Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Dell Launches New Endpoint Data Encryption Solution

Dell today announced an encryption solution designed to help companies protect endpoint devices that contain sensitive information. The “Dell Data Protection | Encryption,” solution is a manageable and auditable solution aimed at helping customers simplify data protection and comply with security regulations.

Dell Encryption Software

Dell today announced an encryption solution designed to help companies protect endpoint devices that contain sensitive information. The “Dell Data Protection | Encryption,” solution is a manageable and auditable solution aimed at helping customers simplify data protection and comply with security regulations.

Dell Encryption Software

With the increase in and rising cost of data breaches, private and public-sector organizations are being forced to reevaluate endpoint device policies. The organizational cost of a data breach incident in the U.S. can be up to $6.75 million, according to a report from the Ponemon Institute.

Dell Data Protection | Encryption is a file-based encryption solution that is designed to protect data on laptops and desktops, as well as external media, in case of loss or theft.

Management and Reporting features allow IT managers to ensure endpoints are protected, through detecting devices that need encryption, enforcing policies and auditing encryption state, regardless of user, device or location.

Dell Data Protection| Encryption is now available through volume licensing. Dell says that Factory installation on Dell Latitude notebooks, Dell OptiPlex desktops and Dell Precision mobile and desktop workstations will be available soon, though no timeline was given.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.