Dell reinvents endpoint security portfolio through strategic collaborations with Secureworks and CrowdStrike
Cyber criminals are continuously shifting their attack techniques to better target endpoints. As more than one-third (39 percent) of cyber attacks are now non-malware based, adversaries can exploit gaps in traditional anti malware solutions used in isolation. Considering 50 percent of organizations also have insufficient endpoint or network visibility during incident response engagements, it's clear many businesses are injecting ineffective security tools into their environments, ultimately adding complexity without directly addressing the problem. These disconnected solutions require ongoing diligence and expert resources to analyze a multitude of security alerts and identify compromised devices. Yet, with the growing cybersecurity skills gap, businesses don't have the resources needed to manage their security infrastructure effectively.
To help organizations address these challenges, Dell is introducing Dell SafeGuard and Response, a portfolio of next-generation endpoint security solutions that combines the managed security, incident response expertise and threat behavioral analytics of Secureworks with the unified endpoint protection platform from CrowdStrike. Dell's modern and effective approach designed to prevent, detect and respond to the shifting threat landscape makes it easy for organizations to protect their data with the industry's most secure commercial PCs.
With AI-driven and cloud-native endpoint protection powered by CrowdStrike and expert threat intelligence and response management by Secureworks, Dell SafeGuard and Response provides customers with the essential capabilities they need to protect their PCs and data. CrowdStrike endpoint security solutions prevent more than 99 percent of malware and non-malware-based threats4, detect 100 percent of vulnerabilities, and respond to sophisticated attacks rapidly. Secureworks' RedCloak™ behavioral analytics are built into the prevention, detection and response capabilities, so customers benefit from an ever-smarter network effect of protection. When an emerging threat is discovered in one environment, countermeasures are created and deployed to all customers who may be affected.
Prevent, detect and respond to evolving threats
With Dell SafeGuard and Response, customers no longer need to worry about complex implementation involving numerous agents. Dell's modern approach to security simplifies the buying process, allowing customers to order these new solutions alongside their new PC. Businesses will receive outstanding prevention combined with the ability to quickly detect compromised devices and remediate cyber incidents.
Customers can select from the following new Dell SafeGuard and Response solutions to meet their unique security needs:
CrowdStrike Falcon Prevent™: This next-generation antivirus (NGAV) solution uses artificial intelligence and machine learning to stop malware and malware-free attacks, offering organizations enhanced protection without requiring signatures and the heavy updates that come with them.
CrowdStrike Falcon Prevent and Insight: In addition to the NGAV solution, customers can advance their threat prevention capabilities with Device Control and Falcon Insight™, the leading endpoint detection and response (EDR) solution. This enables full visibility into endpoint threat activity and real-time remediation designed to prevent, detect and investigate incidents and stop threats.
Secureworks Managed Endpoint Protection: Combined with CrowdStrike Falcon Prevent and Insight and Device Control, this offering provides customers with 24x7 managed services from Secureworks to monitor the state of endpoints for indications of threat actor activity. Secureworks Security Operations Center and Counter Threat Unit™ will investigate events to determine severity, accuracy and context to suggest remedial actions, giving organizations peace of mind around the clock.
Secureworks Incident Management Retainer: In the event of a serious security incident, Secureworks will deploy its On-Demand Incident Response Specialist Team who are highly skilled to respond to and mitigate a cyber incident at any time. Now, organizations with and without security operations centers can have the support and expertise needed in critical times. This service can also be used to build a proactive response plan for future security incidents.
"Organizations are faced with what may feel like an exponentially expanding threat landscape and a mixed bag of solutions to fix it," said Brett Hansen, vice president and general manager of client software and security solutions, Dell. "To meet the evolving needs of our customers and stay ahead of ever-evolving threats, Dell is offering organizations the tools they need to keep their devices and data secure."
"Attacker techniques are getting more sophisticated and customers need managed solutions that are actively guarding against threat activity," said Wendy Thomas, senior vice president of business and product strategy, Secureworks. "Our modern approach with Dell ensures a coordinated defense against cyber threats at the scale and speed required for any customer's evolving security needs beyond the network."
"Being selected by Dell is a testament to CrowdStrike's market leadership and the proven value of our platform," said Matthew Polly, vice president of Worldwide Business Development and Channels, CrowdStrike. "Together, we are equipping customers with a unique and compelling solution to deliver an end-to-end approach to endpoint security that effectively stops threats, while reducing enterprise complexity and modernizing threat detection and management."
Dell SafeGuard and Response will be available globally in March 2019 through Dell and its authorized channel partners.
Additionally, the comprehensive CrowdStrike Falcon platform can also be purchased through Dell.
- Head of Penetration Testing
- United Kingdom
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
- CONTRACT SOC Manager. London / Birmingham. URGENT Immediate role.
REF7847 Contract SOC Manager. SC cleared, London / Birmingham. Initial 3 month Contract. SOC Manager needed to for an URGENT 3-4 month CONTRACT. SC clearance is essential. The project is to aid in the setup, implementation and management of resources to help with the initial stand up stages of a new SOC within a greenfield site. This is a short term contract role whilst a permanent hire is brought on over the coming 3 to 4 months. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- SPLUNK Level 3 SOC Consultant, SIEM Splunk, London / Birmingham
REF CH7825 Level 3 SOC Consultant, SIEM Splunk, London / Birmingham £55,000 + Level 3 SOC Consultant, SIEM SPLUNK needed. Security Clearance. Permanent role Level 3 SOC Consultant, SIEM SPLUNK needed to join a public sector client. The ability to achieve SC clearance is essential. MUST have experience working with SPLUNK ideally to an Advanced Power User level. Splunk Enterprise Security (ES) knowledge and hands on experience highly desirable. The role will include, but not be limited to; managing and handling incidents end to end, supporting and mentoring level 1 / level 2 staff, supporting the SOC manager in the delivery of the SOC roadmap, engaging with the client stakeholders (other technical teams) as and where needed, use case development, advanced search and reporting etc. The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt use this calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Chris.Holt@dclsearch.com
- Aspiring Cyber Partner. Business lead, market maker.
Aspiring Cyber Partner (management consultancy) with Cyber specialism into Healthcare, Utilities and or Public Sector. Working with new and existing clients to help them solve, transform or evolve their cyber capabilities. MUST have; A proven management consultancy background in cyber. A history of identifying and closing new business opportunities. Currently Revenue generating / must be able to demonstrate recent wins. Client facing to board level with international businesses. Team leadership / mentoring experience. Extensive cyber industry experience. Digital transformation, Start-up environments etc. Experienced presenter at industry events, to be the public face of a business / capability. Breadth of knowledge across Cyber security. Service definition / creation. Would consider a senior director with experience delivering the above looking to step up. All conversations kept in confidence. To arrange a discreet call book a time to speak in my diary via https://calendly.com/chris-holt/cyber-partner-call Chris.Holt@dclsearch.com