Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Editor's Blog and Industry Comments

Connected approach to IT Security

08 April, 2013
Dell Software Group discusses its approach to managing the challenges of the connected nature of IT security


Last year, Dell formed its own dedicated Software Group, a major priority of which is security. In creating its security business, Dell wanted to examine a different approach to solving the difficult problems of connecting all the different aspects of security to enable a more holistic approach. Experts exist in trapping malware, identity management, network security, advanced persistent threats and all the other isolated exposures that users and networks face.



By developing its Connected Security Approach, Dell drew on the considerable resources that it had acquired through the incorporation of such well-established IT security brands as SonicWALL, Credence and SecureWorks. The result is an approach that is more best-of-breed, taking the advantages and expertise of many and combining these elements into a structure that can be easily managed.



To understand more about this approach, we spoke to Phil Allen, the EMEA Director of Identity and Access Management at Dell Software Group. Phil explained the importance of obtaining both internal and external protection in obtaining the organizational confidence to provide employees with the right collaborative tools without blocking access to the resources they need in order to be most effective.



The key elements in providing this level of protection are firewalls, identity and access management and privileged access management to mitigate against the insider threat, an important aspect of security that is often fatally overlooked in many organizations. One of the key services provided by Dell Software Group is in access governance which includes the all important maintenance of privileges, including file shares and unstructured data.



Although the management of privileges works at the data level, access priveleges are also managed at the appliation level. This ensures that there are no conflicts between data access privileges and the logged in user rights of third party applications such as Enterprise Requirements Planning systems which have their own user management interfaces. As such, these applications can't be used as a back door into privileged data.



The control panel that pulls the security elements together into an understandable system that works as it should do is Dell SecureWorks, explained Phil. This includes vulnerability management services for companies operating in cloud environments.


Bookmark and Share