Month: February 2021

‘Keep on Gaming!’ Dell’s Newest Gaming Monitor Delivers Unrivaled Gameplay

first_imgAs the worldwide number one brand in monitors for three years running, we constantly strive to wow our customers, whether by introducing innovative products that are the first of their kind or by expanding our portfolio to meet more customers’ needs. We heard and saw how much customers loved our first gaming monitor – the Dell 27 Monitor (S2716DG) – and knew that we needed to expand our gaming-specific line in an effort to not only offer industry-best products, but also a choice in screen size and price points.With the kickoff of PAX West upon us, we couldn’t have scripted a better time to announce the Dell 24 Gaming Monitor (S2417DG). The 24-inch monitor is one of the most popular display sizes on the market, so it seemed only natural to develop one for our gaming lineup. Similar to its older brother, the S2417DG sports NVIDIA G-SYNC technology and now has a lightning-fast refresh rate at 165Hz and one millisecond response time, so serious gamers will appreciate the crisp and fast-moving images without the stuttering or screen tearing that their favorite games deserve in stunning 2560 x 1440 (QHD) resolution.With the S2417DG, gamers can rig their ideal setup with ultra-thin bezels creating a seamless panoramic multi-monitor view for the ultimate gaming experience. Get comfortable because the Dell 24 Gaming Monitor is fully adjustable with tilt, pivot and swivel plus a flicker-free screen so you have a more comfortable view that optimizes eye comfort.Now that you’re ready to game for hours on end, be sure to take advantage of the new customized game modes and the ability to conveniently switch your gameplay to a secondary console via HDMI. In an effort to further enhance your visual and gaming experience, you can choose customized specific gaming modes that suit FPS, RTS and RPG games. Select one of the three preset modes, and you’ll get optimized visuals without having to manually adjust the screen settings every time.We couldn’t be more excited to release another innovative and amazing monitor to pair with the powerful gaming machines that our friends at Alienware continue to design and develop.The Dell 24 Gaming Monitor is available now on, starting at $569.99.last_img read more

Thrive with the Confidence of Cyber Resilience

first_imgCybersecurity. Just hearing that word sends chills up and down the spines of most IT folks I know. It is a complex and unrelenting challenge every company wrestles with as they embark on or continue their digital transformation. It is the “thing that keeps you up at night” and is the #1 subject on the minds of every public and private Board of Directors.On that topic, it isn’t every day you have the opportunity to claim cybersecurity enhancements across your entire portfolio. Today, Dell Technologies is expanding on our foundation of cybersecurity features that help establish and maintain a secure IT ecosystem, from the edge to the core and the cloud. These elements, separately and combined, are intended to bolster your trust and confidence in Dell Technologies as the primary source of IT solutions in today’s digital era.Our story is quite simple for this announcement – battling cybersecurity is about starting strong, staying strong, and outmaneuvering threats. It sounds simple on paper, but it is not simple in execution. Let me take you through what we’re doing to enhance our systems’ intrinsic security so you can focus on your customer and driving your business.Start StrongStarting strong is about laying down a trusted IT infrastructure foundation. That foundation starts with the silicon design and permeates the system’s lifecycle, from supply chain management to manufacturing, delivery, production, and retirement – all from a single, trusted vendor. In this domain, we’re introducing Dell Technologies Secured Component Verification, part of our Cyber Resilient Architecture for PowerEdge servers. Secured Component Verification provides “as-built” hardware validation upon delivery to ensure that nobody has modified your new systems’ hardware configuration in transit.Complementing this capability for Dell Trusted Devices is the new Dell SafeSupply Chain solution, which  delivers additional layers of supply chain security and integrity controls to what are already the industry’s most secure commercial PCs. The new services include tamper-evident seals and a NIST compliant hard drive wipe.We’re formalizing our service offerings for Enterprise customers to simplify system lifecycle management. With services such as Keep Your Hard Drive for Enterprise and Keep Your Component for Enterprise, customers maintain complete control over failed parts, never letting sensitive data out of their sight. With Data Sanitization for Enterprise and Data Destruction for Enterprise services, data residing on end-of-life systems is secured in accordance with NIST 800-88 standards. New to this offering is the ability to offer onsite service as well as the capability to sanitize 3rd party systems, delivering a more complete portfolio that serves evolving customer needs.Stay StrongStaying strong is about being constantly vigilant, looking over the horizon for emerging threats, and providing solutions before there is a (big) problem. This involves systems going into production as well as live systems with critical customer data. Here we’re offering Dell EMC PowerEdge UEFI Secure Boot Customization to address industry-wide firmware certificate authenticity issues. This supports our most secure customers establish and maintain complete control over their server operations. There was recently an industry-wide vulnerability in the Linux GRUB2 bootloader (aka “BootHole”) discovered. Key to the advanced mitigation solution was the use of UEFI Secure Boot Customization. The Dell Technologies implementation of UEFI Secure Boot Customization was highlighted in the National Security Agency (NSA) in their recent technical paper “UEFI Secure Boot Customization.”Staying strong is also about being resilient and coming back stronger when cyberattacks happen. Last week we announced that PowerProtect Cyber Recovery became the first and is currently the only solution to receive endorsement for meeting all of the data vaulting requirements of the Sheltered Harbor standard. Sheltered Harbor is an industry-led initiative created to protect customers, financial institutions, and public confidence in the financial system if a catastrophic event like a cyberattack causes critical systems to fail. PowerProtect Cyber Recovery Solution utilizes a policy-based workflow to securely move business critical data into an isolated environment, preserving and shielding it from invasive cyberattacks. If a major attack occurs, a copy of your most valuable data is secure and ready to restart your IT operations.Outmaneuver ThreatsOutmaneuvering threats is about using every possible advantage to anticipate and mitigate the risks, both outside and inside, aimed at your infrastructure. Here we talk about automation, telemetry, and leveraging AI/ML. For automation, we’re further enhancing Dell EMC OpenManage Ansible Modules. OpenManage Ansible Modules simplifies the automated provisioning, deployment, and updating of PowerEdge servers and modular infrastructure for administrators and developers using RedHat Ansible. For the DevOps team, this integration enables Infrastructure as a Service (IaaS) and Infrastructure as Code (IaC). For the Security team, this enables automated security workflows for configuring user privileges, data storage encryption, secure erasure, and firmware updates, to name just a few.Embedded with every PowerEdge server is the Integrated Dell Remote Access Controller (iDRAC). The iDRAC provides secure, comprehensive, embedded management across the PowerEdge family of servers. iDRAC9 improvements in this release take our unique system lockdown feature to the next level, by locking a NIC to prevent changes to the firmware from the OS and any resident malware. Also, two-factor authentication (2FA) and RSA SecureID support extend the already impressive set of security features available today.Finally, and just as important as everything else outlined here, there is leveraging the telemetry available from iDRAC. The iDRAC sends real-time data for over 5000 different server elements to analytic tools such as Splunk, from CPU utilization to power consumption to network utilization. While the vastness of the available server data is compelling, the value lies in analyzing and learning from the data of all the systems that make up the server infrastructure. This is where the real game of “cat and mouse” is played, where intelligent systems may see early signals of potential attacks and send alerts before the situation turns into a breach. Solutions like CyberSense for PowerProtect Cyber Recovery Solution and Dell Endpoint Security are also available to help you thwart ransomware and malware attacks on your servers, desktops, laptops, and tablets.Confidence from the StartProducts and services, such as the ones we’re announcing today, ultimately have one goal – instill confidence in your IT infrastructure so that your time and energy is spent on innovation and thrilling your customers. Nobody wants to spend all their time chasing shadows, always worried about how severe the next attack will be. We’re here to enable you to be proactive and resilient when it comes to cybersecurity, today and throughout your entire lifecycle.To learn more about all the new cybersecurity elements in this launch please view the our  Security Point of View Paper, explore our Virtual Security Experience and visit our Emerging Technologies page.last_img read more