Dell Technologies expands security portfolio with Project Fort Zero

Spread the love

Mumbai: Dell Technologies expands security portfolio with Project Fort Zero, an end-to-end Zero Trust security solution to protect organisations against cyberattacks. Along with Project Fort Zero, Dell introduced Product Success Accelerator (PSX) for Backup, a new service to help organisations protect and recover data in the event of a disruption.

The new solution Project Fort Zero will be available in the next 12 months after the U.S. Department of Defense validates the solution, the company said.

Dell Technologies expands security portfolio

Project Fort Zero solution is built on Dell’s Zero Trust Center of Excellence and a partner ecosystem of over 30 tech companies to push Zero Trust adoption. Dell will deliver a validated, advanced maturity Zero Trust solution within the next 12 months.

“Zero Trust is designed for decentralised environments, but integrating it across hundreds of point products from dozens of vendors is complex – making it out of reach for most organisations,” said Herb Kelsey, Industry CTO – Government, Dell Technologies.

“We’re helping global organisations solve today’s security challenges by easing integration and accelerating adoption of Zero Trust,” added Kelsey.

“Prioritising and leveraging scalable, real-time, and cloud-enabled data protection storage for backup, archival, and disaster recovery, is the need of the hour. Organisations recognise these challenges and are looking for solutions which can help them integrate data protection across legacy,” said Ripu Bajwa, Director and GM of Data Protection Solutions, Dell Technologies India.

“A solution like Project Fort Zero brings a fully integrated, end-to-end, advanced maturity Zero Trust private cloud solution, across markets. We are confident that this solution will help protect data at the perimeter, thereby making Zero Trust a reality for all,” added Bajwa.

“Organisations are turning to Zero Trust to modernize their cybersecurity programs and keep pace with an evolving attack landscape. But determining where to start, the capabilities to prioritize and the actions needed to progress towards maturity can be complicated,” said John Grady, Principal Analyst, Enterprise Strategy Group.

Leave a Reply

Your email address will not be published. Required fields are marked *