Subscribe Now

* You will receive the latest news and updates on the Canadian IT marketplace.

Trending News

Blog Post

Dell offers protection throughout the data lifecyle

Dell offers protection throughout the data lifecyle 

Announced today at the Dell EMC Forum in Toronto, the newest addition to the company’s security lineup combines data encryption, file access monitoring, data leakage prevention (DLP) and digital rights management (DRM) in a single console. By comparison, Dell said, other solutions in the market today only address certain elements of data security and are not able to protect data upon its exit from an organizations environment.

Dell Data Protection | Secure Lifecycle, provides ubiquitous coverage across devices and operating systems. It safeguards files in major public cloud services, on external storage devices such as USB keys, as well as data in iOS and Android smartphones and tabloids with the use of a secure file container.

Dell Data Protection | Secure Lifecycle will be available in the U.S. and select countries around the world, including Canada, starting December 1.


“In the modern work environment, data travel between people and devices. Securing and encrypting these data, not just at rest, but in motion and in use, has become critical to maintaining integrity and control,” said Brett Hansen, vice president, Dell Endpoint Data Security and Management. 

For instance, many organizations find it a challenge to keep track of how often and from where outside actors are accessing their data. Many administrators and IT managers are also unaware how their current policies may be exposing networks and data to potential threats.

Some of these concerns can be traced to the number of vendors organizations rely on for networking and security products.

According to Dell, the average company has up to 89 third-party vendors accessing the organization’s network each week, “with each outside access bringing individual risks to data not properly protected.”

The new dell security product provides businesses the following:

Granular policy controls: Through comprehensive digital rights functionality, IT departments can enact more granular management over their data for better control of how documents are being viewed and even set individual rights for different users viewing the same document. Organizations can manage exactly who can read, edit, print or share data, as well as set embargoes and expiry times over when the data are permissible to view. The management console also allows for rights to be revoked, immediately removing the ability of a specified person to open the file.

Protection of Microsoft Office files: Transparent encryption policies protect data in motion across PCs, smartphones and tablet devices. Shared data are secure across common collaborative tools such as Box and Dropbox. All Word, Excel and PowerPoint files are fully encrypted while in motion and in use, providing businesses with continuous security for their most valuable data.

Easy use across all devices: Employees can download secure mobile protection from their app store, enhancing manageability for IT departments. Office plug-ins run seamlessly with Microsoft Office 2010 and upward, allowing for improved collaboration with colleagues outside an organization.

Dell Data Protection | Secure Lifecycle’s features speaks to the concept of “security without border” mentioned by Howard Elias, president of global enterprise sales and customer operations at Dell EMC, earlier at the forum’s keynote address.

“Traditionally security was viewed as a mere after-though, a bolt-on,” he said. “That kind of approach won’t cut it going forward.”

Since most employees, now “work without border” – eschewing the typical 9-5 workday, by working remotely, taking work home, working on personal stuff in the office, and working on personal devices rather than corporate equipment, Elias said security has to follow them and their work.

“We have to architect security” into the systems worker use and push it out to the edge of the network because with the Internet of things millions of endpoints are being connected to the network.

Related posts