Dell, EMC, Dell Technologies, Cisco,

Sunday, October 30, 2016

Dell strategies to build security business

#Dell creates a turnkey security bundle to extend value of its commercial PCs, says Jane Wright, principal analyst at TBR. Within the combined security portfolios of Dell, #EMC, #RSA and #VMware, #DellTechnologies possesses many of the components business customers need to secure their users’ endpoints. Just seven weeks after forming Dell Technologies, Dell took the first step to ensure interoperability of its security components and bundle them for easier ordering and support. At Dell EMC World 2016, Dell announced it enabled interoperability of Dell Data Protection Endpoint Security Suite Enterprise (DDP | ESSE), which provides data encryption and threat detection, with Mozy by Dell, which provides cloud-based data backup and recovery. This first bundle is well-timed, as ransomware attacks are becoming more prevalent. DDP encrypts data so it is not useful to the ransomware attacker, and Mozy enables the ransomware victim to quickly recover their data following the attack. The new bundle increases the value proposition of Dell’s commercial PCs, as it affords IT and line-of-business decision makers ease of implementation as well as visibility into and control over users’ PCs. Dell’s endpoint security investments position the vendor to capture a greater share of the enterprise security market Dell’s road map calls for further interoperability and bundling of its endpoint security tools including NetWitness, an RSA product that provides additional endpoint threat detection algorithms, and SecurID, RSA’s widely deployed identity and authentication solution. However, Dell’s planned bundle will leave customers with four different security agents running on each endpoint. TBR believes customers will resist installing and managing so many agents due to complexity, performance and cost issues. This resistance will not be unique to Dell, though, as other vendors aiming to implement different security controls on their customers’ endpoints also require multiple agents.
http://www.infotechlead.com/security/dell-strategies-to-build-security-business-43595

No comments:

Post a Comment