Dell: We can beat Cisco in enterprise and Cloud security

"Cisco is a great competitor, but they don't have our holistic view"

Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.

"Cisco is a great competitor, but they don't have our holistic view," said Patrick Sweeney, executive director product management at the Dell SonicWall division which markets firewalls and other security gear as he described a strategy to optimize the identity management assets gained through Dell's acquisition of Quest last September for $2.4 billion. Cisco isn't Dell's only major security competitor HP and IBM also loom large when it comes to winning large customers. One reason Dell wants to articulate an IT security strategy now is because the company earlier this month announced a buy-out agreement in which Michael Dell and equity investor Silver Lake would acquire Dell for $24.4 billion -- and Dell enterprise customers are eager for information about the implications of this.

[MORE: 13 of the biggest security myths busted]

[RELATED: Dell to continue drive to enterprise with buy-out]

Quest, now part of the Dell Software Group, brings to Dell a range of new products, including identity and access management software. By embedding this kind of security, for starters, in a broad range of IT and security gear, it could help Dell extend security services

Bill Evans, director of product marketing at Dell Quest, said Dell's direction is to advance the "concept of embedded security" to virtually any type of device, wireless or fixed, so that the enterprise can easily establish the policies and controls they want for access and identity management. Quest's audit and activity monitoring capabilities mean that "we have user-activity monitoring" that can be used by enterprises or cloud services, said Evans. "Cisco doesn't have an identity business."

Dell is also combining its security efforts in other ways. The Dell SecureWorks managed security service, which provides threat monitoring for enterprise customers, can now manage Dell SonicWall firewalls for customers as well in its security operations centers, points out James Brooks, product manager there. SecureWorks, which has expertise in monitoring botnets and cyberattacks to protect enterprise customers, itself was acquired by Dell in 2011. There may be more managed services to come.

Sweeney said Dell, as the "No.2 vendor of servers in the World," has enormous presence on the enterprise and cloud infrastructure side. The thousands of sales people at Dell are now organized to make the case for Dell's end-to-end security to CIOs and other high-level management.

Dell is still hungry for further acquisitions, though, that would extend its security capabilities, though Sweeney wouldn't elaborate on what security segments Dell is eager to invest in.

Dell is entering an era where once the company goes private, it won't have to make public statements about its earnings or how its specific product segments are faring. Yesterday, Dell said in its public earnings statement that its fiscal fourth-quarter earnings, which recorded a profit of $530 million, were down from $764 million a year earlier as the company recorded double-digit revenue declines from its personal computer and mobility segments. Its server and networking sales, however, were up about 18%. Dell wouldn't provide guidance for fiscal 2014 since it's expected to go private.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail:

Read more about wide area network in Network World's Wide Area Network section.

Join the CSO newsletter!

Error: Please check your email address.

Tags identity managementIBMNetworkingsecurityinfrastructure managementAccess control and authenticationWide Area NetworkHPmanagementDellsonicwall

More about BillCiscoDellHPIBM AustraliaIDGSecureWorksSonicWall

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ellen Messmer

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts