Dell Technologies Inc.

11/15/2024 | Press release | Distributed by Public on 11/15/2024 11:19

Visibility is an Absolute Must for Security

The Dell and Absolute Security collaboration dates back to the early 2000s. That's when Dell commercial PCs began shipping with the embedded in the BIOS. With that in place, customers can All of those defensive countermeasures right from the Dell factory. Why? To counter emerging cyberattacks on the device.

Fast forward to today - we continue to partner together on solutions with the adversary in mind. We are excited to introduce an expanded integration with Dell commercial PCs.

With this deeper integration, we are expanding Absolute's capability to "persist" - or self-heal - the Dell Trusted Device Application (DTD App). In addition to persisting the entire Dell Endpoint Security ecosystem of products (see below for details), Dell customers are now able to import, consume and act on critical BIOS-level security telemetry from the DTD App directly within the Absolute console. This includes Dell-exclusive telemetry data such as BIOS verification^, CVE detection^ and component tampering^*. This level of visibility is unparalleled, with device-level data enriching security workflow in real-time. Customers can detect and respond swiftly to potential threats while simplifying security operations.

To take advantage of the new integrated capability, simply search for "Dell Trusted Device" within the Reach script library through the Absolute Secure Endpoint console and run our custom script. For a detailed explanation, see our Knowledge Base article.

[Link]Dell Trusted Device telemetry shown directly on the Absolute console after running the script. [Link]How to find the script in the Absolute Reach Script Library.

Additional Solutions from Dell and Absolute

This integration is the latest evolution of a 20-year Dell and Absolute collaboration. Today, Absolute persists the entire Dell Endpoint Security ecosystem of products, including Dell IP such as the DTD App and Dell Encryption, as well as third-party security products such as CrowdStrike, Netskope, Secureworks, Zscaler, Okta and Halcyon. That means peace of mind that your Dell endpoints and mission-critical applications stay cyber resilient, even if a device is tampered with or software is uninstalled. This level of resilience is crucial in today's threat landscape, where cyberattacks are becoming increasingly sophisticated.
Together, we also bolster supply chain security with Absolute Custom Factory Installation (CFI). With Dell, you can factory-install and enable the Absolute Persistence agent in a 1-touch process directly from a Dell-owned and managed factory-thus removing a step in your procurement process in a safe and controlled environment.

Improve Visibility and Control Across the Entire Endpoint Ecosystem

Many organizations are due for a PC refresh this year. It's a perfect time to take a step back and re-evaluate fleet-wide security.

Do you have secure solutions in place that address today's threats?

Do they work together?

Dell and Absolute are on a mission to address customers' strategic cybersecurity objectives - prevention, detection and response, and recovery - while helping address operational burdens as well. By working with us, customers not only simplify procurement by consolidating providers, but they also save time and resources with streamlined integration.

As you refresh your fleet, factory install Absolute CFI on new devices to persist your entire endpoint ecosystem and explore the new integration leveraging Dell Trusted Device telemetry to stay ahead of evolving threats and safeguard critical assets. Reach out to a Dell security specialist to learn more.

^ Based on Dell internal analysis, October 2024. Applicable to PCs on Intel processors. Not all features available with all PCs. Additional purchase required for some features. Validated by Principled Technologies. A comparison of security features, April 2024.

*Requires purchase of Secured Component Verification