Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/19/2012
07:31 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dell Reaches Agreement To Acquire Credant

Credant secures more than 2 million endpoints with customers in a variety of industries

ROUND ROCK, Texas, Dec. 18, 2012 – Dell today announced it has reached an agreement to acquire Credant Technologies, an industry-leading provider of data protection solutions to control, manage and secure data sent from endpoints to servers, storage and the cloud. The addition of Credant technology strengthens Dell's computing solutions and improves the manageability, reliability and security engineered into its enterprise computing portfolio.

Credant technology is a simple, comprehensive and transparent solution that is easy to deploy and protects data across its full lifecycle. Credant protects and encrypts user and corporate data – from PC to mobile to cloud – and works with enterprises' existing systems management processes. Further, the technology supports multiple mobile operating systems allowing companies to confidently embrace the growing "bring your own device" movement.

Credant Leadership

Credant secures more than 2 million endpoints with customers in a variety of industries including, Aerospace and Defense, Energy, Financial Services, Universities, Public Sector, Drugs and Healthcare, Retail and Consumer, and Telecommunications, IT and Media.

Credant offers:

· Simplified Security Management. Single console for full end user ecosystem PC, tablets, external media, mobile devices and public clouds.

· Lower cost of PC lifecycle maintenance for encrypted machines. Works seamlessly with existing IT tools and processes. Data-centric approach to encryption doesn't interfere with existing IT maintenance tools like patch management, application updating or password recovery.

· Flexible data protection. Protects wherever data goes from smart phone to the cloud including core PC device data, largest variety of removable media, self-encrypting drives, MS BitLocker clients, mobile devices and end user data in the cloud.

· Ease in deployment and provisioning. Provision users up to 5.5x faster than competitive solutions – saving more than three hours per PC. Remotely manage end point encryption and authentication policies from single console.

· High levels of security and protection. The Dell Hardware Encryption Accelerator solution equips end-user systems with military-grade protection. It also reaches the highest level of U.S. Federal Information Processing Standards (FIPS) certification for endpoint disk encryption commercially available, 140-2 Level 3.

Dell has taken significant steps over the past three years to expand its security portfolio to offer customers a complete range of world-class security solutions. Today, Dell delivers comprehensive solutions to help customers identify the appropriate technologies and services to manage risk, regardless of the resources available to manage security. Dell's security services and solutions enable organizations of all sizes to protect their IT assets, comply with regulations and reduce security costs.

Financial details of the transaction were not disclosed.

Quotes

"In today's work environment data is always in-flight -- from work being done on a local PC, being sent via email, stored on a USB drive and saved in the cloud. Each one of those experiences represents a potential security risk. As a result, businesses need a data protection strategy that is comprehensive, flexible and easy to deploy," said Jeff Clarke, president, End User Computing Solutions at Dell. "The Credant assets will complement and extend current Dell device security features to make Dell Latitude, OptiPlex and Dell Precision computers among the world's most secure. When combined with the change in compute behaviors and data in-flight, Dell can now offer a differentiated security proposition based on its own intellectual property."

"Protecting critical information has only become more important as organizations globally struggle to protect their data in an ever more complex world," said Bob Heard, chief executive officer and founder of Credant. "This combination allows Credant to bring its deep capabilities in data security to Dell's robust solution set and customer base. Together, we will continue to focus on innovation and building value that result in beneficial outcomes for our customers."

About Credant

Credant was founded in 2001 and is headquartered in Addison, Texas. Dell has a long-standing joint development partnership and OEM agreement with Credant and uses its technology in its Dell Data Protection|Encryption solution.

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

Dell, Latitude, OptiPlex and Dell Precision are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerry,  11/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15073
PUBLISHED: 2019-11-20
An Open Redirect vulnerability for all browsers in MAIL2000 through version 6.0 and 7.0, which will redirect to a malicious site without authentication. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15072
PUBLISHED: 2019-11-20
The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15071
PUBLISHED: 2019-11-20
The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail syste...
CVE-2019-6176
PUBLISHED: 2019-11-20
A potential vulnerability reported in ThinkPad USB-C Dock Firmware version 3.7.2 may allow a denial of service.
CVE-2019-6184
PUBLISHED: 2019-11-20
A potential vulnerability in the discontinued Customer Engagement Service (CCSDK) software version 2.0.21.1 may allow local privilege escalation.