gptkbp:instance_of
|
gptkb:software
|
gptkbp:bfsLayer
|
6
|
gptkbp:bfsParent
|
gptkb:Dell_Software_Solutions
|
gptkbp:developed_by
|
gptkb:Dell_Technologies
|
https://www.w3.org/2000/01/rdf-schema#label
|
Dell Endpoint Security
|
gptkbp:includes
|
Patch Management
Email Security
Firewall Protection
Web Filtering
|
gptkbp:integrates_with
|
gptkb:Dell_Data_Protection
|
gptkbp:is_available_for
|
Purchase
Trial
|
gptkbp:is_available_in
|
Multiple Languages
|
gptkbp:is_available_on
|
gptkb:Cloud_Computing_Service
On-Premises
|
gptkbp:is_compatible_with
|
gptkb:HIPAA
gptkb:GDPR
Virtual Environments
PCIDSS
|
gptkbp:is_designed_for
|
Enterprise Environments
|
gptkbp:is_evaluated_by
|
Third-Party Security Firms
|
gptkbp:is_integrated_with
|
gptkb:SOAR_Solutions
SIEM Solutions
|
gptkbp:is_part_of
|
gptkb:Dell_Security_Solutions
Dell Technologies Portfolio
Dell's Cybersecurity Strategy
|
gptkbp:is_promoted_by
|
Webinars
Case Studies
Trade Shows
White Papers
|
gptkbp:is_scalable
|
gptkb:battle
|
gptkbp:is_supported_by
|
gptkb:Research_Institute
|
gptkbp:is_tested_for
|
Latest Threats
|
gptkbp:is_used_by
|
Businesses
|
gptkbp:marketed_as
|
Compliance Officers
IT Administrators
Security Professionals
CI Os
|
gptkbp:offers
|
gptkb:XMPP_Extension_Protocol
gptkb:Company
gptkb:software
Centralized Management
|
gptkbp:provides
|
gptkb:software
Incident Response
Reporting and Analytics
Threat Detection
Malware Protection
Endpoint Hardening
|
gptkbp:supports
|
gptkb:Windows_Operating_System
gptkb:smartphone
gptkb:Mac_Operating_System
|
gptkbp:updates
|
gptkb:battle
|
gptkbp:utilizes
|
gptkb:Artificial_Intelligence
gptkb:software_framework
|