Connect with us

Hi, what are you looking for?


Data Protection

Dell Announces New Supply Chain Security Offerings

Dell Technologies on Thursday announced new security offerings designed to address threats targeting the supply chain, a device’s boot process, and sensitive data.

Dell Technologies on Thursday announced new security offerings designed to address threats targeting the supply chain, a device’s boot process, and sensitive data.

For supply chain security, Dell unveiled SafeSupply Chain solutions. This includes SafeSupply Chain Tamper Evident Services, which involves adding tamper-evident seals to ensure a device has not been modified during transport — for extra security customers can also request pallet seals. The offering also includes SafeSupply Chain Data Sanitization Services, which enables organizations to perform a hard drive wipe before deploying their own images to ensure that there is no spyware or other malware on the device.Dell launches new supply chain security services

Dell also announced that EMC PowerEdge servers will use Secured Component Verification, which leverages an embedded certificate to cryptographically verify that the hardware has not been tampered with after it left the factory.

As for data security, Dell says its entire infrastructure portfolio now supports services for redeploying and retiring assets, specifically Dell EMC Data Sanitization for Enterprise and Data Destruction for Enterprise. In addition, its Dell EMC Keep Your Hard Drive for Enterprise and Keep Your Component for Enterprise services ensure that sensitive data does not leave the customer’s control when components are being replaced.

In terms of boot security, Dell informed PowerEdge customers that they can customize the boot process on their servers to reduce the attack surface. This capability is called PowerEdge UEFI Secure Boot Customization.

PowerEdge server users have also been informed that the integrated Dell Remote Access Controller (iDRAC) allows them to enable or disable a system lockdown without the need for a reboot, preventing inadvertent or malicious modifications to firmware or configuration data. Dell says the latest iDRAC release (iDRAC9) gives users more control over the lockdown, and it offers stronger security controls with multi-factor authentication.

Most of these new services and capabilities are already available and the rest should become available by the end of the year.

Related: Dell Unveils New Data Protection Appliances

Advertisement. Scroll to continue reading.

Related: New Dell Utility Alerts Security Teams of BIOS Attacks

Related: Dell to Sell RSA Security Unit for $2 Billion

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.