Related Products
|
||||||
About
Dell Data Protection | Endpoint Security Suite offers threat protection, authentication, and encryption, all centrally-managed from the Dell Data Protection Server. With centralized management, consolidated compliance reporting, and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Ensure that security device drivers are up-to-date for the best customer experience. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption enables IT to easily enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t get in the way of existing IT processes for patch management and authentication. Exclusive to select Dell Latitude, OptiPlex and Dell Precision systems, the optional Full Volume Encryption* solution equips end-user systems with military-grade protection that won’t slow your employees down.
|
About
Unless your current mobile security solution is capable of addressing the newer, more advanced threats that are built to jailbreak/root the device, you are vulnerable. The scary part is that just about every solution on the market fails to prevent these newer, more advanced threats. True mobile security needs to incorporate a containerization-based solution that isolates and encrypts the data being accessed and stored on the device and doesn’t rely on the Keystore for storing its crypto. Challenge any vendor with this mobile security requirements list below before committing to any solution. Full encryption of data on the device and full encryption of data being sent or received from the device using AES 256-bit encryption at a minimum. Containerized and encrypted isolation of all work-related emails, files, and apps from personal use. Encrypted transfer of data between apps on the device. Zero use of KeyStore for crypto key storage.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises and users looking for a data protection and encryption software solution for their data needs
|
Audience
Professionals and anyone searching for a solution to encrypt data and store crypto keys
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationDell
Founded: 1984
United States
www.dell.com/support/home/en-us/drivers/driversdetails
|
Company InformationSyncDog
Founded: 2013
United States
www.syncdog.com/solutions/solutions-overview/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
|
||||||
Integrations
Axonius
Boomi
DDP Mobile Edition
Dell EMC Avamar
Dell EMC NetWorker
EMC Elastic Cloud Storage
EMC RecoverPoint
EMC SourceOne Archiving
Linker Vision
MINDely
|
Integrations
Axonius
Boomi
DDP Mobile Edition
Dell EMC Avamar
Dell EMC NetWorker
EMC Elastic Cloud Storage
EMC RecoverPoint
EMC SourceOne Archiving
Linker Vision
MINDely
|
|||||
|
|
|