Dell seeks to crack down on potential supply chain security attacks

Dell seeks to crack down on potential supply chain security attacks

One of the easiest ways to compromise the security of a device is to do so before it reaches its intended recipient, which is why hardware manufacturers like Dell are always looking for new ways to protect themselves. PC during transit. According to a Futurum report, more than three-quarters of companies prioritize supply chain security when selecting a supplier to address a range of security threats, including counterfeit components, malware software, and firmware tampering. . To further secure its supply chain and devices throughout their lifecycle, Dell announced new supply chain security offerings and services focused on data security for Dell Technologies infrastructure and commercial PCs. The company's commercial PCs are already the most secure in the industry, but are now available with more levels of security and supply chain integrity checks. Dell's SafeSupply chain tamper security services help protect against tampering in transit with tamper-evident seals added to devices and their boxes at the factory prior to shipment. However, customers can also choose optional pallet seals for added security. To prevent spyware or malicious agents from being injected into a device's hard drive, Dell's SafeSupply chain data sanitization services ensure that the device is cleaned before the business image is depleted. installed on it by erasing the NIST-compliant hard drive.

Secure servers and remove assets

In addition to providing more security for your PCs, the Dell EMC PowerEdge server portfolio now comes with secure component verification in the form of an embedded certificate that allows businesses to verify their servers arrive on the fly. Measurement of its order and construction. Dell Technologies is the first server vendor to offer a portfolio-wide solution for cryptographically verified hardware integrity. At the same time, PowerEdge servers are built with a cyber-resilient architecture that includes a well-established silicon root of trust. The enterprise secure component reverification can verify that no changes are made to system components after the server is sealed and shipped from the factory. The audit also protects against cybersecurity risks by meeting supply chain security standards in highly regulated industries such as financial services and healthcare. Dell has also expanded its data security-focused services across its infrastructure portfolio with its Dell EMC Data Sanitization for Enterprise and Data Destruction for Enterprise services. The company now provides on-site services for clients to help redeploy or retire assets in accordance with the latest industry and compliance standards. Dell EMC Keep Your Hard Drive for Enterprise and Keep Your Component for Enterprise services are also available for the entire enterprise infrastructure portfolio. With these services, sensitive data never leaves the control of the client, as the pieces are replaced so that companies can comply with strict data privacy regulations such as GDPR. Dell Technologies Global CTO John Roese provided additional insight into the company's commitment to device security in a press release: “As digital value is created, security threats follow. Security is at the foundation of everything we do, and our intrinsic security approach addresses our customers' needs for trusted technologies and partners to help defend against attacks and reduce business risk. "