Dell Technologies Inc.

04/06/2022 | Press release | Distributed by Public on 04/07/2022 10:06

Securing Critical Infrastructure Beyond the Four Walls

It's estimated that by 2025, three-quarters of organizations will face one or more cyberattacks.¹ Are you prepared for these inevitable events and are you doing everything you can to minimize the negative impact on your business? Bolstering cyber-resilience can be likened to fortifying a castle. It's important that not only is the castle itself strong, with fortified walls that can withstand an attack but that any attack is thwarted before it even reaches the gate. As you move beyond the four walls, it is essential to align to a holistic strategy that covers the wide spectrum of security concerns. The National Institute of Standards and Technology (NIST) created a Cybersecurity Framework, with five key pillars that companies need to align to: Identify, Protect, Detect, Respond and Recover.

Companies rely on the expertise of service providers to help them navigate these security needs, with recent studies citing over 80% of companies needing external expertise to help IT teams be successful, and 72% needing that expertise to help cover IT security and risk requirements.²

Fortify security posture on IT assets

Dell Technologies Services' security solutions span the Cybersecurity Framework. STIG Security Hardening introduces a standardized service to deliver Security Technical Implementation Guide (STIG) prescribed standards aligned to NIST 800-53 and federal government security requirements. Aligned to the Protect pillar, this service focuses on enhancing the security of infrastructure technology from day one of new technology deployment.

Our experts will deliver advanced system hardening of IT assets for hyperconverged infrastructure, specifically VxRail, and for networking switches. Hardening helps to treat security weaknesses and vulnerabilities before a system goes into production, offering an advanced level of configuration to maximize the security of IT assets.

While many organizations, especially in the federal space, require this level of security control, many lack the expertise to implement it.

[Link]

Trust a proven process delivered by security experts

Security compliance and hardening can be complex and beyond the scope for many IT teams. That's where STIG Security Hardening Service comes in, delivering tighter, in-depth security control through a rigorous process of over 150 steps to reduce the attack surface of IT assets. This service has been standardized into a well-defined, proven process, aligned to industry standards, and backed by Dell Technologies Services' extensive global network. Experts, armed with vast technical knowledge and cybersecurity experience, will strengthen the security posture of critical infrastructure, reduce risk of potential security issues and enable compliance, all while you stay focused on your business.

For US federal customers that are mandated to this level of security controls, including the Department of Defense and other federal agencies aligned to DISA requirements, this service is essential. And for those in security-sensitive verticals such as financial services, utilities and healthcare, this service can provide peace of mind and critical compliance enablement in a business landscape of ever-increasing cyberattacks, costly security breaches and constantly shifting standards.

[Link]

Look beyond the four walls for maximized security

Over the course of a year, the estimated average cost of data loss is over $900 million and unplanned systems downtime is over $500 million.³ The costs of recovery can be high not just financially, but also in terms of damage to business reputation. By choosing STIG Security Hardening Service together with ProDeploy Enterprise Suite, we can set you on the path to reduce risks and increase security resilience before your new infrastructure is in production. The value of this service is in providing added protection from security breaches and alignment with industry and business security policies.

Weak security configuration increases the risk of cybersecurity breaches, and with that comes a lot of potential damage. A successful cyberattack can lead to data loss and disruption of operations, stalling the business and potentially weakening competitive positioning. And internal resources are often shifted away from strategic business priorities to focus on recovery efforts, which can stall business progress.

Whether your organization is mandated to implement STIG hardening, or could benefit from this added level of security, the outcome is the same. We will instill confidence that your IT assets are configured in the best way, maximizing security to keep you protected from attack while enabling compliance.

While we cannot guarantee that your business will never face a cyberattack, we can assure you will be set up in the best way to reduce your risk. Learn more about STIG Security Hardening Service here.

¹ Detect, Protect, Recover: How Modern Backup Applications can protect you from ransomware, Nik Simpson, Gartner, Jan 6, 2021.

² A Commissioned study conducted by Forrester Consulting on behalf of Dell Technologies, March 2021.

³ Dell Technologies commissioned Vanson Bourne for the Global Data Protection Index, which was conducted between February, March and April 2021 and surveyed 1,000 IT decision makers across 15 countries globally.