Cyberthreats: Dell Technologies unveils new security services and solutions

by times news cr

2024-08-04 16:05:44

According to 72% of business leaders and IT professionals, changing ways of working expose their organizations to increasing risks, the company said in a statement, noting that highly distributed IT environments create new opportunities for cybercriminals and require companies to transform their approach to securing and recovering data and systems.

Dell Technologies’ new security offerings enable businesses to reduce risks and protect their activities, the company noted.

“Healthcare facilities have become prime targets for cybercriminals. Our partnership with Dell Technologies is critical to ensuring we have the best IT system in place while securing our data and sensitive patient information,” said Theodore Fotias, vice president of IT infrastructure at Phoenix Children’s Hospital, in the release.

“Dell security solutions give us the peace of mind we need to focus on our priorities: providing the best possible care and research to our patients,” he said.

For his part, Dell Technologies Senior Vice President of Corporate Strategy Matt Baker said: “Security is in Dell’s DNA. It’s built into our design, our infrastructure, our supply chain and our products.”

“Our growing portfolio of security services and solutions helps businesses address their biggest security challenges and address the growing complexity of securing networks, endpoints and systems. We help our customers drive resilience in a complex environment,” he continued.

The Managed Detection and Response (MDR) Pro Plus offering helps strengthen the security of IT systems

Dell is expanding the capabilities of its MDR offering with Managed Detection and Response Pro Plus, a fully managed security operations solution that helps businesses prevent, respond to and recover from security threats, the statement said.

With Managed Detection and Response Pro Plus, Dell protects network endpoints, infrastructure, software, hardware and cloud environments including:

– 24/7 threat detection and research, while identifying vulnerabilities and prioritizing fixes;

– Automated breach and attack simulations to ensure the proper functioning and configuration of existing corporate network security controls, including web and email gateway settings;

– Hacking tests to find access vulnerabilities to a company’s environment using the same techniques as hackers, flagging potentially suspicious activities and recommending security posture optimizations;

– Cybersecurity training offered throughout the year in the form of clear and concise modules, in order to raise employee awareness of threats and encourage the adoption of good practices.

Dell Expands Threat Management Portfolio with CrowdStrike

In addition to a managed services approach, Dell Technologies enables businesses to design, manage and secure their own IT environments.

Dell is now offering customers a broader choice of cybersecurity software with the addition of CrowdStrike Falcon to its SafeGuard and Response portfolio, the source said.

CrowdStrike’s industry-leading cloud-native platform gives organizations access to a broad suite of defenses, helping accelerate threat research and response to protect critical business risk areas: endpoints and cloud workloads, identity management, and data.

The addition of CrowdStrike to the portfolio enables businesses to further benefit from Dell Technologies’ support to meet their growing security needs.

The company thus supports its customers in their journey towards a zero trust architecture thanks to scalable solutions.

Dell provides hardware protection for its business PCs

Dell Technology delivers the most secure business PCs on the market, launching a cloud version of its Secured Component Verification (SCV) offering, which enables businesses to benefit from increased security, from PC design to the supply chain.

This optimized solution provides enterprise customers with the added assurance that their PCs will be delivered in the exact configuration as ordered and factory-built.

Secure cloud-based component verification helps reduce the risk of tampering with Dell business PCs, including a digital certificate stored in a secure cloud environment that documents key PC components at the factory.

Upon delivery, IT teams can access these certificates to verify the integrity of individual PC components. This unique offering also allows IT teams to verify an entire fleet in a single view, rather than each device individually, providing an additional layer of security while saving significant time.

Product Success Accelerator for Cyber ​​Recovery promotes protection against attacks

Dell launches Product Success Accelerator (PSX) for Cyber ​​Recovery, a new service to help businesses prepare for cyberattacks.

With this solution, companies can more easily and quickly set up a highly secure and isolated cyber recovery vault. This allows them to protect their critical data and maintain their business in the event of a security incident.

Added to Dell’s growing portfolio of cyber recovery solutions and services, PSX for Cyber ​​Recovery is the first standardized, outcomes-based service available within the new PSX family.

Depending on their needs, companies can choose between three levels of support.

– Ready: Includes planning workshops, Dell Cyber ​​Recovery Vault installation and configuration, user manual, success plan, and cybersecurity skills training.

– Optimize: Adds quarterly recovery vault assessments, environment recommendations including updates, patches and policies, and assisted recovery test simulations.

– Operate: Adds ongoing operational support to monitor and investigate activities, initiate corrective actions, and provide support in the event of a cyberattack.

Dell Technologies helps businesses and people build their digital future and transform the way they work, live and play. The company offers customers the industry’s broadest and most innovative portfolio of technologies and services for the data age.

2024-08-04 16:05:44

You may also like

Leave a Comment