Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Getting Started Dell Data Security Implementation Services

Kick-off and Requirements Review

Before installation, it is important to understand your environment and the business and technical objectives of your project, to successfully implement Dell Data Security to meet these objectives. Ensure that you have a thorough understanding of your organization's overall data security requirements.

The following are some common key questions to help the Dell Client Services Team understand your environment and requirements:

  1. What is your organization's type of business (health care, etc)?
  2. What regulatory compliance requirements do you have (HIPAA/HITECH, PCI, etc.)?
  3. What is the size of your organization (number of users, number of physical locations, etc.)?
  4. What is the targeted number of endpoints for the deployment? Are there plans to expand beyond this number in the future?
  5. Do users have local administrator privileges?
  6. What data and devices do you need to manage and encrypt (local fixed disks, USB, etc.)?
  7. What products are you considering deploying?

    • Encryption Enterprise

      • Encryption (DE entitlement) - Windows Encryption, Server Encryption, Encryption External Media, SED Management, Full Disk Encryption, BitLocker Manager, and Mac Encryption.
      • Encryption External Media
    • Endpoint Security Suite Enterprise

      • Advanced Threat Prevention - with or without optional Client Firewall and Web Protection (ATP entitlement)
      • Encryption (DE entitlement) - Windows Encryption, Server Encryption, Encryption External Media, SED Management, Full Disk Encryption, BitLocker Manager, and Mac Encryption.
      • Encryption External Media
  8. What type of user connectivity does your organization support? Types might include the following:

    • Local LAN connectivity only
    • VPN-based and/or enterprise wireless users
    • Remote/disconnected users (users not connected to the network either directly or via VPN for extended periods of time)
    • Non-domain workstations
  9. What data do you need to protect at the endpoint? What type of data do typical users have at the endpoint?
  10. What user applications may contain sensitive information? What are the application file types?
  11. How many domains do you have in your environment? How many are in-scope for encryption?
  12. What operating systems and operating systems versions are targeted for encryption?
  13. Do you have alternate boot partitions configured on your endpoints?

    1. Manufacturer Recovery Partition
    2. Dual-boot Workstations

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\