Modernise cybersecurity with Zero Trust

Issue 5 2023 News & Events, Infrastructure


Doug Woolley.

Organisations are turning to Zero Trust to modernise their cybersecurity programmes and keep pace with an evolving attack landscape. But determining where to start, the capabilities to prioritise and the actions needed to progress towards maturity can be complicated.

Doug Woolley, General Manager, Dell Technologies South Africa, says, “Security and IT leaders need help planning their strategy and implementing the tools to support it. To address this requirement, Dell Technologies has introduced Project Fort Zero to provide an end-to-end Zero Trust security solution for global organisations. It delivers a repeatable blueprint for an end-to-end solution that is based on a validated reference architecture recognised around the world – that of the US Department of Defence.”

Project Fort Zero builds on the momentum of Dell’s Zero Trust Centre of Excellence and partner ecosystem to accelerate Zero Trust adoption. Leading an ecosystem of more than 30 technology companies, Dell will deliver a validated, advanced maturity Zero Trust solution within the next 12 months.

“Zero Trust is designed for decentralised environments, but integrating it across hundreds of point products from dozens of vendors is complex, making it out of reach for most organisations,” Woolley said. “We’re helping South African organisations solve today’s security challenges by easing integration and accelerating adoption of Zero Trust.”

The fully configured Project Fort Zero solution will lower the barrier to Zero Trust adoption. Dell will take on the technology integration and orchestration that typically falls to individual organisations across several vendors. In doing so, the estimated time for advanced Zero Trust adoption is reduced through a private cloud. As a result, the end-to-end solution will help public and private sector organisations adapt and respond to cybersecurity risks while offering the highest level of protection.

Project Fort Zero serves a variety of use cases including:

• In on-premises data centres for organisations, where data security and compliance are paramount.

• In remote or regional locations like retail stores where secure, real-time analysis of customer data can deliver a competitive advantage.

• In the field where a temporary implementation is needed for operational continuity in places with intermittent connectivity such as airplanes and vehicles.

Along with Project Fort Zero, Dell is expanding its security portfolio with Product Success Accelerator (PSX) for Backup, a new service to help organisations protect and recover data in the event of disruption.

PSX for Backup simplifies the implementation and maintenance of backup environments to enable data recovery. PSX for Backup follows the recent release of PSX for Cyber Recovery, which implements and helps operationalise an isolated cyber recovery vault. The isolated cyber recovery vault is intended to be a finality control that delivers assured recoverability after a cyberattack by ensuring that suspicious data copies (of backups) are identified in time.

The cyber recovery vault from Dell Technologies is based on some of the most stringent requirements from the Sheltered Harbor Alliance (an American non-profit that was created by the U.S. Federal Reserve and more than 30 participant banks, to deal with best practices related to cybersecurity and recoverability). Dell’s isolated cyber recovery vault is endorsed by the Sheltered Harbor Alliance, and South African entities can benefit from this critical data recovery control, in order to meet their survival time objective.

Organisations can choose from three levels of backup or cyber recovery based on their needs:

• Ready includes planning workshops, configuration of a validated backup or vault environment, a success plan, a runbook and outcome-based skills training.

• Optimise adds quarterly assessments, improvement recommendations and assisted restore test simulations.

• Operate adds ongoing operational assistance to meet the solution’s performance objectives. Highly skilled experts monitor and investigate alerts, initiate corrective actions and help with restore tasks at the customer's direction.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Igniting standards, powering protection
Securex South Africa News & Events Fire & Safety
Fire safety is more than compliance, it is a critical commitment to protecting lives, assets, and infrastructure. At Firexpo 2025, taking place from 3 to 5 June at Gallagher Convention Centre, that commitment takes centre stage.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...