Simply secure your endpoints
Transcription
Simply secure your endpoints
Simply secure your endpoints Dell Data Protection | Endpoint Security Suite The Dell Data Protection | Endpoint Security Suite Advantage • Sales and support for your hardware and security solutions from one source • Automatic deployment and provisioning when factory-installed on Dell commercial devices • Single integrated client simplifies deployment and updates and ensures all your endpoint protection works seamlessly together • Easy compliance and auditing with pre-defined compliance reports and policy templates, remote management and quick system recovery • Management console with fast and easy deployment in VMware with a fully integrated database and key management • Endpoint protection based on end user profiles, data and groups within your organization Endpoint security and compliance are critical to every organization, no matter the size. Organizations must secure endpoint devices and the data on them, while still satisfying end user requirements to embrace computing trends like bring-your-own-device (BYOD), sharing data in public cloud storage and workforce mobility. Traditional endpoint protection solutions attempt to address these needs, but managing multiple clients and consoles is difficult for resource constrained IT teams, especially those without security experts in house. Most endpoint protection solutions are difficult to deploy and manage, lack coverage for all endpoints, and reduce performance for users. Dell Data Protection | Endpoint Security Suite (DDP | ESS) offers strong endpoint protection for business data, systems, and reputations. The suite offers an integrated client that includes threat protection, authentication and encryption, all centrallymanaged via a single console to help businesses reduce IT management costs and complexity. With consolidated compliance reporting and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Built in security with features like pre-defined policy and report templates is especially helpful to mid-sized organizations with smaller, less specialized IT teams. Encryption Dell Data Protection | Encryption (DDP | E) provides a data-centric, policy-based approach to encryption that protects your data without disrupting IT processes or end user productivity. Designed for easy deployment, end user transparency, and hasslefree compliance, DDP | E delivers a high level of protection, fills critical security gaps and allows you to manage encryption policies for multiple endpoints and operating systems—all from a single management console. DDP | E includes software- and hardware-based encryption, management of Microsoft® BitLocker, and protection of data on external media, self-encrypting drives, mobile devices and data in public cloud storage services. It allows IT to easily enforce encryption policies wherever the data resides without end user intervention. A perfect solution for mixed-vendor environments, DDP | E is supported on both Dell and non-Dell devices and offers many benefits including: • Detailed, enterprise-wide encryption status reporting helps avoid costly fines and damaged reputations if a device is lost or stolen • No special disk preparation or defragmenting required before encryption • System disk and external media encryption in a single solution • Integration with existing processes for authentication, patching and more • Encryption of all data, except files essential to booting the operating system or full disk encryption, depending on your preference • Enhanced port control system to prevent data leakage For customers needing a higher level of security, Dell offers hardware-based encryption with the Dell Data Protection | Hardware Crypto Accelerator (DDP | HCA), which offloads encryption processing to hardware while the software client manages policy enforcement and communications with the management server. Exclusive to select Dell Latitude, OptiPlex and Precision commercial systems, the DDP | HCA offers the highest level of U.S. Federal Information Processing Standards (FIPS) certification available for a commercial disk encryption solution – FIPS 140-2 Level 3. This solution helps prevent attacks on sensitive data without slowing users down. Advanced Authentication Dell Data Protection | Security Tools (DDP | ST) supports advanced hardware authentication, such as Dell’s fully-integrated fingerprint, smart card or contactless smart card reader options. DDP | ST helps manage these multiple hardware authentication methods, supports pre-OS login with self-encrypting drives, single sign-on (SSO) and manages user credentials and passwords. The ability to reset a Windows password via an authorized smartphone is just one example of how DDP | ST helps enable end users while minimizing help desk calls. Dell ControlVault, available on select Dell systems, offers secure hardware storage for all user credentials — such as user passwords, smart card data or fingerprint data — used during Microsoft Windows pre-boot. Dell ControlVault fully isolates a user’s credentials from potentially unsecured operating systems and hard drives. The cryptographic secrets which protect the user data, when stored on the PC, are kept in a secure cryptographic co-processor hardware device and are processed inside that device instead of in main memory where viruses can spy on the process. This option helps ensure the ultimate protection, even against sophisticated hackers attempting to gain access to critical systems. Integrated Threat Protection Dell Data Protection | Endpoint Security Suite includes threat protection to secure your business from malware, phishing and other common threats that target end users, systems and data. This traditional threat protection is a must have for every endpoint and includes anti-virus, anti-spyware, host firewall, host intrusion prevention and web security and content filtering. Dell brings it all together with consolidated compliance reporting, centralized management and automated threat alerts to help businesses reduce IT management costs and complexity. DDP | ESS threat protection includes: • Anti-Virus and Anti-Spyware - Every time a file on your computer is accessed, virus and spyware protection scans the file to make sure it is free of anything potentially harmful • Host Firewall - Silently monitors communications traffic for suspicious activity and takes appropriate action, such as blocking • Browser safety – Web content filtering allows administrators to control access to websites based on safety rating, content category, or specific URLs • Server Alerts - Critical and Major threat protection events seen at the endpoint are immediately sent to the server, with lower severity events captured on the next polling interval Technical Specifications DDP | Endpoint Security Suite is available for mixed vendor environments that meet the below specifications. Supported Client Operating Systems: • Microsoft Windows 7 Ultimate, Enterprise & Professional • Microsoft Windows 8 and 8.1, Enterprise & Professional DDP | Hardware Crypto Accelerator is available on select Dell Precision, Latitude and OptiPlex systems that meet the below specifications. Supported Operating Systems: • Microsoft Windows 7 Ultimate, Enterprise & Professional • Microsoft Windows 8 or 8.1 with downgrade rights DDP Enterprise Server – Virtual Edition is imported into one of the following virtualized environments: • VMware ESXi 5.1 • VMware Workstation 9 & 10 Virtual machine host OS support includes: • CentOS Linux • Oracle Linux • Red Hat Enterprise Linux • SUSE Linux Enterprise Server and Desktop • Open SUSE Linux • Ubuntu Linux • Microsoft Windows XP, Vista, 7, 8 and 8.1 • Microsoft Windows Server 2003, 2003 R2, 2008, 2008 R2, 2012, 2012 R2 VE Remote Management Console OS Support: • Microsoft Windows Server 2003 and 2003 R2 (32- & 64-bit), Standard & Enterprise • Microsoft Windows Server 2008 R2 64bit, Standard & Enterprise • Microsoft Windows Server 2008 SP2 32bit or 64-bit, Standard & Enterprise • Microsoft Windows 7 Enterprise, Professional & Ultimate