Dell Technologies strengthens security portfolio

Dell Technologies is announcing new security services and solutions to help organisations protect against threats, respond to attacks and secure their devices, systems and clouds.

Seventy-two percent of IT business leaders and professionals believe the changing working world exposes their organisation to even greater risk. The highly distributed IT environment creates new opportunities for cybercriminals and requires organisations to transform their approach to securing and recovering their data and systems. Dell’s new security offerings help tackle these challenges so organisations can reduce risk and protect their business.

"Our partnership with Dell Technologies is invaluable for achieving our IT goals while securing our data and patients’ sensitive information at a time when health care institutions are prime targets for cyberattacks,” said Theodore Fotias, vice president, IT Infrastructure, Phoenix Children’s Hospital. “Dell security solutions give us the peace of mind we need to focus on what matters most: delivering the best possible research and care to our patients."

“Security is embedded in Dell’s DNA. It’s built into our designs, infrastructure, supply chain and our products,” said Matt Baker, senior vice president of Corporate Strategy, Dell Technologies. “Our growing portfolio of security services and solutions is helping organisations tackle their toughest security challenges and addressing the increasing complexity of how they stay secure across networks, devices and systems. We’re helping customers double down on resilience in a challenging environment.”

Managed Detection and Response (MDR) Pro Plus helps safeguard IT environments

Dell is expanding the capabilities of its MDR offering with Managed Detection and Response Pro Plus, a fully managed security operations solution that helps organisations prevent, respond and recover from security threats.

With Managed Detection and Response Pro Plus, Dell protects endpoints, infrastructure, software, hardware and clouds by:

•Delivering 24x7 threat detection and investigation while also identifying vulnerabilities and prioritising patching.

•Conducting breach and attack simulations to ensure an organisation’s existing security controls, including web or email gateway settings, are configured and working properly.

•Carrying out penetration testing to find vulnerable pathways into an organisation’s environment utilising the same techniques seasoned hackers use, flagging potentially suspicious activity and recommending security posture improvements.

•Providing year-round cybersecurity training in concise, easy-to-learn modules to improve employee awareness of risks and encourage best practices.

•Offering Incident Recovery Care to quickly deploy certified experts to assess a security incident and get the customer back to business if a breach occurs.

Dell augments its threat management portfolio with CrowdStrike

In addition to a managed services approach, Dell empowers organisations to design, manage and secure their own IT environments. Dell now offers customers more choice in cybersecurity software with the addition of CrowdStrike Falcon into its SafeGuard and Response portfolio. With CrowdStrike’s industry leading cloud native platform, organisations can access an extended suite of defenses that accelerate threat investigation and response to protect critical areas of enterprise risk: endpoints and cloud workloads, identity and data. Adding CrowdStrike to the portfolio makes it easier for organisations to rely on Dell for their expanding security needs, including on their journey to a Zero Trust architecture with scalable and best-in-class solutions.

Dell delivers hardware protections to Dell commercial PCs

Dell builds the industry’s most secure commercial PCs.[ii] Providing organisations an additional boost of confidence with integration between Dell’s PC design and supply chain, Dell is launching a cloud-based version of its Secured Component Verification (SCV) offering. The enhanced solution gives enterprise customers added security assurance that their PCs arrive as they were ordered and built from the factory.

Secured Component Verification on Cloud helps reduce the risk of product tampering of Dell commercial PCs. Dell generates a digital certificate, stored in a secure cloud environment, that documents key PC components in the factory. Upon delivery, IT teams can review the PCs against their corresponding certificates to verify component integrity. This unique offering also allows IT teams to verify an entire PC fleet in a single view versus each device locally, providing an additional layer of security while saving time.

Product Success Accelerator for Cyber Recovery helps protect against attacks

To help organisations prepare for a potential cybersecurity event, Dell is introducing Product Success Accelerator (PSX) for Cyber Recovery. The new service streamlines the implementation and operation of a more secure, isolated Cyber Recovery vault so organisations can protect critical data and maintain business continuity.

Joining Dell’s growing portfolio of cyber recovery solutions and services, PSX for Cyber Recovery is the first standardised, outcome-based service available within the new PSX family. Companies can choose from three levels of assistance based on their needs.

•Ready includes planning workshops, installation and configuration of a Dell Cyber Recovery vault, a runbook, a success plan and cybersecurity skills training

•Optimise adds quarterly vault assessments, recommendations for the environment, including updates, patches and policies, and assisted restore test simulations.

•Operate adds ongoing operational assistance to monitor and investigate activity, initiate corrective actions and provide support in the event of a cyberattack.


The partnership will enable CyberCX to equip its customers with unprecedented visibility over their encrypted network, ensuring they meet both internal and regulatory encryption standards.
Programme offers channel partners strong revenue potential, significant growth opportunities, and industry-leading resources and tools.
Delivering more ways for European customers to prove trust via localised product enhancements, updated policy frameworks and expanded partner ecosystem.
Research indicates that encrypted connections have become the preferred method for malware delivery, putting organisations that don’t decrypt traffic at higher risk.
HP kicks off global Amplify Partner Conference with future-ready strategy for driving greater collaboration and benefits.
CrowdStrike's strategic investment vehicle, the CrowdStrike Falcon Fund, has invested in Abnormal Security, the leading behavioral AI-based email security platform.
The adoption of the AI-powered platform follows a period of rapid growth for Gigaclear and aligns with the internet service provider’s data transformation strategy. This focuses on the implementation of best-in-class platforms and technology to deliver against its data privacy, compliance and data governance goals.
Veracode, a leading global provider of intelligent software security solutions, has opened its new engineering facility in Prague, Czech Republic (Prague Engineering Centre ). The center has been built in partnership with Accion Labs, a global provider of end-to-end software product engineering services, and will leverage expanded international support to deliver Veracode’s market-leading software security solutions.