The Dell Data Security product life cycle explains the end of support policy for products.
Dell Data Security spans many products and was originally named Credant Mobile Guardian. In 2012, Dell acquired Credant and rebranded the product to Dell Data Protection. In 2017, the product was rebranded to Dell Data Security. As products pass their end of potential and are no longer useful to customers, or have become antiquated, these products are sunset towards their End of Life.
Dell Data Security’s Lifecycle process flows through several stages:
Once all these stages have been reached, the product or feature is considered End of Life. Often, for products that have reached End of Life, a newer product version may be required to resolve an issue if the current version exhibiting issues is End of Life.
Unreleased versions are listed below to announce upcoming End of Life for specific product versions, operating systems, or SQL Server versions (for use with the Windows server-based Dell Security Management Server [formerly Dell Data Protection | Enterprise Edition]).
New Commercial customers may continue to purchase Dell Encryption Personal and Dell Encryption products until September 2, 2022.
Current Commercial Dell Encryption Personal and Dell Encryption Enterprise customers have until January 31, 2023, to:
For more information, reference Dell Encryption End of Sale Important Information.
This section holds a summary of the various product statuses. The section entitled Detailed Status outlines the versions and dates that each product entered its phase, and any commentary for that status.
This section separates products into their specific status, outlining the date that the product entered this status, and the date that the next status will be reached (if known). Select the appropriate status for more information.
Product Name | Release Family | Comments |
---|---|---|
Absolute | * | Absolute is the industry standard for endpoint security and resilience. Through a digital tether embedded in the firmware of Dell devices, Absolute ensures you have persistent line of sight to your endpoints to monitor device health metrics and automate critical security controls, fortifying your fleet’s resilience against today’s varied cyber threats. |
CrowdStrike Falcon | * | CrowdStrike Falcon is a cloud-managed endpoint security solution that provides both Next-Generation Anti-Virus (NGAV) along with endpoint-driven EDR. CrowdStrike is extensible with various services that are available as additional modules that are loaded by the single client-side sensor, with no additional processes or overhead to the endpoint. |
Dell Trusted Device (formerly Dell BIOS Verification) | 3.5 and later | The Trusted Device agent includes BIOS Verification, Image Capture, and BIOS Events and Indicators of Attack. BIOS Verification provides customers with affirmation that devices are secured below the operating system, a place where IT administrator visibility is lacking. |
Netskope | * | The Netskope security cloud provides visibility, real-time data, and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. |
Secureworks Red Cloak Threat Detection and Response | * | Secureworks Threat Detection and Response are a cloud-hosed security intelligence platform that takes feeds from EDR application including the RedCloak Sensor, Carbon Black, CrowdStrike, or other EDR-driven applications and applies additional Secureworks intelligence to help administrators identify and resolve threats within their environment. |
*Third-party product version support by the third-party vendor
Product Name | Release Family | End of Sale | Comments |
---|---|---|---|
Dell BitLocker Manager (formerly Dell Data Protection | BitLocker Manager) | 8.x 10.x 11.x |
January 31, 2023 | Dell Encryption BitLocker Manager (formerly Dell Data Protection | BitLocker Manager) manages both fixed and removable media leveraging Microsoft’s BitLocker encryption on endpoints, centrally managed through a Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) or Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) appliance. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Encryption Full Disk Encryption | 10.x 11.x |
January 31, 2023 | Dell Encryption Full Disk Encryption leverages a proprietary encryption algorithm to seal and encrypt volumes through a centrally managed console that provided by a Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) or Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) appliance. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Encryption Policy Based Encryption (formerly Dell Data Protection | Encryption) | 8.x 10.x 11.x |
January 31, 2023 | Dell Encryption Policy Based Encryption (formerly Dell Data Protection | Encryption) is a policy-driven encryption application that encrypts data at rest, centrally managed through a Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) or Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) appliance. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Encryption Self-Encrypting Drive Manager (formerly Dell Data Protection | Self-Encrypting Drive Manager) | 8.x 10.x 11.x |
January 31, 2023 | Dell Encryption Self-Encrypting Drive Manager (formerly Dell Data Protection | Self-Encrypting Drive Manager) is an endpoint application that provides management for OPAL2 based drives, centrally managed through a Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) or Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) appliance. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Encryption External Media (formerly Dell Data Protection | External Media Encryption) | 8.x 10.x 11.x |
January 31, 2023 | Dell Encryption External Media (formerly Dell Data Protection | External Media Encryption) is a policy-driven encryption application that manages encryption on removable media, centrally managed through a Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) or Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) appliance. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) | 8.x 10.x 11.x |
January 31, 2023 | Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) is a policy-driven encryption application that encrypts data at rest, managed on the same device that is encrypted. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) | 8.x 9.x 10.x 11.x |
January 31, 2023 | Dell Security Management Server (formerly Dell Data Protection | Enterprise Server) is a windows-based application server that manages Dell Data Security (formerly Dell Data Protection) products through a single pane of glass, hosted internally within your network. For more information, reference Dell Encryption End of Sale Important Information. |
Dell Security Management Server Virtual (formerly Dell Data Protection | Enterprise Server Virtual) | 8.x 9.x 10.x 11.x |
January 31, 2023 | Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) is a Linux-based virtual appliance server that manages Dell Data Security (formerly Dell Data Protection) products. For more information, reference Dell Encryption End of Sale Important Information. |
VMware Carbon Black | 3.x 4.x |
April 18, 2024 | VMware Carbon Black is a Next-Generation anti-virus (NGAV) that contains various modules that can be activated to provide endpoint-level EDR, and live threat hunting, threat management, and vulnerability analysis from a single cloud-hosted management console. |
VMware Workspace ONE | * | April 18, 2024 | VMware Workspace ONE is an extensible enterprise platform that provides modules supporting identity management, application packaging, and distribution, along with mobile device management. |
*Third-party product version support by the third-party vendor
Product Name | Release Family | Most Recent Version | Date of Most Recent Version | End of Sale | End of Maintenance | Comments |
---|---|---|---|---|---|---|
Dell Data Protection | Mobile Edition | 8.x | 8.0.0.86 | May 09, 2013 | March 15, 2017 | March 2018 | Dell Data Protection | Mobile Edition leveraged Exchange Active Sync to manage mobile device policy compliance and overall health status. Dell has discontinued this product line. For customers that want to leverage a Mobile Device Management solution, check out our current solutions here: Endpoint Security Solutions. |
Dell Endpoint Security Suite Enterprise | All | 3.4.0 | May 2022 | December 2019 | May 2022 | Dell Endpoint Security Suite Enterprise is a bundle that includes Dell Encryption Enterprise, Advanced Threat Prevention (powered by Cylance), along with Web Protection and Client Firewall (powered by McAfee). This product has been superseded by CrowdStrike Falcon Platform, which is bundled with Dell Encryption Enterprise separately. For more information about CrowdStrike Falcon Platform, reference What is the CrowdStrike Falcon Platform and Endpoint Security Solutions. |
Dell Endpoint Security Suite Pro | All | 1.8.2.5 | October 2017 | October 31, 2017 | January 2019 | Dell Endpoint Security Suite Pro offers signature-based anti-virus capabilities, client-based firewall, and web protection, all provided by McAfee’s Endpoint Security. Client-side firewall and web protection continues on with the Dell Endpoint Security Suite Enterprise application, though the packaging for Dell Endpoint Security Suite Pro with signature based anti-virus is no longer being offered. Netskope supersedes Dell Endpoint Security Suite Pro. For more information about Netskope, reference What is Netskope and Endpoint Security Solutions. |
Dell Threat Defense | All | 2.1.1586 | May 2022 | December 2019 | May 2022 | Dell Threat Defense provides a SaaS managed next generation anti-virus that is powered by Cylance’s proprietary AI-based Anti-Malware Engine. Dell Threat Defense has been superseded by CrowdStrike Falcon Platform. For more information about CrowdStrike Falcon Platform, reference What is the CrowdStrike Falcon Platform and Endpoint Security Solutions. |
Product Name | Release Family | Most Recent Version | Date of Most Recent Version | End of Sale | End of Support | Comments |
---|---|---|---|---|---|---|
Dell Data Guardian | 2.x | 2.8.1381.4 | July 15, 2019 | October 31, 2019 | December 2019 | Dell Data Guardian can encrypt data no matter where it goes. This is done by watching where files are being moved through a storage filter driver. If the file is being moved to a location that causes the data to go to a managed cloud service provider such as OneDrive, Google Drive, or Box, then the file is encrypted based on the current user who is logged in. Keys can then be shared to external users for collaboration on files while they remain encrypted. Data Guardian also enables the ability to protect office documents in a key-per-file format with the ability to add a hidden image file that relays information back about the file’s location, even when Data Guardian is not installed on the device attempting to open a protected document. Netskope supersedes Data Guardian. For more information about Netskope, reference What is Netskope and Endpoint Security Solutions |
Dell Data Protection | Security Tools | 1.x | 1.12.0 | February 02, 2017 | February 02, 2017 | February 01, 2018 | Free application that was bundled with hardware for fingerprint and self-encrypting drive support. Functionality available in Dell Data Protection | Personal Edition for stand-alone users is available in Dell Data Protection | Enterprise Edition for remotely managed use. |
Hardware Encryption Accelerator | 8.x | 8.9.3 | July 26, 2016 | May 31, 2016 | January 2018 | Dell’s Hardware Cryptographic Accelerator was an add-on that Dell offered to enhance the experience with Dell Data Protection | Encryption to allow for Full Volume Encryption on supported drives. This hardware was removed from sale in mid-2016, and all ability to use this product was removed in the 8.10.1 release of Dell Data Protection | Encryption. The Dell Security Management Server has removed policies for this product in its 9.9.2 release. Dell’s software-based Full Disk Encryption was released in 8.16.0 as a replacement to this technology. |
Managed Migration Utility | 8.0 | 8.4.1 | October 14, 2014 | January 2017 | January 2018 | The Managed Migration Utility (formerly known as the Assimilation Utility) was developed to help with the transition of keys and management from locally managed Dell Data Protection | Personal Edition clients to a Dell Data Protection | Encryption Server. This technology has been deprecated due to lack of use. To transition from a locally managed version of the product to a remotely managed version, all encryption applications must be decrypted and uninstalled, then reinstalled in a remotely managed mode to connect to a Dell Server. |
Product Name | Release Family | Most Recent Version | Date of Most Recent Version | End of Sale | End of Life | Comments |
---|---|---|---|---|---|---|
Carbonite Endpoint Protection | * | 10.8 | March 2021 | May 2020 | May 2022 | Carbonite Endpoint Protection provides file-level backup that is housed within Carbonite’s cloud-based data storage. Carbonite leverages endpoint-based encryption and global deduplication that is performed on the client to ensure that data is stored securely and efficiently. |
Credant Mobile Armor | All | 7.5 | December 2013 | 2008 | January 2011 | Legacy Credant Version, End of Support was reached before the Dell acquisition in 2013. Products included:
|
Credant Mobile Guardian | 4.x | 4.4.3027 | November 2006 | 2008 | January 2011 | Legacy Credant version, End of Support before Dell acquisition. Products included:
|
Credant Mobile Guardian | 5.x | 5.4.2.1205 | August 2009 | 2009 | January 2013 | Legacy Credant version, End of Support before Dell acquisition. Products included:
|
Credant Mobile Guardian | 6.x | 6.8.3.4538 | June 2012 | 2012 | January 2018 | Legacy Credant version, End of Support starting 2017 Products included:
|
Credant PROTECTOR | 1.x | 1.1 | July 2009 | 2010 | January 2013 | Legacy Credant Product, End of support before Dell acquisition. Dell Data Protection | External Media Encryption supersedes Credant Protector. |
Dell Data Protection | Cloud Encryption | All | 2.0.2.2683 | July 2016 | May 01, 2017 | May 2018 | Dell Data Protection | Cloud Encryption can encrypt data no matter where it goes. This is done by watching where files are being moved through a storage filter driver. If the file is being moved to a location that causes the data to go to a managed cloud service provider such as OneDrive, Google Drive, or Box, then the file is encrypted based on the current user who is logged in. Keys can then be shared to external users for collaboration on files while they remain encrypted. Dell Data Protection | Secure Lifecycle supersedes Dell Data Protection | Cloud Encryption. |
Dell Data Protection | Encryption | 7.x | April 2017 | N/A | January 2021 | Dell Data Protection | Encryption is a multiproduct solution focusing on data-at-rest encryption using a policy-driven file and folder encryption solution, Self-Encrypting Drive Management, and BitLocker Management. Dell Encryption in version 10.x and later supersedes Dell Data Protection | Encryption. |
|
Dell Data Protection | Endpoint Recovery | 1.1.x | 1.1.0 | March 22, 2016 | October 2016 | October 2017 | Dell Data Protection | Endpoint Recovery was a locally managed local backup solution that offered a Free and a Premium back-up experience. This product has been set to End of Life. Mozy Backup and Mozy Sync supersede Dell Data Protection | Endpoint Recovery. |
Dell Data Protection | Protected Workspace | All | 6.2.6 | August 2017 | August 28, 2017 | January 2018 | Dell Data Protection | Protected Workspace offers a sandbox for Microsoft Office applications and popular web browsers, such as Mozilla Firefox and Google Chrome, to ensure that threats that attempt to enter the environment from the web or from Office applications are stopped in their tracks. |
Dell Data Protection | Secure Lifecycle | All | 1.1.358.4 | July 2017 | November 2017 | November 2018 | Dell Data Protection | Secure Lifecycle can encrypt data no matter where it goes. This is done by watching where files are being moved through a storage filter driver. If the file is being moved to a location that causes the data to go to a managed cloud service provider such as OneDrive, Google Drive, or Box, then the file is encrypted based on the current user who is logged in. Keys can then be shared to external users for collaboration on files while they remain encrypted. Dell Data Protection | Secure Lifecycle builds on Dell Data Protection | Cloud Encryption by also allowing the ability to protect office documents in a key-per-file format with the ability to add a hidden image file that relays information back about the file’s location, even when Dell Data Protection | Secure Lifecycle is not installed on the device attempting to open a protected document. Dell Data Guardian supersedes Dell Data Protection | Secure Lifecycle. |
Dell Data Protection | Security Tools Mobile | 1.x | 1.5.5 | May 09, 2013 | April 15, 2017 | April 2018 | Dell Data Protection | Security Tools Mobile allows an administrator to give local users a login with a software-based one-time password, or to allow this one-time password to be used for password recovery. Superseded by RSA's SecurID application. |
Dell Encryption Mac | All | 10.9.0 | December 2020 | January 2021 | November 2022 | Dell Encryption Mac has reached its End of Life with Apple’s End of Support for Catalina - the last supported macOS for Dell Encryption Mac. Encryption Management for FileVault2 has been superseded by VMware Workspace ONE. For more information about Workspace ONE, reference What is Workspace ONE? or reference Endpoint Security Solutions. |
Dell Security Center | N/A | N/A | November 2019 | August 2019 | September 2019 | Dell Security Center is a SaaS platform for managing Dell Data Security’s Data Guardian platform, including encryption of data-in-motion, data classification, and data tracking. Dell Data Guardian, and its Dell Security Center SaaS Management Platform were sunset in Late 2019. |
Mozy Backup by Dell | * | 2.28.2.674 (Windows) 2.17.3.1672 (Mac) |
October 17, 2018 (Windows) March 27, 2019 (Mac) |
May 2019 | January 08, 2020 | Mozy by Dell is a cloud (SaaS) data protection service that automatically backs up your files for Windows and Mac platforms. Customers who have contracts that extend past January 8, 2020 and are interested in transitioning to Carbonite Endpoint can contact their Dell account team or email mozytransitionmailbox@dell.com if an account team has not been assigned. Customers who contract for Mozy by Dell ends before January 8, 2020, must purchase Carbonite licenses to gain access to the Carbonite Endpoint application. Carbonite Endpoint can be purchased on-the-box for select Dell business computers or by contacting Dell Endpoint Security sales. For more information, reference Endpoint Security Solutions. Carbonite EndPoint Protection supersedes Mozy Backup by Dell. |
Mozy Sync by Dell | * | 1.4.1.5086 (Windows) 1.3.5.5071 (Mac) |
September 20, 2018 (Windows) February 25, 2018 (Mac) |
May 2019 | January 08, 2020 | Mozy by Dell is a cloud (SaaS) data protection service that automatically backs up your files for Windows and Mac platforms. Customers who have contracts that extend past January 8, 2020 and are interested in transitioning to Carbonite Endpoint can contact their Dell account team or email mozytransitionmailbox@dell.com if an account team has not been assigned. Customers who contract for Mozy by Dell ends before January 8, 2020, must purchase Carbonite licenses to gain access to the Carbonite Endpoint application. Carbonite Endpoint can be purchased on-the-box for select Dell business computers or by contacting Dell Endpoint Security sales. For more information, reference Endpoint Security Solutions. Carbonite EndPoint Protection supersedes Mozy Backup by Dell. |
Dell Protected Workspace | * | 6.2.8 | November 15, 2017 | March 2016 | January 2018 | Dell Protected Workspace is a client-side sandboxing software, protecting against threats by isolating threat vectors like web browsers and Microsoft Office applications into a container to prevent the escape of any malicious software. Sophos purchased Invincea in February of 2017, and Dell Protected Workspace’s technology was consumed into Sophos X, retiring the legacy Dell Protected Workspace product. |
*Third-party product version support by the third-party vendor
Operating system support does not extend past the final supported version. For information about when the supported Dell Data Security product version has been set to End of Life, reference the Dell Data Security (formerly Dell Data Protection) Software section above.
Dell customers with active support contracts can still contact Dell and receive best effort support to resolve issues regarding current Dell products on no-longer supported operating systems.
Product Name | Final Supported Version | Date of Final Supported Version | Comments |
---|---|---|---|
Windows XP | 8.5.0.7092 | March 2015 | Support deprecated due to .NET compatibility with current operating systems. Microsoft’s End of Life information: Windows XP - Microsoft Lifecycle |
Windows 7 | 11.5.0.4, A49 | January 2023 | Support deprecated due to Microsoft’s End of Life of Windows 7 based on the information here: Windows 7 - Microsoft Lifecycle |
Windows 8 | 11.5.0.4, A49 | January 2023 | Support deprecated due to Microsoft’s End of Life of Windows 8 based on the information here: Windows 8 - Microsoft Lifecycle |
Windows 8.1 | 11.5.0.4, A49 | January 2023 | Support deprecated due to Microsoft’s End of Life of Windows 8.1 based on the information here: Windows 8.1 - Microsoft Lifecycle |
Windows 10 | Varies | Varies | Dell is adhering to the timelines of support for the various Windows 10 feature updates based on the Microsoft Windows 10 life cycle. More information about this life cycle, including End of Life dates for operating systems, is available here: Lifecycle FAQ - Windows |
Windows Server 2008 | Dell Security Management Server 9.9.2 | November 2017 | Support deprecated due to Microsoft’s End of Life of Server 2008 based on the information here: Windows Server 2008 - Microsoft Lifecycle |
Windows Server 2008 R2 | Dell Security Management Server 9.11 | April 2018 | Support deprecated due to Microsoft’s End of Life of Server 2008 R2 based on the information here: Windows Server 2008 R2 - Microsoft Lifecycle |
Specific SQL version support does not extend past the final supported version. For information about when the supported Dell Data Security product version has been set to End of Life, reference the Dell Data Security (formerly Dell Data Protection) Software section above.
Product Name | Final Supported Version | Date of Final Supported Version | Comments |
---|---|---|---|
Microsoft SQL Server 2005 | 8.1.0 | February 2014 | Support deprecated due to changes in the Dell Data Protection code and to align with Microsoft’s End of Life: Search Product and Services Lifecycle Information for SQL Server 2005 |
Microsoft SQL Server 2008 | 9.9.2 | November 2017 | Support deprecated to align with Microsoft’s End of Life: Search Product and Services Lifecycle Information for SQL Server 2008 |
Microsoft SQL Server 2008 R2 | 9.11 | April 2018 | Support deprecated to align with Microsoft’s End of Life: Search Product and Services Lifecycle Information for SQL Server 2008 R2 |
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.