Dell Data Protection Reviews & Product Details

Are you from this Company?
Dell Data Protection
Texas, USA
1984
$50BN to $100BN
Enterprise
94 Likes
61 Buyers Negotiating

Dell Data Protection USP

Dell has advanced in the encryption software market by delivering the best-in-class encryption solutions for encrypting data-at-rest, data-in-motion, and data-in-use. The encryption solutions provided by Dell include Dell Encryption Enterprise, Dell Encryption External Media, Dell Data Guardian, and Dell BitLocker Manager. Dell Encryption Enterprise helps customers encrypt data stored in the system drive, external media, and cloud environment. The file and folder encryption capabilities from Dell support several operating systems, such as Windows, Mac, Linux and Android. Dell Encryption Enterprise offers centralized management of policies, supported with authentication modes, such as Single Sign-On (SSO) and smart cards. Dell Encryption External Media ensures that the critical enterprise data stored in the endpoint, server, and removable disk remains encrypted. Encryption is supported for a wide range of USB, removal disk, and smartphone devices. Dell Encryption External Media supports a wide range of security policies and is compatible with Microsoft Windows Server Active Directory tools. Request Dell Data Protection Pricing to get more information.

Summary

Dell provides a cloud encryption solution Dell Data Guardian, which ensures that the files stored in the cloud environment are secured from advanced cyber-attacks by encrypting data-at-rest in the cloud environment. It also provides centralized management of encryption, policy enforcement, and access recovery. The company's Dell BitLocker Manager offers better visibility and control of the resources and software on Microsoft BitLocker. The features include simpler escrow, recovery, and management of keys and passwords; centralized reporting and management of policies; and support for encryption on other platforms. The wide range of Dell’s encryption solutions support operating systems, such as Microsoft Windows which includes XP, 7, 8, 8.1, and 10; and Mac OS which include X Mavericks, Yosemite, and El Capitan versions. Remote management and compliance enforcement are also offered on web browsers, such as Internet Explorer, Mozilla Firefox, and Google Chrome. Apart from onpremises and cloud environments, Dell also offers encryption support for the virtual machine environment. The company’s encryption solutions are fully compatible with the VMware environment and do not involve the hassles of multiple servers, databases, and licenses.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Encryption Software in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
Dell Data Protection
61 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +13
    Managed Services
  • +12
    Professional Services
  • +5
    Consulting Service
  • +14
    Support and Maintenance
  • +6
    Training and education
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +10
    IaaS
  • +9
    PaaS
  • +8
    SaaS
  • +7
    Large Enterprises
  • +10
    Cloud
  • +14
    Directly
  • +9
    On-Premise
  • +5
    Through Partners / Third-Party Vendors
  • +12
    Cloud Encryption
  • +10
    Database and Application Encryption
  • +13
    Data Encryption
  • +8
    Disk Encryption
Cautions
  • -8
    SMEs
  • -7
    Column-level encryption
  • -12
    Data-at-rest encryption
  • -11
    Data-in-motion encryption
  • -13
    Data-in- process/use encryption
  • -5
    File level encryption
  • -14
    Virtual machine instance encryption
  • -11
    Others (RSA, Blowfish, DES)
  • -10
    Customer Redressal Mechanism/Program
  • -9
    Level of Support
  • -10
    Patented inhouse algorithm
  • -11
    Communication Encryption (Voice email, and message)
  • -14
    Data Loss Prevention
  • -5
    Tokenization
  • -7
    Others
  • -6
    Application-level encryption
  • -8
    Application-level tokenization
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup