#DellST13
Large Commercial Accounts
presenter
Dell Solutions Tour 2013
Copenhagen
#DellST13
Large Commercial Accounts
presenter
Adam Vieth
General Manager, Dell Denmark
#DellST13
#DellST13
Large Commercial Accounts
presenter
Henrik Thomsen
Vice President & GM, Western Europe
Strategy, beyond MHz.
2012
• Consolidation / Virtualization
• Transformation / Mobility
• Cloud / Innovation
• Efficiency / Processes
2013• Virtualization / Convergence
• Transformation / Workloads
• Cloud / On-Demand
• Efficiency / Scalability
Turn data into insights
2009 2020
Volume of
data stored
Zettabytes
0.8
35
of businesses said their organizations will
use ...
Our
customers’
imperatives
Our
end-to-end
portfolio
Delivering technology solutions that enable people everywhere
to grow,...
#DellST13
Thank You!
Henrik_Thomsen@dell.com
#DellST13
Large Commercial Accounts
presenter
Lars Baun, Commercial Sales Director
Cherian Mathews, Global End-User Comput...
Enterprise Solutions Group12 Confidential
B`Dell’s solutions
End to End solutions that drive business outcomes
CONNECT
Emb...
Enterprise Solutions Group13 Confidential
B`Dell’s solutions
End to End solutions that drive business outcomes
CONNECT
Emb...
Enterprise Solutions Group14 Confidential
How we’re helping our customers win
Connect
Investing in tomorrow Designing for ...
Enterprise Solutions Group15 Confidential
Products + Software & Accessories + Services
Dell PrecisionDell Latitude Dell Op...
Enterprise Solutions Group16 Confidential
Most secure, manageable, reliable
Endpoint security
solutions that protect
your ...
Enterprise Solutions Group17 Confidential
End users now expect:
more flexibility
more device choices
modernized business a...
Enterprise Solutions Group18 Confidential
Four mobility business models we address
Corporate-owned devices
Most organizati...
Enterprise Solutions Group19 Confidential
Dell offers a broad set of solutions to enable BYOD
Allowing access to corporate...
Enterprise Solutions Group20 Confidential
Only Dell offers the complete portfolio of end
user computing solutions
Services...
Enterprise Solutions Group21 Confidential
B`Dell’s solutions
End to End solutions that drive business outcomes
CONNECT
Emb...
Enterprise Solutions Group22 Confidential
90%Of enterprises now have a
virtualization program or
project in place
$241
bil...
Enterprise Solutions Group23 Confidential
The promises & realities of virtualization
• Lower power and space footprint
• G...
Enterprise Solutions Group24 Confidential
Virtualization and
consolidation - assessment
and action
The IT virtualization
m...
Enterprise Solutions Group25 Confidential
Dell Cloud Point of View
The keys to the next generation Data Centre
Select the ...
Enterprise Solutions Group26 Confidential
Dell Cloud Consulting Services
Explore the
possibilities
Cloud
Consulting
Worksh...
Enterprise Solutions Group27 Confidential
Redefining Office IT
Current environment
Complex, inefficient, rigidPowerEdge VR...
Enterprise Solutions Group28 Confidential
B`Dell’s solutions
End to End solutions that drive business outcomes
CONNECT
Emb...
Enterprise Solutions Group29 Confidential
The Explosion of Data
Petabyte
Terabyte
Exabyte
Zettabyte
DATA
VOLUME
PC/Client
...
Enterprise Solutions Group30 Confidential
Big Data Characteristics & Drivers
Big
Data
Economics
Data
Volumes
Smart
Queries...
Enterprise Solutions Group31 Confidential
Dell’s Data Insights Maturity Model
Enterprise Solutions Group32 Confidential
Data Ecosystem - Not all data is equal
Transactional Data
Data Integration
ETL
D...
Enterprise Solutions Group33 Confidential
Dell Data Insight Solutions
Evolutionary
• Dell QuickStart Data Warehouse
Applia...
Enterprise Solutions Group34 Confidential
B`Dell’s solutions
End to End solutions that drive business outcomes
CONNECT
Emb...
Enterprise Solutions Group35 Confidential35
“Security + Governance + Compliance
rank in the top 3 barriers to realizing th...
Enterprise Solutions Group36 Confidential
2x to 4x
Number of workers using smartphones for work
between 2009 & 2014 (IDC v...
Enterprise Solutions Group37 Confidential
So let’s start by laying out the challenges that are forcing changes in the
way ...
Enterprise Solutions Group38 Confidential
Were not protected
with mobile security
features1
57%
Of lost laptops
contained ...
Enterprise Solutions Group39 Confidential
Does Dell Have an Answer and
Why Dell?
- Of course because Dell’s in the problem...
Enterprise Solutions Group40 Confidential
Dell security and business solutions are recognized in the Gartner Magic
Quadran...
Enterprise Solutions Group41 Confidential41
Data - Dell Data Protection | Encryption
Configuration & Patch Management
Iden...
#DellST13
Thank You!
Upcoming SlideShare
Loading in...5
×

Dell Solution Tour Copenhagen

1,092

Published on

Dell's plenum slides from Solutions Tour Event in Copenhagen

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,092
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
36
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Dell Solution Tour Copenhagen

  1. 1. #DellST13 Large Commercial Accounts presenter Dell Solutions Tour 2013 Copenhagen
  2. 2. #DellST13 Large Commercial Accounts presenter Adam Vieth General Manager, Dell Denmark
  3. 3. #DellST13
  4. 4. #DellST13 Large Commercial Accounts presenter Henrik Thomsen Vice President & GM, Western Europe
  5. 5. Strategy, beyond MHz.
  6. 6. 2012 • Consolidation / Virtualization • Transformation / Mobility • Cloud / Innovation • Efficiency / Processes
  7. 7. 2013• Virtualization / Convergence • Transformation / Workloads • Cloud / On-Demand • Efficiency / Scalability
  8. 8. Turn data into insights 2009 2020 Volume of data stored Zettabytes 0.8 35 of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. – Harvard Bus Review Smartphone and tablets used at work % of total customer type 85% Corporate Overcome the evolving security threat & ensure compliance of companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact average data loss impact for reactive organizations 79% $1.1M Accelerate adoption: virtualization, convergence, cloud Embrace consumerization : BYOD & beyond growth in smartphones and tablets used at work… Personal Corporate 5X 2/3rd of spend in private cloud solutions. Smartphone and tablets used at work % of total customer type Mobile devices (800m smartphones)3.5B 1.2B people (1 in 6) on social networks
  9. 9. Our customers’ imperatives Our end-to-end portfolio Delivering technology solutions that enable people everywhere to grow, thrive and reach their full potential Our purpose Our differentiated strategy Superior relationship model Efficient, simple and affordable Practical innovation The leading provider of end-to-end scalable solutions Dell strategy – Bringing it all together Connecting END USERS Integrating and optimizing the ENTERPRISE Simplifying and securing through SOFTWARE Accelerating innovation with SERVICES
  10. 10. #DellST13 Thank You! Henrik_Thomsen@dell.com
  11. 11. #DellST13 Large Commercial Accounts presenter Lars Baun, Commercial Sales Director Cherian Mathews, Global End-User Computing Director Jørgen Svart, Senior Solutions Specialist Jesper Boye, Public Sales Director
  12. 12. Enterprise Solutions Group12 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  13. 13. Enterprise Solutions Group13 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  14. 14. Enterprise Solutions Group14 Confidential How we’re helping our customers win Connect Investing in tomorrow Designing for the future Strengthening today Built for Business Cloud Client Computing Evolving Workforce
  15. 15. Enterprise Solutions Group15 Confidential Products + Software & Accessories + Services Dell PrecisionDell Latitude Dell OptiPlex most secure | most manageable | most reliable Built for business Dell offers the world’s most secure, manageable and reliable commercial endpoints
  16. 16. Enterprise Solutions Group16 Confidential Most secure, manageable, reliable Endpoint security solutions that protect your data wherever it goes, without disrupting IT processes or end users Exclusive client systems management technologies that drive efficiencies throughout the device lifecycle Products designed, tested and engineered to deliver a flawless customer experience every time Secure Manageable Reliable
  17. 17. Enterprise Solutions Group17 Confidential End users now expect: more flexibility more device choices modernized business applications enablement of personal device for business use seamless blending of work and personal lives on one device Rise of social media Blurring of work and home The emergence of new mobile devices Changing employee expectations of IT Evolving Workforce Dell offers end-to- end solutions designed to keep your workforce productive, protect your data, and reduce IT complexity
  18. 18. Enterprise Solutions Group18 Confidential Four mobility business models we address Corporate-owned devices Most organizations have needs across these tiers Corporate owned, personally enabled Corporate issued Determining the business model for providing access to your enterprise content is a critical factor in your data and app access strategy. Bring your ownChoose your own (from enterprise-approved product list) Personally owned devices
  19. 19. Enterprise Solutions Group19 Confidential Dell offers a broad set of solutions to enable BYOD Allowing access to corporate email, apps and desktop on smartphones, tablets and PCs PowerConnect W Wireless and ClearPass SonicWALL Clean Wireless Dell Server and Storage Solutions SonicWALL Next-Gen Firewalls Member Purchase Programs Dell App Development Services Quest One Identity Manager Dell Data Protection & Encryption Dell SonicWall Secure Remote Access & Next-Gen Firewalls Dell Wyse PocketCloud Dell KACE Appliances Dell Wyse Cloud Client Manager Dell Cloud Client Computing Solutions
  20. 20. Enterprise Solutions Group20 Confidential Only Dell offers the complete portfolio of end user computing solutions Services, Software & Peripherals Desktop as a Service, consulting, deployment, support, managed services, and a complete S&P ecosystem Infrastructure Networking Storage Network and Datacenters EUC Software Cloud Management Security Tablets Thin / Zero clients End points Personal computers The majority of the end user computing solutions in Dell’s complete portfolio are powered by Intel processors and technologies.
  21. 21. Enterprise Solutions Group21 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  22. 22. Enterprise Solutions Group22 Confidential 90%Of enterprises now have a virtualization program or project in place $241 billionWorldwide spending on cloud computing by 2020 70M users ~50% of total installed professional desktops will shift to hosted virtual desktops in 2014 2XX86-server virtualization will double by 2016 60% Of all new server workloads are virtualized Virtualization – the silver bullet?
  23. 23. Enterprise Solutions Group23 Confidential The promises & realities of virtualization • Lower power and space footprint • Greater utilization • Improve IT speed and flexibility • Eliminate sprawl & unnecessary IT • Hardware limitations • VM sprawl • Decentralized management • Insecure and nonstandard VMs • Redefined roles for people, process & technology • Managing complexity of hybrid environments • Delivering ROI The promise The reality Hidden Costs
  24. 24. Enterprise Solutions Group24 Confidential Virtualization and consolidation - assessment and action The IT virtualization maturity journey Management optimization – operational health checks Service delivery & private cloud – assessment, design and implementation • Lower power and space footprint • Improve IT speed and flexibility • Eliminate sprawl & unnecessary IT • Centralized management • Security and standardization • Reliability & resiliency • On-demand IT elasticity • Self-service & governance Secure & seamless hybrid cloud • Burst Capacity • Seamless & Secure
  25. 25. Enterprise Solutions Group25 Confidential Dell Cloud Point of View The keys to the next generation Data Centre Select the right applications for the right cloud. Standardize policies & leverage analytics to model workload placement. Start from applications Assess current skills, working with you to develop a training roadmap. Understand and develop people Determine how new solutions will impact operations, and realign resources to higher value activities. Optimize processes Agnostic approach to cloud and virtualization technologies (VMware, Microsoft, OpenStack) with best practices for integration into your environment. The right technology for you
  26. 26. Enterprise Solutions Group26 Confidential Dell Cloud Consulting Services Explore the possibilities Cloud Consulting Workshop Decide what's right for your business Cloud Readiness Assessment Build your Cloud Build a Cloud Initiating Planning Executing Controlling Closing Migrate to your Cloud
  27. 27. Enterprise Solutions Group27 Confidential Redefining Office IT Current environment Complex, inefficient, rigidPowerEdge VRTX Simple, efficient, versatile Dell PowerEdge VRTX is powered by intelligent Intel® Xeon® processors
  28. 28. Enterprise Solutions Group28 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  29. 29. Enterprise Solutions Group29 Confidential The Explosion of Data Petabyte Terabyte Exabyte Zettabyte DATA VOLUME PC/Client Era Internet Era Virtual Era Mainframe/Mini Era 2012 2020 Social Interactions Human Files Transactional Data Machine Generated Data (IoT - Internet of Things)
  30. 30. Enterprise Solutions Group30 Confidential Big Data Characteristics & Drivers Big Data Economics Data Volumes Smart Queries Data SpeedNew Data Sources & Types Technologies Main Characteristics • Non-traditional Sources • Unstructured Data • Machine Generated Data Main Drivers • Operational Technologies • Smart Systems • Information Technology • Distributed Parallel Processing • Highly Scalable Commodity Hardware • TB’s to PB’s to EB’s to ZB’s to YB’s • Data Management • Data Latency • High Ingest • Response Times • Batch to Streaming • Predictive/Prescriptive • Modeling & Visualization • Competitive/Differentiation • Exploratory • Volatility • Performance and price optimized business analytics solutions
  31. 31. Enterprise Solutions Group31 Confidential Dell’s Data Insights Maturity Model
  32. 32. Enterprise Solutions Group32 Confidential Data Ecosystem - Not all data is equal Transactional Data Data Integration ETL Data Warehouse BI Tools Dashboards Reports What happened? What is happening? Why did it happen? Human Files File System File Shares EDiscovery Federal Search Browser What do we have? Where are they? Should I have it? Machine Generated Social Interactions Data Modeling Data Mining Predictive Tools Visualization What would happen? How can I make it happen? What do my customers want?
  33. 33. Enterprise Solutions Group33 Confidential Dell Data Insight Solutions Evolutionary • Dell QuickStart Data Warehouse Appliance • Microsoft SQL Server -Parallel Data Warehouse (OEM) • Dell Boomi Cloud Integration • Toad (Quest) BI, Data Analyst, Spotlight, etc. • Microsoft Fast Track Reference Architecture • Oracle Reference Architecture Revolutionary • Cloudera Hadoop Reference Architecture • Crowbar for Hadoop • RainStor Data Warehouse on Hadoop • PowerVault MD with Hadoop • ParAccel Data Warehouse • SAP HANA Infrastructure • Dell RainStor DW Tiering • Compellent for DW • EqualLogic for DW • Fluid Data Architecture • Dell PowerEdge Servers • Dell PowerEdge-C Clusters • Dell PowerConnect & F10 Switches • Big Data Retention Solution (Dell/ RainStor)
  34. 34. Enterprise Solutions Group34 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  35. 35. Enterprise Solutions Group35 Confidential35 “Security + Governance + Compliance rank in the top 3 barriers to realizing the full potential of information technology.” -Say Gartner, in their 2012 CIO Agenda. Today’s business reality: You must re-imagine IT to successfully compete.
  36. 36. Enterprise Solutions Group36 Confidential 2x to 4x Number of workers using smartphones for work between 2009 & 2014 (IDC via Unisys5) 1/3 Mobile Amount of the world’s workforce that will be mobile in 2013 (IDC) 60% to 80% Workers that are wirelessly connected to the Enterprise by 2015 Over 40+ Billion Going social, # of Twitter searches in 2012 1 Trillion Internet connected devices by 2015 #1 Trend Consumerization/BYOD of IT will make the biggest impact on enterprise IT in the next decade (Gartner) Cloud and big data raise Addition concerns to protect “data at move or at rest” 25% of traffic on corporate networks comes from social media Connected Security 360 Security: Its Important and the Trend in Priority is Increasing
  37. 37. Enterprise Solutions Group37 Confidential So let’s start by laying out the challenges that are forcing changes in the way you do business; a changing IT landscape and security challenges. Virtualization Explosive data growth BYOD Advanced persistent threats Management complexity Limited expertise and budgets A disjointed, siloed security environment Insufficient visibility and counter measures 4 Legacy systems New technologies Cloud Compliance Explosive data growth Compliance
  38. 38. Enterprise Solutions Group38 Confidential Were not protected with mobile security features1 57% Of lost laptops contained confidential data1 46%Average value of lost laptop1 $49,246 $5.5M IT managers are looking for ways to: + Fully protect data wherever it goes without disrupting end users + Save time deploying and managing security + Ensure they remain in compliance + Flexible scale to ensure they meet the requirements of different users Data is the most important asset companies own: + Intellectual Property + Customer and employee data + Competitive information Source: 1. Poneman Institute Study Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011 Average organizational cost of a data breach2 Every 53 Seconds a laptop is stolen
  39. 39. Enterprise Solutions Group39 Confidential Does Dell Have an Answer and Why Dell? - Of course because Dell’s in the problem solving business. Let’s talk about why Dell for security. Dell Solutions Tour
  40. 40. Enterprise Solutions Group40 Confidential Dell security and business solutions are recognized in the Gartner Magic Quadrants 2012-2013 1 • Managed Security Service Providers • Unified Threat Management • User Administration and Provisioning • Identity and Access Governance • Enterprise Network Firewalls • Secure Email Gateways • Enterprise Backup/Recovery Software Challengers Niche Players Visionaries Leaders • SAP Implementation Service Providers, North America • Data Center Network Infrastructure • Cloud Infrastructure as a Service • Help Desk Outsourcing, Europe • Desktop Outsourcing, Europe Challengers Niche Players Leaders Security Solutions • Global Enterprise Desktops/Notebooks • Data Center Outsourcing & Infrastructure Services • App Performance Monitoring • Desktop Outsourcing • Help Desk Outsourcing, • Client Lifecycle Management Visionaries Business Solutions • Mobile Data Protection
  41. 41. Enterprise Solutions Group41 Confidential41 Data - Dell Data Protection | Encryption Configuration & Patch Management Identity - Dell QUEST Identity & Access Management Network - Dell SonicWALL Next-generation Firewall Secure Remote Access Email Security Security Services- Dell SecureWork Incident Response Managed Security Services Security & Risk Consulting cloud Data center End points Dell Connected Security Solutions are comprehensive and complete
  42. 42. #DellST13 Thank You!
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×