Before installation, it is important to understand your environment and the business and technical objectives of your project, to successfully implement
Dell Data Security to meet these objectives. Ensure that you have a thorough understanding of your organization's overall data security requirements.
The following are some common key questions to help the Dell Client Services Team understand your environment and requirements:
What is your organization's type of business (health care, etc)?
What regulatory compliance requirements do you have (HIPAA/HITECH, PCI, etc.)?
What is the size of your organization (number of users, number of physical locations, etc.)?
What is the targeted number of endpoints for the deployment? Are there plans to expand beyond this number in the future?
Do users have local administrator privileges?
What data and devices do you need to manage and encrypt (local fixed disks, USB, etc.)?
What products are you considering deploying?
Encryption Enterprise
Encryption (DE entitlement) - Windows Encryption, Server Encryption,
Encryption External Media, SED Management, Full Disk Encryption,
BitLocker Manager, and Mac Encryption.
Encryption External Media
Endpoint Security Suite Enterprise
Advanced Threat Prevention - with or without optional Client Firewall and Web Protection (ATP entitlement)
Encryption (DE entitlement) - Windows Encryption, Server Encryption,
Encryption External Media, SED Management, Full Disk Encryption,
BitLocker Manager, and Mac Encryption.
Encryption External Media
What type of user connectivity does your organization support? Types might include the following:
Local LAN connectivity only
VPN-based and/or enterprise wireless users
Remote/disconnected users (users not connected to the network either directly or via VPN for extended periods of time)
Non-domain workstations
What data do you need to protect at the endpoint? What type of data do typical users have at the endpoint?
What user applications may contain sensitive information? What are the application file types?
How many domains do you have in your environment? How many are in-scope for encryption?
What operating systems and operating systems versions are targeted for encryption?
Do you have alternate boot partitions configured on your endpoints?
Manufacturer Recovery Partition
Dual-boot Workstations
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\