Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/30/2010
12:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dell KACE Kills The Evercookie

Also set to announce PC Lockdown

ROUND ROCK, Texas – Sept. 29, 2010 – Dell KACE continues its commitment to systems management and security innovation by announcing a new PC Lockdown approach that is both easy-to-use and flexible, while still enabling employees to maintain peak productivity. Seen in the past as a luxury reserved primarily for large enterprises due to high costs and complexity of the technology, PC Lockdown capabilities are now part of the award-winning Dell KACE Systems Management Appliance™. Strengthening Dell KACE’s security solution, the company also announced today the availability of a new version of popular Dell KACE Secure Browser freeware tool. The new version stops the latest security threats such as Evercookie and offers Windows 64-bit support in addition to other enhancements. Dell KACE saw more than 15,000 downloads of Dell KACE Secure Browser in its first month of availability. Now, an even larger number of IT organizations can benefit from Dell KACE’s security capabilities. “As adoption of Windows 7 heats up, businesses are re-evaluating their PC Lockdown strategies and strengthening their end-to-end security initiatives,” said Rob Meinhardt, president of Dell KACE. “Dell KACE offers a lockdown solution that secures the endpoint while affording end-users the opportunity to install pre-approved applications on an ad-hoc basis. Gone are the days of managing admin privileges to balance security and flexibility concerns.” Dell KACE’s comprehensive PC Lockdown capabilities integrate with Dell KACE Secure Browser, service desk and self-service software user portal creating an all-in-one, end-to-end approach to security. What’s more, the PC Lockdown solution allows flexible user privileges, which enable enterprises to enforce protective security settings, yet at the same time allows users to continue to use the applications they require to be productive on a day-to-day basis. “Dell KACE appliances allow me to enforce protective security settings for our customers company-wide, while retaining productivity,” said Dan LeBaron chief technology officer for Ingenuit Technologies, Inc., a Washington-based information technology consulting company focusing on the needs of small and mid-size businesses. “Through tools like the Dell KACE Secure Browser and the self-service software portal, users can download approved software and browse websites essential for their job functions even if the PC is in ‘lock down’ mode.” Dell KACE’S PC Lockdown capabilities includes the following:

* Self-service software portal to enable IT organizations to publish approved software titles, license keys, files and scripts that users can access to install applications or configure their systems; * Integrated Service Desk which seamlessly merges with the systems management console so users requiring modifications to their applied PC Lockdown policies can be easily helped; * Dell KACE Secure Browser reset feature which removes all traces of browser activity without the need to run special removal tools, including clever solutions like the new "evercookie" tracking cookies. * Dell KACE Secure Browser whitelist and blacklist features that can be leveraged to grant or prevent access to certain applications and websites; * Scripting to facilitate the removal of local administration rights in network target machines.

To hear more about the new Dell KACE PC Lockdown solution and how to avoid rigid, “all or nothing” policies to meet security objectives, join Dell KACE’s free webinar titled, “PC Lockdown Strategies: Security Benefits, Not User Backlash” on Thursday, Sept. 30, 2010 at 1 p.m. ET. Follow this link to sign up for the event: https://kace.webex.com/kace/onstage/g.php?t=a&d=826293863

The Dell KACE family of systems management and deployment appliances fulfill the systems management needs of the mid-market IT organization, from initial computer deployment to ongoing management and retirement. Dell KACE products are available as both physical and virtual appliances, directly from Dell or through its partners.

About Dell Dell (NASDAQ: DELL) creates, enhances and integrates technology and services customers count on to provide them reliable, long-term value. Dell provides systems-management solutions for customers of all sizes and system complexity. The award-winning Dell KACE family of appliances delivers easy-to-use, comprehensive, and affordable systems management capabilities. For more information, visit www.dell.com/kace or follow the conversation at http://twitter.com/DellKACE

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.