The fact is, and challenge can be, that our users now connect in more ways than ever before.

Speaker in the Dell booth at RSAC 2014More than ever, end-to-end security is a focus for Dell. This week’s RSA Conference 2014 at Moscone Center in San Francisco gave Dell the opportunity to showcase our award-winning protection. This event is the pulse point of the security industry, where leading practitioners connect to explore the most critical security challenges and protect the good guys from the bad guys.

The flip side is - The bad guys are ALSO more connected than any other time. And they have taken on many names: Cybercriminals, Spammers, Spear-Phishers. Because of these attackers, Dell has pulled out all of the stops to out-connect the threat. Not only do you want to protect your business from increasingly prevalent threats, but you also want to safeguard your users. Dell’s Connected Security brings together previously siloed security solutions– next-gen firewalls, secure mobile access, email security, identity and access management, data protection and encryption– and merges their intelligence to create an organic unified system that protects customers better

This week at RSA was spent delivering amazing presentations and  meeting face-to-face with customers and partners. Across two booths, our security experts demonstrated how Dell security solutions defend without endangering access, performance and cost. For Identity and Access Management, we launched Dell’s new Privileged Account Governance which Peter Cummings, managing director UK/senior analyst at Kuppinger Cole, noted “is a step in the right direction for combating internal security breaches.” Hundreds of attendees witnessed an hourly magic show in the booth educated them on Connected Security.

To address the frequent and severe data breaches that affect millions of people, and leads to monetary damage and loss of reputation, we unveiled the Dell SonicWALL Secure Remote Access (SRA) Appliance 7.5 and SonicWALL Mobile Connect 3.0 for mobile users. These new releases allow administrators to easily configure security policies that provide best–in-class, context-aware authentication for both personal and company-owned devices to protect corporate networks and data from mobile threats. They grant access only to trusted devices and authorized users. With these newly updated solutions, mobile devices are interrogated prior to granting access to determine essential security information such as jailbreak or root status, device ID, certificate status and OS versions.

Laptops and PCs are also cross-examined for the presence or absence of security software, client certificates, and device ID. Only devices that meet your configured policy requirements are allowed network access. Dell SonicWALL SRA 7.5 also includes new HTML 5 browser access to RDP and VNC applications and Dashboard image. In today’s mobile workplace, it is vitally important to enable remote and mobile employees to maintain their productivity without compromising network security.


Photo of display in Dell booth at RSAC 2014At the heart of every IT Security program is an effective and efficient network with tight network security, secure mobile access, and data encryption and protection. Our network security experts gave attendees live demonstrations of Dell’s increasingly powerful solutions that protect, transform, connect and inform. Dell SonicWALL next-gen firewalls ranging from the mid-market
Dell SonicWALL NSA 2600 to the large enterprise/ISP class Dell SonicWALL SuperMassive 10800, were live, onsite blocking gigabytes of SSL-encrypted threats. Dell Data Protection | Encryption and Dell Data Protection | Protected WorkSpace were also displayed as comprehensive encryption solutions to help secure data and achieve compliance.

Our customers and partners could not stop talking about our launch of Dell One Identity, SonicWALL Mobile Connect 3.0 and Dell SonicWALL SRA 7.5.

“We put a lot of pressure on Dell, and they delivered brilliantly,” said Will Markham, security practice lead at Colt Technology Services.

Everyone was enthusiastic about how well our innovative architecture fit with their future IT goals and budget. Providing connected security solutions for our customers, world-class support and product development to out-connect the threats, that are constantly evolving satisfies our goals of global security leadership.