Simply secure your endpoints

Transcription

Simply secure your endpoints
Simply secure
your endpoints
Dell Data Protection | Endpoint Security Suite
The Dell Data Protection |
Endpoint Security Suite
Advantage
• Sales and support for your hardware
and security solutions from one
source
• Automatic deployment and
provisioning when factory-installed
on Dell commercial devices
• Single integrated client simplifies
deployment and updates and ensures
all your endpoint protection works
seamlessly together
• Easy compliance and auditing with
pre-defined compliance reports
and policy templates, remote
management and quick system
recovery
• Management console with fast and
easy deployment in VMware with
a fully integrated database and key
management
• Endpoint protection based on end
user profiles, data and groups within
your organization
Endpoint security and compliance are critical to every organization, no matter the size.
Organizations must secure endpoint devices and the data on them, while still satisfying
end user requirements to embrace computing trends like bring-your-own-device
(BYOD), sharing data in public cloud storage and workforce mobility. Traditional endpoint
protection solutions attempt to address these needs, but managing multiple clients and
consoles is difficult for resource constrained IT teams, especially those without security
experts in house. Most endpoint protection solutions are difficult to deploy and manage,
lack coverage for all endpoints, and reduce performance for users.
Dell Data Protection | Endpoint Security Suite (DDP | ESS) offers strong endpoint
protection for business data, systems, and reputations. The suite offers an integrated
client that includes threat protection, authentication and encryption, all centrallymanaged via a single console to help businesses reduce IT management costs and
complexity. With consolidated compliance reporting and console threat alerts, businesses
can easily enforce and prove compliance for all of their endpoints. Built in security with
features like pre-defined policy and report templates is especially helpful to mid-sized
organizations with smaller, less specialized IT teams.
Encryption
Dell Data Protection | Encryption (DDP | E) provides a data-centric, policy-based
approach to encryption that protects your data without disrupting IT processes or end
user productivity. Designed for easy deployment, end user transparency, and hasslefree compliance, DDP | E delivers a high level of protection, fills critical security gaps
and allows you to manage encryption policies for multiple endpoints and operating
systems—all from a single management console.
DDP | E includes software- and hardware-based encryption, management of Microsoft®
BitLocker, and protection of data on external media, self-encrypting drives, mobile
devices and data in public cloud storage services. It allows IT to easily enforce
encryption policies wherever the data resides without end user intervention. A
perfect solution for mixed-vendor environments, DDP | E is supported on both Dell
and non-Dell devices and offers many benefits including:
• Detailed, enterprise-wide encryption status reporting helps avoid costly fines and
damaged reputations if a device is lost or stolen
• No special disk preparation or defragmenting required before encryption
• System disk and external media encryption in a single solution
• Integration with existing processes for authentication, patching and more
• Encryption of all data, except files essential to booting the operating system or
full disk encryption, depending on your preference
• Enhanced port control system to prevent data leakage
For customers needing a higher level of security, Dell offers hardware-based
encryption with the Dell Data Protection | Hardware Crypto Accelerator (DDP | HCA),
which offloads encryption processing to hardware while the software client manages
policy enforcement and communications with the management server. Exclusive
to select Dell Latitude, OptiPlex and Precision commercial systems, the DDP | HCA
offers the highest level of U.S. Federal Information Processing Standards (FIPS)
certification available for a commercial disk encryption solution – FIPS 140-2 Level 3.
This solution helps prevent attacks on sensitive data without slowing users down.
Advanced Authentication
Dell Data Protection | Security Tools (DDP | ST) supports advanced hardware
authentication, such as Dell’s fully-integrated fingerprint, smart card or contactless
smart card reader options. DDP | ST helps manage these multiple hardware
authentication methods, supports pre-OS login with self-encrypting drives, single
sign-on (SSO) and manages user credentials and passwords. The ability to reset a
Windows password via an authorized smartphone is just one example of how
DDP | ST helps enable end users while minimizing help desk calls.
Dell ControlVault, available on select Dell systems, offers secure hardware storage
for all user credentials — such as user passwords, smart card data or fingerprint
data — used during Microsoft Windows pre-boot. Dell ControlVault fully isolates a
user’s credentials from potentially unsecured operating systems and hard drives.
The cryptographic secrets which protect the user data, when stored on the PC, are
kept in a secure cryptographic co-processor hardware device and are processed
inside that device instead of in main memory where viruses can spy on the process.
This option helps ensure the ultimate protection, even against sophisticated hackers
attempting to gain access to critical systems.
Integrated Threat Protection
Dell Data Protection | Endpoint Security Suite includes threat protection to secure
your business from malware, phishing and other common threats that target
end users, systems and data. This traditional threat protection is a must have for
every endpoint and includes anti-virus, anti-spyware, host firewall, host intrusion
prevention and web security and content filtering. Dell brings it all together with
consolidated compliance reporting, centralized management and automated threat
alerts to help businesses reduce IT management costs and complexity. DDP | ESS
threat protection includes:
• Anti-Virus and Anti-Spyware - Every time a file on your computer is accessed,
virus and spyware protection scans the file to make sure it is free of anything
potentially harmful
• Host Firewall - Silently monitors communications traffic for suspicious activity
and takes appropriate action, such as blocking
• Browser safety – Web content filtering allows administrators to control access to
websites based on safety rating, content category, or specific URLs
• Server Alerts - Critical and Major threat protection events seen at the endpoint are
immediately sent to the server, with lower severity events captured on the next
polling interval
Technical Specifications
DDP | Endpoint Security Suite is available
for mixed vendor environments that meet
the below specifications.
Supported Client Operating Systems:
• Microsoft Windows 7 Ultimate,
Enterprise & Professional
• Microsoft Windows 8 and 8.1, Enterprise
& Professional
DDP | Hardware Crypto Accelerator is
available on select Dell Precision, Latitude
and OptiPlex systems that meet the below
specifications.
Supported Operating Systems:
• Microsoft Windows 7 Ultimate,
Enterprise & Professional
• Microsoft Windows 8 or 8.1 with
downgrade rights
DDP Enterprise Server – Virtual Edition
is imported into one of the following
virtualized environments:
• VMware ESXi 5.1
• VMware Workstation 9 & 10
Virtual machine host OS support includes:
• CentOS Linux
• Oracle Linux
• Red Hat Enterprise Linux
• SUSE Linux Enterprise Server and
Desktop
• Open SUSE Linux
• Ubuntu Linux
• Microsoft Windows XP, Vista, 7, 8 and 8.1
• Microsoft Windows Server 2003, 2003
R2, 2008, 2008 R2, 2012, 2012 R2
VE Remote Management Console OS
Support:
• Microsoft Windows Server 2003 and
2003 R2 (32- & 64-bit), Standard &
Enterprise
• Microsoft Windows Server 2008 R2 64bit, Standard & Enterprise
• Microsoft Windows Server 2008 SP2 32bit or 64-bit, Standard & Enterprise
• Microsoft Windows 7 Enterprise,
Professional & Ultimate