Welcome!

Cloud Expo Authors: Raju Chekuri, Tim Hinds, Roger Strukhoff, Elizabeth White, Carmen Gonzalez

News Feed Item

Dell Reaches Agreement to Acquire Credant, an Award-Winning Provider of Data Protection Solutions

Dell today announced it has reached an agreement to acquire Credant Technologies, an industry-leading provider of data protection solutions to control, manage and secure data sent from endpoints to servers, storage and the cloud. The addition of Credant technology strengthens Dell’s computing solutions and improves the manageability, reliability and security engineered into its enterprise computing portfolio.

Credant technology is a simple, comprehensive and transparent solution that is easy to deploy and protects data across its full lifecycle. Credant protects and encrypts user and corporate data – from PC to mobile to cloud – and works with enterprises’ existing systems management processes. Further, the technology supports multiple mobile operating systems allowing companies to confidently embrace the growing “bring your own device” movement.

Credant Leadership

Credant secures more than 2 million endpoints with customers in a variety of industries including, Aerospace and Defense, Energy, Financial Services, Universities, Public Sector, Drugs and Healthcare, Retail and Consumer, and Telecommunications, IT and Media.

Credant offers:

  • Simplified Security Management. Single console for full end user ecosystem PC, tablets, external media, mobile devices and public clouds.
  • Lower cost of PC lifecycle maintenance for encrypted machines. Works seamlessly with existing IT tools and processes. Data-centric approach to encryption doesn’t interfere with existing IT maintenance tools like patch management, application updating or password recovery.
  • Flexible data protection. Protects wherever data goes from smart phone to the cloud including core PC device data, largest variety of removable media, self-encrypting drives, MS BitLocker clients, mobile devices and end user data in the cloud.
  • Ease in deployment and provisioning. Provision users up to 5.5x faster than competitive solutions – saving more than three hours per PC. Remotely manage end point encryption and authentication policies from single console.
  • High levels of security and protection. The Dell Hardware Encryption Accelerator solution equips end-user systems with military-grade protection. It also reaches the highest level of U.S. Federal Information Processing Standards (FIPS) certification for endpoint disk encryption commercially available, 140-2 Level 3.

Dell has taken significant steps over the past three years to expand its security portfolio to offer customers a complete range of world-class security solutions. Today, Dell delivers comprehensive solutions to help customers identify the appropriate technologies and services to manage risk, regardless of the resources available to manage security. Dell’s security services and solutions enable organizations of all sizes to protect their IT assets, comply with regulations and reduce security costs.

Financial details of the transaction were not disclosed.

Quotes

“In today’s work environment data is always in-flight -- from work being done on a local PC, being sent via email, stored on a USB drive and saved in the cloud. Each one of those experiences represents a potential security risk. As a result, businesses need a data protection strategy that is comprehensive, flexible and easy to deploy,” said Jeff Clarke, president, End User Computing Solutions at Dell. “The Credant assets will complement and extend current Dell device security features to make Dell Latitude, OptiPlex and Dell Precision computers among the world’s most secure. When combined with the change in compute behaviors and data in-flight, Dell can now offer a differentiated security proposition based on its own intellectual property.”

“Protecting critical information has only become more important as organizations globally struggle to protect their data in an ever more complex world,” said Bob Heard, chief executive officer and founder of Credant. “This combination allows Credant to bring its deep capabilities in data security to Dell’s robust solution set and customer base. Together, we will continue to focus on innovation and building value that result in beneficial outcomes for our customers.”

About Credant

Credant was founded in 2001 and is headquartered in Addison, Texas. Dell has a long-standing joint development partnership and OEM agreement with Credant and uses its technology in its Dell Data Protection|Encryption solution.

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

Dell, Latitude, OptiPlex and Dell Precision are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

Special Note: Statements that relate to future results and events are forward-looking statements based on Dell's current expectations. Actual results and events in future periods may differ materially from those expressed or implied by these forward-looking statements because of a number of risks, uncertainties and other factors. Risks, uncertainties and assumptions include the possibility that projected benefits may not materialize as expected; that the transaction may not be timely completed, if at all; that Dell is unable to successfully implement the plans, strategies and objectives of management for future operations, including the execution of integration strategies; and other risks that are described in Dell’s Securities and Exchange Commission reports. Dell undertakes no obligation to update these forward-looking statements.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developmen...
SYS-CON Events announced today that B2Cloud, a provider of enterprise resource planning software, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. B2cloud develops the software you need. They have the ideal tools to help you work with your clients. B2Cloud’s main solutions include AGIS – ERP, CLOHC, AGIS – Invoice, and IZUM
As cloud gives an opportunity to businesses to buy services externally – how is cloud impacting your customers? In his General Session at 15th Cloud Expo, Fabio Gori, Director of Worldwide Cloud Marketing at Cisco, provided answers to big questions: Do you see hybrid cloud as where the world is going? What benefits does it bring? And how does Cisco connect all of these clouds? He also discussed Intercloud and Cisco’s investment on it.
Database apps on mobile devices shouldn't stop working when there's limited or no network connectivity. In his session at 16th Cloud Expo, Bradley Holt, a Developer Advocate for IBM Cloudant, will discuss how to bring data stored in a cloud database to the edge of the network (and back again), whenever an Internet connection is available. He will demonstrate techniques for replicating cloud databases with mobile devices in order to build offline-enabled mobile apps that can provide a better,...
The WebRTC Summit 2015 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
SYS-CON Events announced today that CenturyLink, Inc., a leader in the network services market, has been named “Platinum Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The company is a global leader in cloud infrastructure and ...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and eas...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
What if, during a snow emergency, an on-the-ground sensor could automatically trigger a relevant emergency notification related to snowfall and road impact. And then, after it’s triggered, that notification is delivered intelligently to individuals based on an extensive set of rules designed to alert the most available and capable responders. This “what if” question about “smart highways” is short-sighted. We are already there, and we are only getting started. While mainstream attention is pai...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, will review the changes that the cloud computing industry has gone through over the last five years and share insights into what the next five will bring. He will chronicle the challenges enterprise companies are facing as they move to the public cloud. He will delve into the “Hybrid Cloud” space and explain why every CIO should consider ‘hybrid cloud’ as part of their future strategy to a...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
Avnet, Inc. has announced that it ranked No. 4 on the InformationWeek Elite 100 – a list of the top business technology innovators in the U.S. Avnet was recognized for the development of an innovative cloud-based training system that serves as the foundation for Avnet Academy – the company’s education and training organization focused on technical training around top IT vendor technologies. The development of this system allowed Avnet to quickly expand its IT-related training capabilities around...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
A new definition of Big Data & the practical applications of the defined components & associated technical architecture models This presentation introduces a new definition of Big Data, along with the practical applications of the defined components and associated technical architecture models. In his session at Big Data Expo, Tony Shan will start with looking into the concept of Big Data and tracing back the first definition by Doug Laney, and then he will dive deep into the description of 3V...