0% found this document useful (0 votes)
18 views3 pages

Dell Encryption Enterprise Data Sheet

Dell Encryption offers a comprehensive data security solution designed for mixed-vendor environments, enabling automatic deployment and management of encryption policies across various devices and operating systems. The solution provides high-level protection for sensitive data while ensuring minimal disruption to end users and IT processes, with features like centralized management, compliance templates, and support for self-encrypting drives. Dell Encryption is particularly suited for organizations embracing mobility and BYOD trends, allowing for quick deployment and easy integration with existing systems.

Uploaded by

chau.trung.akiho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

Dell Encryption Enterprise Data Sheet

Dell Encryption offers a comprehensive data security solution designed for mixed-vendor environments, enabling automatic deployment and management of encryption policies across various devices and operating systems. The solution provides high-level protection for sensitive data while ensuring minimal disruption to end users and IT processes, with features like centralized management, compliance templates, and support for self-encrypting drives. Dell Encryption is particularly suited for organizations embracing mobility and BYOD trends, allowing for quick deployment and easy integration with existing systems.

Uploaded by

chau.trung.akiho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Simple, comprehensive & flexible data

security for your entire organization.


Dell Encryption
A perfect solution for mixed-vendor environments,
Enterprise enables:
Organizations today must find a way to securing endpoint devices
and the data on them, while still embracing computing trends • Automatic deployment and provisioning when factory-installed
such as bring-your-own-device and workforce mobility. Traditional on Dell commercial devices
encryption solutions attempt to address these needs, but most are
• Fast and easy deployment in less than thirty minutes1 in
difficult to deploy and manage, lack coverage for all endpoints, and
VMware environments with Wizard-based installation and fully
reduce performance for users.
integrated database and key management
Dell Encryption provides a data-centric, policy-based approach • No required defragmenting before encryption
to encryption which protects data on any device or external media.
• System disk and external media encryption in a single solution
Designed for easy deployment, end-user transparency,
and hassle-free • Coverage for mixed-vendor environments, including both Win-
dows and Mac operating systems
compliance, Dell Encryption delivers a high level of protection, fills
• Easy compliance management and auditing with one- touch com-
critical security gaps and allows you to manage encryption policies
pliance policy templates, remote management and quick system
for multiple endpoints and operating systems–all from a single
recovery
management console.
• Integration with existing processes for authentication,
Dell Encryption is a flexible suite of enhanced security solutions patching and more
that include software based encryption, enhanced management
• Sales and support for your hardware and security solutions
of Microsoft® BitLocker, and protection of data on external media,
from one source
self-encrypting drives, mobile devices and data in public cloud
storage services. • Encryption of all data, except files essential to booting the
operating system or full disk encryption, depending on your
preference
Dell Encryption Enterprise
• Enhanced port control system to prevent data leakage
Dell Encryption Enterprise includes software-based, data-centric • Ability to encrypt based on end user profiles, data and groups
encryption that protects your data without disrupting IT processes within your organization
or end user productivity. It allows IT to easily enforce encryption
policies, whether the data resides on the system drive or external • Centralized management of all encryption policies,
media, and doesn’t require end user intervention. including self-encrypting drives and Microsoft
BitLocker encryption
• Enhanced authentication for OPAL standard devices, including
smart cards and single sign-on
Managing Self-Encrypting Drives with
The Dell Encryption advantage Dell Encryption Enterprise
Comprehensive protection, higher level of security
Organizations using self-encrypting drives (SEDs) also require
•  rotects data on any device, external media and in pub-
P careful management if they are to be effective in reducing the risk
lic cloud storage services, such as Box and DropBox of data loss and meeting their audit and compliance goals.
• Master boot records and keys are never exposed
Dell Encryption Enterprise provides a centralized, secure
management for self-encrypting drives across your organization,
Productivity and simplicity for IT and end users
both local and remote. All policy, authentication, management
• Choose the Virtual Edition Server for simplified de- tasks, storing and retrieval of encryption keys are available from
ployment or the Enterprise Edition Server to scale to a single console, reducing the work of keeping critical data safe,
thousands of users and reducing the risk that systems are unprotected in the event of
loss or unauthorized access. Most importantly – the management
• Preset policy templates designed for easy compliance
for OPAL standard devices is fully integrated in the same data
• Seamless integration with existing systems management protection platform as file-based encryption, Microsoft BitLocker,
and authentication processes removable media encryption, smartphone security and encryption
• Encryption is transparent to end users and helps them of data in public cloud storage.
stay productive
Remote management capabilities include the ability to:
Flexible encryption
• Disable logins and wipe user cache to protect data and ensure
• Based on end-user profile, data sensitivity, performance that only an authorized administrator can re-enable access to
or compliance needs the protected data
• Encrypt data on external media or disable ports alto- • Disable the device to prevent any user from logging into the
gether, while allowing non-storage devices to function system until an unlock command is sent
• Manage and audit Microsoft BitLocker and Self Encrypt- • Enable the device so users can login to use the SED
ing Drives to help you on your path to compliance
• Perform a remote and automatic unlock on the disk, enabling
administrators to perform essential tasks such as patching
without needing to leave the device unlocked overnight
• Deliver full pre-boot authentication including authentication
using Active Directory

Dell Security Management • Set policies for automated response to attacks


(including brute-force attacks)
Server Virtual
Deployment of any enterprise-wide application can be a daunting
task, and encryption products have typically been no exception–
until now. Utilizing a purpose-built virtual management server and
console app for VMware, Dell has raised the bar on how easily and
quickly our endpoint encryption solution, Dell Encryption, can be up
and running in most mid-sized enterprise environments with up to
3,500 endpoints.

The Dell Security Management Server Virtual makes Dell


Encryption the perfect choice for small to mid-sized organizations
who have already made an investment in VMware and are looking
for a simple, rapidly deployable management platform for their
encryption and authentication policies. It contains all of the same
features and benefits of the standard Server, including full support
for the broadest range of encryption coverage available for laptops,
desktops, mobile devices, external media, BYOD and public cloud
storage.
Dell Encryption Features and Benefits
Simplified deployment and management
Technical Specifications
Because you need a solution that is easy to deploy and manage Dell Encryption Enterprise is available for mixed vendor
without interfering with your existing IT processes, Dell Encryption environments that meet the below specifications.
helps you:
Supported Client Operating Systems:
• Automatically deploy and provision users when Dell Encryption
• Microsoft Windows XP Professional1
is factory-installed on select Dell commercial devices
• Microsoft Windows 7 Ultimate, Enterprise and
• Deploy the solution in under thirty minutes1 in VMware environ- Professional Editions
ments with a fully-integrated database and key management • Microsoft Windows 8 and 8.1 Enterprise and
versus typical competitive solutions that require multiple serv- Professional Editions
ers, a separate database and multiple licenses • Microsoft Windows 10 Education, Enterprise and Pro Editions2
• Mac OS X Mavericks, Yosemite and El Capitan versions
• Deploy without time-consuming, whole-deployment, full-disk
defragmentation process
Dell Encryption Enterprise has been validated in the following
• Eliminate worry about pre-existing IT processes, operating environments:
with a solution that works out of the box and requires no recon-
• Windows Server 2008 R2 SP0-SP1 64-bit Standard and
figurations
Enterprise Editions
• Integrate the solution with existing authentication processes, • Windows Server 2008 SP2 64-bit Standard and
including Windows password, RSA, fingerprint and Enterprise Editions
Smart Card • Windows Server 2012 R2 Standard and Datacenter Editions
• Correct, protect, govern–quickly detect devices, enforce en- • Windows Server 2016 Standard and Datacenter Editions
cryption and audit encryption • VMware ESXi 5.1, 5.5 and 6.0
• VMware Workstation 9, 10 and 11
• Encrypt users’ sensitive files or data even when IT needs ac-
cess to your endpoint Remote management console and Compliance Reporter access
• Management for OPAL standard devices is fully integrated into are supported via the following Internet Browsers:
one single console for all endpoints • Internet Explorer 11.x or later
• Protect endpoints in heterogeneous environments, regardless • Mozilla Firefox 41.x or later
of user, device or location • Google Chrome 46.x or later

Easier compliance
Dell Encryption comes with preset policy templates to help
customers interested in addressing compliance regulations such
as the following:
End user productivity
• Industry regulations: PCI DSS, Sarbanes Oxley (SOX) We understand the importance of operating at maximum capacity,
without interruption or delay. That’s why we deploy our solution
• US Federal & State regulations: HIPAA and the HITECH Act,
transparently, helping eliminate interruptions during device
Gramm Leach Bliley Act California—SB1386, Massachu-
encryption. In fact, because it is so unobtrusive, people may be
setts—201 CMR 17, Nevada—NRS 603A (which requires PCI
unaware that their devices have been encrypted.
DSS) and more than 45 other State and US jurisdiction laws
• International regulations: US-European Safe Harbor, EU Data
Protection Directive 95/46/EC, UK Data Protection Act, German Broad encryption protection
BDSG (Bundes-daten-schutz- gesetz) and similar legislation in
Rely on Dell Encryption to help safeguard your valuable data
place for all EU Member Countries, Canada – PIPEDA
on any device, external media, and in public cloud storage,
while maintaining productivity. It’s just one more way to give
you the power to do more. For more information about
Dell Data Security, visit Dell.com/DataSecurity.

Learn more at Dell.com/DataSecurity


1
Support DDP | E v 8.5 or earlier
2
Support DDP | E v 8.6.1 or later

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy