Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Innovation
    • IT Management
    • Mobile
    • PC Hardware

    Dell Now Protecting Work Spaces in Its New PCs, Tablets

    Written by

    Chris Preimesberger
    Published June 26, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Thanks to a new partnership with an under-the-radar but powerful company named Invincea, Dell may have a legitimate stake in the ground as the first Tier 1 IT company in years to make a truly radical improvement in enterprise security.

      Up to now Invincea did its work only at high security levels within the U.S. government, the military, and highly regulated large commercial enterprises in verticals such as oil and gas exploration, financial services and health care. Dell announced June 25 that it has partnered with the seven-year-old Fairfax, Va.-based company to bring application-level security to all of its end-user devices—laptops, notebooks, desktops and tablets—under the label Dell Data Protection.

      Much of this new-gen security will be added for no extra cost on Dell devices.

      Instead of only encrypting the device, locking down the operating system or using a traditional virtual private network, Dell Data Protection through Invincea puts a shield—or virtualized container—around each browser or application instance to protect it from the rest of the device and the network on which it resides. That way, if a document or link is opened that is infested with a virus, botnet or other digital malady, the instance is isolated and can be discarded with no harm, no foul. A colored edge actually appears on the window to indicate to the user that the instance is protected.

      If there is an invasive incident inside the container, a full report of the instance is recorded and sent back to Invincea to add to its ever-growing archive of malware knowledge.

      This is a distinct approach from most others, which generally concentrate on locking down access points, the network, document folders, the device itself—or the operating system, which is what new-gen security provider Bromium does, for example. Each of these options is still available in new Dell devices if users want them.

      Protected Workspace Came From DARPA Project

      Invincea’s secret sauce, called DDP Protected Workspace on Dell devices, came out of a Defense Advanced Research Projects Agency (DARPA)-funded project for advanced endpoint protection. It stops cyber-attacks that include spear-phishing, watering hole attacks, drive-by downloads, poisoned search engine results and others that target end users.
      “Each time an employee accesses the Internet or opens an e-mail attachment, they run the risk of becoming the unwitting accomplice to a data breach,” Anup Ghosh, Invincea’s CEO and founder, told eWEEK. “First of all, if you look at basically every other security company out there, it’s based on some sort of list. The premise is that someone, somewhere gets infected, and then they spread it far and wide via their lists. It’s a reactive strategy.

      “Second, the guys writing the malware have figured out that all they have to do is slightly tweak the malware and replicate it on a large basis, then the security can’t keep up. That’s today’s status quo. That approach doesn’t work for targeted attacks. This is where we step in. If you are targeted by someone and they send you an email with an infected attachment or link (a spear-fishing exploit), we protect the user from himself.”

      Ghosh said that Protected Workspace is completely unobtrusive to users so their everyday workflow is uninterrupted.

      Dell, which is starting a new campaign spotlighting security awareness among all device users, obviously was impressed with this approach. The Austin, Texas-based IT giant spent a lot of time checking out a number of different security schemes before deciding this was the one to use across all its products.

      Conventional Security Based on Protecting Lists

      “Traditional security approaches are failing to solve the big challenges, because they are based on legacy approaches,” Brett Hansen, Dell’s executive director of end user computing, told eWEEK. “We believe that security should start at the end-point purchase. As you are buying your next device, you should be thinking about buying security.”

      Because of the fast advancement of the bring-your-own-device (BYOD) trend in the workplace, enterprises are exasperated about what to do to keep business information safe amid the plethora of devices employees use on a daily basis—most of which are not using corporate networks.

      “Among the companies that I speak to, there’s an admission that they’re not doing a good job (in overall device security), and that they have vulnerabilities; there’s also a sense of despair and of ‘I don’t know what to do,’ ” Hansen said. “There’s a lot of security elements out there, they’re confusing, they don’t fully understand this space; they’re asking, ‘What do I need?’ “

      To this end, Dell has brought forth its all-new security scheme, using Invincea as the touch point.

      “End users, by their nature, do silly things. We click on links we shouldn’t, open attachments we shouldn’t, lose things, leave things where they shouldn’t be,” Hansen said. “Ultimately, this creates vulnerabilities, which hackers know they can exploit. The bad guys are increasingly focused on end users for those reasons.”

      Protected Workspace Available in One-Year Subscriptions

      A one-year subscription to DDP Protected Workspace software is included on Dell Precision, Latitude and OptiPlex PCs, Hansen said. Once the application is activated, it begins moving users’ browsers, PDF readers and the Microsoft Office suite into a contained, virtual environment where it automatically identifies malware attacks in real time, based on behaviors and actions inside the environment and away from the host operating system.

      Dell Data Protection Encryption is packaged in a single suite. It features Windows 8 support and auto deployment and provisioning of users when purchased factory-installed on Dell Precision workstations, OptiPlex desktops, and Latitude laptops and tablets.

      Dell commercial PCs that use second-generation Intel v-Pro chips will feature file-level encryption that protects data on the client, on remote media, on mobile devices and in the cloud and virtualized container that protects against zero-day threats, Hansen said.

      The company’s new authentication software, DDP Security Tools, enables IT managers to centrally manage both their encryption and authentication policies on the same console. Authentication options include fingerprint, smart card and contactless smart card readers.

      DDP Security Tools now ships on every Dell commercial PC.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.