Dell Speeds Up Zero Trust Adoption


Dell has announced it is building a Zero Trust ecosystem to bring together more than 30 technology and security companies to create a unified solution across infrastructure platforms, applications, clouds and services.

Navigating security is like trying to make your way through a high-stakes labyrinth. There are so many different, complicated passageways that make it hard to reach your destination.

Dell says it is bringing together technology and capabilities from partners including CorshaGigamonJuniper NetworksMISINomad GCSNVIDIAPalo Alto NetworksVMware and others. By replicating the Department of Defense-approved architecture with technology from providers, Dell says it is enabling organizations to defeat cyber criminals while meeting the U.S. government’s Zero Trust mandate.  

The ecosystem will help execute the Department of Defense Zero Trust requirements, including capabilities such as:

  • Continuous authentication: Continuously authenticates user access using multifactor authentication.
  • Comply to connect, device detection and compliance: Any device attempting to connect to a network or access a resource is detected and assessed for compliance status.
  • Continuous monitoring and ongoing authorization: Automated tools and processes continuously monitor applications and assess their authorization to determine security control effectiveness.
  • Data encryption and rights management: Data rights management tooling encrypts data at rest and in transit to reduce the risk of unauthorized data access.
  • Software defined networkingEnables the control of packets to a centralized server, provides additional visibility into the network and enables integration requirements.
  • Policy decision point and policy orchestration: Collects and documents all rule-based policies to orchestrate across the security stack for effective automation.
  • Threat intelligence: Integration of threat intelligence data with other security information and event management (SIEM) data provides a consolidated view of threat activity.