• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Security suite features advanced threat protection/data encryption in full air-gap mode

July 15, 2017 By Aimee Kalnoskas Leave a Comment

Dell announces an air gap version of its Dell Endpoint Security Suite Enterprise solution to address the need for highly-secure industries to keep their endpoints isolated from the internet, yet still deploy an advanced threat protection solution. The solution integrates Cylance technology using artificial intelligence and predictive mathematical models to help protect against advanced persistent threats and malware. Organizations deploying air gap solutions are often unable to take advantage of newer security technologies because they are based on cloud connections. Dell has worked closely with Cylance to enable these organizations to take advantage of next-generation advanced threat protection technologies by creating an on-premises security solution that doesn’t require an internet connection.

From government to defense organizations, critical infrastructure or the energy and exploration industry, many organizations today are working with highly-sensitive information where maintaining the security and integrity of their data is of the utmost importance. Furthermore, many of these organizations may be in remote locations, like a military installation or offshore oil rig, where an on-premises solution is essential. Institutions that operate in a full air gap mode still need to protect against malicious threats, whether zero-day attacks, internal threats, malicious USB-based (“sneakernet-based”) attacks or other vulnerabilities. In today’s rapidly-evolving – and escalating – threat landscape, organizations need to keep ahead of the threat vectors and adopt more advanced security solutions, without bogging down their IT or productivity.

“Highly-regulated organizations and government agencies need to deploy air gap solutions to protect their highly sensitive data, but have been unable to take advantage of the latest security technology that requires cloud connections,” said Brett Hansen, vice president, Endpoint Data Security and Management, Dell. “Dell is responding to their heightened needs by adapting our flagship Endpoint Security Suite Enterprise solution for on-premises, air gap environments – giving these organizations an advanced threat protection solution that has been inaccessible to them before now.”

With the launch of the air gap solution, Dell Endpoint Security Suite Enterprise can now operate in three modes depending on the organization’s individual needs: in its original mode, the client uses an internet connection for cloud communication on threat data and updates; an on-premises network mode where the client connects to an on-premises server for policy enforcement – using standard software distribution tools (e.g., SCCM) to update clients; or the full air gap mode.

Organizations that must have their critical data isolated from network or internet connections can:

  • Defend against external, internal threats: By deploying a single suite with advanced threat protection and data encryption, highly-secure organizations can defend against external threats such as zero-day attacks and internal threats such as malicious USB connections while also protecting data with Dell Encryption
  • Simplify maintenance: The mathematical models used to detect anomalies only need to be updated a few times a year, greatly reducing the level of support required by IT. In contrast, traditional, signature-based anti-virus solutions require continual updates and are burdensome to maintain in air gap environments.
  • Consolidate management and compliance: IT can easily manage agent policy, and access the agent update as an offline update. The solution also provides access to enhanced threat reporting and a dashboard of threat activity graphics for better management and tracking

In addition to the advanced threat protection features, Dell Endpoint Security Suite Enterprise also includes file-level data encryption, providing a policy-based approach to protect data on any device, external media or public cloud storage services. It allows IT to easily enforce encryption policies for multiple endpoints and operating systems without disrupting end user productivity. The solution also incorporates web protection filtering to help stop targeted attacks that evade traditional defenses like URL filtering and anti-virus signatures.

“Historically, organizations that have deployed air gap solutions have not been able to deploy the latest security technologies to protect against malicious threats,” said Rahul Kashyap, Chief Product Officer, Cylance. “By working with Dell, we are able to offer our advanced threat protection solution in an air gap mode to protect against some of the toughest threats, while dramatically reducing the burden on IT with our mathematical models that require minimal updates.”

 

Filed Under: Applications, Security, Tools Tagged With: dell

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy