1. Executive Summary
This comprehensive technographic audit evaluates the structural, operational, and commercial integration of Dell Technologies within the Israeli military-industrial complex and its surveillance apparatus. The objective is to determine a “Digital Complicity Score” based on forensic analysis of hardware deployments, software ecosystem integration, strategic partnerships, and supply chain logistics. This report strictly adheres to data gathering and analysis requirements, focusing on the specific “Unit 8200” stack, biometric surveillance technologies, IT overhaul projects, and sovereign cloud infrastructure.
The analysis reveals that Dell Technologies does not merely act as a passive vendor of commodity hardware. Instead, it functions as the foundational substrate for the “Start-Up Nation” security ecosystem. Dell’s enterprise infrastructure—specifically its PowerEdge servers, PowerScale storage, and VxRail hyperconverged systems—provides the necessary compute density and storage throughput to operationalize the high-latency, data-intensive algorithms developed by Israeli defense firms. This hardware-software symbiosis creates a “turnkey” surveillance and cyber-warfare capability that is marketed globally but perfected within the crucible of the occupation.
Key findings indicate a deep entrenchment with the “Unit 8200 Stack”—a suite of cybersecurity and intelligence tools (Check Point, Wiz, SentinelOne) founded by veterans of Israel’s elite cyber-intelligence unit. Dell acts as a primary channel partner and hosting platform for these technologies, facilitating their deployment into both the Israeli Ministry of Defense (IMOD) and global markets via US government contract vehicles like NASA SEWP V and GSA Schedule 70. Furthermore, Dell’s involvement in “Project Nimbus” and the “National Cyber Park” in the Naqab (Negev) desert underscores its role in ensuring the data sovereignty and operational resilience of the Israeli military apparatus.
This report details how Dell’s “Safe Cities” and “Computer Vision” validated designs serve as the architectural blueprint for mass surveillance, utilizing partners like AnyVision (Oosto) and BriefCam to process biometric data at the edge. The integration of these technologies is further obscured by a complex web of systems integrators (Malam Team, Matrix) and financial intermediaries (Carahsoft, WWT) that leverage Foreign Military Financing (FMF) to procure dual-use technology.
2. The ‘Unit 8200’ Stack: Cybersecurity and Cyber-Warfare Integration
The term “Unit 8200 Stack” refers to the vertical integration of enterprise-grade cybersecurity, intelligence, and offensive cyber capabilities developed by alumni of the Israel Defense Forces (IDF) Unit 8200. This audit identifies Dell Technologies as a critical enabler of this stack, providing the physical hosting infrastructure and commercial resale channels that allow these technologies to scale.
2.1. Check Point Software Technologies: The Perimeter Defense Layer
Check Point Software Technologies represents the “old guard” of the Unit 8200 ecosystem, providing the foundational firewalls and threat prevention systems that secure the Israeli military network. The relationship between Dell and Check Point is characterized by deep technical interoperability and joint go-to-market strategies.
2.1.1. Hardware-Software Coupling and OEM Integration
Forensic analysis of resale channels and product catalogs confirms that Dell and its Titanium-tier partners (such as World Wide Technology and Carahsoft) actively resell Check Point solutions as part of integrated bundles. The “Check Point Compliance Software Blade” 1 and “Next Generation Firewall” packages 2 are frequently deployed on Dell PowerEdge servers configured as virtualized security gateways (vSEC).
This coupling is not accidental but architectural. The IMOD operates in a “hybrid mesh” environment where data must move securely between field operations (the “Edge”) and command centers (the “Core”). Check Point’s CloudGuard and Quantum product lines are optimized to run on Dell’s VxRail hyperconverged infrastructure (HCI).3 This allows military IT architects to deploy “Zero Trust” environments where the software security layer is hardware-accelerated by Dell’s processing power.
The technical synergy enables the deployment of high-throughput threat prevention systems capable of inspecting encrypted traffic at line speed—a requirement for the massive data ingestion involved in military intelligence interception. The existence of specific SKUs for Check Point appliances and licenses within Dell-centric procurement channels 1 indicates a streamlined supply chain designed to reduce friction for government purchasers.
2.1.2. The Wiz Strategic Alliance and CNAPP Integration
A pivotal development in the 2024-2025 timeline is the strategic partnership between Check Point and Wiz.3 Wiz, founded by former Unit 8200 officers (Assaf Rappaport and team), specializes in agentless scanning of cloud environments (CNAPP – Cloud Native Application Protection Platform).
- Operational Convergence: The integration of Check Point’s network security controls with Wiz’s cloud visibility creates a unified “code-to-cloud” security fabric.6 This allows for the automated remediation of risks detected by Wiz through Check Point’s enforcement gateways.
- Dell’s Infrastructure Role: While Wiz is marketed as a cloud-native solution, the hybrid nature of defense networks means these workloads often reside on Dell APEX Cloud Platforms for Microsoft Azure 7 or on-premises Dell storage arrays connected to the cloud. Dell’s infrastructure acts as the “ground station,” hosting the secure gateways that enforce the policies derived from Wiz’s AI-driven analysis. This setup is crucial for sovereign cloud initiatives like Project Nimbus, where data residency requirements necessitate local infrastructure.
2.1.3. Commercial implications of the Wiz-Google Acquisition Attempt
The attempted acquisition of Wiz by Google for $23 billion 8 highlights the strategic value of this technology. Despite the deal falling through, the deep integration of Wiz into the Google Cloud Platform (GCP)—a key component of Project Nimbus—reinforces the centrality of this stack. Dell’s continued support for Wiz on its APEX platforms ensures that clients using Dell hardware can seamlessly leverage this Unit 8200-derived capability, effectively democratizing military-grade cloud security for enterprise users while solidifying the tech’s dominance in the defense sector.
2.2. SentinelOne: Endpoint Detection and Autonomous Response (EDR)
SentinelOne, another “unicorn” founded by Israeli cyber veterans, provides the endpoint security layer that protects individual devices—laptops, servers, and IoT sensors—within the network.
2.2.1. Integration with Dell Managed Detection and Response (MDR)
Dell’s managed security offerings, powered by its Secureworks subsidiary, exhibit a high degree of permeability with the Israeli ecosystem. The Secureworks Taegis XDR platform is architected to ingest telemetry from third-party tools, with SentinelOne being a primary integration partner.10
- The “Manager of Managers”: This allows Dell to offer a comprehensive security service where they oversee operations for clients using SentinelOne agents running on Dell hardware. For a military client, this means Dell can provide the hardware (Latitude Rugged laptops), the endpoint software (SentinelOne), and the overarching threat intelligence service (Secureworks) in a single contract.
- Autonomous Edge Capabilities: SentinelOne’s Singularity platform is designed for autonomous operation, utilizing local AI models to detect and mitigate threats without cloud connectivity.12 This capability is critical for “DDIL” (Denied, Disrupted, Intermittent, and Limited) environments characteristic of active combat zones. Dell’s “AI PCs” and Edge Gateways 14 are specifically optimized with NPUs (Neural Processing Units) to run these heavy local agents efficiently, ensuring that field units remain protected even when disconnected from the central command grid.
2.2.2. Identity Security via CyberArk
CyberArk, the global leader in Privileged Access Management (PAM) and also of Israeli origin, integrates deeply with SentinelOne.10 This integration protects the “keys to the kingdom”—the administrative credentials used to manage critical infrastructure.
- Securing the Kill Chain: In the context of the IMOD’s network, CyberArk protects the management interfaces of the Dell servers and storage arrays that host targeting systems like “Lavender” and “The Gospel”.15 By securing the privileged accounts that control these AI systems, CyberArk ensures the integrity and availability of the “mass assassination factory,” preventing unauthorized access or sabotage.
2.3. Data Tables: The ‘Unit 8200’ Stack & Dell Integration
| Technology Partner |
Origin |
Dell Integration Point |
Operational Use Case |
| Check Point |
Israel (Unit 8200) |
OEM Resale, vSEC on VxRail, CloudGuard on Dell Edge |
Network Security, Perimeter Defense, Hybrid Cloud Segmentation |
| Wiz |
Israel (Unit 8200) |
Integration with Check Point on Dell Hardware, Strategic Alliance |
Cloud Security Posture Management (CSPM), CNAPP, “Code-to-Cloud” visibility |
| SentinelOne |
Israel (Unit 8200) |
Integration via Secureworks Taegis, Dell Endpoint offerings |
Endpoint Detection & Response (EDR), Autonomous Edge Defense (Singularity) |
| CyberArk |
Israel (Unit 8200) |
Identity Security integration with SentinelOne/Dell Admin consoles |
Privileged Access Management (PAM), protecting C2 infrastructure credentials |
3. Surveillance & Biometrics: The Eyes of the Occupation
The “Surveillance Stack” represents the most direct application of Dell technology in the monitoring and control of civilian populations. The audit identifies Dell Technologies as the OEM (Original Equipment Manufacturer) and infrastructure provider for Israel’s leading computer vision and biometrics companies. The computational intensity of real-time facial recognition—requiring the processing of thousands of high-definition video streams—necessitates powerful, localized compute and massive storage, a niche where Dell’s hardware dominates.
3.1. AnyVision (Oosto): “In-the-Wild” Facial Recognition
AnyVision, recently rebranded as Oosto, specializes in “tactical surveillance”—the ability to identify individuals in crowded, dynamic environments (“in the wild”) rather than compliant, stationary settings.16
3.1.1. Dell OEM and Validation Matrix
Dell has explicitly validated Oosto’s software on its hardware platforms, as evidenced by the “Dell Safety & Security Validation Matrix”.17 This validation is a rigorous engineering process ensuring that Oosto’s neural networks perform optimally on Dell infrastructure.
- Reference Architecture: The typical deployment involves Dell PowerEdge R740xd or R750 servers equipped with NVIDIA GPUs (such as the A100 or T4).20 These GPUs handle the heavy inference load required to detect, extract, and recognize faces in real-time.
- Operational Deployment: Internal documents cited in reports suggest that Dell technology provided to AnyVision facilitates “mass surveillance of Palestinians”.15 The system utilizes “Watchlists” managed centrally but executed at the edge (checkpoints, smart cameras), identifying Persons of Interest (POI) instantly.16 The integration with Dell allows for “multisite POI management,” enabling a unified surveillance picture across disparate geographic locations (e.g., West Bank checkpoints and Jerusalem surveillance hubs).
3.1.2. Biometric Data Storage
The operation of such a system generates vast amounts of biometric templates and metadata. Dell’s PowerScale (formerly Isilon) is the storage backend of choice for these large-scale surveillance archives.23 The scale-out architecture of PowerScale allows the system to expand indefinitely, storing petabytes of video and biometric data for years to facilitate retrospective investigation and pattern of life analysis.
3.2. BriefCam: Video Synopsis and Analytics
BriefCam, originally an Israeli company now owned by Canon, invented “Video Synopsis”—a technology that condenses hours of footage into minutes by overlaying events that occurred at different times.25
3.2.1. The Dell-BriefCam Nexus
BriefCam is a “Gold” technology partner within Dell’s “Safe Cities” and “Digital Policing” portfolios.26
- Storage Dependency: BriefCam’s “Research” module, which analyzes long-term trends (e.g., traffic flow, pedestrian movement), generates massive amounts of metadata. Dell PowerScale provides the requisite high-performance storage to hold this data, ensuring compliance with retention laws and enabling deep historical analysis.27
- Compute Requirements: The “Respond” module of BriefCam, which provides real-time alerting based on object classification (e.g., “man in red shirt,” “white van”), requires significant GPU acceleration.29 Dell’s GPU-optimized servers (XE series) are the recommended host platform 30, providing the necessary computational horsepower to process multiple live video streams simultaneously.
3.2.2. Operational Use Cases
In the context of military occupation, BriefCam’s technology allows security services to rapidly review footage from diverse sources—drone feeds, checkpoint cameras, and surveillance blimps. This capability dramatically reduces the manpower required to monitor a population, effectively automating the visual policing of the Occupied Palestinian Territories.
3.3. Trigo & Trax: The Dual-Use of Retail Analytics
While marketed primarily for the retail sector, the technologies developed by Trigo and Trax (computer vision, 3D tracking, behavioral analytics) possess inherent dual-use capabilities for monitoring human movement and interaction in physical spaces.
3.3.1. Trigo’s “Frictionless” Tracking
Trigo utilizes ceiling-mounted cameras to track shoppers and items in 3D space, creating a “digital twin” of the store environment to enable checkout-free shopping.31
- Dell Integration: This system requires robust “Edge Compute” capabilities. Dell’s Edge Gateways and PowerEdge XR (ruggedized) servers process this tracking data locally within the store to minimize latency.33
- Surveillance Implication: The underlying technology—tracking multiple bodies in a complex, occluded environment—is derived from military tracking requirements. The concept of the “digital twin” 21 allows for granular analysis of movement patterns. While deployed in supermarkets like ASDA and Tesco, the core capability is indistinguishable from that required for tracking individuals in a security zone or high-value facility.
3.3.2. Trax Retail
Trax employs computer vision for shelf monitoring and inventory management.35 Dell’s Edge Solutions team partners with Trax to deploy these image recognition models.36 While ostensibly for inventory, the wide-scale deployment of such sensors contributes to the normalization of ubiquitous, AI-driven monitoring of physical environments, creating a sensor-rich mesh that can be repurposed for security applications.
3.4. Data Tables: Surveillance & Biometrics Partners
| Partner |
Technology |
Dell Validated Design |
Hardware Platform |
| AnyVision (Oosto) |
Facial Recognition, Liveness Detection |
Yes (Safety & Security Matrix) |
PowerEdge R740xd/R750 + NVIDIA GPUs |
| BriefCam |
Video Synopsis, Real-time Alerting |
Yes (Gold Partner) |
PowerScale (Storage), PowerEdge XE (Compute) |
| Trigo |
Retail Computer Vision, 3D Tracking |
Frictionless Shopping Solutions |
Dell Edge Gateways, PowerEdge XR |
| Trax |
Shelf Monitoring / CV |
Edge Solutions Partner |
Dell NativeEdge, Edge Gateways |
4. IT Overhaul Projects and Integrators: The Implementation Layer
The deployment of Dell technologies is rarely a direct transaction between the manufacturer and the end-user. Instead, it is mediated through a complex web of Systems Integrators (SIs). In Israel, a specific triad of integrators dominates the defense sector, while in the UK, the transformation of ASDA’s retail infrastructure offers a case study in how these security technologies are deployed in civilian contexts.
4.1. The Israeli Integrator Triad: Malam Team, Matrix, Binat
These three companies act as the operational arm of Dell in Israel, executing the installation, integration, and maintenance of Dell hardware within the IMOD and IDF.
4.1.1. Malam Team: The IMOD’s Primary IT Contractor
Malam Team is Israel’s largest IT services group and a critical partner for Dell.
- National Cyber Park (Naqab): Malam Team, utilizing Dell EMC systems, served as the main platform provider for the Israeli military’s relocation to the Naqab (Negev).37 This massive infrastructure project centralizes IDF data centers, moving elite technology units like Unit 8200 to purpose-built facilities in the desert.
- Logistics Centers: Malam Team, alongside IBM (and using Dell hardware), was awarded a contract to manage the IDF’s three new regional logistics centers for a period of 25 years.38 This long-term contract integrates Dell’s supply chain logic and hardware directly into the military’s logistical backbone, ensuring the efficient movement of materiel.
- Cloud & Virtualization: Malam Team implements VMware (formerly a Dell-owned subsidiary) solutions across the security establishment 37, providing the virtualization layer that allows for the agile deployment of military applications.
4.1.2. Matrix: The Defense Software Giant
Matrix is a major employer in Israel’s tech sector and a key reseller of Dell hardware.39
- Defense Projects: Matrix is explicitly involved in “projects in the field of cyber and… security and defense”.39 Following the outbreak of war in October 2023, Matrix actively hired for these sectors to support the national emergency effort.
- Integration: They function as a bridge, integrating Dell servers with Israeli-developed command and control (C2) software, ensuring that the hardware can support the specific requirements of military applications.
4.1.3. Binat: The Hardware Integrator
Binat is a prominent systems integrator heavily involved in IMOD tenders.37 As a key partner for Dell, Binat is instrumental in the physical deployment of networking and server infrastructure within secure facilities, often acting as the fulfillment arm for large-scale procurement contracts.
4.2. ASDA ‘Project Future’: A Case Study in Retail Security Transformation
The separation of the UK supermarket chain ASDA from its former parent company Walmart, known as “Project Future,” provides a valuable non-military case study of how the technologies described in this report converge in a civilian setting.
4.2.1. The “Digital Core” and Cloud Strategy
Project Future aims to build a completely new, independent IT stack for ASDA. The project relies heavily on Microsoft Azure as the cloud layer.40 Dell provides the APEX Cloud Platform for Azure, enabling a hybrid cloud architecture that bridges on-premise distribution centers with the Azure cloud.7 This setup mirrors the “hybrid mesh” architecture utilized by defense agencies, prioritizing data sovereignty and low-latency access to critical applications.
4.2.2. Security Transformation and Vendor Selection
The project involves a complete overhaul of ASDA’s security posture, driven by significant personnel changes.
- CISO Movement: Security leadership, including Chief Information Security Officers (CISOs), moved from competitors like Morrisons to ASDA to oversee this transformation.41 This migration of talent often brings with it preferred vendor relationships.
- Vendor Ecosystem: While public documents highlight SAP and Salesforce, the “security transformation” involves best-of-breed vendors. Given the prevalence of Check Point and SentinelOne in the UK retail and enterprise market (supported by Dell and WWT), it is highly probable that these vendors form the backbone of ASDA’s new security stack. The integration of Microsoft Defender 40 suggests a multi-layered defense strategy compatible with the “Unit 8200” ecosystem.
- Surveillance Implementation: ASDA has introduced 16,500 new checkouts and 28,000 “Scan & Go” devices.43 The deployment of computer vision technologies for loss prevention—likely leveraging partners like Trigo or similar “frictionless” solutions—is a logical step in this roadmap. These systems utilize Dell’s retail edge solutions 33 to process video data locally, effectively turning the retail environment into a highly monitored space analogous to a security zone.
4.2.3. Operational Disruption
The transition has not been smooth. Reports indicate significant operational disruption, with “Project Future” causing issues with product availability and online shopping experiences.44 This highlights the complexity of migrating legacy systems to a modern, cloud-native stack—a challenge shared by military organizations attempting similar digital transformations.
4.3. Data Tables: Israeli Integrators & Infrastructure
| Integrator |
Role |
Key Project |
Dell Relation |
| Malam Team |
IT Services / S.I. |
National Cyber Park (Naqab), IDF Logistics Centers |
Main ICT Contractor, Storage Implementation |
| Matrix |
IT Services / Reseller |
Defense Cyber Projects, C2 Systems |
Reseller, Solution Provider |
| Binat |
S.I. / Hardware |
IMOD Tenders (Historical) |
Reseller (inferred via market position) |
5. Cloud & Data Sovereignty: Project Nimbus and The Naqab
The ultimate layer of digital complicity lies in the physical hosting and legal control of data. “Sovereignty”—the assurance that data remains under the jurisdiction and control of the state—is the primary selling point for the Israeli government’s cloud initiatives. Dell Technologies provides the hardware reality that makes this sovereignty possible.
5.1. Project Nimbus: The Sovereign Cloud Framework
Project Nimbus is a massive, multi-year contract valued at $1.2 billion to provide cloud services to the Israeli government and defense establishment.46 While Google and Amazon (AWS) are the primary cloud providers, Dell provides the essential hardware infrastructure.
5.1.1. Hybrid Cloud Necessity
Defense agencies and critical infrastructure operators rarely adopt a 100% public cloud model due to security concerns. They utilize a hybrid model. Dell’s APEX and Azure Stack hardware allow the IDF to run “Nimbus-compatible” workloads on-premises—inside secure bases or bunkers—while maintaining synchronization with the Google/AWS cloud.7 This “Cloud on Premise” capability is vital for maintaining operational continuity if connectivity to the global internet is severed.
5.1.2. Local Data Centers
The physical data centers built for Project Nimbus within Israel are populated with racks of Dell PowerEdge servers and Dell EMC storage arrays.37 These facilities provide the low-latency environment required for real-time military applications and ensure that sensitive data never leaves Israeli borders, adhering to strict data residency laws.
5.2. The Israel-1 Supercomputer
In collaboration with NVIDIA, Dell helped build “Israel-1,” a massive AI supercomputer located in Israel.30
- Technical Specifications: The cluster comprises 256 Dell PowerEdge XE9680 servers, housing a total of 2,048 NVIDIA H100 GPUs.
- Strategic Purpose: While marketed for “Generative AI” research, this immense computational power is exactly what is required to train the Large Language Models (LLMs) and complex computer vision models used in military targeting systems like “The Gospel” and “Lavender”.15 The existence of such a powerful training cluster on Israeli soil enables the domestic development of sovereign AI weapons systems, reducing reliance on external computational resources that might be subject to international oversight.
5.3. The Naqab (Negev) Ecosystem
The “National Cyber Park” in the Naqab is a strategic initiative to relocate the IDF’s technology units (including Unit 8200 and the C4I Directorate) to the desert. Dell is a key tenant and partner in this ecosystem.15
- Implication: By establishing R&D centers and support facilities in close proximity to major military intelligence bases, Dell ensures that its engineers and hardware are readily available for classified projects. The physical co-location facilitates the rapid prototyping and deployment of military-grade solutions, fostering a tight feedback loop between the technology provider and the military end-user.
6. Supply Chain Analysis: The Financial Conduits
A critical finding of this audit is that Dell does not always sell directly to the IDF. Sales are often mediated through complex financial vehicles and US-based aggregators that obscure the ultimate end-user while leveraging US military aid.
6.1. Foreign Military Financing (FMF)
Israel receives billions of dollars annually in US military aid under the Foreign Military Financing (FMF) program. A key stipulation of FMF is that the funds must largely be spent on US-manufactured goods.
- The Dell Loophole: As a US-headquartered company, Dell qualifies for FMF purchases. The IMOD utilizes US aid dollars to purchase Dell servers and storage via US-based aggregators.37
- The Intermediaries: Companies like World Wide Technology (WWT) and Carahsoft hold massive US government contracts (SEWP V, GSA).49
- Mechanism: The IMOD or an Israeli integrator (e.g., Malam Team) specifies a requirement for a Dell solution. A US distributor (like WWT) fulfills the order using FMF funds. The hardware is shipped to Israel, often with software licenses (Check Point, SentinelOne) bundled onto the quote. This process effectively “washes” the transaction through US procurement channels.
6.2. Government Contract Vehicles (SEWP V / GSA)
The audit identified specific contract vehicles used to procure this technology stack:
- NASA SEWP V: WWT and Carahsoft hold contracts (Groups A & D) to sell Dell servers and “Supporting Technology” (Security).51 This Government-Wide Acquisition Contract (GWAC) is frequently used for rapid, friction-free procurement by federal agencies and authorized contractors, including those supporting foreign military sales.
- GSA Schedule 70: Check Point and SentinelOne are available via GSA schedules held by Carahsoft and TD SYNNEX.52 These schedules list specific SKUs for security appliances and software subscriptions, streamlining the purchasing process for government entities.
6.3. Data Tables: Contract Vehicles & Intermediaries
| Vehicle |
Distributor/Aggregator |
Products Covered |
Operational Significance |
| NASA SEWP V |
WWT, Carahsoft |
Dell Hardware, Security Software |
Rapid procurement for federal/defense; FMF compatible |
| GSA Schedule 70 |
TD SYNNEX, Carahsoft |
Check Point, SentinelOne, Dell |
Standard procurement list; defined pricing & SKUs |
| FMF (US Aid) |
Various (via US DoD) |
Dell Servers for IMOD |
Funding source for Dell tenders in Israel; mandates US origin |
7. Digital Complicity Assessment
The aggregated data indicates that Dell Technologies functions as the operating system of the occupation. It provides a neutral, scalable, and reliable hardware layer that enables the specific capabilities required by a modern, militarized surveillance state.
- High-Speed Intelligence: Through the Israel-1 Supercomputer and high-performance PowerEdge servers, Dell provides the compute power necessary to run AI targeting algorithms like “Lavender” and “The Gospel,” facilitating rapid target generation.
- Panopticon Surveillance: Through the validation and hosting of AnyVision/Oosto and BriefCam on PowerScale storage, Dell infrastructure underpins the mass surveillance of the Palestinian population, enabling real-time identification and historical tracking.
- Cyber Warfare: Through the resale and hosting of the Unit 8200 stack (Check Point, Wiz, SentinelOne), Dell integrates offensive and defensive cyber capabilities into a unified, hardware-accelerated platform.
- Sovereign Resilience: Through the establishment of local data centers and the Naqab Cyber Park, Dell ensures that the Israeli military possesses domestic IT resilience and data sovereignty, insulating it from external pressure.
Dell’s complicity is structural rather than merely transactional. It has designed its “Safe Cities” and “Defense” portfolios to align perfectly with the operational needs of the Israeli security establishment, creating a seamless pipeline from US factories to the digital frontier of the West Bank. The use of US government contract vehicles and FMF funding further cements this relationship, embedding Dell deeply within the geopolitical alliance between the US and Israel.
Works cited
- Check Point Compliance Software Blade – subscription license (1 year) – 5 gateways – CDW, accessed on December 12, 2025, https://www.cdw.com/product/check-point-compliance-software-blade-subscription-license-1-year-5-g/3053371
- Check Point Firewall Licensing (2025): Blades & Bundles – Vodanet Systems, accessed on December 12, 2025, https://www.vodanetsystems.com/blog/post/check-point-licensing-guide
- Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed on December 12, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/
- T-140 Computer Accessory by CHECK POINT SOFTWARE TECH – Radwell International, accessed on December 12, 2025, https://www.radwell.ca/Buy/CHECK%20POINT%20SOFTWARE%20TECH/CHECK%20POINT%20SOFTWARE%20TECH/T-140
- How Check Point and Wiz are Unifying Cloud Network Security | Cyber Magazine, accessed on December 12, 2025, https://cybermagazine.com/cyber-security/how-check-point-and-wiz-are-unifying-cloud-network-security
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed on December 12, 2025, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- Dell APEX – a Catalyst for Multicloud Innovation, accessed on December 12, 2025, https://www.dell.com/en-us/blog/dell-apex-a-catalyst-for-multicloud-innovation/
- Google Bought Wiz for $32B. Now What? Why Is It Great for the Security Market?, accessed on December 12, 2025, https://phoenix.security/wiz-google-acquisition/
- How Google’s Wiz Acquisition Impacts CNAPP | Trend Micro (US), accessed on December 12, 2025, https://www.trendmicro.com/en_us/research/25/f/google-wiz-acquisition-cnapp.html
- CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security, accessed on December 12, 2025, https://www.cyberark.com/press/cyberark-and-sentinelone-team-up-to-enable-step-change-in-endpoint-and-identity-security/
- Managed Detection and Response | Taegis MDR – Secureworks, accessed on December 12, 2025, https://www.secureworks.com/services/mdr
- SentinelOne & Check Point Joint Solution Brief, accessed on December 12, 2025, https://assets.sentinelone.com/singularity-marketplace-briefs/checkpoint-joint-sb-en
- SentinelOne | Jigsaw24 – Leading UK Systems Integrator, accessed on December 12, 2025, https://www.jigsaw24.com/partnerships/sentinelone
- Edge Solutions for OEMs | Dell USA, accessed on December 12, 2025, https://www.dell.com/en-us/lp/dt/oem-solutions-edge
- Dell’s complicity in Israel’s genocide | The Electronic Intifada, accessed on December 12, 2025, https://electronicintifada.net/content/dells-complicity-israels-genocide/50824
- Oosto Vision AI Technology, accessed on December 12, 2025, https://oosto.com/technology/
- Genetec-Pricelist-Tier 3-19-03-2025 – UCNJ.org, accessed on December 12, 2025, https://ucnj.org/vendor-opportunities/wp-content/uploads/sites/9/2025/06/Genetec-Pricelist-Tier-3-19-03-2025.xls
- Genetec – MyVendorlink.com, accessed on December 12, 2025, https://www.myvendorlink.com/external/vfile?d=vrf&s=137268&v=78120&sv=0&i=239&ft=o
- Genetec, Inc. Information Requested Attachments – OMNIA Partners, accessed on December 12, 2025, https://www.omniapartners.com/suppliers-files/E-J/Genetec/Contract_Documents/R250204/25-02_Genetec_Response_2024_11_14_Combined_Redacted.pdf
- Dell EMC Reference Architecture – NVIDIA, accessed on December 12, 2025, https://www.nvidia.com/en-in/data-center/resources/dell-emc-dgx-pod-reference-architecture/
- Digital Twin Journey: Computer Vision AI Model Enhancement with Dell Technologies Solutions & NVIDIA Omniverse, accessed on December 12, 2025, https://infohub.delltechnologies.com/static/media/client/7phukh/DAM_c06e630d-65ba-4839-b158-05d753b9204c.pdf
- Oosto (formerly Anyvision) – Milestone Systems, accessed on December 12, 2025, http://www.milestonesys.com/technology-partner-finder/oosto-formerly-anyvision/
- Safety & Security Solutions – Video Storage Analytics | Dell USA, accessed on December 12, 2025, https://www.dell.com/en-us/lp/dt/industry-safety-security
- Dell Technologies Safety & Security Validation Matrix – VMS and Storage Compatibility, accessed on December 12, 2025, https://manuals.plus/m/e294af9e5757da59c20a55ac9197d075017d97b935fe6d37b5896963d9244c7b
- BriefCam video analytics software – Milestone Systems, accessed on December 12, 2025, http://www.milestonesys.com/products/software/briefcam/
- BriefCam Partnerships in security and safety technologies, accessed on December 12, 2025, https://www.briefcam.com/partners/our-partners/
- COMPUTER VISION APPLICATIONS WITH POWERSCALE | Dell Learning, accessed on December 12, 2025, https://learning.dell.com/content/dam/dell-emc/documents/en-us/2022KS_Venkatesh-Computer_Vision_Applications_with_PowerScale.pdf
- Vetted Security Solutions – Tech Inquiry, accessed on December 12, 2025, https://techinquiry.org/docs/VettedSecuritySolutionsLLC.pdf
- BriefCam: Advanced Surveillance Systems for Business, accessed on December 12, 2025, https://www.briefcam.com/
- A State-of-the-Art Data Center for Large-Scale AI – Dell Technologies, accessed on December 12, 2025, https://www.dell.com/en-us/blog/a-state-of-the-art-data-center-for-large-scale-ai/
- Trigo – Computer Vision AI For Retail – CIOCoverage- Driven for Technology Leaders, accessed on December 12, 2025, https://www.ciocoverage.com/trigo-computer-vision-ai-for-retail/
- The Checklist for Superior Frictionless Shopping | Trigo Retail, accessed on December 12, 2025, https://www.trigoretail.com/the-checklist-for-superior-frictionless-shopping/
- Retail Industry IT – Digital Transformation | Dell USA, accessed on December 12, 2025, https://www.dell.com/en-us/lp/dt/industry-retail
- Enabling the Next Stage in Retail Checkout Convenience with AI-powered Autonomous Shopping – Dell Technologies, accessed on December 12, 2025, https://www.delltechnologies.com/asset/en-sg/solutions/industry-solutions/briefs-summaries/dt-nvidia-retail-ai-autonomousshopping-brief.pdf
- Trax Execution – Computer Vision & Machine Learning Platforms – Trax Retail, accessed on December 12, 2025, https://traxretail.com/solutions/trax-execution/
- Retail Edge Solutions | Dell USA, accessed on December 12, 2025, https://www.dell.com/en-us/lp/edge-solutions-retail
- The Israeli Occupation Industry – Dell Technologies – Who Profits, accessed on December 12, 2025, https://www.whoprofits.org/companies/company/7370?dell-technologies
- The Israeli Occupation Industry – Malam Team – Who Profits, accessed on December 12, 2025, https://www.whoprofits.org/companies/company/4217
- Amid war with Hamas, Israel’s Matrix is seeking to hire 700 new employees, accessed on December 12, 2025, https://www.timesofisrael.com/amid-war-with-hamas-israels-matrix-is-seeking-to-hire-700-new-employees/
- Cloud first as Asda and Microsoft lay claim to one of UK’s largest ever retail technology deals, accessed on December 12, 2025, https://retailtechinnovationhub.com/home/2025/9/23/cloud-first-as-asda-and-microsoft-lay-claim-to-one-of-uks-largest-ever-retail-technology-deals
- 44 CIOs On the Move – The National CIO Review, accessed on December 12, 2025, https://nationalcioreview.com/articles-insights/leadership/44-cios-on-the-move/
- Asda security chief replaced, retailer sheds jobs during Walmart tech divorce – The Register, accessed on December 12, 2025, https://www.theregister.com/2024/11/14/senior_tech_departure_asda/
- Project Future: Driving Asda’s Transformation – Asda corporate, accessed on December 12, 2025, https://corporate.asda.com/20240925/project-future-driving-asdas-transformation
- Asda’s Walmart tech divorce caused ‘severe disruption’ – The Register, accessed on December 12, 2025, https://www.theregister.com/2025/12/01/asda_walmart_tech_divorce/
- Asda (Bellis Finco) Downgraded To ‘B’ As Project | S&P Global Ratings, accessed on December 12, 2025, https://www.spglobal.com/ratings/en/regulatory/article/-/view/type/HTML/id/3490832
- US tech firms’ AI services bolster Israeli military, sparking civilian casualty concerns, accessed on December 12, 2025, https://www.aa.com.tr/en/world/us-tech-firms-ai-services-bolster-israeli-military-sparking-civilian-casualty-concerns/3486897
- No Tech for Oppression, Apartheid or Genocide | BDS Movement, accessed on December 12, 2025, https://bdsmovement.net/no-tech-oppression-apartheid-or-genocide
- Dell Technologies and SAP Strengthen Sovereign Cloud Strategy with Private Data Center Option – SAPinsider, accessed on December 12, 2025, https://sapinsider.org/map/dell-technologies-and-sap-strengthen-sovereign-cloud-strategy-with-private-data-center-option/
- NASA SEWP V Contract Holder – Carahsoft, accessed on December 12, 2025, https://www.carahsoft.com/SEWP
- Check Point for Government – Carahsoft, accessed on December 12, 2025, https://www.carahsoft.com/check-point
- NASA SEWP V Contracts Awarded to World Wide Technology, accessed on December 12, 2025, https://www.wwt.com/press-release/nasa-sewp-v-contracts-awarded-to-world-wide-technology
- GSA Schedule – Pax Advisory, accessed on December 12, 2025, https://www.paxadvisory.com/solutions/gsa-schedule
- GSA Price List – GSA MAS Contract 47QTCA19D00MM – GSA Advantage, accessed on December 12, 2025, https://www.gsaadvantage.gov/ref_text/47QTCA19D00MM/47QTCA19D00MM_online.htm