SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
A comparison of security features in Dell, HP,
and Lenovo PC systems
Approach
Dell™
commissioned Principled Technologies to investigate 10 security features in the PC security and system
management space:
• Support for monitoring solutions
• BIOS security and protection features
y Platform integrity validation
y Device integrity validation via off-site measurements
y Component integrity validation for Intel®
Management Engine (ME) via off-site measurements
y BIOS image capture for analysis
y Built-in hardware cache for monitoring BIOS changes with security information and event
management (SIEM) integration
• Microsoft Intune management
y BIOS setting management integrations for Intune
y BIOS access management security enhancements for Intune
• Remote management
y Intel vPro®
remote management
y PC management using cellular data
These features rely on manufacturer-enabled communication between the hardware and the operating system
(OS). We reviewed publicly available marketing claims and feature documentation for three Windows original
equipment manufacturers (OEMs): Dell, HP, and Lenovo®
. Many of the Dell features relate to the Dell Trusted
Device application.
In this report, we indicate that an OEM supports a given feature if its published materials mention that feature is
present. We have done our best to determine which features each OEM supports, using a variety of search terms
and brand-specific phrasing to locate features. Some of the features we mark as being absent might be present
but not covered in the OEM marketing or documentation. It is also possible that, despite our best efforts, we
missed or overlooked some features that the OEM marketing or documentation does address.
We completed no hands-on validation of any of the features we discuss below. Therefore, we cannot verify
the functionality, scope, or reliability of these features. We do not cover system requirements or any licensing,
services, or additional hardware or software that might be necessary to use the features.
A comparison of security features in Dell, HP, and Lenovo PC systems April 2024
A Principled Technologies report: In-depth research. Real-world value.
Table 1 lists the primary sources we used for each OEM. We consulted Intel®
Hardware Shield as well as OEM
websites, which we cite in the sections below.1
Table 1: The primary sources we used for each OEM. Source: Principled Technologies.
Dell HP Lenovo
• Dell Trusted Device2
• Dell Blog – The Secret Sauce
Behind Dell Trusted Devices3
• Dell Trusted Device BIOS
Security Whitepaper4
• HP Sure Start WhitePaper5
• HP Sure Start InfoSheet6
• Lenovo Think Deploy Blog7
• Supply Chain Security Solutions
from Intel and Lenovo8
Findings
Support for monitoring solutions
We looked at how each OEM designs its products for monitoring solutions. We also looked at which specific
solutions the manufacturers recommend. We discuss features utilized by SIEM, endpoint detection and response
(EDR), unified endpoint management (UEM), and other security tools that collect device data for analysis. We
collectively refer to those tools as monitoring solutions.
Dell, HP, and Lenovo have designed their devices to integrate with modern monitoring solutions. For Dell,
many of the features we discuss below integrate with monitoring solutions and Microsoft Intune.9
Dell materials
specifically mention Managed Detection and Response with Microsoft, which integrates with Intune and
Microsoft Sentinel, as well as VMware®
Carbon Black.10,11
HP discusses designing for SIEM solutions in both its HP
Sure Click Enterprise documentation and its HP Wolf Security report.12,13,14
Lenovo ThinkShield materials discuss
partnerships with multiple monitoring solutions, such as SentinelOne, Sepio, and Eclypsium.15
BIOS security and protection features
Platform integrity validation
We looked for solutions where the OEM provides a service that validates new PC hardware and firmware against
a manifest the manufacturer captured during production. Dell, HP, and Lenovo all provide a path for platform
integrity validation via certificates as well as options for implementing verification at scale.16,17,18
Device integrity validation via off-site measurements
We looked for solutions where a manufacturer collects measurements on a per-build basis and uses that
information to validate the integrity of the BIOS components. The Dell Trusted Device application validates
measurements on individual PCs against those Dell has captured. This allows Dell to verify the authenticity of
the firmware. Dell is the only OEM of the group that offers the capability to validate BIOS measurements against
version-specific BIOS measurements.19
We did not find similar features for HP or Lenovo.
Component integrity validation for Intel Management Engine via off-site measurements
We looked for device integrity validation tools that use off-site measurements to validate the integrity of the Intel
Management Engine component. Using features similar to those in the previous section, Dell supports offsite
Intel ME component verification.20,21
We did not find similar features for HP or Lenovo.
A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 2
BIOS image capture for analysis
We looked for features that allow administrators to capture an image of the device BIOS as a recoverable file for
further analysis. Dell offers a BIOS Image Capture feature. Dell Trusted Device provides the captured BIOS image
file only if the system has detected a corrupt or tampered image that differs from the offsite Intel ME component
verification measurement we discuss above.22
We did not find similar features for HP or Lenovo.
Built-in hardware cache for monitoring BIOS changes with SIEM integration
We looked for solutions where the OEMs provide a firmware-enabled cache that records BIOS settings changes
and other changes in the system within the firmware, so that monitoring applications can detect possible attack
sequences. Under Dell Trusted Device, Dell provides the “Indicators of attack” feature.23
We did not find similar
features for HP or Lenovo.
Microsoft Intune management
BIOS setting management integrations for Microsoft Intune
We looked for OEM integrations specifically designed around managing BIOS settings using Intune. Both Dell
and HP simplify package management for administrators by integrating directly with the Intune console and have
integrations that simplify managing BIOS settings through Intune. Using Dell Command | Endpoint Configure for
Microsoft Intune and Dell Command | Configure, administrators can package BIOS changes and distribute them
across their fleet to manage BIOS settings on multiple devices.24,25
HP also allows for BIOS setting management
through Microsoft Intune via HP Connect.26
Administrators can create and manage policies within Intune and
deploy those policies across their fleets.27
We did not find a similar integration for Lenovo.
BIOS access management security enhancements for Microsoft Intune
We looked for ways that OEMs further secure BIOS access on endpoints using UEM tools beyond passwords.
Specifically, we sought tools that integrate with Microsoft Intune and simplify the management of encrypted
authentication methods used to access each system’s BIOS.
We found such features for both Dell and HP, but did not find them for Lenovo. In Dell Command | Endpoint
Configure for Microsoft Intune, Dell supports rotating unique secure passwords for each device through Intune.
This solution leverages the Dell Client Connector for Intune to decode encrypted BIOS settings. Whenever
this solution makes a change in the BIOS, it automatically changes the BIOS password.28
HP Connect offers
certificate-based authentication BIOS management for PCs through Intune. Administrators can still access the
local BIOS using the Sure Admin app.29
Remote management
Intel vPro remote management
We looked for ways that OEMs support remote management to remote devices using Intel vPro. Dell, HP, and
Lenovo all support Intel vPro, as well as connectivity to devices with remote KVM access over Wi-Fi via Intel
Endpoint Management Assistant (Intel EMA).30,31,32,33
PC management using cellular data
We looked for OEM security services that utilize cellular data to protect remote devices. HP provides a service to
secure remote systems using cellular data with HP Wolf Protect and Trace. It maintains some functionality even
when the system is powered off.34
When we conducted our research, this service supported 32 systems.35
We did
not find similar features for Dell or Lenovo.
A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 3
Summary of findings
Table 2 summarizes our findings. Based on our research using publicly available materials, it appears that Dell
supports nine of the ten PC security features we investigated, HP supports six of them, and Lenovo supports
three features.
Table 2: Summary of our findings. Source: Principled Technologies.
Dell HP Lenovo
Support for monitoring solutions   
Platform integrity validation   
Device integrity validation via off-site measurements  no data no data
Component integrity validation for Intel Management Engine via off-site measurements  no data no data
BIOS image capture for analysis  no data no data
Built-in firmware cache for BIOS changes  no data no data
BIOS setting management integrations for Microsoft Intune   no data
BIOS access management security enhancements for Microsoft Intune   no data
Intel vPro Remote Management   
PC management using cellular data no data  no data
1. Intel, “Intel Hardware Shield-Below-the-OS Security,” accessed April 4, 2024,
https://www.intel.com/content/dam/www/central-libraries/us/en/documents/below-the-os-security-white-paper.pdf.
2. Dell, “What is Dell Trusted Device,” accessed April 3, 2024,
https://www.dell.com/support/kbdoc/en-us/000126098/what-is-dell-trusted-device.
3. Bentz, Tom “The Secret Sauce Behind Dell Trusted Devices,” accessed April 3, 2024,
https://www.dell.com/en-us/blog/the-secret-sauce-behind-dell-trusted-devices/.
4. Dell, “Client Solutions Dell Trusted Device: BIOS Security,” accessed April 3, 2024, https://www.delltechnologies.com/
asset/en-gb/products/security/industry-market/dell-trusted-device-below-the-os-whitepaper.pdf.
5. HP, “HP Sure Start – Whitepaper,” accessed April 3, 2024,
https://h20195.www2.hp.com/v2/getpdf.aspx/4AA7-6645ENW.pdf.
6. HP, “HP Sure Start Infosheet,” accessed April 3, 2024, https://h20195.www2.hp.com/v2/getpdf.aspx/4AA7-2562ENW.pdf.
7. Philip Jorgensen, “Think Deploy Blog: Updating Lenovo Thin Installer with Proactive Remediations,” accessed April 3,
2024, https://blog.lenovocdrt.com/#/2023/ti_winget_pr?id=monitoring/.
8. Intel and Lenovo, “Supply Chain Security Solutions from Intel and Lenovo,” accessed April 3, 2024,
https://www.intel.com/content/dam/www/central-libraries/us/en/documents/2022-08/supply-chain-security-solutions-
from-intel-and-lenovo-may2020.pdf.
9. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” SIEM section, accessed April 3, 2024,
https://www.dell.com/support/manuals/en-us/trusted-device/trusted_device_cg/siem?guid=guid-dbd44a39-5668-45ab-
a83e-ecadc95c0825&lang=en-us/.
10. Dell, “Managed Detection and Response with Microsoft,” accessed April 15, 2024,
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW19W2x/.
A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 4
11. CrowdStrike and Dell, “Making cybersecurity fast and frictionless,” accessed April 15, 2024,
https://www.crowdstrike.com/resources/data-sheets/crowdstrike-and-dell-technologies/.
12. HP, “HP Sure Click Enterprise,” accessed April 15, 2024,
https://h20195.www2.hp.com/v2/getpdf.aspx/4AA7-6963ENW.pdf.
13. HP Wolf Security, “Blurred Lines and Blindspots,” accessed April 15, 2024, https://press.hp.com/content/dam/sites/
garage-press/press/press-releases/2021/wolf-security-and-flexworker/2021_HP_Wolf_Security_Blurred_Lines_Report.pdf.
14. HP, “HP Sure Start Whitepaper,” accessed April 15, 2024,
https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=4AA7-6645ENW.
15. Lenovo, “ThinkShield,” accessed April 15, 2024, https://www.lenovo.com/us/en/software/thinkshield.
16. Dell, “What is Dell Trusted Device Service Secured Component Verification,” accessed April 3, 2024,
https://www.dell.com/support/kbdoc/en-us/000221396/what-is-dell-trusted-device-secured-component-verification/.
17. HP, “HP Platform Certificate Datasheet,” accessed April 3, 2024,
https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=4AA8-3109ENW&jumpid=va_05dd58b305/.
18. Intel and Lenovo, “Supply Chain Security Solutions from Intel and Lenovo,” accessed April 3, 2024,
https://www.intel.com/content/dam/www/central-libraries/us/en/documents/2022-08/supply-chain-security-solutions-
from-intel-and-lenovo-may2020.pdf.
19. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” Intel ME Verification section, accessed April 3, 2024,
https://www.dell.com/support/manuals/en-us/trusted-device/trusted_device/intelme-verification?guid=guid-bac1f4e2-
2700-4c45-a5e0-b45aab57401a&lang=en-us/.
20. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” Intel ME Verification section.
21. Bentz, Tom “The Secret Sauce Behind Dell Trusted Devices,” accessed April 3, 2024,
https://www.dell.com/en-us/blog/the-secret-sauce-behind-dell-trusted-devices/.
22. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” BIOS Events & Indicator of Attack section, accessed
April 15, 2024, https://www.dell.com/support/manuals/en-us/trusted-device/trusted_device/bios-events-indicators-of-
attack?guid=guid-8f0b4d74-793e-499f-b41e-46d9445faa9b&lang=en-us/.
23. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” BIOS Events & Indicators of Attack section.
24. Bentz, Tom, “Streamline Endpoint Security and Manageability with BLOBs,” accessed April 15, 2024,
https://www.dell.com/en-us/blog/streamline-endpoint-security-and-manageability-with-blobs/.
25. Dell, “Dell Command | Endpoint Configure for Microsoft Intune User’s Guide,” accessed April 15, 2024,
https://dl.dell.com/content/manual52878209-dell-command-endpoint-configure-for-microsoft-intune-users-guide.pdf.
26. HP, “HP Connect,” accessed April 15, 2024, https://connect.admin.hp.com/.
27. HP, “HP Connect User Guide,” accessed April 15, 2024, https://connect.admin.hp.com/static/HPConnectUserGuide.pdf.
28. Bentz, Tom, “Streamline Endpoint Security and Manageability with BLOBs,” accessed April 15, 2024,
https://www.dell.com/en-us/blog/streamline-endpoint-security-and-manageability-with-blobs/.
29. HP Developers, “HP Sure Admin step-by-step,” accessed April 15, 2024,
https://developers.hp.com/hp-client-management/blog/hp-sure-admin-step-step/.
30. Dell, “The Intel-vPro®
Platform,” accessed April 15, 2024, https://www.dell.com/en-us/lp/intel-vpro-platform.
31. HP, “Intel EVO,” accessed April 23, 2024, https://www.hp.com/us-en/laptops/business/intel-evo.html.
32. Lenovo, “What is vPro,” accessed April 23, 2024, https://www.lenovo.com/us/en/faqs/pc-life-faqs/what-is-vpro/.
33. Intel, “For IT: A How-to Guide to the Intel vPro®
Platform,” accessed April 23, 2024,
https://plan.seek.intel.com/Guide_to_IntelvPro_REG/.
34. HP, “HP Protect and Trace with Wolf Connect Solution Overview,” accessed April 3, 2024,
https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=4AA8-3324ENW.
35. HP Wolf Security, “Protect and Trace with Wolf Connect,” accessed April 3, 2024,
https://www.hpwolf.com/en/legal/ptwc/platforms/.
A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 5
Principled Technologies is a registered trademark of Principled Technologies, Inc.
All other product names are the trademarks of their respective owners.
DISCLAIMER OF WARRANTIES; LIMITATION OF LIABILITY:
Principled Technologies, Inc. has made reasonable efforts to ensure the accuracy and validity of its testing, however, Principled Technologies, Inc. specifically disclaims
any warranty, expressed or implied, relating to the test results and analysis, their accuracy, completeness or quality, including any implied warranty of fitness for any
particular purpose. All persons or entities relying on the results of any testing do so at their own risk, and agree that Principled Technologies, Inc., its employees and its
subcontractors shall have no liability whatsoever from any claim of loss or damage on account of any alleged error or defect in any testing procedure or result.
In no event shall Principled Technologies, Inc. be liable for indirect, special, incidental, or consequential damages in connection with its testing, even if advised of
the possibility of such damages. In no event shall Principled Technologies, Inc.’s liability, including for direct damages, exceed the amounts paid in connection with
Principled Technologies, Inc.’s testing. Customer’s sole and exclusive remedies are as set forth herein.
This project was commissioned by Dell Technologies.
Principled
Technologies®
Facts matter.®
Principled
Technologies®
Facts matter.®
A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 6

Weitere ähnliche Inhalte

Ähnlich wie A comparison of security features in Dell, HP, and Lenovo PC systems

Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.Keshav Murthy
 
E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case Intel IT Center
 
Xeon E5 Making the Business Case PowerPoint
Xeon E5 Making the Business Case PowerPointXeon E5 Making the Business Case PowerPoint
Xeon E5 Making the Business Case PowerPointIntel IT Center
 
IBM i and related software Data migrations.pdf
IBM i and related software Data migrations.pdfIBM i and related software Data migrations.pdf
IBM i and related software Data migrations.pdfken761ken1
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014StampedeCon
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Techtechnext1
 
Control review for iOS
Control review for iOSControl review for iOS
Control review for iOSWilliam Price
 
Develop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster ReadyDevelop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster ReadyIntel IT Center
 
Utilisation des capteurs dans les applications windows 8
Utilisation des capteurs dans les applications windows 8Utilisation des capteurs dans les applications windows 8
Utilisation des capteurs dans les applications windows 8Intel Developer Zone Community
 
“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...
“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...
“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...Edge AI and Vision Alliance
 
【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh
【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh
【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYehMAKERPRO.cc
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7mphacker
 
AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training Intel® Software
 
Dell management tools made server deployment and updates easier, offered more...
Dell management tools made server deployment and updates easier, offered more...Dell management tools made server deployment and updates easier, offered more...
Dell management tools made server deployment and updates easier, offered more...Principled Technologies
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
 
Top 3 Useful Tools for DevOps Automation -
Top 3 Useful Tools for DevOps Automation -Top 3 Useful Tools for DevOps Automation -
Top 3 Useful Tools for DevOps Automation -Urolime Technologies
 
Driving Industrial InnovationOn the Path to Exascale
Driving Industrial InnovationOn the Path to ExascaleDriving Industrial InnovationOn the Path to Exascale
Driving Industrial InnovationOn the Path to ExascaleIntel IT Center
 
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...MongoDB
 

Ähnlich wie A comparison of security features in Dell, HP, and Lenovo PC systems (20)

Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.Informix IWA data life cycle mgmt & Performance on Intel.
Informix IWA data life cycle mgmt & Performance on Intel.
 
E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case
 
Xeon E5 Making the Business Case PowerPoint
Xeon E5 Making the Business Case PowerPointXeon E5 Making the Business Case PowerPoint
Xeon E5 Making the Business Case PowerPoint
 
IBM i and related software Data migrations.pdf
IBM i and related software Data migrations.pdfIBM i and related software Data migrations.pdf
IBM i and related software Data migrations.pdf
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
Control review for iOS
Control review for iOSControl review for iOS
Control review for iOS
 
Develop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster ReadyDevelop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster Ready
 
Windows 7
Windows 7Windows 7
Windows 7
 
Utilisation des capteurs dans les applications windows 8
Utilisation des capteurs dans les applications windows 8Utilisation des capteurs dans les applications windows 8
Utilisation des capteurs dans les applications windows 8
 
“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...
“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...
“Accelerating Edge AI Solution Development with Pre-validated Hardware-Softwa...
 
【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh
【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh
【視覺進化論】AI智慧視覺運算技術論壇_2_ChungYeh
 
MeeGo Overview DeveloperDay Munich
MeeGo Overview DeveloperDay MunichMeeGo Overview DeveloperDay Munich
MeeGo Overview DeveloperDay Munich
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7
 
AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training AIDC Summit LA- Hands-on Training
AIDC Summit LA- Hands-on Training
 
Dell management tools made server deployment and updates easier, offered more...
Dell management tools made server deployment and updates easier, offered more...Dell management tools made server deployment and updates easier, offered more...
Dell management tools made server deployment and updates easier, offered more...
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
 
Top 3 Useful Tools for DevOps Automation -
Top 3 Useful Tools for DevOps Automation -Top 3 Useful Tools for DevOps Automation -
Top 3 Useful Tools for DevOps Automation -
 
Driving Industrial InnovationOn the Path to Exascale
Driving Industrial InnovationOn the Path to ExascaleDriving Industrial InnovationOn the Path to Exascale
Driving Industrial InnovationOn the Path to Exascale
 
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
 

Mehr von Principled Technologies

Enable security features with no impact to OLTP performance with Dell PowerEd...
Enable security features with no impact to OLTP performance with Dell PowerEd...Enable security features with no impact to OLTP performance with Dell PowerEd...
Enable security features with no impact to OLTP performance with Dell PowerEd...Principled Technologies
 
Improving energy efficiency in the data center: Endure higher temperatures wi...
Improving energy efficiency in the data center: Endure higher temperatures wi...Improving energy efficiency in the data center: Endure higher temperatures wi...
Improving energy efficiency in the data center: Endure higher temperatures wi...Principled Technologies
 
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...Principled Technologies
 
Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....
Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....
Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....Principled Technologies
 
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...Principled Technologies
 
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Principled Technologies
 
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Principled Technologies
 
Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...
Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...
Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...Principled Technologies
 
Improve performance and gain room to grow by easily migrating to a modern Ope...
Improve performance and gain room to grow by easily migrating to a modern Ope...Improve performance and gain room to grow by easily migrating to a modern Ope...
Improve performance and gain room to grow by easily migrating to a modern Ope...Principled Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Principled Technologies
 
Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...Principled Technologies
 
Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...Principled Technologies
 
Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...
Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...
Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...Principled Technologies
 
Scale up your storage with higher-performing Dell APEX Block Storage for AWS
Scale up your storage with higher-performing Dell APEX Block Storage for AWSScale up your storage with higher-performing Dell APEX Block Storage for AWS
Scale up your storage with higher-performing Dell APEX Block Storage for AWSPrincipled Technologies
 
Get in and stay in the productivity zone with the HP Z2 G9 Tower Workstation
Get in and stay in the productivity zone with the HP Z2 G9 Tower WorkstationGet in and stay in the productivity zone with the HP Z2 G9 Tower Workstation
Get in and stay in the productivity zone with the HP Z2 G9 Tower WorkstationPrincipled Technologies
 
Open up new possibilities with higher transactional database performance from...
Open up new possibilities with higher transactional database performance from...Open up new possibilities with higher transactional database performance from...
Open up new possibilities with higher transactional database performance from...Principled Technologies
 
Improving database performance and value with an easy migration to Azure Data...
Improving database performance and value with an easy migration to Azure Data...Improving database performance and value with an easy migration to Azure Data...
Improving database performance and value with an easy migration to Azure Data...Principled Technologies
 
Realize better value and performance migrating from Azure Database for Postgr...
Realize better value and performance migrating from Azure Database for Postgr...Realize better value and performance migrating from Azure Database for Postgr...
Realize better value and performance migrating from Azure Database for Postgr...Principled Technologies
 

Mehr von Principled Technologies (20)

Enable security features with no impact to OLTP performance with Dell PowerEd...
Enable security features with no impact to OLTP performance with Dell PowerEd...Enable security features with no impact to OLTP performance with Dell PowerEd...
Enable security features with no impact to OLTP performance with Dell PowerEd...
 
Improving energy efficiency in the data center: Endure higher temperatures wi...
Improving energy efficiency in the data center: Endure higher temperatures wi...Improving energy efficiency in the data center: Endure higher temperatures wi...
Improving energy efficiency in the data center: Endure higher temperatures wi...
 
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
 
Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....
Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....
Investing in GenAI: Cost‑benefit analysis of Dell on‑premises deployments vs....
 
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
Dell APEX Cloud Platform for Red Hat OpenShift: An easily deployable and powe...
 
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
 
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
 
Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...
Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...
Realize 2.1X the performance with 20% less power with AMD EPYC processor-back...
 
Improve performance and gain room to grow by easily migrating to a modern Ope...
Improve performance and gain room to grow by easily migrating to a modern Ope...Improve performance and gain room to grow by easily migrating to a modern Ope...
Improve performance and gain room to grow by easily migrating to a modern Ope...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
Upgrade your cloud infrastructure with Dell PowerEdge R760 servers and VMware...
 
Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...
 
Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...Increase security, sustainability, and efficiency with robust Dell server man...
Increase security, sustainability, and efficiency with robust Dell server man...
 
Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...
Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...
Scale up your storage with higher-performing Dell APEX Block Storage for AWS ...
 
Scale up your storage with higher-performing Dell APEX Block Storage for AWS
Scale up your storage with higher-performing Dell APEX Block Storage for AWSScale up your storage with higher-performing Dell APEX Block Storage for AWS
Scale up your storage with higher-performing Dell APEX Block Storage for AWS
 
Get in and stay in the productivity zone with the HP Z2 G9 Tower Workstation
Get in and stay in the productivity zone with the HP Z2 G9 Tower WorkstationGet in and stay in the productivity zone with the HP Z2 G9 Tower Workstation
Get in and stay in the productivity zone with the HP Z2 G9 Tower Workstation
 
Open up new possibilities with higher transactional database performance from...
Open up new possibilities with higher transactional database performance from...Open up new possibilities with higher transactional database performance from...
Open up new possibilities with higher transactional database performance from...
 
Improving database performance and value with an easy migration to Azure Data...
Improving database performance and value with an easy migration to Azure Data...Improving database performance and value with an easy migration to Azure Data...
Improving database performance and value with an easy migration to Azure Data...
 
Realize better value and performance migrating from Azure Database for Postgr...
Realize better value and performance migrating from Azure Database for Postgr...Realize better value and performance migrating from Azure Database for Postgr...
Realize better value and performance migrating from Azure Database for Postgr...
 

Kürzlich hochgeladen

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Kürzlich hochgeladen (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

A comparison of security features in Dell, HP, and Lenovo PC systems

  • 1. A comparison of security features in Dell, HP, and Lenovo PC systems Approach Dell™ commissioned Principled Technologies to investigate 10 security features in the PC security and system management space: • Support for monitoring solutions • BIOS security and protection features y Platform integrity validation y Device integrity validation via off-site measurements y Component integrity validation for Intel® Management Engine (ME) via off-site measurements y BIOS image capture for analysis y Built-in hardware cache for monitoring BIOS changes with security information and event management (SIEM) integration • Microsoft Intune management y BIOS setting management integrations for Intune y BIOS access management security enhancements for Intune • Remote management y Intel vPro® remote management y PC management using cellular data These features rely on manufacturer-enabled communication between the hardware and the operating system (OS). We reviewed publicly available marketing claims and feature documentation for three Windows original equipment manufacturers (OEMs): Dell, HP, and Lenovo® . Many of the Dell features relate to the Dell Trusted Device application. In this report, we indicate that an OEM supports a given feature if its published materials mention that feature is present. We have done our best to determine which features each OEM supports, using a variety of search terms and brand-specific phrasing to locate features. Some of the features we mark as being absent might be present but not covered in the OEM marketing or documentation. It is also possible that, despite our best efforts, we missed or overlooked some features that the OEM marketing or documentation does address. We completed no hands-on validation of any of the features we discuss below. Therefore, we cannot verify the functionality, scope, or reliability of these features. We do not cover system requirements or any licensing, services, or additional hardware or software that might be necessary to use the features. A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 A Principled Technologies report: In-depth research. Real-world value.
  • 2. Table 1 lists the primary sources we used for each OEM. We consulted Intel® Hardware Shield as well as OEM websites, which we cite in the sections below.1 Table 1: The primary sources we used for each OEM. Source: Principled Technologies. Dell HP Lenovo • Dell Trusted Device2 • Dell Blog – The Secret Sauce Behind Dell Trusted Devices3 • Dell Trusted Device BIOS Security Whitepaper4 • HP Sure Start WhitePaper5 • HP Sure Start InfoSheet6 • Lenovo Think Deploy Blog7 • Supply Chain Security Solutions from Intel and Lenovo8 Findings Support for monitoring solutions We looked at how each OEM designs its products for monitoring solutions. We also looked at which specific solutions the manufacturers recommend. We discuss features utilized by SIEM, endpoint detection and response (EDR), unified endpoint management (UEM), and other security tools that collect device data for analysis. We collectively refer to those tools as monitoring solutions. Dell, HP, and Lenovo have designed their devices to integrate with modern monitoring solutions. For Dell, many of the features we discuss below integrate with monitoring solutions and Microsoft Intune.9 Dell materials specifically mention Managed Detection and Response with Microsoft, which integrates with Intune and Microsoft Sentinel, as well as VMware® Carbon Black.10,11 HP discusses designing for SIEM solutions in both its HP Sure Click Enterprise documentation and its HP Wolf Security report.12,13,14 Lenovo ThinkShield materials discuss partnerships with multiple monitoring solutions, such as SentinelOne, Sepio, and Eclypsium.15 BIOS security and protection features Platform integrity validation We looked for solutions where the OEM provides a service that validates new PC hardware and firmware against a manifest the manufacturer captured during production. Dell, HP, and Lenovo all provide a path for platform integrity validation via certificates as well as options for implementing verification at scale.16,17,18 Device integrity validation via off-site measurements We looked for solutions where a manufacturer collects measurements on a per-build basis and uses that information to validate the integrity of the BIOS components. The Dell Trusted Device application validates measurements on individual PCs against those Dell has captured. This allows Dell to verify the authenticity of the firmware. Dell is the only OEM of the group that offers the capability to validate BIOS measurements against version-specific BIOS measurements.19 We did not find similar features for HP or Lenovo. Component integrity validation for Intel Management Engine via off-site measurements We looked for device integrity validation tools that use off-site measurements to validate the integrity of the Intel Management Engine component. Using features similar to those in the previous section, Dell supports offsite Intel ME component verification.20,21 We did not find similar features for HP or Lenovo. A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 2
  • 3. BIOS image capture for analysis We looked for features that allow administrators to capture an image of the device BIOS as a recoverable file for further analysis. Dell offers a BIOS Image Capture feature. Dell Trusted Device provides the captured BIOS image file only if the system has detected a corrupt or tampered image that differs from the offsite Intel ME component verification measurement we discuss above.22 We did not find similar features for HP or Lenovo. Built-in hardware cache for monitoring BIOS changes with SIEM integration We looked for solutions where the OEMs provide a firmware-enabled cache that records BIOS settings changes and other changes in the system within the firmware, so that monitoring applications can detect possible attack sequences. Under Dell Trusted Device, Dell provides the “Indicators of attack” feature.23 We did not find similar features for HP or Lenovo. Microsoft Intune management BIOS setting management integrations for Microsoft Intune We looked for OEM integrations specifically designed around managing BIOS settings using Intune. Both Dell and HP simplify package management for administrators by integrating directly with the Intune console and have integrations that simplify managing BIOS settings through Intune. Using Dell Command | Endpoint Configure for Microsoft Intune and Dell Command | Configure, administrators can package BIOS changes and distribute them across their fleet to manage BIOS settings on multiple devices.24,25 HP also allows for BIOS setting management through Microsoft Intune via HP Connect.26 Administrators can create and manage policies within Intune and deploy those policies across their fleets.27 We did not find a similar integration for Lenovo. BIOS access management security enhancements for Microsoft Intune We looked for ways that OEMs further secure BIOS access on endpoints using UEM tools beyond passwords. Specifically, we sought tools that integrate with Microsoft Intune and simplify the management of encrypted authentication methods used to access each system’s BIOS. We found such features for both Dell and HP, but did not find them for Lenovo. In Dell Command | Endpoint Configure for Microsoft Intune, Dell supports rotating unique secure passwords for each device through Intune. This solution leverages the Dell Client Connector for Intune to decode encrypted BIOS settings. Whenever this solution makes a change in the BIOS, it automatically changes the BIOS password.28 HP Connect offers certificate-based authentication BIOS management for PCs through Intune. Administrators can still access the local BIOS using the Sure Admin app.29 Remote management Intel vPro remote management We looked for ways that OEMs support remote management to remote devices using Intel vPro. Dell, HP, and Lenovo all support Intel vPro, as well as connectivity to devices with remote KVM access over Wi-Fi via Intel Endpoint Management Assistant (Intel EMA).30,31,32,33 PC management using cellular data We looked for OEM security services that utilize cellular data to protect remote devices. HP provides a service to secure remote systems using cellular data with HP Wolf Protect and Trace. It maintains some functionality even when the system is powered off.34 When we conducted our research, this service supported 32 systems.35 We did not find similar features for Dell or Lenovo. A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 3
  • 4. Summary of findings Table 2 summarizes our findings. Based on our research using publicly available materials, it appears that Dell supports nine of the ten PC security features we investigated, HP supports six of them, and Lenovo supports three features. Table 2: Summary of our findings. Source: Principled Technologies. Dell HP Lenovo Support for monitoring solutions    Platform integrity validation    Device integrity validation via off-site measurements  no data no data Component integrity validation for Intel Management Engine via off-site measurements  no data no data BIOS image capture for analysis  no data no data Built-in firmware cache for BIOS changes  no data no data BIOS setting management integrations for Microsoft Intune   no data BIOS access management security enhancements for Microsoft Intune   no data Intel vPro Remote Management    PC management using cellular data no data  no data 1. Intel, “Intel Hardware Shield-Below-the-OS Security,” accessed April 4, 2024, https://www.intel.com/content/dam/www/central-libraries/us/en/documents/below-the-os-security-white-paper.pdf. 2. Dell, “What is Dell Trusted Device,” accessed April 3, 2024, https://www.dell.com/support/kbdoc/en-us/000126098/what-is-dell-trusted-device. 3. Bentz, Tom “The Secret Sauce Behind Dell Trusted Devices,” accessed April 3, 2024, https://www.dell.com/en-us/blog/the-secret-sauce-behind-dell-trusted-devices/. 4. Dell, “Client Solutions Dell Trusted Device: BIOS Security,” accessed April 3, 2024, https://www.delltechnologies.com/ asset/en-gb/products/security/industry-market/dell-trusted-device-below-the-os-whitepaper.pdf. 5. HP, “HP Sure Start – Whitepaper,” accessed April 3, 2024, https://h20195.www2.hp.com/v2/getpdf.aspx/4AA7-6645ENW.pdf. 6. HP, “HP Sure Start Infosheet,” accessed April 3, 2024, https://h20195.www2.hp.com/v2/getpdf.aspx/4AA7-2562ENW.pdf. 7. Philip Jorgensen, “Think Deploy Blog: Updating Lenovo Thin Installer with Proactive Remediations,” accessed April 3, 2024, https://blog.lenovocdrt.com/#/2023/ti_winget_pr?id=monitoring/. 8. Intel and Lenovo, “Supply Chain Security Solutions from Intel and Lenovo,” accessed April 3, 2024, https://www.intel.com/content/dam/www/central-libraries/us/en/documents/2022-08/supply-chain-security-solutions- from-intel-and-lenovo-may2020.pdf. 9. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” SIEM section, accessed April 3, 2024, https://www.dell.com/support/manuals/en-us/trusted-device/trusted_device_cg/siem?guid=guid-dbd44a39-5668-45ab- a83e-ecadc95c0825&lang=en-us/. 10. Dell, “Managed Detection and Response with Microsoft,” accessed April 15, 2024, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW19W2x/. A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 4
  • 5. 11. CrowdStrike and Dell, “Making cybersecurity fast and frictionless,” accessed April 15, 2024, https://www.crowdstrike.com/resources/data-sheets/crowdstrike-and-dell-technologies/. 12. HP, “HP Sure Click Enterprise,” accessed April 15, 2024, https://h20195.www2.hp.com/v2/getpdf.aspx/4AA7-6963ENW.pdf. 13. HP Wolf Security, “Blurred Lines and Blindspots,” accessed April 15, 2024, https://press.hp.com/content/dam/sites/ garage-press/press/press-releases/2021/wolf-security-and-flexworker/2021_HP_Wolf_Security_Blurred_Lines_Report.pdf. 14. HP, “HP Sure Start Whitepaper,” accessed April 15, 2024, https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=4AA7-6645ENW. 15. Lenovo, “ThinkShield,” accessed April 15, 2024, https://www.lenovo.com/us/en/software/thinkshield. 16. Dell, “What is Dell Trusted Device Service Secured Component Verification,” accessed April 3, 2024, https://www.dell.com/support/kbdoc/en-us/000221396/what-is-dell-trusted-device-secured-component-verification/. 17. HP, “HP Platform Certificate Datasheet,” accessed April 3, 2024, https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=4AA8-3109ENW&jumpid=va_05dd58b305/. 18. Intel and Lenovo, “Supply Chain Security Solutions from Intel and Lenovo,” accessed April 3, 2024, https://www.intel.com/content/dam/www/central-libraries/us/en/documents/2022-08/supply-chain-security-solutions- from-intel-and-lenovo-may2020.pdf. 19. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” Intel ME Verification section, accessed April 3, 2024, https://www.dell.com/support/manuals/en-us/trusted-device/trusted_device/intelme-verification?guid=guid-bac1f4e2- 2700-4c45-a5e0-b45aab57401a&lang=en-us/. 20. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” Intel ME Verification section. 21. Bentz, Tom “The Secret Sauce Behind Dell Trusted Devices,” accessed April 3, 2024, https://www.dell.com/en-us/blog/the-secret-sauce-behind-dell-trusted-devices/. 22. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” BIOS Events & Indicator of Attack section, accessed April 15, 2024, https://www.dell.com/support/manuals/en-us/trusted-device/trusted_device/bios-events-indicators-of- attack?guid=guid-8f0b4d74-793e-499f-b41e-46d9445faa9b&lang=en-us/. 23. Dell, “Dell Trusted Device Installation and Administrator Guide v5.5,” BIOS Events & Indicators of Attack section. 24. Bentz, Tom, “Streamline Endpoint Security and Manageability with BLOBs,” accessed April 15, 2024, https://www.dell.com/en-us/blog/streamline-endpoint-security-and-manageability-with-blobs/. 25. Dell, “Dell Command | Endpoint Configure for Microsoft Intune User’s Guide,” accessed April 15, 2024, https://dl.dell.com/content/manual52878209-dell-command-endpoint-configure-for-microsoft-intune-users-guide.pdf. 26. HP, “HP Connect,” accessed April 15, 2024, https://connect.admin.hp.com/. 27. HP, “HP Connect User Guide,” accessed April 15, 2024, https://connect.admin.hp.com/static/HPConnectUserGuide.pdf. 28. Bentz, Tom, “Streamline Endpoint Security and Manageability with BLOBs,” accessed April 15, 2024, https://www.dell.com/en-us/blog/streamline-endpoint-security-and-manageability-with-blobs/. 29. HP Developers, “HP Sure Admin step-by-step,” accessed April 15, 2024, https://developers.hp.com/hp-client-management/blog/hp-sure-admin-step-step/. 30. Dell, “The Intel-vPro® Platform,” accessed April 15, 2024, https://www.dell.com/en-us/lp/intel-vpro-platform. 31. HP, “Intel EVO,” accessed April 23, 2024, https://www.hp.com/us-en/laptops/business/intel-evo.html. 32. Lenovo, “What is vPro,” accessed April 23, 2024, https://www.lenovo.com/us/en/faqs/pc-life-faqs/what-is-vpro/. 33. Intel, “For IT: A How-to Guide to the Intel vPro® Platform,” accessed April 23, 2024, https://plan.seek.intel.com/Guide_to_IntelvPro_REG/. 34. HP, “HP Protect and Trace with Wolf Connect Solution Overview,” accessed April 3, 2024, https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=4AA8-3324ENW. 35. HP Wolf Security, “Protect and Trace with Wolf Connect,” accessed April 3, 2024, https://www.hpwolf.com/en/legal/ptwc/platforms/. A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 5
  • 6. Principled Technologies is a registered trademark of Principled Technologies, Inc. All other product names are the trademarks of their respective owners. DISCLAIMER OF WARRANTIES; LIMITATION OF LIABILITY: Principled Technologies, Inc. has made reasonable efforts to ensure the accuracy and validity of its testing, however, Principled Technologies, Inc. specifically disclaims any warranty, expressed or implied, relating to the test results and analysis, their accuracy, completeness or quality, including any implied warranty of fitness for any particular purpose. All persons or entities relying on the results of any testing do so at their own risk, and agree that Principled Technologies, Inc., its employees and its subcontractors shall have no liability whatsoever from any claim of loss or damage on account of any alleged error or defect in any testing procedure or result. In no event shall Principled Technologies, Inc. be liable for indirect, special, incidental, or consequential damages in connection with its testing, even if advised of the possibility of such damages. In no event shall Principled Technologies, Inc.’s liability, including for direct damages, exceed the amounts paid in connection with Principled Technologies, Inc.’s testing. Customer’s sole and exclusive remedies are as set forth herein. This project was commissioned by Dell Technologies. Principled Technologies® Facts matter.® Principled Technologies® Facts matter.® A comparison of security features in Dell, HP, and Lenovo PC systems April 2024 | 6