Information Security Services

Protect your organisation from data breaches and downtime

New compliance regulations and threats to data security are emerging every day, and innovations such as mobility and cloud can heighten these risks. To get ahead of growing IT security demands — and to satisfy PCI, ISO 27001 and other regulations, and demonstrate compliance to auditors — you need flexible information security services that lower the risk of breaches, downtime and noncompliance.
Talk to Dell About Security
Managed Intrusion Detection and Prevention
Optimise the effectiveness of IDS and IPS devices with expert management and 24x7 monitoring.

Firewall Management
Get the most out of your firewall appliances with expert management and 24x7 monitoring.

Next Generation Firewall Management
Maximize next generation firewall performance with 24x7 monitoring and expert management.

Managed UTM
Reduce your administrative burden and get advanced protection against IT security threats by administering and monitoring your UTM infrastructure 24x7.

Managed Advanced Malware Protection
Prevent the deployment of custom and targeted malware with signature-less detect.

Managed Web Application Firewall
Optimise web application protection with 24x7 monitoring and expert management.

Security Monitoring
Detect and respond more quickly to threats with 24x7 monitoring of security activity by our certified experts.

Log Management Services
Satisfy compliance and forensics requirements for log collection, storage and reporting.

SIM On-Demand Services
Correlate and report security information using an on-demand service and avoid the cost of deploying expensive SIM tools.

Vulnerability Management Services
Find and fix exposures in your network with our expertly managed vulnerability scanning.

PCI Scanning
Get accurate scans of external-facing systems, identify and remediate vulnerabilities, submit PCI scanning compliance reports directly to your acquiring bank(s), and complete and submit SAQs online.

Web Application Scanning Services
Identify security flaws in your web applications with expertly managed scanning services.

Email Security Services
Protect your infrastructure from inbound and outbound email threats.

Web Security Services
Protect your organisation from malicious inbound and outbound web traffic.
Compliance and Certification Services
Identify gaps and improve compliance with PCI, ISO 27001 and other regulations and standards.

Security Testing and Assessments
Identify security vulnerabilities and prioritize risks.

Residency Services
Fill gaps in your security capabilities and support key projects with premier security experts.

Security and Governance Program Development
Establish a security programme that aligns your policies with business needs, compliance requirements and industry standards.

Mobile Security
Safely embrace the full reach and opportunity of mobile devices and applications through our Mobile Security Services and Solutions.

Cloud Security

Minimise risk and improve security while gaining the benefits of cloud technology. Services include strategic consulting, tactical planning, risk assessments, testing of cloud deployments and more.
Threat Intelligence Feed
Understand new threats and learn how to defend against them.

Vulnerability Feed
Identify new vulnerabilities that pose risk to your systems.

Advisory Feed
Get up-to-date intelligence and expert guidance on significant security events and trends.

Emerging Threat Bulletins
Access real-time CTU researcher updates with the latest insight into threats.

Microsoft Update Analysis
Gain a detailed understanding of vulnerabilities revealed in Microsoft Updates and their severity within 24 hours.

Live Intelligence Briefings
Sit in on live sessions from CTU researchers on emerging threats and vulnerabilities.

Weekly Intelligence Summaries
Get up to speed with expert analysis of the week’s significant events and security trends.

CTU Support
Gain direct access to CTU researchers for questions and advice on emerging threats.

Attacker Database Feed
Stay abreast of IP addresses that are being used by threats worldwide.

Custom Malware Analysis
Understand the purpose and methods used by a specific malware sample.

Targeted Threat Intelligence
Get actionable security intelligence and expert security consultation to monitor for threats beyond the edges of your network.

Advanced Threat Resource Centre
Know your attack surface, know your assets, and insure your layered defenses are appropriately designed and up-to-date to best detect, resist and respond to Advanced Persistent Threats (APTs).
Incident Response Planning & Analysis
Our expert consultants can work with you to prepare your organisation to respond quickly and effectively to a security incident.

Incident Response Testing & Capability Analysis
Dell SecureWorks Incident Response security experts can test and evaluate your Incident Response procedures and plan and how well your team responds to an attack.

Digital Forensics Investigation
If you have a security incident, we can capture and analyse data stored in hard drives, CDs, DVDs, thumb drives and other media formats to help you determine what has been compromised.

Incident Response Retainer Service
Our experts work to contain the breach, mitigate the threat and protect your assets to minimise the cost, damage and disruption your organisation faces from a security breach.

Emergency Incident Response
Dell SecureWorks' Emergency Incident Response experts can provide rapid emergency incident response to contain a breach, mitigate the threat and protect your assets.

Anti-Phishing Services & Phishing Takedown
Dell SecureWorks provides the tools and expertise to restore customer confidence and turn the tables on the attackers.


  1. updates_Win81.jpg

    Microsoft Windows 8 and 8.1 with pro update / upgrade video

    Update your existing Microsoft Operating System from Windows 8 or Windows 8.1 to the latest. You may need to buy the update / upgrade.

  2. ddp-mobile-edition-video.jpg

    Dell Data Protection | Mobile Edition

    Take a look at Dell Data Protection | Mobile Edition and see how transparently data can be securely accessed on iOS and Android devices.

  3. ddp-cloud-edition-video.jpg

    Dell Data Protection | Cloud Edition

    Watch how DDP | Cloud Edition protects data stored and shared in public cloud services. Put IT back in control of data security.

  4. powervault-lto-6-tape-backup-devices.jpg

    PowerVault LTO

    Highlights of the PowerVault LTO tape family of standalone drives, autoloaders and tape libraries.

  5. esupport-poweredge-r730-nfc-video-en.jpg

    PowerEdge R730: iDRAC Quick Sync

    How to install the iDRAC Quick Sync bezel, and use Open Manage Mobile to view and change server configurations

  6. alienware-echo-laptop-family-video.jpg

    Alienware Laptops

    Alienware Laptops and Alienware Graphics Amplifier

  7. Dell_Powervault_LTO_Storage_Video.jpg

    PowerVault LTO

    Highlights of the PowerVault LTO tape family of standalone drives, autoloaders and tape libraries.

  8. small-business-server-migration-recorded-webinar.jpg

    Small Business Server Migration Recorded Webinar #1

    Small Business Server Migration Recorded Webinar #1 including what end of support means and how Dell services can help.

  9. dw-infographic-animation-sc2000-video-en.jpg

    Dell Storage SCv2000 Series

    The entry-level Dell Storage SCv2000 Series, powered by Intel® Xeon®.

  10. Cyprian Sadlon video

    Precision M3800

    Cyprian is a motion graphics artist in the Lower East Side. See how he uses his Dell Precision M3800 workstation and Adobe After Effects to bring his creative projects to life.

Case Studies

  1. Forrester Total Economic Impact of Dell SecureWorks

    Forrester Total Economic Impact of Dell SecureWorks

    The Forrester Total Economic Impact (TEI) study shows how a global investment firm improved security and saved $3.36 million by working with Dell SecureWorks.

  2. Click here to read PDF

    4Front Credit Union chooses Dell SecureWorks to maintain compliant information security


    Local credit union’s lean IT staff saves 500 hours a year by turning most security chores over to Dell’s SecureWorks managed services and its certified security professionals, who operate 24x7 from five Security Operations Centers worldwide.

  3. 2015-pyn-10022283-data-management-security.jpg

    Philadelphia Youth Network (PYN) - Video


    Philadelphia Youth Network improves its decision-making, data protection and security through partnership with Dell.

  4. international-relief-and-development-video-en.jpg

    Dell Presents: International Relief & Development and Dell Security

    IRD implements end-to-end security solutions with the help of Dell SonicWALL products.

  5. Click here to read PDF

    Lone Star National Bank manages intrusion detection and prevention with Dell SecureWorks


    Bank saves time and money spent on intrusion prevention and detection with Dell SecureWorks, which simplifies compliance, streamlines audits, improves reporting, and helps recoup resources needed to develop value-added services.

  6. Click here to read PDF

    George Jon & Associates provides its customers scalability, security, and technical management


    Law technology firm gives eDiscovery software providers scalability, faster document deliver, security and reliability by deploying Dell PowerEdge servers, Dell EqualLogic storage arrays, Dell Networking switches and Dell software.

  7. Click here to read PDF

    Background Investigations keeps credit and inquiry data secure with Dell Secureworks


    Credit-reporting agency complies with industry data security standards by using Dell SecureWorks full penetration-testing services, saving the company as much as two months a year in IT staff time.

  8. Click here to read PDF

    Eastern Maine Electric Cooperative (EMEC) uses Dell Secureworks for protecting enterprise and payment systems


    A regional electric coop has used Dell SecureWorks iSensor for monitoring and defending its network, protecting company and member data, as well as its PCI-compliant online payment system, for the last 10 years.

  9. Click here to read PDF

    Lake Area Bank protects its network with Dell SecureWorks


    Local bank has been protecting its customers’ data for 14 years by using Dell SecureWorks to monitor and defend its network. Recently, the bank engaged Dell SecureWorks Incident Response to assess, contain and eradicate a trojan virus.

  10. Click here to read PDF

    Kittitas Valley Healthcare gains efficiency by placing its EHR solution on the Dell Secure Healthcare Cloud


    Rural hospital finds new clinical and operating efficiencies, as well as better continuity in delivering primary patient care to its community, by placing their EHR system securely in Dell’s cloud.

  1. View More Resources

    View more Dell SecureWorks resources.