Why Dell for Your Enterprise Mobility Management Needs
Total Page:16
File Type:pdf, Size:1020Kb
Tablets and mobility solutions for your evolving workforce Luc Van Houdenhove EUC Marketing Manager Dell Solutions Tour 2014 Evolution of Workforce End users will work around IT to get what they need 92% of IT heads say that business managers want things that IT cannot deliver – many involve BYOD Source: VansonBourne 2013 Dell Mobility Solutions Source: VansonBourne 2013 Why is mobility/ BYOD so important? 460 Extra hours worked per employee because of BYOD Dell - Restricted - Confidential - Privileged 5 Dell Software Device ownership in 2014 ### ## # Corporate Personally owned owned 350 billion Files uploaded to DropBox Security issues since >3 billion last year: Malicious programs detected Embracing mobility is about doing more for your business CEO/organization CIO and IT staff Employees • Improve productivity • Improve mobile data • Attractive / flexible security work environment • Improve employee satisfaction • Redirect IT to • Improve productivity innovation • Improve talent • Broader device choice acquisition & • Simplify deployment retention and management • Improved ability to innovate & collaborate • Improve IT process & policy adherence 9 Dell Mobility Solutions Requirements for tablet use Business use is about much more than the device Application Accessories access for the job • Touch-enabled • In-Office PC productivity apps Experience • Simplified app • Field Use Tools True business development Limited • Vertical Specific usability • Legacy app Accessories impact on IT access • Durable construction • Enterprise-grade security • Business-class battery life • Ease of management • Expandable memory • Simple app deployment • Full-size inputs Enabling tablets in more business use cases Dell believes the solution starts with the end user 1 2 3 Define users and Identify peripherals, Determine model based on create profiles apps and data access user profile & data access Virtualization Task Workers Peripherals Applications Cloud PC Office Workers Web Thin clients Power Workers Dell commercial client Dell Venue Pro tablets Mobile Workers Storage Content Dell’s tablet E2E solution A value proposition to improve workforce productivity Simplified Business Built for Robust services application accessory Business portfolio access ecosystem • Microsoft • Business Rugged • Docking stations and • Windows 8 Boot productivity durability keyboards for PC Camp applications • Range of experience • Application • Access to legacy configurations • Broad array of mobile development services Windows 7 apps • Optional enhanced productivity tools • Configuration and • Simplified application Security Features • Field worker deployment Deployment • Simplified integration ruggedized • ProSupport • Ecosystem of key and management peripherals ISVs and Integrators • Vertical specific accessories Simplified application access Application Readiness challenge Tablets means migration to Windows 8.1 • The most common application compatibility challenges that you’ll find out in the market are primarily around • Microsoft productivity applications • Access to legacy Windows 7 apps • Simplified application Deployment • Ecosystem of key ISVs and Integrators 13 Confidential Global Marketing Dell’s end-to-end mobility heritage Single partner with breadth and leadership Dell KACE/EMM Dell Secure Dell Dell Data Dell One Application systems Mobile Networking Protection | Identity Cloud Services management Access W-Series Encryption Access Manager Enterprise Dell’s entry into enterprise mobile management extends from leadership across ESM, Dell - Restricted - ConfidentialUTM, -networkingPrivileged , MDP, IAM and ITO industry segments 14 Dell - Internal Use - Confidential - Privileged Dell Software Only Dell’s end-to-end portfolio addresses mobility challenges across the enterprise Devices Management Security & Applications Dell Enterprise Infrastructure Custom Dell Venue Mobility Application SonicWALL Management Services SMA Cloud Client- Dell XPS Networking W- Series Computing Dell Data Protection One Identity Cloud Dell - Restricted - Confidential - Privileged Access Manager 15 Dell Services Dell Software Dell SonicWALL Secure Mobile Access Simple, policy-enforced mobile access to mission-critical data and applications without compromising security One-click mobile access to authorized corporate applications and resources Mobile Connect app Context-aware authentication and device interrogation to restrict access to authorized 8.1 users and trusted devices Secure SSL VPN connection and granular network Secure Remote Access appliance access controls Centralized access control policy management for efficient administration 16 Dell SonicWALL Next-Gen Firewall Provides your mobile workforce with secure, remote access to your corporate data and intranet and protects from threats Superior gateway protection, inspection for SSL encrypted sessions, and application intelligence and control • Automatically block attacks • Automatically identify applications by their DNA • Single sign-on to identify users • Illuminate all application traffic on the network • Control by application and user 17 Dell One Identity Provides business-driven access control and governance for users and privileged accounts Control data and user access – not just the device. provides secure access to web resources, Webthority protects systems from direct exposure Enforce policy Enhance security Provide unique user sessions Gain awareness 18 Dell Networking W-Series Ensures you have the necessary bandwidth capacity and policy management to handle guests and employee access from any device Wireless Switching ClearPass Networking access that meets extensive Employee and guest access to the network mobility and security requirements from any device • Easy, flexible deployment for enabling mobile Wi-Fi • Easy to add and manage both guest and access employee-owned devices • Manage amount of available bandwidth for additional • Self-registration eliminates need for IT to touch mobile devices every device • Control over access policies – prioritization based on • User, device, and application fingerprinting apply user, device, location, application, and time access and quality-of-service policies • Enhanced security features – guest access, encryption, • Seamless network integration authentication, intrusion detection 19 Built for Business - Security & Management Built for Business EMM security With industry-leading security from Dell, your enterprise data and apps are secure on the endpoint or in the container Secure remote access Encryption Data loss protection Remote wipe Identity access management Policy management Compliance reporting Endpoints Containers Desktop Laptops Mobile devices Laptops Tablets Mobile devices 21 Confidential Dell Mobility Solutions Dell - Internal Use - Confidential Dell Mobile Management Securely manage and provision enterprise smartphones and tablets with a SaaS-based solution Mobile device, Real-time User self-service Central application and reporting, portal management content alerts and management analytics Enterprise benefits • Security and compliance • Policy management • Rapid deployment • Automatic upgrades • OpEx instead of CapEx Dell - Restricted - Confidential - Privileged 22 • Targeted tools for the job Dell Software Dell KACE K1000 as a Service Get comprehensive SaaS support for laptops and desktops across multiple operating systems Systems management for Windows, OSX and Linux Enterprise benefits • Simplified management • Reduced costs Asset management in a single view • Rapid deployment • Secure workspaces, mobile devices, laptops, desktops, servers • Automatic upgrades Compliance reporting • OpEx instead of CapEx Application distribution Patch and policy management Service desk Dell - Restricted - Confidential - Privileged 23 Dell Software Dell Mobile Workspace Increase productivity by enabling your users to work remotely and securely on enterprise or personal mobile devices Secure email, calendar, Optional Secure remote Central contacts, productivity access and management browser and applications data separation file manager Enterprise benefits User benefits • Security and data loss • Productivity and protection collaboration • Management and control • Device choice • Increased user productivity (smartphones and tablets) • Rapid deployment • Personal privacy • Automatic upgrades • OpEx instead of CapEx • EncouragesDell - Restricted adoption - Confidential - Privileged 35 Dell Software Dell Desktop Workspace Provide a secure, managed environment for your enterprise Windows image on corporate-managed or BYO PCs and Macs 4 layers of security Secure DLP Encryption remote Firewall 1 2 3 access 4 Dell – Internal Use – Confidential Enterprise benefits: User benefits: Use cases: • 4 layers of security • Best application performance • Remote employees • Management and control • Consistent experience • Contractors and consultants • Increased user productivity • Work while offline • Mobile employees • Low-friction integration • Laptop of your choice • Mergers and acquisitions • Rapid onboarding • Offshore software • No hardware to purchase development • AccessDell - Restrictedto legacy - Confidential applications - Privileged 36 • Executives whoDell prefer Software Macs Box for Dell File sync and share capabilities Share content in the partner’s cloud or your cloud, sync it between devices and collaborate across your business Secure Connect Collaborate Safeguard content on BYO mobile devices Use Box for Dell with Dell Mobile Workspace or Dell Desktop Workspace.