This document discusses Dell's Data Protection and Security Tools software which provides advanced authentication capabilities beyond passwords. It supports multiple hardware authentication methods and can manage user credentials and passwords for applications, websites and operating systems. The software also integrates with Dell's remote management console and includes features like credential storage using a Trusted Platform Module for added security.
This document discusses Dell's Data Protection and Security Tools software which provides advanced authentication capabilities beyond passwords. It supports multiple hardware authentication methods and can manage user credentials and passwords for applications, websites and operating systems. The software also integrates with Dell's remote management console and includes features like credential storage using a Trusted Platform Module for added security.
The status quo of authentication has long been the PCs, but any website, SaaS or application. Once users password, but passwords are widely known by both enroll their credentials, DDP | ST allows use of those security professionals and end users to be broken and are credentials to logon to the device and perform password considered to be the weakest link of security today. Why? replacement. Multifactor policy can be defined as well if Because end users write down passwords on paper or keep required or desired. a list of them on their PCs. They choose passwords that are easy to remember or use the same password for access to Profiles can be set up for each application or website to all of their personal and business systems, and so forth. associate the user’s enrolled advanced authentication credentials with the password of that application or When we hear that hackers have gained access to accounts service. When the user subsequently accesses that site or systems, a likely point of attack was via a user password or application, they are prompted to use their advanced gained inappropriately. Social Engineering, phishing, authentication credential instead of typing in the password. Advanced Persistent Threats (APT) and password resets are This allows the user to choose a stronger, more complex all used by hackers to gain access to individual’s data and password that they don’t need to write down — and in fact, business information. don’t even need to know. This significantly raises the level of access security. No matter the size of your organization or how much data you have, safeguarding the information stored on Finally, Dell Data Protection | Security Tools is integrated your systems is critical. Your first line of defense lies at the with the Dell Data Protection remote management endpoint, and having the right authentication solutions console, so you can centrally manage both your in place can greatly strengthen your protection against a authentication and encryption solutions. security breach. In many cases, this means moving beyond passwords to more advanced authentication measures. Trusted Platform Module (TPM)1 For added security, Dell Latitude laptops ship with the Dell Data Protection | Security Tools only FIPS 140-2 compliant TPM in the industry today. Dell Data Protection | Security Tools stores user credentials in Dell Data Protection | Security Tools (DDP | ST) is an TPM-protected credential stores. It uses TPM to protect end-to-end software security solution included with all the encryption key for user credential containers stored on Dell Precision™, Latitude and OptiPlex systems. DDP | ST the system hard drive as well as being used by other Dell supports advanced hardware authentication, such as Dell’s Data Protection applications to protect authentication and fully-integrated fingerprint, smart card or contactless smart encryption tokens. card reader options. Dell Data Protection | Security Tools can help manage these multiple hardware authentication methods, support pre-OS login with self-encrypting drives, Dell ControlVault™1 single sign-on (SSO) and manage user credentials and passwords. Dell ControlVault, available on select Dell Latitude laptops, offers secure hardware storage for all user credentials — In addition, Dell Data Protection | Security Tools provides such as user passwords, smart card data or fingerprint data advanced authentication capabilities to access not only — used during Microsoft Windows preboot. Dell ControlVault fully isolates a user’s credentials from Technical Specifications potentially unsecured operating systems and hard drives. The cryptographic secrets which protect the user data, Dell Data Protection | Security Tools is pre-installed on all Dell when stored on the PC, are kept in a secure cryptographic Latitude, OptiPlex, and Dell Precision™ systems. co-processor hardware device and are processed inside Operating Systems supported: that device instead of in main memory where viruses can • Windows® 7 Enterprise, Professional, and Ultimate spy on the process. This option helps ensure the ultimate • Windows 8 Enterprise and Pro protection, even against sophisticated hackers attempting to gain access to critical systems. Hardware supported: • Fingerprint readers Any OS is inherently difficult to secure from malware, • Smart Card readers which has become a multi-billion dollar, well-organized • Contactless Smart Card readers industry. Dell ControlVault™ avoids malware by storing and matching credentials in a separate secure process. Dell ControlVault™ is available on select Dell Latitude laptops. It is a security subsystem fully isolated from the host OS and associated malware and consists of a local secure Dell FIPS 140-2 compliant TPM is available on select Dell memory, integrated fingerprint processing and integrated Latitude laptops and select Dell Precision mobile workstations. FIPS 201 contacted and contactless smart card readers.
Dell offers the world’s most secure
commercial PCs Dell’s advanced authentication solutions, in combination with Dell Data Protection solutions for comprehensive encryption and leading-edge malware prevention help make Dell commercial PCs some of the most secure in the industry. To learn more about Dell Data Protection solutions, visit www.dell.com/dataprotection.
Learn more at www.Dell.com/DataProtection
1. Offering may vary by country and by configuration.