· Secures critical business documents and maintains protection as data moves across devices
· Provides IT with the authority to enact data leakage prevention, digital rights management, and file access monitoring
· Expands visibility of where and how businesses access their data with granular policy controls capabilities
Dell has announced the release of Dell Data Protection | Secure Lifecycle, a data protection solution to protect business data wherever that information travels. The latest addition to the Dell Data Security Solutions portfolio, Secure Lifecycle protect critical business data at all stages of the lifecycle – at rest, in motion, and in use – whether inside or outside of a network. It also provides the ability to define access rights at a granular level, giving IT leaders the authority to restrict individual file access rights only to those that ‘need to know.’
Secure Lifecycle combines multiple functionalities into an integrated solution: data encryption, file access monitoring, DLP (data leakage prevention) and DRM (digital rights management), to provide data protection with a single console. According to Dell existing solutions address selected elements of data security and are unable to protect data that leave an organisation’s environment. Among its most important capabilities is delivering visibility into the location of data. It provides ubiquitous coverage across devices and operating systems, safeguarding files on external storage such as USB keys (Editor's note: an external flash drive that connects via the USB port) and major public cloud services, as well as on iOS and Android smartphones and tablets via a secure file container.
“In the modern work environment, data travel between people and devices. Securing and encrypting these data, not just at rest, but in motion and in use, has become critical to maintaining integrity and control,” said Brett Hansen, VP, Dell Endpoint Data Security and Management. “Dell Data Protection | Secure Lifecycle protects data at all stages of the lifecycle and provides the visibility and confidence for organisations to embrace the mobile workforce—securely.”
The majority of today’s organisations recognise the importance of a robust cybersecurity programme but often struggle to maintain visibility into how often and from where outside actors are accessing their data, as well as understand how their current policies may be limiting productivity or exposing potential threats. The average company has up to 89 third-party vendors accessing their company’s network each week, with each outside access bringing individual risks to data not properly protected*.
In addition, a recent Dell Data Security Survey shows that 80% of midsize organizations are concerned about uploading files to popular public cloud platforms. Dell Data Protection | Secure Lifecycle provides a heightened level of encryption, which matches the realities of the modern workplace by providing:
· Full visibility: Organisations can understand where and how critical business information is being used, leaked or lost.
· Granular policy controls: Through comprehensive digital rights functionality, IT departments can enact more granular management over their data for better control of how documents are being viewed and even set individual rights for different users viewing the same document.
· Protection of Microsoft Office files: Transparent encryption policies protect data in motion across PCs, smartphones and tablet devices. At the same time, shared data are secure across common collaborative tools such as Box and Dropbox.
· Supported across all devices: The solution allows employees to download secure mobile protection from their app store, enhancing manageability for IT departments. Further, office plug-ins run seamlessly with Microsoft Office 2010 and upward, allowing for improved collaboration with colleagues outside an organisation.
Interested?
Dell Data Protection | Secure Lifecycle will be available December 1, 2016, in Singapore.
*Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers, Bomgar, 2016
· Provides IT with the authority to enact data leakage prevention, digital rights management, and file access monitoring
· Expands visibility of where and how businesses access their data with granular policy controls capabilities
Dell has announced the release of Dell Data Protection | Secure Lifecycle, a data protection solution to protect business data wherever that information travels. The latest addition to the Dell Data Security Solutions portfolio, Secure Lifecycle protect critical business data at all stages of the lifecycle – at rest, in motion, and in use – whether inside or outside of a network. It also provides the ability to define access rights at a granular level, giving IT leaders the authority to restrict individual file access rights only to those that ‘need to know.’
Secure Lifecycle combines multiple functionalities into an integrated solution: data encryption, file access monitoring, DLP (data leakage prevention) and DRM (digital rights management), to provide data protection with a single console. According to Dell existing solutions address selected elements of data security and are unable to protect data that leave an organisation’s environment. Among its most important capabilities is delivering visibility into the location of data. It provides ubiquitous coverage across devices and operating systems, safeguarding files on external storage such as USB keys (Editor's note: an external flash drive that connects via the USB port) and major public cloud services, as well as on iOS and Android smartphones and tablets via a secure file container.
“In the modern work environment, data travel between people and devices. Securing and encrypting these data, not just at rest, but in motion and in use, has become critical to maintaining integrity and control,” said Brett Hansen, VP, Dell Endpoint Data Security and Management. “Dell Data Protection | Secure Lifecycle protects data at all stages of the lifecycle and provides the visibility and confidence for organisations to embrace the mobile workforce—securely.”
The majority of today’s organisations recognise the importance of a robust cybersecurity programme but often struggle to maintain visibility into how often and from where outside actors are accessing their data, as well as understand how their current policies may be limiting productivity or exposing potential threats. The average company has up to 89 third-party vendors accessing their company’s network each week, with each outside access bringing individual risks to data not properly protected*.
In addition, a recent Dell Data Security Survey shows that 80% of midsize organizations are concerned about uploading files to popular public cloud platforms. Dell Data Protection | Secure Lifecycle provides a heightened level of encryption, which matches the realities of the modern workplace by providing:
· Full visibility: Organisations can understand where and how critical business information is being used, leaked or lost.
· Granular policy controls: Through comprehensive digital rights functionality, IT departments can enact more granular management over their data for better control of how documents are being viewed and even set individual rights for different users viewing the same document.
· Protection of Microsoft Office files: Transparent encryption policies protect data in motion across PCs, smartphones and tablet devices. At the same time, shared data are secure across common collaborative tools such as Box and Dropbox.
· Supported across all devices: The solution allows employees to download secure mobile protection from their app store, enhancing manageability for IT departments. Further, office plug-ins run seamlessly with Microsoft Office 2010 and upward, allowing for improved collaboration with colleagues outside an organisation.
Interested?
Dell Data Protection | Secure Lifecycle will be available December 1, 2016, in Singapore.
*Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers, Bomgar, 2016
posted from Bloggeroid
No comments:
Post a Comment