With the increase in ransomware attacks and the spread of firmware-based malware, personal and remote devices have become increasingly vulnerable. When considering protecting a computer, it is important to consider several aspects related to how the device contributes to the overall security of an organization. This includes its ability to prevent attacks, its resistance during an attack, and its safe keeping throughout its lifespan.
secure devices
Dell Technologies adopts several secure practices during the development of its computers to ensure security in line with industry standards. These practices support a Zero Trust approach to security and are founded on three fundamental principles:Secure the supply chain of devices, that is, strict controls in supply chains for both hardware and software, also known as physical and digital supply chains. These controls help maintain product integrity throughout the manufacturing, assembly, delivery, and deployment processes, ensuring customers get exactly what they purchased. Thus, in the era of “trust no one” or Zero Trust, verifications must be included during each step of the process. These checks incorporate advanced technologies such as Safe Component Verification, to identify component swapping, and SafeBIOS Verification, using a process outside of the server, to identify and alert on any firmware tampering. Security processes that are also maintained throughout the supply chain and that help detect any errors before tackling the next step.Design and development of secure devices, with effective and innovative hardware and firmware. Design, development, and subsequent testing are governed by the prescriptive Secure Development Lifecycle (SDL). Above all, because the ultimate responsibility of technology providers is to ensure that what they sell does not pose a risk to users due to bugs or vulnerabilities. To help prevent attacks and provide resilience to the security software stack, rigorous threat modeling is also carried out during the software development process, identifying potential risks from suspected sophisticated attacks and even applying this methodology to the software. critical hardwareEnsure device security while in use. Today, true security includes protection at the hardware, firmware, and software level to ensure protection against advanced threats. Because cybercriminals are constantly innovating new ways to break into software, SDL practices are designed to enhance post-release protection, including the ability to quickly and easily identify and fix vulnerabilities. At the same time, it is essential to proactively and periodically inform about updates and security support policies, and how products remain protected throughout their useful life. All of this, with the aim of achieving a safe and connected world, in addition to keeping data, the network, the organization and the security of customers above all else.