Dell Launches Zero Trust and Cyber Resiliency Services

Dell is offering new cybersecurity services that allow organizations to assess their Zero Trust and cyber resilience maturity, endpoint security solutions to support hybrid work, and ransomware protection for object storage data.

Zero Trust is a cybersecurity model that shifts how organizations approach security from reliance solely on perimeter defenses to a proactive strategy that allows only known good activity across ecosystems and data pipelines.

It allows organizations to better align their cybersecurity strategy across the data center, clouds, and at the edge.

Dell aims to serve as a catalyst for customers to achieve Zero Trust outcomes by making the design and integration of this architecture easier, according to the company.

“In a multicloud world, an organization’s cybersecurity strategy must transcend its infrastructure and extend to its applications and data," said John Roese, global chief technology officer, Dell Technologies. “We believe a Zero Trust strategy is the best path forward. Dell has the proven IT and security foundation, technology integration experience, and extensive global partner ecosystem to help simplify customers’ cybersecurity transformations.”

To help organizations align to Zero Trust principles and achieve cyber resiliency, Dell Cybersecurity Advisory Services provide organizations a roadmap to Zero Trust that builds on their existing cybersecurity assets. These services find and address security gaps, determine advanced technologies customers should implement, and help them learn how to enable continuous vigilance and governance for long-term cyber resiliency. By working with Dell, organizations have the tools and actionable insights they need to better secure their data and IT environments.

To minimize attack surfaces and better protect organizations, Dell offers a new Vulnerability Management service with Dell experts that regularly scan customer environments for vulnerabilities, provide a full picture of exposures and help prioritize patching efforts.

Dell continues to enhance its portfolio with new offerings that help customers prevent, detect, and respond to threats wherever they occur, and allow greater control of the IT environment, including:

  • Hardware protections for the industry’s most secure commercial PCs: To address growing supply chain threats, customers can now opt for Dell to disable PC ports prior to shipment to help prevent tampering of BIOS settings. Dell is also expanding availability of tamper-evident seals to Asia-Pacific, Europe, the Middle East and Africa to offer more physical security measures during shipment.
  • Firmware protections to detect growing threats: Organizations can detect potential tampering of a PC’s BIOS with the new integration of telemetry between Microsoft Intune, as part of Microsoft Endpoint Manager, and Splunk consoles. Within the Microsoft Endpoint Manager admin center, IT administrators can secure, control and configure Dell PCs, including BIOS configuration and password management. These capabilities, which Dell is first to market with, will be available in a future release of Intune, helping ensure user productivity while reducing IT complexity.
  • Advanced software protections: New capabilities from Dell speed threat detection and remediation. Additionally, a new data loss prevention offering helps protect sensitive data from unauthorized downloads onto external USB storage devices, providing greater visibility and policy control on this behavior.

The Dell ECS Enterprise Object Storage platform expands cyber protection capabilities to help secure object data to an isolated cyber vault residing locally or in a remote environment. Accessible through the AWS S3 protocol, critical applications and backup servers can continue to access the isolated copy while supporting legal compliance in the event of a cyberattack that compromises the primary and secondary data copy.

Together with AI-powered threat detection and immutability, the new solution provides organizations a rapid path to data recovery from ransomware and other malicious attacks, according to the company.

For more information about these updates, visit