Dell Technologies Intros New Secure Supply Chain Offerings
December 4, 2020
Secure the supply chain and
device lifecycle with end-to-end protection
More than three-quarters of
organizations prioritize supply chain security during vendor
selection3 to address security threats such as
counterfeit components, malware and firmware tampering. Dell
Technologies relieves these concerns with new supply chain
security offerings and data security-focused services for
Dell Technologies infrastructure and commercial PCs. The new
offerings strengthen its comprehensive secure supply chain
practices. Protect PCs during transit:
Dell commercial PCs – already the most secure in the
industry1 – are now available with more layers of
supply chain security and integrity controls. Dell
Technologies SafeSupply Chain solutions are offered on top
of the Dell Secure Development Lifecycle and standard supply
chain security measures. New solutions include: Validate server integrity
upon arrival: The Dell EMC PowerEdge server portfolio now
comes with
Secured
Component Verification,
an embedded certificate that lets companies verify their
servers arrive as they were ordered and built – without
hardware compromise. Dell Technologies is the first server
provider with a portfolio-wide solution for
cryptographically verified hardware integrity.4
Also, PowerEdge servers are built with a
cyber-resilient
architecture,
including a well-established silicon
Root of Trust.
The new Secured Component Verification: Redeploy, retire and keep
assets securely: Dell Technologies extends its data
security-focused services to the entire Dell Technologies
infrastructure portfolio: Secure infrastructure with
customization, automation and intelligence Forty-four percent of
organizations experienced at least one hardware-level or
BIOS attack over the past 12 months and 16% have had more
than one attack. Companies need to secure
infrastructure at the hardware and firmware level to help
prevent certain types of vulnerabilities and malicious
attacks. Dell Technologies tackles these issues with new
levels of security customization, automation and
intelligence for the PowerEdge server portfolio.
Customize boot security for
servers: The boot process is the secure foundation for any
device. If the boot process is compromised, attackers can
subvert security controls to access any part of the system.
With Dell Technologies server security capabilities, IT
staff can customize their server boot process to reduce the
threat surface and thwart boot-related attacks. This
exclusive capability8 –
PowerEdge UEFI
Secure Boot Customization
– provides advanced mitigation for industry-wide bootloader
vulnerabilities. This approach is featured in a recent
United States National Security Agency
report.
Lockdown servers to protect
against threats: PowerEdge servers’ integrated Dell Remote
Access Controller (iDRAC)
offers automated server management both at the server and
remotely. With iDRAC, customers can enable or disable a
system lockdown without having to reboot. This Dell-only
security feature9 prevents unintentional or
malicious changes to the server’s firmware and critical
configuration data. The newest release – iDRAC9 – extends
the lockdown capability to include network interface
controllers, providing customers more control over the
lockdown. The latest release also: Availability |
Terms of Use | Copyright © 2002 - 2020 CONSTITUENTWORKS SM CORPORATION. All rights reserved. | Privacy Statement