Home > APEX > Cyber & Data Protection > White Papers > Dell APEX Cyber Recovery Services – Security Guide > Overview
Dell Technologies is expanding its available Cyber Recovery offerings to include the APEX Cyber Recovery Services solution (the “Service”). The importance of having an on-premises, isolated, immutable cyber vault that protects critical data is now empowered by a Dell Technologies managed service. As customers embrace as-a-Service consumption models, such as APEX, cybersecurity is a top priority.
Maintaining the availability of customer’s data within the Service is paramount and a core priority for Dell. Importantly, the overall security of this Service is a shared responsibility between Dell and the customer.
This paper describes the security measures in use by Dell designed to secure remote management of the Service. This paper also defines the shared responsibilities between Dell and the customer as it relates to the Service.
In Dell services, cybersecurity is of great importance to us. Our approach to address cyber threats and risks is based on the attacker point of view. We use the MITRE ATT@CK framework, a knowledge base and model for observed cyber adversary behavior, reflecting the various phases of an adversary’s attack life cycle and the platforms they are known to target. Through this approach, we identify what an adversary can do and define how to protect against the veritable attack vectors in the most effective way to secure the Service by design.
Layered security is a supplementary approach we use to ensure that a security system will leverage the protection in multiple layers, to slow, block, delay, or hinder a threat until it can be completely neutralized.