Dell Solution Tour Copenhagen

Like this? Share it with your network

Share

Dell Solution Tour Copenhagen

  • 867 views
Uploaded on

Dell's plenum slides from Solutions Tour Event in Copenhagen

Dell's plenum slides from Solutions Tour Event in Copenhagen

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
867
On Slideshare
814
From Embeds
53
Number of Embeds
1

Actions

Shares
Downloads
22
Comments
0
Likes
1

Embeds 53

http://storify.com 53

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. #DellST13 Large Commercial Accounts presenter Dell Solutions Tour 2013 Copenhagen
  • 2. #DellST13 Large Commercial Accounts presenter Adam Vieth General Manager, Dell Denmark
  • 3. #DellST13
  • 4. #DellST13 Large Commercial Accounts presenter Henrik Thomsen Vice President & GM, Western Europe
  • 5. Strategy, beyond MHz.
  • 6. 2012 • Consolidation / Virtualization • Transformation / Mobility • Cloud / Innovation • Efficiency / Processes
  • 7. 2013• Virtualization / Convergence • Transformation / Workloads • Cloud / On-Demand • Efficiency / Scalability
  • 8. Turn data into insights 2009 2020 Volume of data stored Zettabytes 0.8 35 of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. – Harvard Bus Review Smartphone and tablets used at work % of total customer type 85% Corporate Overcome the evolving security threat & ensure compliance of companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact average data loss impact for reactive organizations 79% $1.1M Accelerate adoption: virtualization, convergence, cloud Embrace consumerization : BYOD & beyond growth in smartphones and tablets used at work… Personal Corporate 5X 2/3rd of spend in private cloud solutions. Smartphone and tablets used at work % of total customer type Mobile devices (800m smartphones)3.5B 1.2B people (1 in 6) on social networks
  • 9. Our customers’ imperatives Our end-to-end portfolio Delivering technology solutions that enable people everywhere to grow, thrive and reach their full potential Our purpose Our differentiated strategy Superior relationship model Efficient, simple and affordable Practical innovation The leading provider of end-to-end scalable solutions Dell strategy – Bringing it all together Connecting END USERS Integrating and optimizing the ENTERPRISE Simplifying and securing through SOFTWARE Accelerating innovation with SERVICES
  • 10. #DellST13 Thank You! Henrik_Thomsen@dell.com
  • 11. #DellST13 Large Commercial Accounts presenter Lars Baun, Commercial Sales Director Cherian Mathews, Global End-User Computing Director Jørgen Svart, Senior Solutions Specialist Jesper Boye, Public Sales Director
  • 12. Enterprise Solutions Group12 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  • 13. Enterprise Solutions Group13 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  • 14. Enterprise Solutions Group14 Confidential How we’re helping our customers win Connect Investing in tomorrow Designing for the future Strengthening today Built for Business Cloud Client Computing Evolving Workforce
  • 15. Enterprise Solutions Group15 Confidential Products + Software & Accessories + Services Dell PrecisionDell Latitude Dell OptiPlex most secure | most manageable | most reliable Built for business Dell offers the world’s most secure, manageable and reliable commercial endpoints
  • 16. Enterprise Solutions Group16 Confidential Most secure, manageable, reliable Endpoint security solutions that protect your data wherever it goes, without disrupting IT processes or end users Exclusive client systems management technologies that drive efficiencies throughout the device lifecycle Products designed, tested and engineered to deliver a flawless customer experience every time Secure Manageable Reliable
  • 17. Enterprise Solutions Group17 Confidential End users now expect: more flexibility more device choices modernized business applications enablement of personal device for business use seamless blending of work and personal lives on one device Rise of social media Blurring of work and home The emergence of new mobile devices Changing employee expectations of IT Evolving Workforce Dell offers end-to- end solutions designed to keep your workforce productive, protect your data, and reduce IT complexity
  • 18. Enterprise Solutions Group18 Confidential Four mobility business models we address Corporate-owned devices Most organizations have needs across these tiers Corporate owned, personally enabled Corporate issued Determining the business model for providing access to your enterprise content is a critical factor in your data and app access strategy. Bring your ownChoose your own (from enterprise-approved product list) Personally owned devices
  • 19. Enterprise Solutions Group19 Confidential Dell offers a broad set of solutions to enable BYOD Allowing access to corporate email, apps and desktop on smartphones, tablets and PCs PowerConnect W Wireless and ClearPass SonicWALL Clean Wireless Dell Server and Storage Solutions SonicWALL Next-Gen Firewalls Member Purchase Programs Dell App Development Services Quest One Identity Manager Dell Data Protection & Encryption Dell SonicWall Secure Remote Access & Next-Gen Firewalls Dell Wyse PocketCloud Dell KACE Appliances Dell Wyse Cloud Client Manager Dell Cloud Client Computing Solutions
  • 20. Enterprise Solutions Group20 Confidential Only Dell offers the complete portfolio of end user computing solutions Services, Software & Peripherals Desktop as a Service, consulting, deployment, support, managed services, and a complete S&P ecosystem Infrastructure Networking Storage Network and Datacenters EUC Software Cloud Management Security Tablets Thin / Zero clients End points Personal computers The majority of the end user computing solutions in Dell’s complete portfolio are powered by Intel processors and technologies.
  • 21. Enterprise Solutions Group21 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  • 22. Enterprise Solutions Group22 Confidential 90%Of enterprises now have a virtualization program or project in place $241 billionWorldwide spending on cloud computing by 2020 70M users ~50% of total installed professional desktops will shift to hosted virtual desktops in 2014 2XX86-server virtualization will double by 2016 60% Of all new server workloads are virtualized Virtualization – the silver bullet?
  • 23. Enterprise Solutions Group23 Confidential The promises & realities of virtualization • Lower power and space footprint • Greater utilization • Improve IT speed and flexibility • Eliminate sprawl & unnecessary IT • Hardware limitations • VM sprawl • Decentralized management • Insecure and nonstandard VMs • Redefined roles for people, process & technology • Managing complexity of hybrid environments • Delivering ROI The promise The reality Hidden Costs
  • 24. Enterprise Solutions Group24 Confidential Virtualization and consolidation - assessment and action The IT virtualization maturity journey Management optimization – operational health checks Service delivery & private cloud – assessment, design and implementation • Lower power and space footprint • Improve IT speed and flexibility • Eliminate sprawl & unnecessary IT • Centralized management • Security and standardization • Reliability & resiliency • On-demand IT elasticity • Self-service & governance Secure & seamless hybrid cloud • Burst Capacity • Seamless & Secure
  • 25. Enterprise Solutions Group25 Confidential Dell Cloud Point of View The keys to the next generation Data Centre Select the right applications for the right cloud. Standardize policies & leverage analytics to model workload placement. Start from applications Assess current skills, working with you to develop a training roadmap. Understand and develop people Determine how new solutions will impact operations, and realign resources to higher value activities. Optimize processes Agnostic approach to cloud and virtualization technologies (VMware, Microsoft, OpenStack) with best practices for integration into your environment. The right technology for you
  • 26. Enterprise Solutions Group26 Confidential Dell Cloud Consulting Services Explore the possibilities Cloud Consulting Workshop Decide what's right for your business Cloud Readiness Assessment Build your Cloud Build a Cloud Initiating Planning Executing Controlling Closing Migrate to your Cloud
  • 27. Enterprise Solutions Group27 Confidential Redefining Office IT Current environment Complex, inefficient, rigidPowerEdge VRTX Simple, efficient, versatile Dell PowerEdge VRTX is powered by intelligent Intel® Xeon® processors
  • 28. Enterprise Solutions Group28 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  • 29. Enterprise Solutions Group29 Confidential The Explosion of Data Petabyte Terabyte Exabyte Zettabyte DATA VOLUME PC/Client Era Internet Era Virtual Era Mainframe/Mini Era 2012 2020 Social Interactions Human Files Transactional Data Machine Generated Data (IoT - Internet of Things)
  • 30. Enterprise Solutions Group30 Confidential Big Data Characteristics & Drivers Big Data Economics Data Volumes Smart Queries Data SpeedNew Data Sources & Types Technologies Main Characteristics • Non-traditional Sources • Unstructured Data • Machine Generated Data Main Drivers • Operational Technologies • Smart Systems • Information Technology • Distributed Parallel Processing • Highly Scalable Commodity Hardware • TB’s to PB’s to EB’s to ZB’s to YB’s • Data Management • Data Latency • High Ingest • Response Times • Batch to Streaming • Predictive/Prescriptive • Modeling & Visualization • Competitive/Differentiation • Exploratory • Volatility • Performance and price optimized business analytics solutions
  • 31. Enterprise Solutions Group31 Confidential Dell’s Data Insights Maturity Model
  • 32. Enterprise Solutions Group32 Confidential Data Ecosystem - Not all data is equal Transactional Data Data Integration ETL Data Warehouse BI Tools Dashboards Reports What happened? What is happening? Why did it happen? Human Files File System File Shares EDiscovery Federal Search Browser What do we have? Where are they? Should I have it? Machine Generated Social Interactions Data Modeling Data Mining Predictive Tools Visualization What would happen? How can I make it happen? What do my customers want?
  • 33. Enterprise Solutions Group33 Confidential Dell Data Insight Solutions Evolutionary • Dell QuickStart Data Warehouse Appliance • Microsoft SQL Server -Parallel Data Warehouse (OEM) • Dell Boomi Cloud Integration • Toad (Quest) BI, Data Analyst, Spotlight, etc. • Microsoft Fast Track Reference Architecture • Oracle Reference Architecture Revolutionary • Cloudera Hadoop Reference Architecture • Crowbar for Hadoop • RainStor Data Warehouse on Hadoop • PowerVault MD with Hadoop • ParAccel Data Warehouse • SAP HANA Infrastructure • Dell RainStor DW Tiering • Compellent for DW • EqualLogic for DW • Fluid Data Architecture • Dell PowerEdge Servers • Dell PowerEdge-C Clusters • Dell PowerConnect & F10 Switches • Big Data Retention Solution (Dell/ RainStor)
  • 34. Enterprise Solutions Group34 Confidential B`Dell’s solutions End to End solutions that drive business outcomes CONNECT Embrace consumerization: BYOD and beyond TRANSFORM Accelerate adoption: virtualization, convergence, cloud INFORM Turn data into insights PROTECT Overcome the evolving security threat & ensure compliance The Power to do More Driving greater operational efficiency and accelerating results Differentiated with a scalable design point Business-class connected solutions Integrated, optimized enterprise Software that simplifies IT and mitigates risk Flexible, next- generation services
  • 35. Enterprise Solutions Group35 Confidential35 “Security + Governance + Compliance rank in the top 3 barriers to realizing the full potential of information technology.” -Say Gartner, in their 2012 CIO Agenda. Today’s business reality: You must re-imagine IT to successfully compete.
  • 36. Enterprise Solutions Group36 Confidential 2x to 4x Number of workers using smartphones for work between 2009 & 2014 (IDC via Unisys5) 1/3 Mobile Amount of the world’s workforce that will be mobile in 2013 (IDC) 60% to 80% Workers that are wirelessly connected to the Enterprise by 2015 Over 40+ Billion Going social, # of Twitter searches in 2012 1 Trillion Internet connected devices by 2015 #1 Trend Consumerization/BYOD of IT will make the biggest impact on enterprise IT in the next decade (Gartner) Cloud and big data raise Addition concerns to protect “data at move or at rest” 25% of traffic on corporate networks comes from social media Connected Security 360 Security: Its Important and the Trend in Priority is Increasing
  • 37. Enterprise Solutions Group37 Confidential So let’s start by laying out the challenges that are forcing changes in the way you do business; a changing IT landscape and security challenges. Virtualization Explosive data growth BYOD Advanced persistent threats Management complexity Limited expertise and budgets A disjointed, siloed security environment Insufficient visibility and counter measures 4 Legacy systems New technologies Cloud Compliance Explosive data growth Compliance
  • 38. Enterprise Solutions Group38 Confidential Were not protected with mobile security features1 57% Of lost laptops contained confidential data1 46%Average value of lost laptop1 $49,246 $5.5M IT managers are looking for ways to: + Fully protect data wherever it goes without disrupting end users + Save time deploying and managing security + Ensure they remain in compliance + Flexible scale to ensure they meet the requirements of different users Data is the most important asset companies own: + Intellectual Property + Customer and employee data + Competitive information Source: 1. Poneman Institute Study Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011 Average organizational cost of a data breach2 Every 53 Seconds a laptop is stolen
  • 39. Enterprise Solutions Group39 Confidential Does Dell Have an Answer and Why Dell? - Of course because Dell’s in the problem solving business. Let’s talk about why Dell for security. Dell Solutions Tour
  • 40. Enterprise Solutions Group40 Confidential Dell security and business solutions are recognized in the Gartner Magic Quadrants 2012-2013 1 • Managed Security Service Providers • Unified Threat Management • User Administration and Provisioning • Identity and Access Governance • Enterprise Network Firewalls • Secure Email Gateways • Enterprise Backup/Recovery Software Challengers Niche Players Visionaries Leaders • SAP Implementation Service Providers, North America • Data Center Network Infrastructure • Cloud Infrastructure as a Service • Help Desk Outsourcing, Europe • Desktop Outsourcing, Europe Challengers Niche Players Leaders Security Solutions • Global Enterprise Desktops/Notebooks • Data Center Outsourcing & Infrastructure Services • App Performance Monitoring • Desktop Outsourcing • Help Desk Outsourcing, • Client Lifecycle Management Visionaries Business Solutions • Mobile Data Protection
  • 41. Enterprise Solutions Group41 Confidential41 Data - Dell Data Protection | Encryption Configuration & Patch Management Identity - Dell QUEST Identity & Access Management Network - Dell SonicWALL Next-generation Firewall Secure Remote Access Email Security Security Services- Dell SecureWork Incident Response Managed Security Services Security & Risk Consulting cloud Data center End points Dell Connected Security Solutions are comprehensive and complete
  • 42. #DellST13 Thank You!