By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Dell Data Protection | Secure Lifecycle Protects Critical Data on the Move

dell enterprise

Dell announces release of the next-generation data protection solution to protect business data on move. Dubbed as Dell Data Protection | Secure Lifecycle, a new addition to the Data Security Solutions portfolio is touted to protect critical business data at all stages of the lifecycle – at rest, in motion, and in use – whether inside or outside of a network.

It also provides the ability to define access rights at a granular level, giving IT leaders the authority to restrict individual file access rights only to those that ‘need to know.’

Armed with multiple functionalities into an integrated solution: data encryption, file access monitoring, DLP (data leakage prevention) and DRM (digital rights management), the new rollout provides data protection with a single console.

It provides ubiquitous coverage across devices and operating systems, safeguarding files on external storage such as USB keys and major public cloud services, as well as on iOS and Android smartphones and tablets via a secure file container.

Citing on the new rollout, Brett Hansen, vice president, Dell Endpoint Data Security and Management, said, “In the modern work environment, data travel between people and devices. Securing and encrypting these data, not just at rest, but in motion and in use, has become critical to maintaining integrity and control. Dell Data Protection | Secure Lifecycle protects data at all stages of the lifecycle and provides the visibility and confidence for organizations to embrace the mobile workforce—securely.”

Dell Data Protection | Secure Lifecycle provides a heightened level of encryption, which matches the realities of the modern workplace by providing:

  • Full visibility: Organizations can understand where and how critical business information is being used, leaked or lost. IT departments can access reports and sophisticated metadata to triangulate more accurately if and when nefarious behavior occurs. The console gives visibility into other files that were shared with the suspected bad actor, and by which employee, reducing the time it takes to uncover potential violations.
  • Granular policy controls: Through comprehensive digital rights functionality, IT departments can enact more granular management over their data for better control of how documents are being viewed and even set individual rights for different users viewing the same document. This equips organizations to manage exactly who can read, edit, print or share data, as well as set embargoes and expiry times over when the data are permissible to view. The management console also allows for rights to be revoked, immediately removing the ability of a specified person to open the file.
  • Protection of Microsoft Office files: Transparent encryption policies protect data in motion across PCs, smartphones and tablet devices. At the same time, shared data are secure across common collaborative tools such as Box and Dropbox. The solution also ensures all Word, Excel and PowerPoint files are fully encrypted while in motion and in use, providing businesses with continuous security for their most valuable data.
  • Easy use across all devices: The solution allows employees to download secure mobile protection from their app store, enhancing manageability for IT departments. Further, office plug-ins run seamlessly with Microsoft Office 2010 and upward, allowing for improved collaboration with colleagues outside an organization.

Availability

Dell Data Protection | Secure Lifecycle will be available Dec. 1, 2016, in the United States and select countries.

Tags

BiS Team

BIS Infotech is a vivid one stop online source protracting all the exclusive affairs of the Consumer and Business Technology. We have well accomplished on delivering expert views, reviews, and stories empowering millions with impartial and nonpareil opinions. Technology has become an inexorable part of our daily lifestyle and with BIS Infotech expertise, millions of intriguers everyday are finding for itself a crony hangout zone.

Related Articles

Upcoming Events