Dell EMC reveals new enterprise security portfolio

Endpoint Data Security and Management range combines EMC and Dell products

Dell EMC has today announced its new Endpoint Data Security and Management portfolio, which incorporates products from across the Dell and EMC ranges into a single line.

The portfolio has four main pillars: data protection, Identity assurance, threat detection and response, and unified endpoint management.

Data Protection has two subsections, Dell Data Protection | Endpoint Security Suite Enterprise and MozyEnterprise and MozyPro.

Dell Data Protection | Endpoint Security Suite Enterprise provides authentication, file-based data encryption and advanced threat protection, which the company said will allow businesses to cover both sides of the security coin - data protection and threat prevention.

MozyEnterprise and MozyPro, meanwhile, provides secure, cloud data protection for desktop PCs, laptops and small servers. It is targeted particularly at small to mid-sized businesses and distributed enterprises, providing, Dell EMC claimed, resilient and easy recovery from data loss, whether that be accidental deletion or a malware attack.

The Identity Assurance pillar consists primarily of RSA SecurID Access, the familiar key fob or software-based two-factor authentication that has been iconic of RSA for the past several years.

Threat Detection and Response, meanwhile, covers RSA NetWitness Endpoint, which uses behavioural analytics and machine learning for threat detection, which can in turn help focus investigation efforts where they are most needed.

Finally, Unified Endpoint Management covers VMware AirWatch, the longstanding product range that offers over-the-air management, including configuration management, software distribution and operating system patching, across all platforms.

"With our Endpoint Data Security and Management Portfolio, we are solving real customer pain points when it comes to purchasing and deploying cloud solutions," Jeff Clarke, president of client solutions group at Dell, said.

"Customers have told us they want to consolidate vendors to ease the manageability burden while enhancing their security. That's what we're doing for them," he concluded.

Featured Resources

Become a digital service provider

How to transform your business from network core to edge

Download now

Optimal business results with the cloud

Evaluating the best approaches to hybrid cloud adoption

Download now

Virtualisation that enables choices, not compromises

Harness the virtualisation technology that's right for your hybrid infrastructure

Download now

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Security

Mimecast admits hackers accessed users’ Microsoft accounts

13 Jan 2021
What is public key infrastructure (PKI)?
Security

What is public key infrastructure (PKI)?

12 Jan 2021

Most Popular

150,000 arrest records accidentally deleted from police database
data management

150,000 arrest records accidentally deleted from police database

15 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021