How do you securely include personally-owned devices into your standardized management scheme? And how can you quickly update all of your endpoints to include the latest security patches and have an audit report to confirm that all of them were updated successfully?
This focuses on specific use cases to securely manage mobility and bring-your-own-device (BYOD) client devices offered by Dell and other manufacturers. It also demonstrates exclusive secure management advantages available only from Dell.
Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management
1. Dell World 2014
Securely managing all Dell and non-Dell end user devices
Roger Bjork, Director, Dell Mobile/BYOD Solutions
Bill Odell, Director, Dell Endpoint Systems Management
November 5-6, 2014
Dell World 2014
2. Dell World 2014
The biggest barriers to mobility
Risk of data breach
Cost of maintaining mobile devices
Complexity of managing multiple platforms and devices
50%
40%
36%
According to Dell’s Global Technology Adoption Index:
3. Dell World 2014
Only Dell’s end-to-end portfolio addresses mobility challenges across the enterprise One-off solutions increase complexity, cost and risk
Choose one strategic partner who can provide unified support
IT decision
maker
$
Vendor complexity
?
$
Too many vendors
to choose from
Disparate
support teams
Disconnected
back ends
Small vendors
bought out
One strategic partner
4. Dell World 2014
Dell’s end-to-end mobility heritage
Single partner with breadth and leadership
Dell - Internal Use - Confidential - Privileged
4
Dell KACE/EMM systems management
Dell Secure Mobile Access
Dell Networking W-Series
Dell Data Protection | Encryption Enterprise
Dell One Identity Cloud Access Manager
Application Services
Dell’s entry into enterprise mobile management extends from leadership across ESM, UTM, networking, MDP, IAM and ITO industry segments
6. Dell World 2014
Integrated solutions for a multi device world
for ALL devices
across MULTIPLE platforms
Corporate issued
Employee owned (BYOD)
across the LIFECYCLE
Deploy
Manage
Secure
Service
7. Dell World 2014
Dell ESM – KACE, EMM and Desktop Authority
K1000 Management Appliance
Comprehensive systems management for laptops, desktops, servers and tablets. Improve security, meet compliance requirements and decrease user downtime
K2000 Deployment Appliance
Integrated systems provisioning and deployment, fulfilling tasks including inventory assessment, OS and application provisioning, migration and recovery
Enterprise Mobility Management (EMM)
Flexible, comprehensive, K1000 integrated solution for securely, managing mobile devices – both BYOD and corporate owned
Desktop Authority Management Suite (DAMS)
Provides a centralized, secure and consistent management of the Windows user environment that automates users’ access to resources and applications
8. Dell World 2014
KACE K1000 Management Appliance
Know
Manage
Enforce
Asset management
Configuration scans
Inventory
Dell Warranty
Patch management
Software metering
Help desk
Software distribution
Reporting
9. Dell World 2014
New: K1000 v6.0 – Securely Managing IoT
SECURE
•Machine configuration
•Security scanning
Security
•Software blacklisting
•Full OS and device inventory
Expertise
•Deployment & maintenance
•User interface
•K1000 GO mobile app
Visibility
•Robust discovery
•Broader platform support
•Agentless technology
11. Dell World 2014
Dell Enterprise Mobility Management (EMM)
Your devices, your users, your mobile strategy
•Complete, secure endpoint management
•Secure enterprise workspace on all devices
•Secure access to enterprise data
•Integrated console management
•User self-service
•Identity management
•Business apps and services you need
•Flexibility for future-proofing
Comprehensive mobile enablement
Endpoint management
Smartphones
Tablets
M2M
Laptops
Desktops
Smartphones
Tablets
Laptops
Workspace management
Corporate issued
User owned (BYOD)
12. Dell World 2014
Dell Enterprise Mobility Management (EMM)
•Complete, secure endpoint management
•Secure enterprise workspace on all devices
•Secure access to enterprise data
•Integrated console management
•User self-service
•Identity management
•Business apps and services you need
•Flexibility for future-proofing
Your devices, your users, your mobile strategy
Comprehensive mobile enablement
Endpoint management
Smartphones
Tablets
M2M
Laptops
Desktops
Smartphones
Tablets
Laptops
Workspace management
Corporate issued
User owned (BYOD)
Dell Mobile Management
Dell KACE K1000 & K1000 as a Service
Dell Mobile Workspace
Dell Desktop Workspace
13. Dell World 2014
EMM – An integrated platform for all endpoints
Dell KACE K1000
Corporate owned
Dell Mobile Management
Corporate owned
BYOD
Dell Mobile Workspace
Dell Desktop Workspace
BYOD
K1000 manages all corporate owned PCs
•Manages secure applications on BYOD mobile
•Manages corporate owned mobile
•Passes inventory to K1000
Creates secure applications on BYOD mobile
•Creates secure applications on BYOD PCs
•Manages PC owner privileges
•K1000 can manage virtual secure application
14. Dell World 2014
Dell Mobile Management
Enterprise benefits
• Security and compliance
• Policy management
• Rapid deployment
• Automatic upgrades
• OpEx instead of CapEx
• Targeted tools for the job
Central
management
Mobile device,
application and
content
management
User self-service
portal
Real-time
reporting,
alerts and
analytics
Securely manage and provision enterprise smartphones and tablets with a
SaaS-based solution
15. Dell World 2014
Dell Mobile Workspace
Secure email, calendar, contacts, browser and file manager
Optional productivity applications
Secure remote access and data separation
Central management
User benefits
Enterprise benefits
•Productivity and collaboration
•Device choice (smartphones and tablets)
•Personal privacy
•Security & data loss protection
•Management and control
•Increased user productivity
•Rapid deployment
•Automatic upgrades
•OpEx instead of CapEx
•Encourages adoption
Increase productivity by enabling your users to work remotely and securely on enterprise or personal mobile devices
16. Dell World 2014
Dell Business Phone
Powered by Vonage Business Solutions™
•Make your telecom budget go further
•Manage and control calling plans and records
•Secure enterprise phone data with Dell Mobile Workspace
•Deliver robust features, like a conference bridge, call recording and group text messaging
•Extend coverage with calling over Wi-Fi
•Improve productivity and collaboration
Make the move to BYO by providing a business phone service on personal smartphones and tablets with robust features, security and control
17. Dell World 2014
Box for Dell
File sync and share capabilities
Safeguard content on personally-owned
mobile devices
Use Box for Dell with Dell Mobile Workspace or
Dell Desktop Workspace.
Share content in the partner’s cloud or your cloud,
sync it between devices and collaborate across your business
Secure Connect Collaborate
18. Dell World 2014
Dell Desktop Workspace
Enterprise benefits:
•Four layers of security
•Management and control
•Increased user productivity
•Low-friction integration
•Rapid onboarding
•No hardware to purchase
•Access to legacy applications
Del – Internal Use – Confidential
4 layers of security
1
2
3
4
DLP
Encryption
Secure remote access
Firewall
•Best application performance
•Consistent experience
•Work while offline
•Laptop of your choice
User benefits:
•Remote employees
•Contractors and consultants
•Mobile employees
•Mergers and acquisitions
•Offshore software development
•Executives who prefer Macs
Use cases:
Provide a secure, managed environment for your enterprise Windows image on corporate-managed or personally-owned PCs and Macs
19. Dell World 2014
Next steps
Visit us in the Solutions Expo to:
•See a demo
•Learn about FREE 1-YEAR KACE and EMM offers.
Attend other Mobility sessions:
•MT54: The new reality of mobile solutions: Everything you have been told about mobility is wrong
•MT24: Enabling mobility without compromising security