dell solution tour copenhagen
DESCRIPTION
Dell's plenum slides from Solutions Tour Event in CopenhagenTRANSCRIPT
#DellST13
Large Commercial Accounts presenter
Dell Solutions Tour 2013 Copenhagen
#DellST13
Large Commercial Accounts presenter
Adam Vieth General Manager, Dell Denmark
#DellST13
#DellST13
Large Commercial Accounts presenter
Henrik Thomsen Vice President & GM, Western Europe
Strategy, beyond MHz.
2012 • Consolidation / Virtualization
• Transformation / Mobility
• Cloud / Innovation
• Efficiency / Processes
2013 • Virtualization / Convergence
• Transformation / Workloads
• Cloud / On-Demand
• Efficiency / Scalability
Turn data into insights
2009 2020
Volume of data stored Zettabytes
0.8
35
of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. – Harvard Bus Review
Smartphone and tablets used at work % of total customer type
85%
Corporate
Overcome the evolving security threat & ensure compliance
of companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact
average data loss impact for reactive organizations
79%
$1.1M
Accelerate adoption: virtualization, convergence, cloud
Embrace consumerization : BYOD & beyond
growth in smartphones and tablets used at work…
Personal
Corporate
5X
2/3rd of spend in private cloud solutions.
Smartphone and tablets used at work % of total customer type
Mobile devices (800m smartphones) 3.5B
1.2B people (1 in 6) on social networks
Our customers’ imperatives
Our end-to-end portfolio
Delivering technology solutions that enable people everywhere to grow, thrive and reach their full potential
Our purpose
Our differentiated strategy
Superior relationship model
Efficient, simple and affordable
Practical innovation
The leading provider of end-to-end scalable solutions
Dell strategy – Bringing it all together
Connecting
END USERS
Integrating and
optimizing the
ENTERPRISE
Simplifying and
securing through
SOFTWARE
Accelerating
innovation with
SERVICES
#DellST13
Thank You! [email protected]
#DellST13
Large Commercial Accounts presenter
Lars Baun, Commercial Sales Director
Cherian Mathews, Global End-User Computing Director
Jørgen Svart, Senior Solutions Specialist
Jesper Boye, Public Sales Director
Enterprise Solutions Group 12 Confidential
B` Dell’s solutions End to End solutions that drive business outcomes
CONNECT Embrace
consumerization: BYOD and beyond
TRANSFORM Accelerate adoption:
virtualization, convergence, cloud
INFORM Turn data
into insights
PROTECT Overcome the evolving
security threat & ensure compliance
The Power to do More
Business-class connected solutions
Integrated, optimized enterprise
Software that simplifies IT and
mitigates risk
Flexible, next-generation
services
Enterprise Solutions Group 13 Confidential
B` Dell’s solutions End to End solutions that drive business outcomes
CONNECT Embrace
consumerization: BYOD and beyond
TRANSFORM Accelerate adoption:
virtualization, convergence, cloud
INFORM Turn data
into insights
PROTECT Overcome the evolving
security threat & ensure compliance
The Power to do More
Driving greater operational efficiency and accelerating results
Differentiated with a scalable design point
Business-class connected solutions
Integrated, optimized enterprise
Software that simplifies IT and
mitigates risk
Flexible, next-generation
services
Enterprise Solutions Group 14 Confidential
How we’re helping our customers win
Connect
Investing in tomorrow Designing for the future
Strengthening today
Built for Business
Cloud Client Computing Evolving Workforce
Enterprise Solutions Group 15 Confidential
Products + Software & Accessories + Services
Dell Precision Dell Latitude
Dell OptiPlex
most secure | most manageable | most reliable
Built for business
Dell offers the world’s most secure, manageable and reliable commercial endpoints
Enterprise Solutions Group 16 Confidential
Most secure, manageable, reliable
Endpoint security solutions that protect your data wherever it goes, without disrupting IT processes or end users
Exclusive client systems management technologies that drive efficiencies throughout the device lifecycle
Products designed, tested and engineered to deliver a flawless customer experience every time
Secure Manageable Reliable
Enterprise Solutions Group 17 Confidential
End users now expect: more flexibility
more device choices modernized business applications
enablement of personal device for business use seamless blending of work and personal lives on one device
Rise of social media
Blurring of work
and home
The emergence
of new mobile devices
Changing employee
expectations of IT
Evolving Workforce
Dell offers end-to-end solutions designed to keep your workforce productive, protect your data, and reduce IT complexity
Enterprise Solutions Group 18 Confidential
Four mobility business models we address
Corporate-owned devices
Most organizations have needs across these tiers
Corporate owned, personally enabled
Corporate issued
Determining the business model for providing access to your enterprise content is a critical factor in your data and app access strategy.
Bring your own Choose your own (from enterprise-approved product list)
Personally owned devices
Enterprise Solutions Group 19 Confidential
Dell offers a broad set of solutions to enable BYOD Allowing access to corporate email, apps and desktop on smartphones, tablets and PCs
PowerConnect W Wireless and ClearPass SonicWALL Clean Wireless
Dell Server and Storage Solutions
SonicWALL Next-Gen Firewalls
Member Purchase Programs
Dell App Development Services
Quest One Identity Manager
Dell Data Protection & Encryption
Dell SonicWall Secure Remote Access & Next-Gen Firewalls
Dell Wyse PocketCloud
Dell KACE Appliances
Dell Wyse Cloud Client Manager
Dell Cloud Client Computing Solutions
Enterprise Solutions Group 20 Confidential
Only Dell offers the complete portfolio of end user computing solutions
Services, Software & Peripherals Desktop as a Service, consulting, deployment, support,
managed services, and a complete S&P ecosystem
Infrastructure
Networking
Storage
Network and Datacenters
EUC Software
Cloud
Management
Security
Tablets
Thin / Zero clients
End points
Personal computers
The majority of the end user computing solutions in Dell’s complete portfolio are powered by Intel processors and technologies.
Enterprise Solutions Group 21 Confidential
B` Dell’s solutions End to End solutions that drive business outcomes
CONNECT Embrace
consumerization: BYOD and beyond
TRANSFORM Accelerate adoption:
virtualization, convergence, cloud
INFORM Turn data
into insights
PROTECT Overcome the evolving
security threat & ensure compliance
The Power to do More
Driving greater operational efficiency and accelerating results
Differentiated with a scalable design point
Business-class connected solutions
Integrated, optimized enterprise
Software that simplifies IT and
mitigates risk
Flexible, next-generation
services
Enterprise Solutions Group 22 Confidential
90% Of enterprises now have a virtualization program or
project in place
$241 billion
Worldwide spending on cloud computing by 2020 70M users
~50% of total installed professional desktops will shift to hosted virtual desktops in 2014
2X X86-server virtualization will
double by 2016
60% Of all new server
workloads are virtualized
Virtualization – the silver bullet?
Enterprise Solutions Group 23 Confidential
The promises & realities of virtualization • Lower power and space footprint • Greater utilization • Improve IT speed and flexibility • Eliminate sprawl & unnecessary IT
• Hardware limitations • VM sprawl • Decentralized management • Insecure and nonstandard VMs • Redefined roles for people, process & technology • Managing complexity of hybrid environments • Delivering ROI
The promise
The reality
Hidden Costs
Enterprise Solutions Group 24 Confidential
Virtualization and consolidation - assessment
and action
The IT virtualization maturity journey
Management optimization – operational health checks
Service delivery & private cloud – assessment, design
and implementation
• Lower power and space footprint
• Improve IT speed and flexibility
• Eliminate sprawl & unnecessary IT
• Centralized management
• Security and standardization
• Reliability & resiliency
• On-demand IT elasticity
• Self-service & governance
Secure & seamless hybrid cloud • Burst Capacity
• Seamless & Secure
Enterprise Solutions Group 25 Confidential
Dell Cloud Point of View The keys to the next generation Data Centre
Select the right applications for the right cloud. Standardize policies & leverage analytics to model workload placement.
Start from applications
Assess current skills, working with you to develop a training roadmap.
Understand and develop people
Determine how new solutions will impact operations, and realign resources to higher value activities.
Optimize processes
Agnostic approach to cloud and virtualization technologies (VMware, Microsoft, OpenStack) with best practices for integration into your environment.
The right technology for you
Enterprise Solutions Group 26 Confidential
Dell Cloud Consulting Services
Explore the possibilities
Cloud Consulting Workshop
Decide what's right for your business
Cloud Readiness
Assessment
Build your Cloud
Build a Cloud
Initiating Planning Executing Controlling Closing
Migrate to your Cloud
Enterprise Solutions Group 27 Confidential
Redefining Office IT
Current environment Complex, inefficient, rigid PowerEdge VRTX
Simple, efficient, versatile
Dell PowerEdge VRTX is powered by intelligent Intel® Xeon® processors
Enterprise Solutions Group 28 Confidential
B` Dell’s solutions End to End solutions that drive business outcomes
CONNECT Embrace
consumerization: BYOD and beyond
TRANSFORM Accelerate adoption:
virtualization, convergence, cloud
INFORM Turn data
into insights
PROTECT Overcome the evolving
security threat & ensure compliance
The Power to do More
Driving greater operational efficiency and accelerating results
Differentiated with a scalable design point
Business-class connected solutions
Integrated, optimized enterprise
Software that simplifies IT and
mitigates risk
Flexible, next-generation
services
Enterprise Solutions Group 29 Confidential
The Explosion of Data
Petabyte
Terabyte
Exabyte
Zettabyte
DATA VOLUME
PC/Client Era
Internet Era
Virtual Era
Mainframe/Mini Era 2012 2020
Social Interactions
Human Files
Transactional Data
Machine Generated Data (IoT - Internet of
Things)
Enterprise Solutions Group 30 Confidential
Big Data Characteristics & Drivers
Big Data
Economics
Data Volumes
Smart Queries
Data Speed
New Data Sources &
Types
Technologies
Main Characteristics • Non-traditional Sources • Unstructured Data • Machine Generated Data
Main Drivers • Operational Technologies
• Smart Systems
• Information Technology • Distributed Parallel Processing • Highly Scalable Commodity Hardware
• TB’s to PB’s to EB’s to ZB’s to YB’s • Data Management
• Data Latency • High Ingest • Response Times • Batch to Streaming
• Predictive/Prescriptive • Modeling & Visualization • Competitive/Differentiation • Exploratory • Volatility
• Performance and price optimized business analytics solutions
Enterprise Solutions Group 31 Confidential
Dell’s Data Insights Maturity Model
Enterprise Solutions Group 32 Confidential
Data Ecosystem - Not all data is equal
Transactional Data
Data Integration
ETL
Data Warehouse
BI Tools
Dashboards
Reports
What happened?
What is happening?
Why did it happen?
Human Files
File System
File Shares
EDiscovery
Federal Search
Browser
What do we have?
Where are they?
Should I have it?
Machine Generated
Social Interactions
Data Modeling
Data Mining
Predictive Tools
Visualization
What would happen?
How can I make it happen?
What do my customers want?
Enterprise Solutions Group 33 Confidential
Dell Data Insight Solutions
Evolutionary
• Dell QuickStart Data Warehouse Appliance
• Microsoft SQL Server -Parallel Data Warehouse (OEM)
• Dell Boomi Cloud Integration
• Toad (Quest) BI, Data Analyst, Spotlight, etc.
• Microsoft Fast Track Reference Architecture
• Oracle Reference Architecture
Revolutionary
• Cloudera Hadoop Reference Architecture
• Crowbar for Hadoop
• RainStor Data Warehouse on Hadoop
• PowerVault MD with Hadoop
• ParAccel Data Warehouse
• SAP HANA
Infrastructure
• Dell RainStor DW Tiering
• Compellent for DW
• EqualLogic for DW
• Fluid Data Architecture
• Dell PowerEdge Servers
• Dell PowerEdge-C Clusters
• Dell PowerConnect & F10 Switches
• Big Data Retention Solution (Dell/ RainStor)
Enterprise Solutions Group 34 Confidential
B` Dell’s solutions End to End solutions that drive business outcomes
CONNECT Embrace
consumerization: BYOD and beyond
TRANSFORM Accelerate adoption:
virtualization, convergence, cloud
INFORM Turn data
into insights
PROTECT Overcome the evolving
security threat & ensure compliance
The Power to do More
Driving greater operational efficiency and accelerating results
Differentiated with a scalable design point
Business-class connected solutions
Integrated, optimized enterprise
Software that simplifies IT and
mitigates risk
Flexible, next-generation
services
Enterprise Solutions Group 35 Confidential 35
“Security + Governance + Compliance rank in the top 3 barriers to realizing the full potential of information technology.”
-Say Gartner, in their 2012 CIO Agenda.
Today’s business reality: You must re-imagine IT to successfully compete.
Enterprise Solutions Group 36 Confidential
2x to 4x Number of workers using smartphones for work between 2009 & 2014 (IDC via Unisys5)
1/3 Mobile Amount of the world’s workforce that will be mobile in 2013 (IDC)
60% to 80% Workers that are wirelessly connected to the Enterprise by 2015
Over 40+ Billion Going social, # of Twitter searches in 2012
1 Trillion Internet connected devices by 2015
#1 Trend Consumerization/BYOD of IT will make the biggest impact on enterprise IT in the next decade (Gartner)
Cloud and big data raise Addition concerns to protect “data at move or at rest”
25% of traffic on corporate
networks comes from social media
Connected Security 360 Security: Its Important and the Trend in Priority is Increasing
Enterprise Solutions Group 37 Confidential
So let’s start by laying out the challenges that are forcing changes in the
way you do business; a changing IT landscape and security challenges.
Virtualization
Explosive data growth
BYOD
Advanced persistent threats
Management complexity
Limited expertise and budgets
A disjointed, siloed security environment
Insufficient visibility and counter measures
4
Legacy systems
New technologies
Cloud
Compliance
Explosive data growth
Compliance
Enterprise Solutions Group 38 Confidential
Were not protected with mobile security features1
57%
Of lost laptops contained confidential data1
46% Average value of lost laptop1
$49,246
$5.5M
IT managers are looking for ways to:
+ Fully protect data wherever it goes without disrupting end users
+ Save time deploying and managing security
+ Ensure they remain in compliance
+ Flexible scale to ensure they meet the requirements of different users
Data is the most important asset companies own:
+ Intellectual Property
+ Customer and employee data
+ Competitive information
Source: 1. Poneman Institute Study
Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011
Average organizational
cost of a data breach2
Every 53 Seconds a laptop is stolen
Enterprise Solutions Group 39 Confidential
Does Dell Have an Answer and Why Dell?
- Of course because Dell’s in the problem solving business. Let’s talk about why Dell for security.
Dell Solutions Tour
Enterprise Solutions Group 40 Confidential
Dell security and business solutions are recognized in the Gartner Magic Quadrants 2012-2013 1
• Managed Security Service Providers
• Unified Threat Management
• User Administration and Provisioning
• Identity and Access Governance
• Enterprise Network Firewalls
• Secure Email Gateways
• Enterprise Backup/Recovery Software
Challengers
Niche Players Visionaries
Leaders
• SAP Implementation Service Providers, North America
• Data Center Network Infrastructure
• Cloud Infrastructure as a Service
• Help Desk Outsourcing, Europe
• Desktop Outsourcing, Europe
Challengers
Niche Players
Leaders
Security Solutions
• Global Enterprise Desktops/Notebooks
• Data Center Outsourcing & Infrastructure Services
• App Performance Monitoring
• Desktop Outsourcing
• Help Desk Outsourcing,
• Client Lifecycle Management
Visionaries
Business Solutions
• Mobile Data Protection
Enterprise Solutions Group 41 Confidential 41
Data - Dell Data Protection | Encryption
Configuration & Patch Management
Identity - Dell QUEST
Identity & Access Management
Network - Dell SonicWALL Next-generation Firewall Secure Remote Access Email Security
Security Services- Dell SecureWork Incident Response Managed Security Services Security & Risk Consulting
cloud
Data center
End points
Dell Connected Security Solutions are comprehensive and complete
#DellST13
Thank You!