Risk
2/27/2008
07:33 PM
Gayle Kesten
Gayle Kesten
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Dell Preps Hosted Support Services

InformationWeek

Dell is turning the technologies acquired through its SilverBack and Everdream buys into the foundation of a series of Web-hosted support services that should be ready by year's end.Among the services Dell says it will make available are patch management, antivirus, antispam, online backup and recovery, asset discovery, asset tracking, e-mail continuity, e-mail archiving and image management. The plan is to let customers pick and choose from among those offerings -- representing a more customizable approach that SMBs with limited IT resources and budgets will appreciate.

Dell also mentioned eventual plans to bundle Web-hosted services for small offices. "This is going to take a couple of years to be really full scale," said Steve Schuckenbrock, senior VP of Dell's Global Services.

The hosted services will run out of network operating centers, the first of which has been built in Mexico.InformationWeek

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio