InvestorsHub Logo

mdt

Followers 2
Posts 167
Boards Moderated 0
Alias Born 05/25/2004

mdt

Re: RootOfTrust post# 143772

Wednesday, 05/02/2007 2:20:15 PM

Wednesday, May 02, 2007 2:20:15 PM

Post# of 249238
the embassy listing wasn't anything new, it was just nice to see again. i went into the notebooks offered at the federal level and then DOD offerings and all the notebooks listed

http://www.dell.com/content/topics/global.aspx/solutions/pub/security?c=us&cs=fedportal&l=en...

although they list Identiphi as well

IDENTITY AND DATA SECURITY


Managing access to sensitive government data is the most critical link in your security chain. By using Dell OptiPlex desktops, Dell PrecisionTM workstations and Latitude notebooks, you can enjoy a number of standard security features built into the box, as well as optional hardware and software from industry leaders to help you create a multi-point authentication strategyand help protect your agency.

BIOS-enabled security adds a layer of protection on top of your operating system passwords, tying additional password protection to system startups and pre-operating system configuration. Take data security to the next level with Smart Card tools, which combine passwords and access cards to provide a robust security solution. In tandem with Trusted Platform Module (TPM) technology, this can minimize network and system breaches.

Because user identity and data security are absolutely vital to protecting your federal initiatives, Dell also offers bio-metric devices to positively identify users through unique physical characteristics. Dell's range of security software supports this combination of security initiatives, ensuring ease of use and a step towards FISMA compliance.

User Authentication
Federal agencies and departments must know who is accessing sensitive information at all times. User authentication relies on passwords or external identification devices to verify access to the system and network data. Government organizations are a common target for hackers, and passwords alone are often not effective enough to ensure accurate authentication in sensitive IT environments.

For robust identity management, Dell has partnered with developers of leading security packages, such as the IdentiPHI Enterprise Security Suite. This versatile software suite provides encryption and single sign-on to applications and network resources. It works with Smart Cards, biometrics and token devices, and Dell offers the associated hardware and professional services for assessment and deployment.

Smart Cards combine user credentials stored in a security object (the card) with security knowledge (a password) to create a two-factor security process you can count on. Smart Card technology can be easily integrated into your existing technology with Smart Card keyboard readers, or enhanced to include biometrics technology, such as fingerprint readers. This helps ensure that only authorized users are accessing your data.

System Authentication
Dell's system authentication security solutions include the Trusted Platform Module (TPM), which is standard on Dell's D-family of Latitude notebooks, Dell OptiPlex desktops and select Dell Precision Workstations. TPM is an industry-wide effort to standardize trusted PC platforms, utilizing a chip embedded in a system that identifies that computer as an authorized system. This cutting-edge technology helps prevent attacks from hackers looking to capture passwords and encryption keys to your data. Many Dell partners, such as IdentiPHI and Wave Systems, also provide solutions that are compatible with TPM.

File and Folder Encryption
Protecting sensitive data as well as the privacy rights of citizens are top security concerns. Whether in transit over the network or at rest on your system, encryption helps secure data with a digital signature, minimizing its potential to be altered or accessed by unauthorized users internally or externally. Data encryption technologies help secure your data by converting files and text into "cipher text" that can only be decoded to its original form with a valid password or encryption key (often managed by Smart Cards or TPM). Encrypting network traffic usually involves the use of a Virtual Private Network for remote connections. Dell offers industry-leading encryption solutions such as IdentiPHI and EncryptX to help keep your most critical data secure. These complete encryption solutions let you manage who can decode data stored on your network, with assigned privileges and best-in-class encryption techniques.

Data Recovery
Local Recovery is a client-based, stand-alone backup and recovery application developed by Altiris and available on Dell OptiPlex desktops, Latitude notebooks and Dell Precision Workstations. Local Recovery helps protect your operating systems, applications and data from unintentional changes, accidental deletion, virus attacks and corrupted files. Once activated, periodic snapshots of your data are taken automatically, working seamlessly and unobtrusively to backup your data for protection

mdt.......

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.