White Papers

Copyright © 2019 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries
Follow Us
For PowerEdge news
PowerEdge DfD Repository
For more technical learning
In Conclusion
Security must be designed within the architecture of the server to effectively withstand sophisticated cyber-
crime: phishing attacks that harvest credentials, advanced persistent threats (taking control of firmware),
data exfiltration (stealing data). Yet it’s not just the server features that need to support customer security
it is also necessary to provide protection against the possibility of corruption in manufacturing and within
the server supply chain. These layers of security must be considered as critical criteria for user decisions
on integrating technical equipment into their environments.
As Dell EMC designs products, it will always be to protect, protect, and protect customer data and assets
and in consideration of worst-case scenarios, ensure that users of Dell EMC solutions can recover quickly,
and resume production with as little disruption as possible. With these goals, Dell EMC is constantly
evaluating new ways within each security layer to protect customers.