Mark Davison at Dell’s Technology Camp, Paris – It wouldn’t be a technology camp without new technology and Dell has used the opportunity in Paris this week to launch a slew of new products as it looks to transform, connect, inform and protect customers.
One of the prominent announcements yesterday was four products the company says will make its Connected Security a reality and tackle some of IT’s biggest imperatives in BYOD, cloud, network security and compliance.
“Today’s mega-trends – cloud, BYOD/mobility, and big data – each introduce a magnitude of new threats and vulnerabilities,” says Matt Medeiros, vice-president and GM: security products at Dell.
“The new challenges these threats create for the IT environment – insufficient visibility, silo-ed security, compliance requirements and new reporting – all must be managed with limited resources.
“The only true line of defence is a comprehensive set of predictive, context-aware security solutions that break down silos and protect data where it resides,” he adds. “Dell Connected Security provides a dynamic solution portfolio that gives organisations the power to solve today’s biggest security and compliance challenges, while helping them better prepare for tomorrow. ”
The four new additions to Dell’s Connected Security portfolio are:
* One Identity Cloud Access Manager – addresses the need to control access to cloud apps and other apps from multiple end points – including office desktops, laptops, and mobile devices – that expose organisations to major security vulnerabilities; provides an increased layer of security with access management for both on-premise applications and Web-based applications like Salesforce, Google Apps and 0ffice 365; and enables Connected Security by delivering browser-based access through a unified and secure single sign-on, with just-in-time cloud provisioning, federation, authorisation, and audit capabilities for all use situations.
* The Dell SonicWall Network Security Appliance (NSA) 2600 – Includes critical security capabilities such as intrusion prevention with sophisticated anti-evasion technology; network-based anti-malware with cloud assist; CloudAV Security; Dell SonicWALL Global Response Intelligent Defense (GRID) Network, which gathers input from millions of sensors to provide connected security against today’s increasingly connected threats; SSL decryption and inspection; content/URL filtering; application visibility; application control; and application bandwidth management ; and delivers secure mobile access from a wide variety of platforms including Windows, Linux, MacOS, iOS, Windows 8.1 RT, and Android, enabling organisations to provide multi-layered security and access control rules as part of a multilayered BYOD strategy.
* ChangeAuditor 6.0 – Enables the viewing, correlation and filtering of change events, and provides the relation to other events over the course of time and in chronological order across the Windows environment.
This affords a better understanding and forensic analysis of those events and trends; eliminates unknown security concerns and ensures continuous auditing of critical assets by providing detailed and normalised information on a change, and any related events, in only one click; and delivers on the promise of Connected Security by detecting threats and patterns, enabling a rapid response from any device in realtime.
* InTrust 10.7 – Monitors user access to critical systems and applications, and enables forensic analysis of user and system activity based on historical event data; collects events on user and administrator activity from diverse and widely dispersed systems and applications, and presents them in an easy-to-use and complete form suitable for reporting and analysis; enriches the Dell SecureWorks offering with intelligent data feeds that capture crucial aspects of user activity on Windows systems, detecting internal threats in less time and with less overhead; and supports Connected Security that’s unified with the business by eliminating silos of information, connecting security information across data, user, network, applications, and services.