Visit www.barracudasecurity.com

Legend

Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED

Saturday, January 22, 2005

US DELL COMPUTERS IS BEST LINE OF DEFENCE IN COMPUTER SECURITYDell Security Solutions In The Batter For Comprehensive IT Security, Dell is The Best Line of Defense



Case Studies
Dell Security Solutions In The Batter For Comprehensive IT Security, Dell is The Best Line of Defense
July 2003
Information and communication have always stood as the foundation upon which good government is built. Today, information and communication are managed and facilitated through an ever-increasing cache of sophisticated technological equipment, which government agencies must trust completely.

Dell understands the crucial role information technology plays in today's state and local government operations. Dell delivers a comprehensive, end-to-end security solution that provides customer support while protecting critical equipment and data against everything from simple theft to viruses and unauthorized access.

As a trusted provider of public-sector information technology for nearly 20 years - and the number-one supplier of PCs to government in the United States - Dell understands the unique security needs of state and local government organizations. As those needs continue to grow and evolve, Dell will be there to support and guide its government customers for whom security is not just necessary, but an absolutely critical concern.

Assessing Needs

Dell offers complete Security Assessments to help public agencies build the most secure IT environment possible. Through these assessments, Dell security professionals analyze an agency's entire technological operation and offer real solutions that mitigate safety risks.

"We've gone into some of the very best kept infrastructures - where the team is really informed to perform an assessment and inventory their environment - and there are always surprises for them in terms of what they have and what they thought they had," said Kathy Thomas, senior program strategist for Dell Professional Services in the public sector.

In these days of heightened security awareness, surprises are definitely something government agencies can do without. That's why, in addition to the initial Security Assessment, Dell offers Fast Track solutions that can gauge the safety of every part of an agency's IT infrastructure and allow customers to quickly implement features to minimize security risks.

Three key Fast Track services are: Fast Track to Secure Desktop, Fast Track to secure Servers and Fast Track to Secure Operations. Highly trained Dell technicians offer security solutions for clients based on NSA standards through the use of Fast Track services.

For instance, in the interest of security, many customers choose to lock down a standard image for desktops and servers. Dell technicians can now use Custom Factory Integration (CFI) to burn an individual image for a customer in order to simplify and standardize desktop configuration according to Thomas.

And because Dell understands not every customer has the same needs for every service, the Security Assessment and Fast Track services are available individually or as a package. Dell has worked with strategic partners like Microsoft and Net IQ to offer a breadth of security services to meet any government agency's needs.

"Our security services continue the value proposition for our customers," said Thomas. "Customers are looking for the best security they can get, but at the same time they've got limited budgets. We use a tools-based methodology in order to drive down the cost, help prioritize their needs and deliver the appropriate return on investment."

Building a Security Fortress

But Dell's security solutions are not limited to the expertise provided by Fast Track Service personnel. Where some technology companies offer customers a thin veil of security, Dell understands the intricacies of today's IT systems and the sensitive nature of the information they contain.

Dell's security solution includes strong protection provided by four sturdy walls of security: physical security, user security, system security and network security.

Together these four solid walls of protection surround an agency's IT infrastructure and the data it holds with a comprehensive bulwark that provides an end-to-end security package.

Getting Physical

Dell's protection begins with the physical computer security. Law enforcement officials estimate a computer is stolen every 93 seconds in the United States and less than 10 percent of these machines are ever recovered.

With those odds it's no wonder government agencies and businesses are more aware of the need to physically protect their computers. Dell offers several standard and optional features designed to safeguard an agency's computing assets.

All Dell OptiPlex desktops are equipped with a chassis intrusion alert system that deploys when a chassis is opened. The OptiPlex also features a configuration change alert that sends notification when any aspect of system configuration (processor, memory, hard drive, etc.) is changed. Using Dell OpenManage system management tools, alerts from both features can be configured to notify both the end-user and/or the IT administrator.

Cable lock slots and chassis lock loops provide the ability to help secure a system and protect its components.

As options, Dell offers cable locks for both notebook and desktop systems; a custom three-in-one chassis lock that insures the chassis cover is closed to protect internal components, secure the system itself and protect system peripherals; and factory integrated asset tags to help track an organization's Dell systems.

In addition, Computrace Plus PC Tracking and Loss Control Service enables IT managers to know where their computers are at all times. If a computer is stolen Dell's Absolute Recovery Team is equipped to work with law enforcement officials to trace and recover the equipment.

User Friendly

User security forms another important wall in Dell's fortress of security.

System, hard drive, and system set-up passwords are all a part of Dell's BIOS-enabled security features that protect systems during the pre-boot process, even before operating system-based password protection is in place. These features are standard on Dell OptiPlex desktops, Dell? Precision? workstations and Latitude? notebooks.

Along with that internal security, Dell also offers smart cards - portable credit-card size devices with internal integrated circuits (ICs) that are physically inserted into a slot on either the computer or its keyboard.

Combining the use of something a user must hold (the smart card) with something only the user knows (a PIN) provides thorough, two-tiered, security.

Select models of the new Dell D-family notebooks now include an integrated smart card reader. Keyboard model readers also are available on select OptiPlex desktops and Dell Precision workstations.

The Inside Scoop

Of course, external precautions cannot protect agencies from hackers who invade their systems internally. However, Dell provides a third wall of safety through a variety of standard and optional features designed to surround an agency's technology in a stronghold of protection that helps ensure system integrity.

"The biggest threat is if you're running on older software and older hardware," said Steve Skibinski of Intel Solutions Market Development Group. Intel works closely with Dell to provide the best possible security for government agencies on a wide range of operating systems.

"What we're working on with Dell is to get the message out to end-users that if they're running older operating systems in their government agencies they are a security vulnerability," Skibinski said.

Dell's LegacySelect allows for quick transitions away from legacy technologies for select users while retaining some levels of legacy support for others. It is a standard feature on OptiPlex desktops.

Security related features include the ability to disable floppy drives, USB, parallel, serial and PS/2 ports, and PCI slots. By disabling these items, unauthorized users are unable to circumvent established security protocols.

Boot Integrity Service (BIS) Support enables PCs to authenticate a boot image before download and execution. BIS helps to determine whether an image comes from an authorized server and has not been corrupted before installation on a system.

"We're constantly integrating more security features right into the platform," Skibinski explained. "Dell has the Z series which has the smart card built right into the system."

Dell also provides retail and volume licenses for the leading anti-virus software packages, such as Norton AntiVirus and McAfee VirusScan. Anti-virus software is often available as a pre-installed option on new Dell systems.

Logging-on to Security

The final section of Dell's safety shield is network security.

With millions of technology devices now performing mission-critical tasks for a plethora of government agencies, network security is an absolute must.

Server Network Interface Cards (NICs) such as the Intel Pro 100S protect sensitive data traveling on a LAN with standards-based security features while maintaining high performance. NICs work to safeguard servers such as Dell's PowerEdge.

Secure Socket Layers provide secure protocol for large the large numbers of clients using today's Web Servers. Dell PowerEdge Servers are available with Broadcome's CryptoNextX SSL800 adapter, which accelerates the SSL protocol by allowing the server to support large numbers of clients using secure communications while helping maintain high performance.

Virtual Private Networking (VPN) gives authorized users secure, authenticated remote access to an agency's LAN via public networks such as the Internet. Del PowerEdge servers provide an ideal platform for operating systems such as Microsoft® Windows® Server 2003, which incorporates VPN functionality.

Microsoft, another key Dell industry partner, has spent more than $200 million to help ensure the security of its latest server software, constantly asking, "is this product extremely secure," according to Michael Stephenson, lead product manager for Microsoft's Windows Server Group.

"We designed this to be the most secure Windows Server operating system that we have ever shipped," Stephenson said.

In addition, Microsoft now offers Microsoft .NET, it's Web services solution that is revolutionizing how people interact with people and devices via the Web.

.NET provides exceptionally strong security protection by allowing users to manage their personal data by dictating which people and applications can access or alter particular pieces of that data. These permissions are associated with binding privacy policies that outlive specific transactions.

Because Microsoft understands that effective security requires a combination of secure software and good operational practices, physical security, and license agreements, current and upcoming software security programs and technologies are an important part of the .NET solution.

Firewalls that allow agencies to filter and content manage VPNs, monitor network resource requests and control Internet access also are a part of Dell's network security package.

The strength of Dell's four-walls of security, in conjunction with Dell's expert Professional Services provide a fortified garrison that can surround and protect the computer systems of state and local governments and their associated agencies.

In these days of threats - both foreign and domestic, real and perceived - Dell's full-service security solutions offer something that has lately been rather hard to find: peace of mind.












No comments: