Last year, Dell formed its own dedicated Software Group, a major priority of which is security. In creating its security business, Dell wanted to examine a different approach to solving the difficult problems of connecting all the different aspects of security to enable a more holistic approach. Experts exist in trapping malware, identity management, network security, advanced persistent threats and all the other isolated exposures that users and networks face.
By developing its Connected Security Approach, Dell drew on the considerable resources that it had acquired through the incorporation of such well-established IT security brands as SonicWALL, Credence and SecureWorks. The result is an approach that is more best-of-breed, taking the advantages and expertise of many and combining these elements into a structure that can be easily managed.
To understand more about this approach, we spoke to Phil Allen, the EMEA Director of Identity and Access Management at Dell Software Group. Phil explained the importance of obtaining both internal and external protection in obtaining the organizational confidence to provide employees with the right collaborative tools without blocking access to the resources they need in order to be most effective.
The key elements in providing this level of protection are firewalls, identity and access management and privileged access management to mitigate against the insider threat, an important aspect of security that is often fatally overlooked in many organizations. One of the key services provided by Dell Software Group is in access governance which includes the all important maintenance of privileges, including file shares and unstructured data.
Although the management of privileges works at the data level, access priveleges are also managed at the appliation level. This ensures that there are no conflicts between data access privileges and the logged in user rights of third party applications such as Enterprise Requirements Planning systems which have their own user management interfaces. As such, these applications can't be used as a back door into privileged data.
The control panel that pulls the security elements together into an understandable system that works as it should do is Dell SecureWorks, explained Phil. This includes vulnerability management services for companies operating in cloud environments.