SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Dell Technologies introduces Project Fort Zero to transform security

24 May 2023

Dell Technologies introduces Project Fort Zero to transform security
Contact company
Contact Dell
icon Add as a preferred source Download PDF version

Dell Technologies introduces Project Fort Zero to provide an end-to-end Zero Trust security solution for global organisations to protect against cyberattacks.

The solution will be validated by the U.S. Department of Defense and is part of a Dell Security portfolio expansion.

Project Fort Zero

Project Fort Zero builds on the momentum of Dell’s Zero Trust Center of Excellence and partner ecosystem to accelerate Zero Trust adoption.

Leading an ecosystem of more than 30 leading technology companies, Dell will deliver a validated, advanced maturity Zero Trust solution within the next 12 months.

Adoption in decentralised environments

We’re helping global organisations solve today’s security challenges by easing integration"

“Zero Trust is designed for decentralised environments but integrating it across hundreds of point products from dozens of vendors is complex making it out of reach for most organisations,” said Herb Kelsey, Industry Chief Technology Officer, Government, Dell Technologies.

He adds, “We’re helping global organisations solve today’s security challenges by easing integration and accelerating adoption of Zero Trust.”

Validated Zero Trust solution

The fully configured Project Fort Zero solution will lower the barrier to Zero Trust adoption. Dell will take on the technology integration and orchestration that typically falls to individual organisations across several vendors. In doing so, the estimated time for advanced Zero Trust adoption is reduced through a private cloud.

To achieve validation, a government assessment team will evaluate the Project Fort Zero solution for advanced maturity accreditation and certify compliance against the U.S. Department of Defense Zero Trust reference architecture, which is recognised around the world.

This end-to-end solution will help global public- and private-sector organizations adapt and respond to cybersecurity risks while offering the highest level of protection.

Applications

Project Fort Zero can serve a variety of use cases including:  

  • In on-premises data centres for organisations where data security and compliance are paramount.
  • In remote or regional locations like retail stores where secure, real-time analysis of customer data can deliver a competitive advantage.
  • In the field where a temporary implementation is needed in places with intermittent connectivity, like airplanes or vehicles, for operational continuity.

Modernising cybersecurity

Project Fort Zero can help accelerate this process by delivering a repeatable blueprint for an end-to-end solution"

“Organisations are turning to Zero Trust to modernise their cybersecurity programmes and keep pace with an evolving attack landscape. But determining where to start, the capabilities to prioritise and the actions needed to progress towards maturity can be complicated,” said John Grady, Principal Analyst, of Enterprise Strategy Group. 

He adds, “Security and IT leaders need help planning their strategy and implementing the tools to support it. Project Fort Zero can help accelerate this process by delivering a repeatable blueprint for an end-to-end solution that is based on a validated reference architecture recognised around the world."

PSX for Backup 

Along with Project Fort Zero, Dell is expanding its security portfolio with Product Success Accelerator (PSX) for Backup, a new service to help organisations protect and recover data in the event of a disruption. 

PSX for Backup simplifies the implementation and maintenance of backup environments to enable data recovery. It follows the recent release of PSX for Cyber Recovery, which implements and helps operationalise an isolated cyber recovery vault.

Three levels of backup

Organisations can choose from three levels of backup or cyber recovery based on their needs: 

  • Ready includes planning workshops, the configuration of a validated backup or vault environment, a success plan, a runbook, and outcome-based skills training.
  • Optimise adds quarterly assessments, improvement recommendations, and assisted restore test simulations.
  • Operate adds ongoing operational assistance to meet the solution’s performance objectives. Highly skilled experts monitor and investigate alerts, initiate corrective actions, and help with restoring tasks at the customer's direction.

Availability

  • Project Fort Zero’s advanced maturity Zero Trust solution will be available to public- and private-sector organisations within the next 12 months.
  • Dell Product Success Accelerator for Backup is now available in locations across North America, Europe, and Asia Pacific.
  • Dell Product Success Accelerator for Cyber Recovery expanded availability to locations in Europe, Latin America, and Asia Pacific, in addition to North America.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Retail surveillance
  • Electronic security systems
  • Retail security systems
  • Shop security systems
  • Application security
  • Physical security
  • Industrial security
  • Mall security
  • Commercial security
  • Perimeter security
  • Private sector security
  • Public sector security
  • Shopping centre security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Video analytics
  • Electronic access control
  • Building security
  • Facility security
  • Store security
  • Store surveillance
  • Public security
  • Industrial security systems
  • Retail security
  • Wireless security
  • Door access control
  • Security software
  • Industrial surveillance
  • Human area network
  • Green security
  • Physical Security Information Management (PSIM)
  • Security communication
  • Integration software
  • Perimeter protection
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • GDPR
  • Mergers & Acquisitions
  • Touchless Security
  • Related links
  • Standalone / Networked Access control systems & kits
  • Proximity Access control systems & kits
  • Standalone/Networkable Access control controllers
  • Related categories
  • Access control controllers
  • Access control systems & kits
Related white papers
Physical access control

Physical access control

Download
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Retail security in 2021 and beyond

Retail security in 2021 and beyond

What security technologies are impacting the retail market?

What security technologies are impacting the retail market?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec