This partner-enabling material first presented in 2015 at Kontrax Partner Days in Bulgaria speaks about converting business needs in to processes IT can understand and can build value on.
Research show that IT-Enabled enterprises present an additional 20% market value.
IT at the heart of business make your enterprise adaptive, flexible, and responsive to changes
19. 19
Dell ONE: Broad portofolio of products that are modular
and integrated
Access Governance
Privileged Account Management
Identity Administration
User Activity Monitoring
20. 20
Dell ONE: Complete Identity & Access Management
DELL
Single Sign-On
Provisioning
Role
Management
Identity
Intelligence
Multifactor
Authentication
Password
Management
Privileged Account
Management
Optimizing an
IAM Framework
21. 21
Data Protection is about INFORMATION
#1 Backup and Replication
#2 Information Security
24. 24
Dell Connected Security: Data that is safe and secure
38B security
events
analyzed daily
1m devices
WW reporting
on 40m users
638B
intrusions
prevented in
2011
$14 trillion in
assets
protected daily
40,000 new
malware
samples
analyzed
every day
4.2B malware
attacks
blocked in
2011
Data
encrypted and
protected on
7m devices
Dell
SonicWALL
Dell Dell Secureworks
Dell Credant
Dell KaceDell Quest
Email Security
Endpoint Security
Network Security
Remote Access Security
25. 25
Dell Software: International leadership
1M
customers
90%
of Global 1000 are Dell
Software customers
3M
community members
Highest overall protection
Next-Gen Firewall
NSS Labs EMA
Radar Report Value Leader
for Boomi Cloud Integration
6,000
team members
Gartner
$2B
software revenue
9 Magic Quadrants
1,600 software
engineers
2,500 software
sales
26.
27. Thank You
To learn more about Dell Software solutions please visit:
http://software.dell.com/solutions/information-management/
http://software.dell.com/solutions/identity-and-access-management/
http://software.dell.com/solutions/data-protection/
http://www.sonicwall.com/us/en/
Editor's Notes
The most common approach in today’s enterprises qualifies IT as support arm for production and non-production departments all around
IT, just like logistics for example, has a number of procedures for guidance and a number of “tools” for help, and by using these, an entire division of engineers and technicians swarm around fixing and patching and upgrading stuff, so that corporate, meaningful personnel can do their own job in the most pleasant and efficient way…
… but nobody knows exactly what IT is doing
However, it is expected that IT knows exactly what business wants
IT is asked to translate each business process in to IT processes that can be measured, managed and improved by IT engineers.
It is natural that IT lacks the business perspective needed to make it a driver for the enterprise. Instead, they will adopt niche solutions that will allow them to fix and improve point to point pains expressed by corporate exmployees, all in an endless effort to relieve themselves from the load of managing what would suppose to be business processes and business manageable activities.
Most of the time, IT ends up being cornered by their own decisions to adopt not-integrated, not-supported applications choosed without having in mind the bigger picture. The enterprise becomes an “Repair & Replace Corporation”
Everyone should understand that for organizations to be successful on a competitive market, it’s not about the technology but about enterprise collaboration and about creating the culture to allow and drive the RIGHT people to do the RIGHT job by using the RIGHT tools
The right technology, in the right situation can go a long way towards enabling teams and people to manage business processes and by that, collaborate for the common goal of maximizing business productivity
IT-enabled enterprises are organizations where IT is given the RIGHT purpose of putting technology in the hands of the business. This is done by reaching a level of cultural conscience that enables the organization to adopt those scalable, integrated and enterprise-designed solutions that are built from scratch with the single purpose in mind of being used by non-IT people and providing value to managers
Market research shows that in IT-enabled enterprises, IT value counts as much as 20% of the whole business, because this is business that is adaptive, flexible, responsive to changes and has business processes that are clearly defined and rightfully managed by the right people.
And by that, relieving IT of the load of managing people, information and processes and putting them in the RIGHT position of adding IT value to the organization.
An IT-enabled enterprise provides much higher ROI and has a greater TCO than a traditional one.
It’s easier than ever to drive value in customer organizations with innovative IT management solutions. Whether it’s managing virtualization and cloud computing, secure mobility user access governance, or the untapped potential of data, there are dozens of ways to unlock the power of IT in a business. The best way to start: by drastically reducing complexity and risk.
Scalable, integrated business and enterprise software solutions from Dell make it easy to secure and manage networks, applications, systems, endpoints, devices and data to help business deliver on the full promise of technology
Dell Software simplifies IT management, mitigates risk and accelerates results with end-to-end IT solutions for end-to-end needs.
Now let me give you a hint on how to better navigate and research all those solutions and products.
No matter what is the message marketing wishes to transmit at one point, and no matter what division is put in light for a certain event, Dell Software is always about three things:
Information Management
Identity Management
Data Protection
For IT personnel, Information Management is about implementing and maintaining APPLICATIONS that will be used by non-IT PEOPLE in order to manage PROCESSES that transform DATA into INFORMATION… in other words, it’s about APPLICATION PERFORMANCE and DATA MANAGEMENT
There are two major areas of interest:
#1 Application Performance Management
#2 Big Data Analytics and Business Intelligence
The lack of correlation and collaboration caused by disparate tools and gaps in coverage wreck havoc on your end users:
For example: the current monitoring system may be showing green lights for all the different domains of the infrastructure being monitored…
… but when you add them all up, the effect on the NOC team responsible for incident management and problem assignment is slower reaction time—and that contributes to overall mean-time-to-resolution of the problem. How many of you have been part of a blamestorm?
That extra delay can directly impact revenue due to end user dissatisfaction, a drop in customer loyalty and orders lost to competitors.
This is why it is critical to monitor the end-user’s experience and the best starting point for application management.
Operations and NOC personnel tend to lean on these sorts of “outside-looking in” technologies, since they don’t own the backend infrastructure and have limited ability to deploy agents to those systems. Zero overhead and zero agent deployment effort/management.
Dell’s APM solution blends business context with deep technical insight, unifying all users and data within a structured model built around transactions. Dell allows your customers to build business services around technology, from network to OS and virtualization infrastructure and storage, from databases to applications and web user experience, giving an end-to-end view of the whole picture, and also helping organizations to meet SLA
TRANSFORM – INTEGRATE - DEVELOP
The big data analytics solutions from Dell enable business users to rapidly transform structured and unstructured data into analytic insights without the time, complexity and costs of other solutions. By combining natural language processing, machine learning and sentiment analysis technologies with easy-to use search and visualization capabilities, our big data analytics solution lets you mine content, discover relationships and realize the full value of big data
Note to presenter: We discuss about StatSoft Statistica
TRANSFORM – INTEGRATE - DEVELOP
Second, Dell enables data synchronization across application – the business can take benefit of the industry’s largest integration PaaS to connect any combination of cloud and on-premises applications. There is no limit in to the target audience: whether your customer works in a business, ISV or system integrator environment, and regardless of organization size and budget
TRANSFORM – INTEGRATE - DEVELOP
Toad is now Dell. The best known family of tools dedicated to database development & administration, but also to BI, with roots going back to the 90’s!
Dell enables self-service business intelligence, which means easily and secure access to structured and unstructured data from nearly any source, within a collaborative analysis environment that streamlines data sharing between IT and business, thru intuitive interfaces and leading visualization capabilities that enable business and technical users to easily discover new insight.
Going back to Development, Toad is the world’s #1 name for DBAs everywhere. Dell guarantees application success through improved code quality, performance and maintainability and gives you access to a community of 3 mil. users
Identity and Access Management is about creating, maintaining and mapping user accounts for the PEOPLE that will access corporate SYSTEMS and APPLICATIONS
And also to control and make sure each PERSON has the RIGHT access to do the RIGHT job by using the RIGHT tools, nothing more and nothing less
Identity Management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals
IAM is concerned with four fundamental concepts:
1. Authentication – ensuring that the person logging on to a system is who they say they are
2. Authorization – the parameters placed around what a user is allowed to do (access) once they are authenticated
3. Administration – in order to enable someone to authenticate and to be correctly authorized, there are managerial tasks that must be undertaken to set up the user account
4. Audit (Compliance) – those activities that help „prove” that authentication, authorization and administration are done at a level of security sufficient to satisfy established standards
All of the „A”assume there is an identity established for each user. This identity or account resides somewhere (typically in a directory) so it can be authenticated, authorized, managed and audited. And typically the directory is tied specifically and exclusively to the application or system that controls user access. If all this is done correctly, the four „A” are easily satisfied.
All systems include these requirements for authentication, authorization, administration and audit.
Dell is uniquelly positioned to meet your customer identity access management needs across the enterprise.
Dell One Identity solution include a broad portofolio of products. They are built to provide business driven solution simplicity with granular access controls and rapid time to value when implemented.
Dell One enables easier accountability while providing greater transparency throughout the business.
IAM is simplified by delivering:
- modular and integrated products that leverage existing investments in technology and supports other relevant components of the Dell One suite
- solutions are simple with rapid time to value
Dell One provides the most comprehensive fine grained access controls across users, systems and applications
Solutions are business driven and designed to be easy to use and configure with a user friendly interface
Additionally:
- There is no requirement for an underlying framework upon which capabilities must be built
- Control is placed in the hands of the business and data owners
Dell understands that every organization is unique and that you need the right IAM solution for your customer environment, challenges and goals. That’s why the Dell One offering is designed with flexibility in mind. Use the solutions you need now to address the short-term challenges and rely on an unparalleled depth of capabilities to meet whatever needs come down the road.
Single Sign-on
Often considered the mythical “Holy Grail” of IAM, single sign-on (SSO) is a reality through Dell One. By removing identity from a high number of systems (Unix, Linux, Mac, Java and many applications) in favor of the ubiquitous Active Directory identity, Dell One provides true SSO for a major portion of your enterprise. But Dell One doesn’t stop there. For systems that cannot be integrated with Active Directory, Dell One delivers enterprise single sign-on that initiates non-Windows authentication from initial AD logon—and it’s transparent to the user. No other solution can offer world-class “true” SSO combined with enterprise SSO for complete coverage.
Provisioning
The traditional first step in IAM, provisioning is often one of the most time-consuming, error-prone and troublesome aspects of IAM in complex environments. Dell One drives provisioning with a layer of identity intelligence that delivers automation, workflows and attestation based on your business objectives, not the limitations of your technologies or resources. Our solutions enable you to “codelessly” provision, re-provision and de-provision users across the entire enterprise. We provide self-service for end users and line-of-business personnel that frees IT from the tedious burden of many provisioning tasks. The Dell One approach lets you realize benefits in a matter of months, not years, and at a fraction of the cost of traditional provisioning frameworks.
Role Management
A key to effective IAM is establishing roles to associate your users with the appropriate policies, access rights and business processes that IAM should control. Dell One gives you the power to build a single set of roles and apply them across the enterprise. Our capabilities for consolidating identities and implementing identity intelligence make ad hoc role definition and enforcement things of the past. Dell One can even mine your existing role structure and provide you with the easy-to-use tools to normalize the roles enterprise-wide. Then, you can apply them according to the business driven policies, rules and objectives you’ve established.
Identity Intelligence
What makes IAM especially tough is correlating the disparate components (identities, roles, rules, workflows, policies and approvals) with the systems and entitlements required for users to do their jobs. Dell One delivers the 360-degree visibility and enterprise-wide control necessary to actually achieve your IAM objectives—based on your business needs, not the limitations of specific technologies. This intelligent approach (combined with key, unifying IAM components) dramatically streamlines and secures IAM, including provisioning, role management, compliance and access control.
Multifactor Authentication
Chances are, you’re moving toward multifactor authentication to further secure user access and satisfy regulations. Dell One lets you affordably implement this important technology—without having to add infrastructure. Our multifactor authentication options rely on Active Directory—not a proprietary identity store—and allow you to manage authentication through interfaces you already use. When combined with Dell One’s identity consolidation capabilities, your single solution can be applied to the largest possible portion of your environment.
Password Management
Analysts report that as much as 35 percent of help desk workload is dedicated to helping users reset forgotten passwords. Dell One helps you address this productivity-killing burden by reducing the number of passwords for each user through identity consolidation. We also strengthen and standardize policy across systems and relieve IT of the password-reset burden entirely. With fewer passwords to forget and the power to securely help themselves, users have fewer interruptions and IT can focus on more critical work.
Privileged Account Management
Let’s face it, in some IT departments today there are too many administrators who have too much power on too many systems. Native tools can’t address this issue of too many with “keys to the kingdom” because they rarely provide compliance visibility or the flexibility to manage privilege delegation or command control. Dell One gives you the power to granularly delegate administrative rights and execute command control on Windows-, AD- and Unix based systems and devices, while providing a compliance ready audit trail of administrative activities, rights and permissions that spans the entire enterprise. In addition, Dell One secures and automates the request, approval, release, use, return and changing of administrative credentials regardless of which system or which administrator account is required.
Optimizing an IdAM Framework
Perhaps you have already invested heavily in an IAM framework. Dell One can help you achieve more value from existing solutions by accelerating their deployment and reducing their complexity. By consolidating a high number of identities (from Unix, Linux, Mac, Java and other applications) into Active Directory, Dell One gives you the power to immediately secure and control those other systems without custom coding and dedicated synchronization points. In addition, the Dell One approach perfectly complements an existing deployment with enhanced, business-driven identity intelligence. We also fill critical functionality gaps with capabilities such as single sign-on, strong authentication, efficient Active Directory administration and privileged account management.
Data Protection covers two major areas:
#1 – Ensuring information exists and is always actual within systems and applications, which is done via data backup and replication
In other words, data backup and replication technologies ensure that PEOPLE will always be able to use and exchange most recent corporate INFORMATION in their day-to-day job activities
#2 - Ensuring information is safe and secure
In other words, security technologies ensure that INFORMATION will be accessed, changed and shared only by the RIGHT people, at the RIGHT time and by using the RIGHT tools so that corporate intellectual property is safe from theft or loss, and the information management tools used are working without downtime
Dell backup and recovery solutions range from scalable software designed for almost any platform, to CDP & deduplication appliances as well as database & application specific data protection. Dell solutions cut backup windows from hours to minutes – and recovering data takes only seconds.
Only Dell allows your customers to back up physical and virtual machines with either agent-based or agentless backup, giving them the best of both worlds. Plus, our broad portofolio lets IT choose the speed at which they recover data to meet business-driven SLAs, as well as choose the levels of protection based on how vital data and applications are to the business
Note to presenter:
Comprehensive data protection software: NetVault Backup
CDP solutions: AppAssure
Deduplication applicances: DR4000 \ DR6000
Application Specific: Recovery Manager for AD / Exchange / SharePoint, vRanger
Database Specific: LiteSpeed for SQL Server
Dell is the only player on the market that provides high-speed replication for both physical and virtual environments and at any layer: infrastructure, database and application. Your customer will be able to achieve high availability, offload operational reporting to a cost-effective secondary system and integrate existing data stores by copying only changed data to VMware, Hyper-V, Windows and Linux, File Systems, Exchange, Oracle, Hadoop, SQL Server, IBM DB2 and other platforms. Our solutions also simplify and accelerate backup and recovery while dramatically reducing storage costs.
Note to presenter: we are discussing about Shareplex, AppAssure, vRanger
Also, we’d like to mention here that Dell Compellent is the only solution on the market that leverages thin remote replication at block level. Thin replication transfers only blocks of data that have changed and does not require pre-allocation, consuming less space and helping to lower bandwidth costs.
Dell is firmly committed to providing end-to-end IT solutions that enable customers to grow and thrive. This includes continuous protection of customers data, applications, systems and networks.
SonicWALL simplifies and strengthens security of critical systems and data with seamless security management solutions. It fully protects organizations with highly effective intrusion prevention, anti-malware, content/URL filtering, and application control, no matter the size, budget and structure. SonicWALL also adds Active Directory®-based, two-factor authentication and strong password enforcement. Plus, provide visibility and reporting for security and permissions across Microsoft® servers and non-Windows environments. From servers to desktops to data, trust Dell to streamline security management.
Dell Software gives you 30 years of experience in Information Management, Identity Management and Data Protection. This continuous effort enabled us to position the company as an international leader with over 1 mil. customers, 90% of the Global 1000 being among them
In everything we do, we’re focused on delivering solutions to enable smarter decisions and more effective outcomes – giving customer the power to do more – so they can overcome obstacles, achieve their ideas and pursue their dreams.
Above all, we are committed to helping them realize the superior long-term value they need to grow and thrive.