Statements (54)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Dell_Software_Solutions
|
gptkbp:aims_to |
Personal data
Sensitive data Corporate data |
gptkbp:developed_by |
gptkb:Dell_Technologies
|
gptkbp:features |
Centralized management
User authentication Compliance reporting Endpoint protection |
gptkbp:has_feature |
Full disk encryption
Remote wipe User access controls File-level encryption Backup scheduling |
https://www.w3.org/2000/01/rdf-schema#label |
Dell Data Protection
|
gptkbp:integrates_with |
gptkb:Microsoft_Azure
gptkb:Microsoft_Active_Directory V Mware |
gptkbp:is_available_in |
Multiple languages
|
gptkbp:is_available_on |
Software distribution platforms
Dell's website |
gptkbp:is_compatible_with |
Third-party hardware
Dell hardware |
gptkbp:is_considered |
Cost-effective solution
Enterprise-grade solution Scalable solution |
gptkbp:is_designed_for |
Data security
Data availability Data integrity |
gptkbp:is_evaluated_by |
gptkb:Forrester
gptkb:Gartner |
gptkbp:is_part_of |
Dell Endpoint Security Suite
Dell's security solutions |
gptkbp:is_used_by |
gptkb:Educational_Institution
Businesses Government agencies |
gptkbp:marketed_as |
Security professionals
IT professionals Compliance officers |
gptkbp:offers |
Cloud storage options
Hybrid deployment On-premises deployment |
gptkbp:provides |
Data encryption
Data backup Data recovery |
gptkbp:supports |
gptkb:operating_system
Regulatory compliance Mac operating system Data loss prevention |
gptkbp:updates |
gptkb:battle
|
gptkbp:user_reviews |
Negative
Positive |