Quantcast
Channel: Dell TechCenter
Viewing all articles
Browse latest Browse all 1001

Dell IAM Solutions Garner Industry Accolades

$
0
0

By Todd Peterson, senior product marketing manager, Identity and Access Management, Dell Software

We are pleased to announce that the Info Security Products Guide, the industry's leading information security research and advisory guide, recognized three of Dell’s Identity and Access Management solutions in the 2014 Global Excellence Awards last night, at RSA. In the Products and Services Excellence category, Dell™ One Identity Manager-Data Governance Edition took the Gold award for Best Security Service (New or Updated version), while Dell™ One Identity Cloud Access Manager earned a Bronze award for Cloud Security, and ChangeAuditor also took the Bronze for Compliance.

Further recognition for our IAM portfolio came from the Bronze award presented in the Best Deployments (USA) category for the Dell KACE customer case study, "Dell Helps Pepperdine University Secure Devices against “Drive-by” Malware."  Pepperdine deployed Dell KACE Endpoint Systems Management Appliances to reduce vulnerability to “drive-by” downloads of information stealers, extortion-ware and spambots from mobile devices used to access the university’s network. The school also used Dell KACE K1000 Systems Management Appliance to perform device discovery and inventory of hardware and software to enable asset tracking and compliance reporting, and the Dell KACE K2000 Deployment Appliance to improve patching. In addition to these awards, Dell also was a grand trophy winner.

All of these solutions are part of our comprehensive Connected Security product portfolio, and the industry recognition reflected in these awards is testament to our best-in-breed solutions’ success at solving our customers’ pain points. Our holistic Connected Security approach protects against threats both known and unknown, from all perimeters of the corporate network ─ inside out , and outside in. It embeds security into the fabric of software, and governs access to every application and protects every device.

We know attackers are looking to worm their way into the network any place they can find a disconnect in the security perimeter, and that’s why our Connected Security solutions not only protect from the data to the endpoint to the cloud, they also provide deeper insights and stronger predictive analytics to quickly foil security threats, regardless of the direction from which they attack. 


Viewing all articles
Browse latest Browse all 1001

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>