Dell today announced the availability of a new endpoint security suite designed to help organizations of all sizes protect sensitive information and meet compliance requirements.
The Dell Data Protection | Endpoint Security Suite (DDP | ESS) is an easy-to-deploy solution that delivers authentication, encryption, and threat protection capabilities.
According to Dell, the threat protection system is powered by antivirus and anti-spyware technologies that leverage a combination of signatures and heuristics to identify and block threats. Protection is also provided by several other security layers, including a centrally managed personal firewall, a Web reputation service, and a content filtering mechanism. The firewall enables businesses to monitor traffic and take appropriate action in case suspicious activity is detected, while the content filtering system allows IT administrators to control access to websites based on safety ratings, content categories, and specific URLs.
DDP | ESS authentication focuses on authentication to the Windows operating system. The solution offers a wide range of Windows login options, such as passwords, smartcards and fingerprint readers, and one-time passwords generated by a smartphone app.
“Multi-factor authentication, using two or more of the available options, centralized management, and authentication key backup are all native to the solutions,” Dell told SecurityWeek. “PBA, Pre-boot authentication before the OS loads, is supported with password and contact smart card for self-encrypting drives as well as the FIPS 140-2 Level 3 encryption accelerator expansion card available on Dell PC (aka Hardware Crypto Accelerator).”
DDP | ESS is deployed through a single client install process, and it comes with a wizard for quick and easy setup and configuration.
Organizations can manage all components from a single console that provides consolidated status and compliance reporting capabilities. Compliance reports can be easily generated even by small IT teams that lack in-house security specialists by using pre-set policy and report templates, Dell said.
“We integrate authentication, encryption and threat protection into a single client so customers don’t have to piece together a solution from multiple vendors and try to make it all work. We ensure everything works together seamlessly and provide centralized management and reporting for everything via a single console. Future launches will include additional endpoint security capabilities,” the company noted.
Pricing for the Dell Data Protection | Endpoint Security Suite starts at $109 per client when ordered with Dell hardware, and $129 per client as software for Dell and non-Dell systems.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
