Dell Latitude E5400 Product Manual page 22

Dell laptop
Hide thumbs Also See for Latitude E5400:
Table of Contents

Advertisement

Latitude E6500, E6400 Reviewer's Guide
Latitude E5500, E5400 Reviewer's Guide
Simply Secure
Information technology has become a
backbone for our customers. It is a daily tool
for real time collaboration as well as crucial
business data storage. At the same time, our
world has become extremely mobile: valuable
files are sent over the networks or carried
around the planet on notebooks. As a result,
there is a growing threat for data loss or
leakage.
Whether you need enhanced physical
protection or easy to manage protection for
your critical data, Dell's security offering can
help. We are committed to simplifying
security deployment, usage and maintenance,
in order to allow smaller businesses to acquire
relevant security and larger organizations to
implement at low total cost of ownership
impact.
Deploy Faster
The complexity of IT can slow down even the
most tightly run organization. By speeding up
deployment and configuration, you can reclaim
wasted time and redirect it toward growing
your business.
Dell can deliver a fully secured system directly
from the factory that covers all four key
aspects of security: System Protection, Access
Control, Data protection and Malicious
Threats prevention.
With Dell's Custom Factory Integration (CFI),
we can deliver pre-configured systems
including non-Dell standard hardware and
proprietary software right out of the factory.
CFI offers security features such as custom
asset tags, and StopTrack or TLS labels.
22
*See important information at end of document

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Latitude e5500

Table of Contents