Dell Technologies (NYSE: DELL) brings intrinsic security to the forefront with new solutions and services that protect customers' data. By building security into its supply chain, services, infrastructure and devices, Dell Technologies helps customers lower risk and become more cyber resilient.
Organizations face increasing pressure to protect themselves and their customers as security risks intensify. TheDell Technologies 2020 Digital Transformation Indexfound that data privacy and cybersecurity concerns are the No. 1 barrier to digital transformation.2RecentFuturum Researchalso found that 56% of companies experienced an external cyberattack attributed to a vulnerability in hardware or silicon-level security.3
"As digital value is created, security threats follow," said John Roese, global chief technology officer, Dell Technologies. "Security is the foundation of everything we do, and our intrinsic security approach addresses our customers' need for trusted technology and partners to help them fend off attacks and lower business risk."
For years, Dell has embedded hundreds of professional security engineers across the company to design and build security into its supply chain, services, infrastructure and devices.From hardware Root of Trust inPowerEdgeservers andsecurity below the operating systemin Dell PCs, to end-to-end encryption inPowerMaxand cyber recovery solutions inPowerProtect, security is top of mind.
"Every new technology and offering should have security at its core," said Patrick Moorhead, president and principal analyst, Moor Insights & Strategy. "IT infrastructure must have built-in security at every juncture, and that security must be predictive rather than reactive, self-defending and generally resilient."
Secure the supply chain and device lifecycle with end-to-end protection
More than three-quarters of organizations prioritize supply chain security during vendor selection3to address security threats such as counterfeit components, malware and firmware tampering. Dell Technologies relieves these concerns with new supply chain security offerings and data security-focused services for Dell Technologies infrastructure and commercial PCs. The new offerings strengthen its comprehensive secure supply chain practices.
Protect PCs during transit:Dell commercial PCs -already the most secure in the industry1-are now available with more layers of supply chain security and integrity controls. Dell Technologies SafeSupply Chain solutions are offered on top of the Dell Secure Development Lifecycle and standard supply chain security measures. New solutions include:
Validate server integrity upon arrival:The Dell EMC PowerEdge server portfolio now comes withSecured Component Verification, an embedded certificate that lets companies verify their servers arrive as they were ordered and built -without hardware compromise. Dell Technologies is the first server provider with a portfolio-wide solution for cryptographically verified hardware integrity.4Also, PowerEdge servers are built with a cyber-resilient architecture, including a well-established siliconRoot of Trust. The new Secured Component Verification:
Redeploy, retire and keep assets securely:Dell Technologies extends its data security-focused services to the entire Dell Technologies infrastructure portfolio:
Secure infrastructure with customization, automation and intelligence
Forty-four percent of organizations experienced at least one hardware-level or BIOS attack over the past 12 months and 16% have had more than one attack.3Companies need to secure infrastructure at the hardware and firmware level to help prevent certain types of vulnerabilities and malicious attacks. Dell Technologies tackles these issues with new levels of security customization, automation and intelligence for the PowerEdge server portfolio.
Customize boot security for servers:The boot process is the secure foundation for any device. If the boot process is compromised, attackers can subvert security controls to access any part of the system. With Dell Technologies server security capabilities, IT staff can customize their server boot process to reduce the threat surface and thwart boot-related attacks. This exclusive capability8-PowerEdge UEFI Secure Boot Customization-provides advanced mitigation for industry-wide bootloader vulnerabilities. This approach is featured in a recent United States National Security Agencyreport.
Lockdown servers to protect against threats:PowerEdge servers' integrated Dell Remote Access Controller (iDRAC) offers automated server management both at the server and remotely. With iDRAC, customers can enable or disable a system lockdown without having to reboot. This Dell-only security feature9prevents unintentional or malicious changes to the server's firmware and critical configuration data. The newest release -iDRAC9 -extends the lockdown capability to include network interface controllers, providing customers more control over the lockdown. The latest release also:
Availability
Additional resources
About Dell Technologies
Dell Technologies(NYSE: DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry's broadest and most innovative technology and services portfolio for the data era.
Copyright ? 2020 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC and Dell EMC are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.
1Based on internal analysis, January 2020
2Dell Technologies 2020 Digital Transformation Index
3Futurum Research, Four Keys to Navigating the Hardware Security Journey, Oct. 2020
4Based on Dell analysis of publicly available data, October 2020. Available on PowerEdge 14G and 15G, except for XE7100, XE7420, XE7220, C6420 and C6525.
5For more information, please see theDell Media Sanitization Statement. Dell makes no recommendations regarding the customer's security needs or representations regarding the effectiveness of one method of data removal over another. It is the customer's responsibility to protect any confidential or sensitive information contained on its hard drives recovered by Dell.
6Non-Dell branded products' eligibility is based on technology type, not vendor.
7Hard drive retention is not available on Chromebook or Venue tablets, except the Venue 11 Pro.
8Feature available on PowerEdge 14 G and newer. Requires customer certificate(s).
9Based on Dell analysis of publicly available data, Oct. 2020.