0% found this document useful (0 votes)
46 views

Dell Data Protection - Security Tools Data Sheet

This document discusses Dell's Data Protection and Security Tools software which provides advanced authentication capabilities beyond passwords. It supports multiple hardware authentication methods and can manage user credentials and passwords for applications, websites and operating systems. The software also integrates with Dell's remote management console and includes features like credential storage using a Trusted Platform Module for added security.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Dell Data Protection - Security Tools Data Sheet

This document discusses Dell's Data Protection and Security Tools software which provides advanced authentication capabilities beyond passwords. It supports multiple hardware authentication methods and can manage user credentials and passwords for applications, websites and operating systems. The software also integrates with Dell's remote management console and includes features like credential storage using a Trusted Platform Module for added security.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Flexible, secure solutions to keep

unauthorized users out of your data


The status quo of authentication has long been the PCs, but any website, SaaS or application. Once users
password, but passwords are widely known by both enroll their credentials, DDP | ST allows use of those
security professionals and end users to be broken and are credentials to logon to the device and perform password
considered to be the weakest link of security today. Why? replacement. Multifactor policy can be defined as well if
Because end users write down passwords on paper or keep required or desired.
a list of them on their PCs. They choose passwords that are
easy to remember or use the same password for access to Profiles can be set up for each application or website to
all of their personal and business systems, and so forth. associate the user’s enrolled advanced authentication
credentials with the password of that application or
When we hear that hackers have gained access to accounts service. When the user subsequently accesses that site
or systems, a likely point of attack was via a user password or application, they are prompted to use their advanced
gained inappropriately. Social Engineering, phishing, authentication credential instead of typing in the password.
Advanced Persistent Threats (APT) and password resets are This allows the user to choose a stronger, more complex
all used by hackers to gain access to individual’s data and password that they don’t need to write down — and in fact,
business information. don’t even need to know. This significantly raises the level
of access security.
No matter the size of your organization or how much
data you have, safeguarding the information stored on Finally, Dell Data Protection | Security Tools is integrated
your systems is critical. Your first line of defense lies at the with the Dell Data Protection remote management
endpoint, and having the right authentication solutions console, so you can centrally manage both your
in place can greatly strengthen your protection against a authentication and encryption solutions.
security breach. In many cases, this means moving beyond
passwords to more advanced authentication measures. Trusted Platform Module (TPM)1
For added security, Dell Latitude laptops ship with the
Dell Data Protection | Security Tools only FIPS 140-2 compliant TPM in the industry today. Dell
Data Protection | Security Tools stores user credentials in
Dell Data Protection | Security Tools (DDP | ST) is an
TPM-protected credential stores. It uses TPM to protect
end-to-end software security solution included with all
the encryption key for user credential containers stored on
Dell Precision™, Latitude and OptiPlex systems. DDP | ST
the system hard drive as well as being used by other Dell
supports advanced hardware authentication, such as Dell’s
Data Protection applications to protect authentication and
fully-integrated fingerprint, smart card or contactless smart
encryption tokens.
card reader options. Dell Data Protection | Security Tools
can help manage these multiple hardware authentication
methods, support pre-OS login with self-encrypting drives, Dell ControlVault™1
single sign-on (SSO) and manage user credentials and
passwords. Dell ControlVault, available on select Dell Latitude laptops,
offers secure hardware storage for all user credentials —
In addition, Dell Data Protection | Security Tools provides such as user passwords, smart card data or fingerprint data
advanced authentication capabilities to access not only — used during Microsoft Windows preboot.
Dell ControlVault fully isolates a user’s credentials from Technical Specifications
potentially unsecured operating systems and hard drives.
The cryptographic secrets which protect the user data, Dell Data Protection | Security Tools is pre-installed on all Dell
when stored on the PC, are kept in a secure cryptographic Latitude, OptiPlex, and Dell Precision™ systems.
co-processor hardware device and are processed inside Operating Systems supported:
that device instead of in main memory where viruses can
• Windows® 7 Enterprise, Professional, and Ultimate
spy on the process. This option helps ensure the ultimate • Windows 8 Enterprise and Pro
protection, even against sophisticated hackers attempting
to gain access to critical systems. Hardware supported:
• Fingerprint readers
Any OS is inherently difficult to secure from malware, • Smart Card readers
which has become a multi-billion dollar, well-organized • Contactless Smart Card readers
industry. Dell ControlVault™ avoids malware by storing
and matching credentials in a separate secure process. Dell ControlVault™ is available on select Dell Latitude laptops.
It is a security subsystem fully isolated from the host OS
and associated malware and consists of a local secure Dell FIPS 140-2 compliant TPM is available on select Dell
memory, integrated fingerprint processing and integrated Latitude laptops and select Dell Precision mobile workstations.
FIPS 201 contacted and contactless smart card readers.

Dell offers the world’s most secure


commercial PCs
Dell’s advanced authentication solutions, in combination
with Dell Data Protection solutions for comprehensive
encryption and leading-edge malware prevention help
make Dell commercial PCs some of the most secure in the
industry. To learn more about Dell Data Protection solutions,
visit www.dell.com/dataprotection.

Learn more at www.Dell.com/DataProtection


1. Offering may vary by country and by configuration.

You might also like