SlideShare a Scribd company logo
1 of 27
Excellence for IT-Enabled
Enterprises
Adrian Dumitrescu
Q-East Software
adrian.dumitrescu@qeast.ro
2
Right now enterprise IT highly qualified personnel is doing
A LOT of things…
… but nobody knows WHAT
3
IT at the heart of business?
4
IT at the heart of business?
… well, this would be a never ending repair and replace job
5
The RIGHT technology in the hands of the RIGHT people…
… the driver for SUCCESS
6
Which leads us to IT-enabled enterprises…
USERS
DATA
APPLICATIONS
IT Engineer
PEOPLE
INFORMATION
PROCESSES
7
… That are competitive and responsive
PEOPLE
INFORMATION
PROCESSES
Business Manager
8
End-to-End software solutions for End-to-End needs
9
Dell is uniquely positioned to meet customer needs across
the enterprise
Information Management
Identity Management
Data Protection
10
Information Management is about PROCESSES
#1 Application Performance Management
#2 Big Data & BI
11
Information management: END-TO-END APM
12
Information management: END-TO-END APM
13
Information management: TRANSFORM
14
Information management: INTEGRATE
15
Information management: DEVELOP
16
Identity Management is about PEOPLE
#1 User provisioning
#2 Access control
17
IAM: Four Fundamental Concepts
18
…in other words
19
Dell ONE: Broad portofolio of products that are modular
and integrated
Access Governance
Privileged Account Management
Identity Administration
User Activity Monitoring
20
Dell ONE: Complete Identity & Access Management
DELL
Single Sign-On
Provisioning
Role
Management
Identity
Intelligence
Multifactor
Authentication
Password
Management
Privileged Account
Management
Optimizing an
IAM Framework
21
Data Protection is about INFORMATION
#1 Backup and Replication
#2 Information Security
22
Foundational Backup & Recovery
23
Simple, affordable zero-impact replication
24
Dell Connected Security: Data that is safe and secure
38B security
events
analyzed daily
1m devices
WW reporting
on 40m users
638B
intrusions
prevented in
2011
$14 trillion in
assets
protected daily
40,000 new
malware
samples
analyzed
every day
4.2B malware
attacks
blocked in
2011
Data
encrypted and
protected on
7m devices
Dell
SonicWALL
Dell Dell Secureworks
Dell Credant
Dell KaceDell Quest
Email Security
Endpoint Security
Network Security
Remote Access Security
25
Dell Software: International leadership
1M
customers
90%
of Global 1000 are Dell
Software customers
3M
community members
Highest overall protection
Next-Gen Firewall
NSS Labs EMA
Radar Report Value Leader
for Boomi Cloud Integration
6,000
team members
Gartner
$2B
software revenue
9 Magic Quadrants
1,600 software
engineers
2,500 software
sales
Thank You
To learn more about Dell Software solutions please visit:
http://software.dell.com/solutions/information-management/
http://software.dell.com/solutions/identity-and-access-management/
http://software.dell.com/solutions/data-protection/
http://www.sonicwall.com/us/en/

More Related Content

What's hot

IDC_254721_ExecBrief_Digital_Transformation
IDC_254721_ExecBrief_Digital_TransformationIDC_254721_ExecBrief_Digital_Transformation
IDC_254721_ExecBrief_Digital_Transformation
Heather Hargraves
 

What's hot (7)

Deep Learning With Apache MXNet On Video by Ben Taylor @ ziff.ai
Deep Learning With Apache MXNet On Video by Ben Taylor @ ziff.aiDeep Learning With Apache MXNet On Video by Ben Taylor @ ziff.ai
Deep Learning With Apache MXNet On Video by Ben Taylor @ ziff.ai
 
Smart Apps for Smart Work
Smart Apps for Smart WorkSmart Apps for Smart Work
Smart Apps for Smart Work
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
 
Death of the traditional enterprise - IT and users on a collision course
Death of the traditional enterprise - IT and users on a collision courseDeath of the traditional enterprise - IT and users on a collision course
Death of the traditional enterprise - IT and users on a collision course
 
Concord's data story
Concord's data storyConcord's data story
Concord's data story
 
Impact IT_Profile short
Impact IT_Profile shortImpact IT_Profile short
Impact IT_Profile short
 
IDC_254721_ExecBrief_Digital_Transformation
IDC_254721_ExecBrief_Digital_TransformationIDC_254721_ExecBrief_Digital_Transformation
IDC_254721_ExecBrief_Digital_Transformation
 

Similar to Dell software - Excellence for IT-Enabled Enterprises

Brian smith presentation in sync conference
Brian smith presentation   in sync conferenceBrian smith presentation   in sync conference
Brian smith presentation in sync conference
InSync Conference
 
Darin Fredde Project Document
Darin Fredde Project    DocumentDarin Fredde Project    Document
Darin Fredde Project Document
dfredde
 

Similar to Dell software - Excellence for IT-Enabled Enterprises (20)

Diigital transformation
Diigital transformationDiigital transformation
Diigital transformation
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: Dell
 
NEW VERSION! -- Where is content management headed?
NEW VERSION! -- Where is content management headed?NEW VERSION! -- Where is content management headed?
NEW VERSION! -- Where is content management headed?
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantage
 
Di in the age of digital disruptions v1.0
Di in the age of digital disruptions v1.0Di in the age of digital disruptions v1.0
Di in the age of digital disruptions v1.0
 
DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenter
 
Idc june 2017_v1
Idc june 2017_v1Idc june 2017_v1
Idc june 2017_v1
 
Acctiva: expertise in Business Intelligence, Data Warehousing, Data Governance
Acctiva: expertise in Business Intelligence, Data Warehousing, Data GovernanceAcctiva: expertise in Business Intelligence, Data Warehousing, Data Governance
Acctiva: expertise in Business Intelligence, Data Warehousing, Data Governance
 
Erp software Benefits
Erp software BenefitsErp software Benefits
Erp software Benefits
 
IT Trends & Service Management
IT Trends & Service ManagementIT Trends & Service Management
IT Trends & Service Management
 
Our presentation on Management Information System
Our presentation on Management Information SystemOur presentation on Management Information System
Our presentation on Management Information System
 
Brian smith presentation in sync conference
Brian smith presentation   in sync conferenceBrian smith presentation   in sync conference
Brian smith presentation in sync conference
 
Devoteam presentation for hr tech job fair london 20 sep2018
Devoteam presentation for hr tech job fair london 20 sep2018Devoteam presentation for hr tech job fair london 20 sep2018
Devoteam presentation for hr tech job fair london 20 sep2018
 
Darin Fredde Project Document
Darin Fredde Project    DocumentDarin Fredde Project    Document
Darin Fredde Project Document
 
The Next Big Thing
The Next Big ThingThe Next Big Thing
The Next Big Thing
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
CIO Summit 2015 - Keynote Mayka van Acht - Archer Daniels Midland
CIO Summit 2015 - Keynote Mayka van Acht - Archer Daniels MidlandCIO Summit 2015 - Keynote Mayka van Acht - Archer Daniels Midland
CIO Summit 2015 - Keynote Mayka van Acht - Archer Daniels Midland
 
The computing age
The computing ageThe computing age
The computing age
 
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
 
Pinnacle Lecture #1 - Initiation of "rapid" Transformation of IT ... Venue: I...
Pinnacle Lecture #1 - Initiation of "rapid" Transformation of IT ... Venue: I...Pinnacle Lecture #1 - Initiation of "rapid" Transformation of IT ... Venue: I...
Pinnacle Lecture #1 - Initiation of "rapid" Transformation of IT ... Venue: I...
 

More from Adrian Dumitrescu

More from Adrian Dumitrescu (8)

OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Dell Software is Future Ready - no movie
Dell Software is Future Ready - no movieDell Software is Future Ready - no movie
Dell Software is Future Ready - no movie
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWall
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Recently uploaded (20)

BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 

Dell software - Excellence for IT-Enabled Enterprises

Editor's Notes

  1. The most common approach in today’s enterprises qualifies IT as support arm for production and non-production departments all around IT, just like logistics for example, has a number of procedures for guidance and a number of “tools” for help, and by using these, an entire division of engineers and technicians swarm around fixing and patching and upgrading stuff, so that corporate, meaningful personnel can do their own job in the most pleasant and efficient way… … but nobody knows exactly what IT is doing
  2. However, it is expected that IT knows exactly what business wants IT is asked to translate each business process in to IT processes that can be measured, managed and improved by IT engineers.
  3. It is natural that IT lacks the business perspective needed to make it a driver for the enterprise. Instead, they will adopt niche solutions that will allow them to fix and improve point to point pains expressed by corporate exmployees, all in an endless effort to relieve themselves from the load of managing what would suppose to be business processes and business manageable activities. Most of the time, IT ends up being cornered by their own decisions to adopt not-integrated, not-supported applications choosed without having in mind the bigger picture. The enterprise becomes an “Repair & Replace Corporation”
  4. Everyone should understand that for organizations to be successful on a competitive market, it’s not about the technology but about enterprise collaboration and about creating the culture to allow and drive the RIGHT people to do the RIGHT job by using the RIGHT tools The right technology, in the right situation can go a long way towards enabling teams and people to manage business processes and by that, collaborate for the common goal of maximizing business productivity
  5. IT-enabled enterprises are organizations where IT is given the RIGHT purpose of putting technology in the hands of the business. This is done by reaching a level of cultural conscience that enables the organization to adopt those scalable, integrated and enterprise-designed solutions that are built from scratch with the single purpose in mind of being used by non-IT people and providing value to managers Market research shows that in IT-enabled enterprises, IT value counts as much as 20% of the whole business, because this is business that is adaptive, flexible, responsive to changes and has business processes that are clearly defined and rightfully managed by the right people.
  6. And by that, relieving IT of the load of managing people, information and processes and putting them in the RIGHT position of adding IT value to the organization. An IT-enabled enterprise provides much higher ROI and has a greater TCO than a traditional one.
  7. It’s easier than ever to drive value in customer organizations with innovative IT management solutions. Whether it’s managing virtualization and cloud computing, secure mobility user access governance, or the untapped potential of data, there are dozens of ways to unlock the power of IT in a business. The best way to start: by drastically reducing complexity and risk. Scalable, integrated business and enterprise software solutions from Dell make it easy to secure and manage networks, applications, systems, endpoints, devices and data to help business deliver on the full promise of technology Dell Software simplifies IT management, mitigates risk and accelerates results with end-to-end IT solutions for end-to-end needs.
  8. Now let me give you a hint on how to better navigate and research all those solutions and products. No matter what is the message marketing wishes to transmit at one point, and no matter what division is put in light for a certain event, Dell Software is always about three things: Information Management Identity Management Data Protection
  9. For IT personnel, Information Management is about implementing and maintaining APPLICATIONS that will be used by non-IT PEOPLE in order to manage PROCESSES that transform DATA into INFORMATION… in other words, it’s about APPLICATION PERFORMANCE and DATA MANAGEMENT There are two major areas of interest: #1 Application Performance Management #2 Big Data Analytics and Business Intelligence
  10. The lack of correlation and collaboration caused by disparate tools and gaps in coverage wreck havoc on your end users: For example: the current monitoring system may be showing green lights for all the different domains of the infrastructure being monitored… … but when you add them all up, the effect on the NOC team responsible for incident management and problem assignment is slower reaction time—and that contributes to overall mean-time-to-resolution of the problem. How many of you have been part of a blamestorm? That extra delay can directly impact revenue due to end user dissatisfaction, a drop in customer loyalty and orders lost to competitors. This is why it is critical to monitor the end-user’s experience and the best starting point for application management. Operations and NOC personnel tend to lean on these sorts of “outside-looking in” technologies, since they don’t own the backend infrastructure and have limited ability to deploy agents to those systems. Zero overhead and zero agent deployment effort/management.
  11. Dell’s APM solution blends business context with deep technical insight, unifying all users and data within a structured model built around transactions. Dell allows your customers to build business services around technology, from network to OS and virtualization infrastructure and storage, from databases to applications and web user experience, giving an end-to-end view of the whole picture, and also helping organizations to meet SLA
  12. TRANSFORM – INTEGRATE - DEVELOP The big data analytics solutions from Dell enable business users to rapidly transform structured and unstructured data into analytic insights without the time, complexity and costs of other solutions. By combining natural language processing, machine learning and sentiment analysis technologies with easy-to use search and visualization capabilities, our big data analytics solution lets you mine content, discover relationships and realize the full value of big data Note to presenter: We discuss about StatSoft Statistica
  13. TRANSFORM – INTEGRATE - DEVELOP Second, Dell enables data synchronization across application – the business can take benefit of the industry’s largest integration PaaS to connect any combination of cloud and on-premises applications. There is no limit in to the target audience: whether your customer works in a business, ISV or system integrator environment, and regardless of organization size and budget
  14. TRANSFORM – INTEGRATE - DEVELOP Toad is now Dell. The best known family of tools dedicated to database development & administration, but also to BI, with roots going back to the 90’s! Dell enables self-service business intelligence, which means easily and secure access to structured and unstructured data from nearly any source, within a collaborative analysis environment that streamlines data sharing between IT and business, thru intuitive interfaces and leading visualization capabilities that enable business and technical users to easily discover new insight. Going back to Development, Toad is the world’s #1 name for DBAs everywhere. Dell guarantees application success through improved code quality, performance and maintainability and gives you access to a community of 3 mil. users
  15. Identity and Access Management is about creating, maintaining and mapping user accounts for the PEOPLE that will access corporate SYSTEMS and APPLICATIONS And also to control and make sure each PERSON has the RIGHT access to do the RIGHT job by using the RIGHT tools, nothing more and nothing less Identity Management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals
  16. IAM is concerned with four fundamental concepts: 1. Authentication – ensuring that the person logging on to a system is who they say they are 2. Authorization – the parameters placed around what a user is allowed to do (access) once they are authenticated 3. Administration – in order to enable someone to authenticate and to be correctly authorized, there are managerial tasks that must be undertaken to set up the user account 4. Audit (Compliance) – those activities that help „prove” that authentication, authorization and administration are done at a level of security sufficient to satisfy established standards
  17. All of the „A”assume there is an identity established for each user. This identity or account resides somewhere (typically in a directory) so it can be authenticated, authorized, managed and audited. And typically the directory is tied specifically and exclusively to the application or system that controls user access. If all this is done correctly, the four „A” are easily satisfied. All systems include these requirements for authentication, authorization, administration and audit.
  18. Dell is uniquelly positioned to meet your customer identity access management needs across the enterprise. Dell One Identity solution include a broad portofolio of products. They are built to provide business driven solution simplicity with granular access controls and rapid time to value when implemented. Dell One enables easier accountability while providing greater transparency throughout the business. IAM is simplified by delivering: - modular and integrated products that leverage existing investments in technology and supports other relevant components of the Dell One suite - solutions are simple with rapid time to value Dell One provides the most comprehensive fine grained access controls across users, systems and applications Solutions are business driven and designed to be easy to use and configure with a user friendly interface Additionally: - There is no requirement for an underlying framework upon which capabilities must be built - Control is placed in the hands of the business and data owners
  19. Dell understands that every organization is unique and that you need the right IAM solution for your customer environment, challenges and goals. That’s why the Dell One offering is designed with flexibility in mind. Use the solutions you need now to address the short-term challenges and rely on an unparalleled depth of capabilities to meet whatever needs come down the road. Single Sign-on Often considered the mythical “Holy Grail” of IAM, single sign-on (SSO) is a reality through Dell One. By removing identity from a high number of systems (Unix, Linux, Mac, Java and many applications) in favor of the ubiquitous Active Directory identity, Dell One provides true SSO for a major portion of your enterprise. But Dell One doesn’t stop there. For systems that cannot be integrated with Active Directory, Dell One delivers enterprise single sign-on that initiates non-Windows authentication from initial AD logon—and it’s transparent to the user. No other solution can offer world-class “true” SSO combined with enterprise SSO for complete coverage. Provisioning The traditional first step in IAM, provisioning is often one of the most time-consuming, error-prone and troublesome aspects of IAM in complex environments. Dell One drives provisioning with a layer of identity intelligence that delivers automation, workflows and attestation based on your business objectives, not the limitations of your technologies or resources. Our solutions enable you to “codelessly” provision, re-provision and de-provision users across the entire enterprise. We provide self-service for end users and line-of-business personnel that frees IT from the tedious burden of many provisioning tasks. The Dell One approach lets you realize benefits in a matter of months, not years, and at a fraction of the cost of traditional provisioning frameworks. Role Management A key to effective IAM is establishing roles to associate your users with the appropriate policies, access rights and business processes that IAM should control. Dell One gives you the power to build a single set of roles and apply them across the enterprise. Our capabilities for consolidating identities and implementing identity intelligence make ad hoc role definition and enforcement things of the past. Dell One can even mine your existing role structure and provide you with the easy-to-use tools to normalize the roles enterprise-wide. Then, you can apply them according to the business driven policies, rules and objectives you’ve established. Identity Intelligence What makes IAM especially tough is correlating the disparate components (identities, roles, rules, workflows, policies and approvals) with the systems and entitlements required for users to do their jobs. Dell One delivers the 360-degree visibility and enterprise-wide control necessary to actually achieve your IAM objectives—based on your business needs, not the limitations of specific technologies. This intelligent approach (combined with key, unifying IAM components) dramatically streamlines and secures IAM, including provisioning, role management, compliance and access control. Multifactor Authentication Chances are, you’re moving toward multifactor authentication to further secure user access and satisfy regulations. Dell One lets you affordably implement this important technology—without having to add infrastructure. Our multifactor authentication options rely on Active Directory—not a proprietary identity store—and allow you to manage authentication through interfaces you already use. When combined with Dell One’s identity consolidation capabilities, your single solution can be applied to the largest possible portion of your environment. Password Management Analysts report that as much as 35 percent of help desk workload is dedicated to helping users reset forgotten passwords. Dell One helps you address this productivity-killing burden by reducing the number of passwords for each user through identity consolidation. We also strengthen and standardize policy across systems and relieve IT of the password-reset burden entirely. With fewer passwords to forget and the power to securely help themselves, users have fewer interruptions and IT can focus on more critical work. Privileged Account Management Let’s face it, in some IT departments today there are too many administrators who have too much power on too many systems. Native tools can’t address this issue of too many with “keys to the kingdom” because they rarely provide compliance visibility or the flexibility to manage privilege delegation or command control. Dell One gives you the power to granularly delegate administrative rights and execute command control on Windows-, AD- and Unix based systems and devices, while providing a compliance ready audit trail of administrative activities, rights and permissions that spans the entire enterprise. In addition, Dell One secures and automates the request, approval, release, use, return and changing of administrative credentials regardless of which system or which administrator account is required. Optimizing an IdAM Framework Perhaps you have already invested heavily in an IAM framework. Dell One can help you achieve more value from existing solutions by accelerating their deployment and reducing their complexity. By consolidating a high number of identities (from Unix, Linux, Mac, Java and other applications) into Active Directory, Dell One gives you the power to immediately secure and control those other systems without custom coding and dedicated synchronization points. In addition, the Dell One approach perfectly complements an existing deployment with enhanced, business-driven identity intelligence. We also fill critical functionality gaps with capabilities such as single sign-on, strong authentication, efficient Active Directory administration and privileged account management.
  20. Data Protection covers two major areas: #1 – Ensuring information exists and is always actual within systems and applications, which is done via data backup and replication In other words, data backup and replication technologies ensure that PEOPLE will always be able to use and exchange most recent corporate INFORMATION in their day-to-day job activities #2 - Ensuring information is safe and secure In other words, security technologies ensure that INFORMATION will be accessed, changed and shared only by the RIGHT people, at the RIGHT time and by using the RIGHT tools so that corporate intellectual property is safe from theft or loss, and the information management tools used are working without downtime
  21. Dell backup and recovery solutions range from scalable software designed for almost any platform, to CDP & deduplication appliances as well as database & application specific data protection. Dell solutions cut backup windows from hours to minutes – and recovering data takes only seconds. Only Dell allows your customers to back up physical and virtual machines with either agent-based or agentless backup, giving them the best of both worlds. Plus, our broad portofolio lets IT choose the speed at which they recover data to meet business-driven SLAs, as well as choose the levels of protection based on how vital data and applications are to the business Note to presenter: Comprehensive data protection software: NetVault Backup CDP solutions: AppAssure Deduplication applicances: DR4000 \ DR6000 Application Specific: Recovery Manager for AD / Exchange / SharePoint, vRanger Database Specific: LiteSpeed for SQL Server
  22. Dell is the only player on the market that provides high-speed replication for both physical and virtual environments and at any layer: infrastructure, database and application. Your customer will be able to achieve high availability, offload operational reporting to a cost-effective secondary system and integrate existing data stores by copying only changed data to VMware, Hyper-V, Windows and Linux, File Systems, Exchange, Oracle, Hadoop, SQL Server, IBM DB2 and other platforms. Our solutions also simplify and accelerate backup and recovery while dramatically reducing storage costs. Note to presenter: we are discussing about Shareplex, AppAssure, vRanger Also, we’d like to mention here that Dell Compellent is the only solution on the market that leverages thin remote replication at block level. Thin replication transfers only blocks of data that have changed and does not require pre-allocation, consuming less space and helping to lower bandwidth costs.
  23. Dell is firmly committed to providing end-to-end IT solutions that enable customers to grow and thrive. This includes continuous protection of customers data, applications, systems and networks. SonicWALL simplifies and strengthens security of critical systems and data with seamless security management solutions. It fully protects organizations with highly effective intrusion prevention, anti-malware, content/URL filtering, and application control, no matter the size, budget and structure. SonicWALL also adds Active Directory®-based, two-factor authentication and strong password enforcement. Plus, provide visibility and reporting for security and permissions across Microsoft® servers and non-Windows environments. From servers to desktops to data, trust Dell to streamline security management.
  24. Dell Software gives you 30 years of experience in Information Management, Identity Management and Data Protection. This continuous effort enabled us to position the company as an international leader with over 1 mil. customers, 90% of the Global 1000 being among them
  25. In everything we do, we’re focused on delivering solutions to enable smarter decisions and more effective outcomes – giving customer the power to do more – so they can overcome obstacles, achieve their ideas and pursue their dreams. Above all, we are committed to helping them realize the superior long-term value they need to grow and thrive.