Information Security Services

Protect your organisation from data breaches and downtime

New compliance regulations and threats to data security are emerging every day, and innovations such as mobility and cloud can heighten these risks. To get ahead of growing IT security demands — and to satisfy PCI, ISO 27001 and other regulations, and demonstrate compliance to auditors — you need flexible information security services that lower the risk of breaches, downtime and noncompliance.
Talk to Dell About Security
Managed Intrusion Detection and Prevention
Optimise the effectiveness of IDS and IPS devices with expert management and 24x7 monitoring.

Firewall Management
Get the most out of your firewall appliances with expert management and 24x7 monitoring.

Next Generation Firewall Management
Maximize next generation firewall performance with 24x7 monitoring and expert management.

Managed UTM
Reduce your administrative burden and get advanced protection against IT security threats by administering and monitoring your UTM infrastructure 24x7.

Managed Advanced Malware Protection
Prevent the deployment of custom and targeted malware with signature-less detect.

Managed Web Application Firewall
Optimise web application protection with 24x7 monitoring and expert management.

Security Monitoring
Detect and respond more quickly to threats with 24x7 monitoring of security activity by our certified experts.

Log Management Services
Satisfy compliance and forensics requirements for log collection, storage and reporting.

SIM On-Demand Services
Correlate and report security information using an on-demand service and avoid the cost of deploying expensive SIM tools.

Vulnerability Management Services
Find and fix exposures in your network with our expertly managed vulnerability scanning.

PCI Scanning
Get accurate scans of external-facing systems, identify and remediate vulnerabilities, submit PCI scanning compliance reports directly to your acquiring bank(s), and complete and submit SAQs online.

Web Application Scanning Services
Identify security flaws in your web applications with expertly managed scanning services.

Email Security Services
Protect your infrastructure from inbound and outbound email threats.

Web Security Services
Protect your organisation from malicious inbound and outbound web traffic.
Compliance and Certification Services
Identify gaps and improve compliance with PCI, ISO 27001 and other regulations and standards.

Security Testing and Assessments
Identify security vulnerabilities and prioritize risks.

Residency Services
Fill gaps in your security capabilities and support key projects with premier security experts.

Security and Governance Program Development
Establish a security programme that aligns your policies with business needs, compliance requirements and industry standards.

Mobile Security
Safely embrace the full reach and opportunity of mobile devices and applications through our Mobile Security Services and Solutions.

Cloud Security

Minimise risk and improve security while gaining the benefits of cloud technology. Services include strategic consulting, tactical planning, risk assessments, testing of cloud deployments and more.
Threat Intelligence Feed
Understand new threats and learn how to defend against them.

Vulnerability Feed
Identify new vulnerabilities that pose risk to your systems.

Advisory Feed
Get up-to-date intelligence and expert guidance on significant security events and trends.

Emerging Threat Bulletins
Access real-time CTU researcher updates with the latest insight into threats.

Microsoft Update Analysis
Gain a detailed understanding of vulnerabilities revealed in Microsoft Updates and their severity within 24 hours.

Live Intelligence Briefings
Sit in on live sessions from CTU researchers on emerging threats and vulnerabilities.

Weekly Intelligence Summaries
Get up to speed with expert analysis of the week’s significant events and security trends.

CTU Support
Gain direct access to CTU researchers for questions and advice on emerging threats.

Attacker Database Feed
Stay abreast of IP addresses that are being used by threats worldwide.

Custom Malware Analysis
Understand the purpose and methods used by a specific malware sample.

Targeted Threat Intelligence
Get actionable security intelligence and expert security consultation to monitor for threats beyond the edges of your network.

Advanced Threat Resource Centre
Know your attack surface, know your assets, and insure your layered defenses are appropriately designed and up-to-date to best detect, resist and respond to Advanced Persistent Threats (APTs).
Incident Response Planning & Analysis
Our expert consultants can work with you to prepare your organisation to respond quickly and effectively to a security incident.

Incident Response Testing & Capability Analysis
Dell SecureWorks Incident Response security experts can test and evaluate your Incident Response procedures and plan and how well your team responds to an attack.

Digital Forensics Investigation
If you have a security incident, we can capture and analyse data stored in hard drives, CDs, DVDs, thumb drives and other media formats to help you determine what has been compromised.

Incident Response Retainer Service
Our experts work to contain the breach, mitigate the threat and protect your assets to minimise the cost, damage and disruption your organisation faces from a security breach.

Emergency Incident Response
Dell SecureWorks' Emergency Incident Response experts can provide rapid emergency incident response to contain a breach, mitigate the threat and protect your assets.

Anti-Phishing Services & Phishing Takedown
Dell SecureWorks provides the tools and expertise to restore customer confidence and turn the tables on the attackers.


  1. lifestyle-premium-design-category-video.jpg

    Premium Design and Performance Laptop Category

    Dell XPS laptops and ultrabooks are thoughtfully designed with premium materials, to enhance function and performance.

  2. wyse-5000-series-video-en.jpg

    Dell Wyse 5000 Series all-in-one thin client

    The Dell Wyse 5000 Series all-in-one thin client. Serious security, professional power and elegant simplicity, all in one. Work has never looked better.

  3. Dell_eSupport_My_Products_and_Services_EN.jpg

    Explore eSupport: My Products and Services

    Learn more about the 'My Products and Services' feature on Dell's website.

  4. esupport-xps-thumbnail

    XPS 8500: Remove the Primary Hard Drive

    This video shows you the correct method to remove the primary hard drive of your XPS 8500 desktop.

  5. pet620_zes_qrl_security_bezel.jpg

    PowerEdge T620: Security Bezel

    Dell Quick Resource Locator video. Get immediate access to detailed how-to videos using your smart phone and a model specific QR code on Dell PowerEdge servers. Be more efficient and effective managing your data center hardware with the information you need, when you need it. PowerEdge T620 Security Bezel . dell.com/qrl/servers.

  6. windows8-password-reset-v5.jpg

    Password reset in Windows 8

    Do you frequently forget your password? This video will guide you through several options for ensuring you can recover it, if it is lost.

  7. esupport-lassoinstall-US-EN.jpg

    Learn How to Install the Dell Lasso Utility

    This video will guide you through locating and installing the Dell Lasso Utility. Lasso can be downloaded at http://dell.to/19Zt563. Lasso is a standalone collection utility that automates the collection of all pertinent HW and SW configuration details from the target SAN Attached Servers, Dell Storage Arrays, Fibre Channel, Ethernet and FCoE Switches and Tape Library.

  8. esupport-InstallSUUfromLCC-EN-v1.jpg

    Install the Server Update Utility with Dell's Lifecycle Controller

    This video will guide you through install Dell’s Server Update Utility with the Lifecycle controller. The SUU .iso can be downloaded at http://dell.to/12emN8N. SUU compares the versions of components currently installed on your system with update components packaged on the Dell PowerEdge Server Update Utility. SUU then displays a comparison report of the versions and provides the option of updating the components. Dell Lifecycle Controller technology allows users to perform useful tasks such as configure BIOS and hardware settings, deploy operating systems, update drivers, change RAID settings, and save hardware profiles.

  9. esupport-DPCD-BSOD-EN-v1.jpg

    Diagnose and Resolve Software Issues Automatically

    Is your system experiencing fatal Windows errors, commonly known as Blue Screens? Learn how to use Dell's PC Diagnostics tools to diagnose and resolve common errors now. Visit Dell.com/diagnostics to get started.

  10. eSupport-DBAR-RestoringtheSystemAfterOSCrash-EN-V1.jpg

    Restoring Windows after a Crash with Dell Backup and Recovery 1.5

    Learn how to restore your Dell computer using Dell Backup Recovery if you can't boot into Windows. You will need the recovery media you created using the previous video http://youtu.be/6f17jCKpxcE.

Case Studies

  1. Forrester Total Economic Impact of Dell SecureWorks

    Forrester Total Economic Impact of Dell SecureWorks

    The Forrester Total Economic Impact (TEI) study shows how a global investment firm improved security and saved $3.36 million by working with Dell SecureWorks.

  2. Click here to read PDF

    Lake Area Bank protects its network with Dell SecureWorks


    Local bank has been protecting its customers’ data for 14 years by using Dell SecureWorks to monitor and defend its network. Recently, the bank engaged Dell SecureWorks Incident Response to assess, contain and eradicate a trojan virus.

  3. Click here to read PDF

    Kittitas Valley Healthcare gains efficiency by placing its EHR solution on the Dell Secure Healthcare Cloud


    Rural hospital finds new clinical and operating efficiencies, as well as better continuity in delivering primary patient care to its community, by placing their EHR system securely in Dell’s cloud.

  4. Click here to read PDF

    ATMI upgrades IT for growth and efficiency


    Manufacturer deploys Dell PowerEdge servers, Dell Compellent storage, Dell Networking switches and Dell AppAssure data protection software to gain efficiency, add capacity, and cut costs.

  5. Click here to read PDF

    Glasgow 2014 Commonwealth Games simplifies management with Dell as its IT partner - Infographic


    Technology is integral to the success of the Games. Dell is proud to be the official end-to-end IT partner of the XX Commonwealth Games, and will provide both hardware and data center support.

  6. Click here to read PDF

    Provincie Zeeland aims for greater productivity and efficiency with its Dell end-to-end infrastructure


    Authority in the Netherlands creates end-to-end solution from Dell, featuring servers, storage, networking, desktops, workstations, laptops and tablet devices. As a result, it is enhancing productivity, lowering costs and improving taxpayer value.

  7. Click here to read PDF

    Vertafore secures its insurance industry cloud software with Dell SecureWorks


    Leading insurance industry software provider protects insurers and their customers from cyber threats with the help of Dell SecureWorks.

  8. secureworks-demo.jpg

    Dell SecureWorks Services Overview

    Dell SecureWorks helps organizations deal with the day-to-day and strategic challenges of information security and compliance.

  9. Click here to read PDF

    Green Clinic Health System


    Green Clinic helps nurses and physicians work smarter and boost efficiency, while the IT team streamlines systems deployment, management and HIPAA compliance.

  10. Click here to read PDF

    AZUR SPACE Solar Power


    Global manufacturer of high-performance solar cells assesses the risk exposure of its mission-critical assets through industry-leading penetration testing.

  1. View More Resources

    View more Dell SecureWorks resources.