Connected Security Becomes Real at RSA 2013

RSA 2013 finds the Identity and Access Management (IAM) team at Dell at an inflection point. It's been a busy couple of quarters. It's not just all the work we've been doing to deliver best of breed solutions to our customers. And it's not just all the M&A activity that both our old and new organizations have seen. We've been doing the hard work of bringing our vision for connected security to life. That means building highly valuable cross-product features into our IAM portfolio, while simultaneously delivering best-of-breed features into each of our Privileged Access Management (PAM), Identity Access Governance (IAG), Single Sign-On (SSO), and Identity Administration product lines. Let me tell you, it has not been easy. But the end is worth it. When we can look a client in the eye, and tell them a major shift in the needs of their program doesn't mean scrapping their technology progress, it all pays off. 

Nothing demonstrates this better than the Quest One Privileged Access Suite for Unix that Dell is announcing at RSA 2013. We have the best PAM tools on the market for privileged password management, privileged session management, AD bridge, and UNIX privilege delegation ─ and all of them are being advanced by powerful new features. Each now becomes an element in a Connected Security strategy to deliver a single administrative and automation experience. This means organizations that use all of them can do so in one consistent manner, and those who use one piece, and then add another have no new tricks to learn. They just see a lot of new capabilities in the interfaces they already know. And all of this is woven into freeware management software that anyone can gain value from today ─ right now ─ for the price of their time to download and install it. 

Dell also has been pursuing the path of Connected Security though a modular, yet integrated, approach, which means we are connecting more dots than anyone else. So, beyond RSA 2013, you can expect to see more solutions in the style of the Quest One Privileged Access Suite for Unix, but even more inclusive. We want to connect the powerful application knowledge and enforcement power of the Dell SonicWALL SuperMassive 9000 Series. We want to leverage the industry-leading Counter Threat Intelligence from Dell SecureWorks. Once we connect all those dots, Dell will secure its place as the leader, and only viable contestant, in the race for true Connected Security.

About the Author: Jonathan Sander