aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Multi-Cloud
  • Solutions

Dell Technologies Delivers Zero Trust, Cybersecurity Solutions To Protect Multicloud And Edge Environments

  • aster.cloud
  • October 9, 2022
  • 4 minute read

Dell Technologies (NYSE:DELL) will open a Zero Trust Center of Excellence in collaboration with CyberPoint International and the Maryland Innovation Security Institute (MISI) in Spring 2023 at DreamPort, the U.S. Cyber Command’s premier cybersecurity innovation facility. Dell also unveils new cybersecurity services that allow organizations to assess their Zero Trust and cyber resilience maturity, endpoint security solutions to support hybrid work, and ransomware protection for object storage data.

Zero Trust is a cybersecurity model that shifts how organizations approach security from reliance solely on perimeter defenses to a proactive strategy that allows only known good activity across ecosystems and data pipelines. It allows organizations to better align their cybersecurity strategy across the data center, clouds and at the edge. Dell aims to serve as a catalyst for customers to achieve Zero Trust outcomes by making the design and integration of this architecture easier.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

“In a multicloud world, an organization’s cybersecurity strategy must transcend its infrastructure and extend to its applications and data,” said John Roese, global chief technology officer, Dell Technologies. “We believe a Zero Trust strategy is the best path forward. Dell has the proven IT and security foundation, technology integration experience, and extensive global partner ecosystem to help simplify customers’ cybersecurity transformations.”

Center of Excellence to speed Zero Trust adoption

Together with MISI, CyberPoint International and a team of industry small, women-owned and veteran-owned businesses, Dell will power the Zero Trust Center of Excellence at DreamPort to provide organizations with a secure data center to validate Zero Trust use cases. The Center of Excellence will use the Department of Defense Zero Trust Reference Architecture as its foundation for organizations to test configurations before deployment in their own environments. By orchestrating across an extensive ecosystem, Dell will deliver a repeatable blueprint of the architecture, providing a quicker path to adoption and easing the integration and orchestration burden for customers.

Read More  Mosquitoes Get The Swat With New Mosquito Forecast Built By OFF! Insect Repellents And Google Cloud

“We believe our critical collaboration with Dell Technologies at the DreamPort Center of Excellence will drive rapid innovation and integration of Zero Trust solutions to help the U.S. government and commercial enterprises defend increasingly complex and ongoing cyber threats,” said Horace Jones, president, CyberPoint International.

Cybersecurity services to align with Zero Trust and reduce risk

To help organizations align to Zero Trust principles and achieve cyber resiliency, Dell Cybersecurity Advisory Services provide organizations a roadmap to Zero Trust that builds on their existing cybersecurity assets. These services find and address security gaps, determine advanced technologies customers should implement, and help them learn how to enable continuous vigilance and governance for long-term cyber resiliency. By working with Dell, organizations have the tools and actionable insights they need to better secure their data and IT environments.

To minimize attack surfaces and better protect organizations, Dell offers a new Vulnerability Management service with Dell experts that regularly scan customer environments for vulnerabilities, provide a full picture of exposures and help prioritize patching efforts.

Commercial PC cybersecurity offerings support hybrid work

With breaches happening above and below the operating system, secure devices are foundational to a Zero Trust-ready organization. Dell continues to enhance its portfolio with new offerings that help customers prevent, detect and respond to threats wherever they occur, and allow greater control of the IT environment:

  • Hardware protections for the industry’s most secure commercial PCs:1 To address growing supply chain threats, customers can now opt for Dell to disable PC ports prior to shipment to help prevent tampering of BIOS settings. Dell is also expanding availability of tamper-evident seals to Asia-Pacific, Europe, the Middle East and Africa to offer more physical security measures during shipment.
  • Firmware protections to detect growing threats: Organizations can detect potential tampering of a PC’s BIOS with the new integration of telemetry between Microsoft Intune, as part of Microsoft Endpoint Manager, and Splunk consoles. Within the Microsoft Endpoint Manager admin center, IT administrators can secure, control and configure Dell PCs, including BIOS configuration and password management. These capabilities, which Dell is first to market with, will be available in a future release of Intune, helping ensure user productivity while reducing IT complexity.
  • Advanced software protections: New capabilities from Dell speed threat detection and remediation. Additionally, a new data loss prevention offering helps protect sensitive data from unauthorized downloads onto external USB storage devices, providing greater visibility and policy control on this behavior.
Read More  Hardware Is A Cybersecurity Risk. Here's What We Need To Know

Enhanced cyber protection and recovery for object storage

To address the growth of object storage data, such as videos and photographs, it is critical to take advantage of the latest cyber protection solutions that isolate data, intelligently detect threats and enable fast data recovery.

The Dell ECS Enterprise Object Storage platform expands cyber protection capabilities to help secure object data to an isolated cyber vault residing locally or in a remote environment. Accessible through the AWS S3 protocol, critical applications and backup servers can continue to access the isolated copy while supporting legal compliance in the event of a cyberattack that compromises the primary and secondary data copy. Together with AI-powered threat detection and immutability, the new solution provides organizations a rapid path to data recovery from ransomware and other malicious attacks.

Additional resources

  • Connect with Dell via LinkedIn and Twitter

Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.


Copyright © 2022 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies and Dell are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

1 Based on Dell analysis, September 2022.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Cybersecurity
  • Dell Technologies
  • Object Storage
  • Zero Trust
You May Also Like
View Post
  • Cloud-Native
  • Multi-Cloud

Oracle Expands Multicloud Capabilities with AWS, Google Cloud, and Microsoft Azure

  • September 11, 2024
Cloud computing concept image double exposure Digitally Enhanced Smart City Concept with Cloud Computing
View Post
  • Cloud-Native
  • Computing
  • Hybrid Cloud
  • Multi-Cloud
  • Public Cloud

Make Your Business Resilient By Integrating These Best Practices Into Your Cloud Architecture

  • July 29, 2024
Waldos
View Post
  • Computing
  • Platforms
  • Solutions

Waldo’s Dollar Mart Streamlines Retail Operations With Oracle Cloud

  • February 20, 2024
Vote
View Post
  • Solutions

Technology Industry To Combat Deceptive Use Of AI In 2024 Elections

  • February 16, 2024
View Post
  • Solutions
  • Technology

Delivering Copilot For Everyone

  • February 11, 2024
View Post
  • People
  • Solutions
  • Technology

Farmers In India Are Using AI For Agriculture – Here’s How They Could Inspire The World

  • January 24, 2024
View Post
  • Engineering
  • Platforms
  • Solutions

Simplify Speech Analytics With BigQuery, Powered By Vertex AI

  • January 14, 2024
View Post
  • Solutions
  • Technology

AI For Impact: How Google Cloud Is Bringing AI To Accelerate Climate Action

  • December 3, 2023

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • 3
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 4
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 5
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 6
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 7
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 8
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 9
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 10
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 2
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 3
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 4
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • Nintendo Switch Deals on Amazon 5
    10 Physical Nintendo Switch Game Deals on MAR10 Day!
    • March 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.