Dell EMC reveals new enterprise security portfolio
Endpoint Data Security and Management range combines EMC and Dell products
Dell EMC has today announced its new Endpoint Data Security and Management portfolio, which incorporates products from across the Dell and EMC ranges into a single line.
The portfolio has four main pillars: data protection, Identity assurance, threat detection and response, and unified endpoint management.
Data Protection has two subsections, Dell Data Protection | Endpoint Security Suite Enterprise and MozyEnterprise and MozyPro.
Dell Data Protection | Endpoint Security Suite Enterprise provides authentication, file-based data encryption and advanced threat protection, which the company said will allow businesses to cover both sides of the security coin - data protection and threat prevention.
MozyEnterprise and MozyPro, meanwhile, provides secure, cloud data protection for desktop PCs, laptops and small servers. It is targeted particularly at small to mid-sized businesses and distributed enterprises, providing, Dell EMC claimed, resilient and easy recovery from data loss, whether that be accidental deletion or a malware attack.
The Identity Assurance pillar consists primarily of RSA SecurID Access, the familiar key fob or software-based two-factor authentication that has been iconic of RSA for the past several years.
Threat Detection and Response, meanwhile, covers RSA NetWitness Endpoint, which uses behavioural analytics and machine learning for threat detection, which can in turn help focus investigation efforts where they are most needed.
Finally, Unified Endpoint Management covers VMware AirWatch, the longstanding product range that offers over-the-air management, including configuration management, software distribution and operating system patching, across all platforms.
"With our Endpoint Data Security and Management Portfolio, we are solving real customer pain points when it comes to purchasing and deploying cloud solutions," Jeff Clarke, president of client solutions group at Dell, said.
"Customers have told us they want to consolidate vendors to ease the manageability burden while enhancing their security. That's what we're doing for them," he concluded.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now