Dell launches security management software

Solutions focus on encryption and user authentication

Tags: Dell CorporationEncryptionUnited Arab Emirates
  • E-Mail
Dell launches security management software Dell is launching two new security software solutions focusing on encryption and authentication. (Getty Images)
By  Georgina Enzer Published  June 16, 2011

Dell has launched two new solutions for client security which focus on data encryption and user authentication, which will be launched in the Middle East this month.

 "We split security up into four quadrants; protecting your data, protecting the system itself, preventing unauthorised access or authentication of the user and anti-malware for preventing malicious attacks. We have launched two solutions which have addressed the two biggest pain points of our customers, which is data encryption - protecting data - and authenticating the user," said David Konetski, senior technical staff, office of the CTO, Dell.

According to Dell, many of its customers are requesting end-to-end solutions from the company from end-points to back-end, security and services.

Dell's new authentication service, recently launched in Europe, now provides a full back-end system with easy deployment for SMBs.

"For years we have been providing the ability to authenticate, so now with a swipe of the finger I can get into a laptop in the pre-boot environment, this gets me into an authentication screen, which allows us to  authenticate the user before any software runs on the machine, making it a very secure environment. We have single sign on so that will take me all the way through the BIOS, through the machine itself and then onto the network," said Konetski.

Dell's authentication system is designed to be easy for small businesses to set up, if they do not have a back-end management system.

The new authentication software also provides a swift file-based encryption solution that is faster to deploy than traditional sector-based encryption.

"With a sector-based system you have to lift all the data off the machine to search the hard drive for errors, hope you find everything, then start putting it all back on with encryption. What then happens is you have 5% to 10% fall out. It also takes about a full day to deploy that type of system. Our system is file-based so we are able to deploy within about an hour and we don't touch the file system we just encrypt the files as they sit in the drive and what that enables us to do is implement a very flexible encryption key structure," said Konetski.

Dell is also able to deploy individual keys so that high-security data cannot be accessed by even the IT department.

"If you are a high-level executive and you have data files that you don't want anyone to see including your IT manager then we are able to deploy individual keys - user as well as IT keys - so IT can get in and do patch management and all the data updates they need to do," said Konetski.

Dell's authentication system also employs the use of templates, designed for SMBs who may not have security professionals, these templates set up all the company's policies and reporting automatically.

"If the settings need to be payment card compliant, we have settings for that, we have settings for healthcare etc. So it sets up all your policies and reporting," said Konetski.

"We also do removable storage as well as hard drive storage with the same back-end management system."


Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code