Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?


Data Protection

Dell Announces New Supply Chain Security Offerings

Dell Technologies on Thursday announced new security offerings designed to address threats targeting the supply chain, a device’s boot process, and sensitive data.

Dell Technologies on Thursday announced new security offerings designed to address threats targeting the supply chain, a device’s boot process, and sensitive data.

For supply chain security, Dell unveiled SafeSupply Chain solutions. This includes SafeSupply Chain Tamper Evident Services, which involves adding tamper-evident seals to ensure a device has not been modified during transport — for extra security customers can also request pallet seals. The offering also includes SafeSupply Chain Data Sanitization Services, which enables organizations to perform a hard drive wipe before deploying their own images to ensure that there is no spyware or other malware on the device.Dell launches new supply chain security services

Dell also announced that EMC PowerEdge servers will use Secured Component Verification, which leverages an embedded certificate to cryptographically verify that the hardware has not been tampered with after it left the factory.

As for data security, Dell says its entire infrastructure portfolio now supports services for redeploying and retiring assets, specifically Dell EMC Data Sanitization for Enterprise and Data Destruction for Enterprise. In addition, its Dell EMC Keep Your Hard Drive for Enterprise and Keep Your Component for Enterprise services ensure that sensitive data does not leave the customer’s control when components are being replaced.

In terms of boot security, Dell informed PowerEdge customers that they can customize the boot process on their servers to reduce the attack surface. This capability is called PowerEdge UEFI Secure Boot Customization.

PowerEdge server users have also been informed that the integrated Dell Remote Access Controller (iDRAC) allows them to enable or disable a system lockdown without the need for a reboot, preventing inadvertent or malicious modifications to firmware or configuration data. Dell says the latest iDRAC release (iDRAC9) gives users more control over the lockdown, and it offers stronger security controls with multi-factor authentication.

Most of these new services and capabilities are already available and the rest should become available by the end of the year.

Related: Dell Unveils New Data Protection Appliances

Related: New Dell Utility Alerts Security Teams of BIOS Attacks

Advertisement. Scroll to continue reading.

Related: Dell to Sell RSA Security Unit for $2 Billion

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.