Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Dell Launches New Endpoint Data Encryption Solution

Dell today announced an encryption solution designed to help companies protect endpoint devices that contain sensitive information. The “Dell Data Protection | Encryption,” solution is a manageable and auditable solution aimed at helping customers simplify data protection and comply with security regulations.

Dell Encryption Software

Dell today announced an encryption solution designed to help companies protect endpoint devices that contain sensitive information. The “Dell Data Protection | Encryption,” solution is a manageable and auditable solution aimed at helping customers simplify data protection and comply with security regulations.

Dell Encryption Software

With the increase in and rising cost of data breaches, private and public-sector organizations are being forced to reevaluate endpoint device policies. The organizational cost of a data breach incident in the U.S. can be up to $6.75 million, according to a report from the Ponemon Institute.

Dell Data Protection | Encryption is a file-based encryption solution that is designed to protect data on laptops and desktops, as well as external media, in case of loss or theft.

Management and Reporting features allow IT managers to ensure endpoints are protected, through detecting devices that need encryption, enforcing policies and auditing encryption state, regardless of user, device or location.

Dell Data Protection| Encryption is now available through volume licensing. Dell says that Factory installation on Dell Latitude notebooks, Dell OptiPlex desktops and Dell Precision mobile and desktop workstations will be available soon, though no timeline was given.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybercrime

A database containing over 235 million unique records of Twitter users is now available for free on the web, cybercrime intelligence firm Hudson Rock...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Privacy

The EU's digital policy chief warned TikTok’s boss that the social media app must fall in line with tough new rules for online platforms...