See our complete list of top 10 enterprise encryption solutions.
Dell Technologies provides a portfolio of server, storage, security and other technologies ranging from edge to core to cloud. The company has grown from a PC and server specialist into one of the largest IT vendors in the world. It is privately held.
Dell Encryption Enterprise provides software-based, data-centric encryption that protects all data types on multiple endpoints and operating systems. Available for mixed vendor environments – regardless of user, device or location – it provides integration with existing systems management while allowing end users to store personal information on external media. Dell Encryption Enterprise also integrates with existing authentication processes, including Windows password, RSA, fingerprint, and Smart Card.
For organizations using self-encrypting drives, Dell Encryption Enterprise provides centralized, secure management from a single console for all policy, authentication, management tasks, storage and retrieval of encryption keys. In addition, it allows IT to rapidly enforce encryption policies, whether the data resides on the system drive or external media, and doesn’t require end-user intervention. Management for OPAL standard devices is integrated in the same data protection platform as file-based encryption, Microsoft BitLocker, and removable media encryption. The Dell Security Management Server console is included with Dell Encryption Enterprise, and manages other security offerings such as Dell Endpoint Security Suite Enterprise, which combines Dell Encryption with AI-based anti-malware prevention, and Dell Data Guardian, which is a data encryption solution that protects data in motion and in use.
“The top features that an enterprise encryption solution must have include encryption of all data, and the ability to encrypt based on end user profiles, data and groups within your organization,” said Chris Burchett, Vice President of Client Security Software at Dell. “In addition, encryption tools must offer the ability to encrypt data on external media such as USB, granular port control, centralized management of encryption policies, and coverage for mixed-vendor environments, including both Windows and Mac OS.”
Dell Encryption Enterprise uses agents that are deployed on Windows PC and file server OSs, Mac OS and external media. Deployment leverages existing management tools (e.g., SCCM via MSI package or .EXE packages).
Markets and Use Cases
Dell Encryption Enterprise serves government, healthcare, critical infrastructure and utilities. The company boasts uptake by 98 percent of the Fortune 500 for its various technologies.
It supports high throughput with typical performance impact of less than 3%. The product is built to scale from smaller deployments consisting of tens of systems to very large enterprise deployments of 350,000 endpoints or more.
Dell Encryption Enterprise comes with preset policy templates to meet the needs of those interested in addressing compliance regulations across numerous industry (PCI DSS, SOX), U.S. federal and state (HIPAA, HITECH Act, FIPS 140-2 certifications for endpoint disk encryption) and international (US-European Safe Harbor, EU Data Protection Directive) regulations. It includes support for Advanced Encryption Standard 128-bit and 256-bit keys.
The product has some built-in automation to gather internal metrics and for load balancing.
Standalone or Suite
Dell offers encryption as a standalone solution with Dell Encryption Enterprise, and as part of a suite. Dell Endpoint Security Suite Enterprise includes encryption and advanced threat prevention in a single suite.
It is delivered as a software client at the endpoint, which is managed with an included, on-premises management server for policy and reporting. When operated on Dell commercial PCs, it can be automatically deployed and provisioned in the factory installation.
A per seat perpetual license with one-year support starts at about $79 USD.
Get the Free Cybersecurity Newsletter
Strengthen your organization’s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices.