To help private and public sector organizations simplify Zero Trust adoption, Dell is building a new ecosystem. It will bring together more than 30 leading technology and security companies to create a unified solution across infrastructure platforms, applications, clouds and services.
Together with the Maryland Innovation Security Institute (MISI), Zero Trust Center of Excellence, Dell is constructing an advanced private cloud solution focused on integrating and orchestrating security for customers. The approach will help organizations implement the technology and tap the expertise needed to build and configure the architecture, says the company in a blog post.
It will bring together technology and capabilities from partners including Corsha, Gigamon, Juniper Networks, MISI, Nomad GCS, NVIDIA, Palo Alto Networks, VMware and others. By replicating the Department of Defense-approved architecture with technology from leading providers, the company says its enabling organizations to defeat cyber criminals while meeting the U.S. government’s Zero Trust mandate.
Meeting Zero Trust Ecosystem Department of Defense Requirements
The ecosystem will help execute the Department of Defense Zero Trust requirements, including capabilities such as:
- Continuous authentication: Continuously authenticates user access using multifactor authentication.
- Comply to connect, device detection and compliance: Any device attempting to connect to a network or access a resource is detected and assessed for compliance status.
- Continuous monitoring and ongoing authorization: Automated tools and processes continuously monitor applications and assess their authorization to determine security control effectiveness.
- Data encryption and rights management: Data rights management tooling encrypts data at rest and in transit to reduce the risk of unauthorized data access.
- Software defined networking: Enables the control of packets to a centralized server, provides additional visibility into the network and enables integration requirements.
- Policy decision point and policy orchestration: Collects and documents all rule-based policies to orchestrate across the security stack for effective automation.
- Threat intelligence: Integration of threat intelligence data with other security information and event management (SIEM) data provides a consolidated view of threat activity.
“Zero Trust is a journey, and the destination is a well-defined set of integrated and automated security activities,” said Herb Kelsey, security strategy program lead at Dell Technologies. “The partner ecosystem is a critical component of the Dells project to scale an end-to-end validated Zero Trust solution for organizations worldwide.”
The company plans to share more on its Zero Trust strategy at its Dell Technologies World 2023 tech conference in Las Vegas, May 22-25, 2023.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!