View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Dell unveils new encryption tool for endpoint devices

Dell Data Protection | Encryption provides encryption for laptops, desktops, tablets and other devices

By CBR Staff Writer

Dell has unveiled its new flexible, manageable and auditable endpoint encryption offering – Dell Data Protection | Encryption.

The new encryption tool is designed to help companies protect endpoint devices. The company said that such end point devices serve as the "front door" to sensitive information.

Dell Data Protection | Encryption is a file-based encryption tool that is designed to protect data on laptops and desktops, and external media, in case of loss or theft.

The company said that the tool includes centralised management and comprehensive reporting which would detect devices that need encryption, help the IT department to enforce policies and audit encryption state.

The reporting feature also provides confirmation that endpoints are protected regardless of user, device or location, said Dell.

Among the key features of Dell Data Protection | encryption are: easy deployment and integration into heterogeneous IT environments; quick recovery of systems; one offering to encrypt data on the disk, plus removable media such as USB thumb drives, external hard drives, eSata drives, 1394 devices, optical storage and Secure Digital (SD); and pre-set policy templates.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Dell Commercial Client Product Group vice-president and general manager Steve Lalla said, "Security threats are on the rise and we’re here to help customers have the power to do more by proactively protecting their data in a way that doesn’t hinder their IT processes."

"Dell Data Protection is designed to help protect your businesses’ vital data in an easy to deploy and cost-effective manner," Lalla said.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.