Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 8 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Dell integrate technologies to offer enterprise mobility management concept

by The Gurus
October 5, 2020
in Editor's News
Share on FacebookShare on Twitter

Dell has announced plans to allow users to use its technologies to enable mobile connectivity.

Named Enterprise Mobility Management (EMM) to allow mobile users to connect to a unified solution, and will be launched as an annual software subscription license across EMEA from Q1 2014. According to the company, Dell EMM provides unified security and management for remote workers and allows its Connected Security concept to get “more connected”.

Building on earlier announcements with a unified solution that provides mobile device management (MDM), mobile application management (MAM), mobile content management (MCM), and a Secure Remote Access gateway (SonicWALL/SRA) to establish secure endpoints, the company said that this brings in technology acquired from other companies acquired by Dell.

Kevin Norlin, head of EMEA for Dell Software, told IT Security Guru that it took the assets from the acquisitions at the research and development level and integrated them to deliver this solution. “It uses Sonicwall technology for the network security, Quest for single sign on and Kace for the appliance capability and Secureworks for the expertise and technology to bring it together,” he said.

“We have done work on our side so users don’t have to, I cannot think of another provider with this solution and technologies with different offerings. With 100,000 users, Dell helps a lot of mobile workers and as long as they have data integrity you can have a mobile workforce. What we are trying to do is cover all requirements and try to provide somehow a bit different. It is all about supporting the mobile worker.”

According to the company, Dell EMM provides IT with a comprehensive management experience to configure and define security and compliance policies for iOS and Android smartphones; Windows, Android and iOS tablets; Linux, Mac and Windows laptops and desktops; as well as thin and zero cloud clients.

The integration also includes secure remote access with two-factor authentication and SSL VPN via technology from Dell Defender and SonicWALL, while cloud-based authentication is offered via the integration between Dell Cloud and Defender.

Norlin said: “There are solutions for the laptop, for the network and for mobile. Dell is fitting it together at another level. Who owns the endpoint? It is for all employees to protect data and need a productive solution. This is for iOS, Android, Windows, Linux – it is a unified solution to deliver a connected security approach.

“What we are trying to do is cover all requirements and try to provide somehow a bit different. It is all about supporting the mobile worker. Who cares what device or OS you are running, what are you trying to do?”

FacebookTweetLinkedIn
Tags: DellMDMmobile
ShareTweetShare
Previous Post

“Snowden” wins US Department of Defense’s Cyber Security Challenge

Next Post

Data Retention Directive described as “incompatible” by EU court of justice

Recent News

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato SASE Cloud Named “Leader” and “Outperformer” in GigaOm Radar Report for SD-WAN

February 7, 2023
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

UK second most targeted nation behind America for Ransomware

February 7, 2023
safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information