Dell: We can beat Cisco in enterprise and Cloud security
- 20 February, 2013 18:01
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.
"Cisco is a great competitor, but they don't have our holistic view," said Patrick Sweeney, executive director product management at the Dell SonicWall division which markets firewalls and other security gear as he described a strategy to optimize the identity management assets gained through Dell's acquisition of Quest last September for $2.4 billion. Cisco isn't Dell's only major security competitor HP and IBM also loom large when it comes to winning large customers. One reason Dell wants to articulate an IT security strategy now is because the company earlier this month announced a buy-out agreement in which Michael Dell and equity investor Silver Lake would acquire Dell for $24.4 billion -- and Dell enterprise customers are eager for information about the implications of this.
Quest, now part of the Dell Software Group, brings to Dell a range of new products, including identity and access management software. By embedding this kind of security, for starters, in a broad range of IT and security gear, it could help Dell extend security services.
Bill Evans, director of product marketing at Dell Quest, said Dell's direction is to advance the "concept of embedded security" to virtually any type of device, wireless or fixed, so that the enterprise can easily establish the policies and controls they want for access and identity management. Quest's audit and activity monitoring capabilities mean that "we have user-activity monitoring" that can be used by enterprises or cloud services, said Evans. "Cisco doesn't have an identity business."
Dell is also combining its security efforts in other ways. The Dell SecureWorks managed security service, which provides threat monitoring for enterprise customers, can now manage Dell SonicWall firewalls for customers as well in its security operations centers, points out James Brooks, product manager there. SecureWorks, which has expertise in monitoring botnets and cyberattacks to protect enterprise customers, itself was acquired by Dell in 2011. There may be more managed services to come.
Sweeney said Dell, as the "No.2 vendor of servers in the World," has enormous presence on the enterprise and cloud infrastructure side. The thousands of sales people at Dell are now organized to make the case for Dell's end-to-end security to CIOs and other high-level management.
Dell is still hungry for further acquisitions, though, that would extend its security capabilities, though Sweeney wouldn't elaborate on what security segments Dell is eager to invest in.
Dell is entering an era where once the company goes private, it won't have to make public statements about its earnings or how its specific product segments are faring. Yesterday, Dell said in its public earnings statement that its fiscal fourth-quarter earnings, which recorded a profit of $530 million, were down from $764 million a year earlier as the company recorded double-digit revenue declines from its personal computer and mobility segments. Its server and networking sales, however, were up about 18%. Dell wouldn't provide guidance for fiscal 2014 since it's expected to go private.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: email@example.com.
Read more about wide area network in Network World's Wide Area Network section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- World Quality Report - The State of Quality 2012
- IDC: Delivering Customer Value with Enterprise Flash Deployments
- Seeing the Forest for the Trees - A Systematic Approach to Application Performance Monitoring
- Cost-effective Virtualisation & Cloud Security
- 2013 Global Information Security Survey: Initial findings
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.