Presented at the Cluj Innovation Days for Digital Medicine & Digital Governance Conference in 2016, this materials speaks about live, work and culture in our technology-driven era. And just as how the recent discovery of gravitational waves changed for ever the world of physics, digital governance will change for ever the human world.
Find a trusted future-ready partner for the next decade of your life.
4. 4
LIFE…
1. We have the first strips that auto-tie
2. The bionic finger can sense surface texture
3. Researcher can easily re-write living organisms genetic code
4. Leukemia, Alzheimer, brain and heart injuries, and so on can
now be cured
5. New applications for grafen, hydrogen, wind and solar panels
could fasten an energy revolution
6. Elon Munsk, Jeff Bezos and space odissey
5. 5
TECHNOLOGY…
1. Electric cars are becoming a daily reality…
2. … and they are autonomous…
3. Fully replacing current technologies
4. Autonomus robots get out of the factory and in to our homes:
Domino Pizza deliverers, bellboys, housekeepers
5. DRONES!
6. Powerful lasers (ELI-NP)
7. And holodecs (INCAS)
6. 6
CULTURE…
1. Interactive digital manuals for TVs and tablets
2. Amazing archeological discoveries that model history as we
know it
3. Who was really the Neanderthal?
4. The periodic table of Mendeleev has four new elements
5. Personal jouneys to out-of-space
6. Travelling with 347 kmph across the world
8. 8
The Business Case for Digital Governance
Overcoming key risks:
• Loss of credibility
• Loss of market share
• Resource waste
• Risk of litigation
9. 9
Dell Software is Future Ready
https://www.youtube.com/watch?v=_exc_FR56is
10. 10
Dell Software – Your Today Partner for The World of
Tomorrow
It’s not about technology but about creating the culture to allow and drive the
RIGHT people to do the RIGHT job by using the RIGHT tools
21. 21
Dell ONE: Broad portofolio of products that are modular
and integrated
Access Governance
Privileged Account Management
Identity Administration
User Activity Monitoring
22. 22
Dell ONE: Complete Identity & Access Management
DELL
Single Sign-On
Provisioning
Role
Management
Identity
Intelligence
Multifactor
Authentication
Password
Management
Privileged Account
Management
Optimizing an
IAM Framework
Migration and
Consolidation
23. 23
Data Protection is about INFORMATION
#1 Backup and Replication
#2 Information Security
26. 26
Dell Connected Security: Data that is safe and secure
38B security
events
analyzed daily
1m devices
WW reporting
on 40m users
638B
intrusions
prevented in
2011
$14 trillion in
assets
protected daily
40,000 new
malware
samples
analyzed
every day
4.2B malware
attacks
blocked in
2011
Data
encrypted and
protected on
7m devices
Dell
SonicWALL
Dell Dell Secureworks
Dell Credant
Dell KaceDell Quest
Email Security
Endpoint Security
Network Security
Remote Access Security
27. 27
Did You Know That…
1. Our Information Management solutions are traditional Gartner leaders for
over 6 years?
2. Statistica and Toad are the oldest solutions still on the market today? They
were both released in 1986 and continually developed to meet your needs
3. Boomi Atomsphere is largest PaaS in the world?
4. The largest IAM-enabled organization in the world uses Dell Software
solutions?
5. Dell’s SharePlex is the “de facto” replication solution for Oracle
environments worldwide?
6. SonicWALL is the NSS Labs recommended solution for Application Firewall?
It is also the solution with the largest number of developers currently
engaged (800) and has the second largest sensors network worldwide
28. 28
A Sustained and Continuous Effort
$18 billion in investments
Seamless cloud
enablement
End-to-end
connected
security
Business-class
connected
devices
Data- driven
insights
Flexible
transition
services
Intelligent
converged
infrastructure
Connect
your workforce
Protect
your
organization
Transform
your IT efficiency
Inform
your decisions
Disciplined M&A strategy aligned with our design philosophy
29. 29
Dell Software: International Leadership
1M
customers
90%
of Global 1000 are Dell
Software customers
3M
community members
Highest overall protection
Next-Gen Firewall
NSS Labs EMA
Radar Report Value Leader
for Boomi Cloud Integration
6,000
team members
Gartner
$2B
software revenue
9 Magic Quadrants
1,600 software
engineers
2,500 software
sales
30.
31. Thank You
Transform the way you do business so you can transform the lives of
the people you serve
http://futureready.dell.com/
Editor's Notes
Hello World
My name is Adrian Dumitrescu and I am here TODAY to talk to you about TOMORROW
In less than 10 years, life as we know will change dramatically. New research and findings in technologies will change the way we live, the way we work and the way we access and process information
And just like recently discovered gravitational waves changes for ever the world of physics, recent discoveries in how to enable, process, and use technology opens a one-way door to what becomes more and more clearly – THE FUTURE
Well people, we live interesting times…
[enumerate LIFE]
New technology enablers will allow us to live a more meaningful life by simply giving us more time to do what we like, how we like
[enumerate TECHNOLOGY]
Time that we can spend for personal achievement
[enumerate CULTURE]
So what does that has to do anything with our subject today?
Digital governance is a framework for establishing accountability, roles, and decision-making authority for an organization’s DIGITAL PRESENCE - which means its websites, mobile sites, social channels, and any other Internet and Web-enabled products and services
Over the years, the organizational online presence has grown organically to such an extent that ad hoc and informal business processes and management and production guidelines are no longer adequate to manage it. The continued growth of the organizational digital presence managed by informal processes and guidelines exposes organizations to risk and liability. Key risks include loss of credibility, loss of market share, resource waste, and risk of litigation. While the risks associated with a corporate digital presence can not be completely eliminated, they can certainly be mitigated and the liabilities which come along with an underperforming online presence reduced - but only if organizations apply sensible governance constraints over digital operational practices.
Transform the way you do business so you can transform the lives of the people you serve
Everyone should understand that for organizations to be successful in the World of Tomorrow, it’s not about the technology but about enterprise collaboration and about creating the culture to allow and drive the RIGHT people to do the RIGHT job by using the RIGHT tools
The right technology, in the right situation can go a long way towards enabling teams and people to manage business processes and by that, collaborate for the common goal of maximizing business productivity
It’s easier than ever to drive value in organizations with innovative IT management solutions. Whether it’s managing virtualization and cloud computing, secure mobility user access governance, or the untapped potential of data, there are dozens of ways to unlock the power of IT in a business. The best way to start: by drastically reducing complexity and risk.
Scalable, integrated business and enterprise software solutions from Dell make it easy to secure and manage networks, applications, systems, endpoints, devices and data to help business deliver on the full promise of technology
Dell Software simplifies IT management, mitigates risk and accelerates results with end-to-end IT solutions for end-to-end needs.
No matter the size, or the activities an organization is focused on, adopting technology is always a matter of PROCESSES, PEOPLE and INFORMATION. And this is why Dell Software solution proposals will always focus on Information Management, Identity Management and Data Protection
For IT personnel, Information Management is about implementing and maintaining APPLICATIONS that will be used by non-IT PEOPLE in order to manage PROCESSES that transform DATA into INFORMATION… in other words, it’s about APPLICATION PERFORMANCE and DATA MANAGEMENT
There are two major areas of interest:
#1 Application Performance Management
#2 Big Data Analytics and Business Intelligence
Accelerates IT and helps cuts operational costs by reducing infrastructure complexity with end-to-end visibility and best practice advice built on years of virtualization management experience
Enables effective, rapid implementation of virtualization and cloud computing initiatives with the insight required to optimize configuration management, resource utilization and storage
Dell’s APM solution blends business context with deep technical insight, unifying all users and data within a structured model built around transactions. Dell allows your customers to build business services around technology, from network to OS and virtualization infrastructure and storage, from databases to applications and web user experience, giving an end-to-end view of the whole picture, and also helping organizations to meet SLA
TRANSFORM – INTEGRATE - DEVELOP
The big data analytics solutions from Dell enable business users to rapidly transform structured and unstructured data into analytic insights without the time, complexity and costs of other solutions. By combining natural language processing, machine learning and sentiment analysis technologies with easy-to use search and visualization capabilities, our big data analytics solution lets you mine content, discover relationships and realize the full value of big data
Note to presenter: We discuss about StatSoft Statistica
TRANSFORM – INTEGRATE - DEVELOP
Second, Dell enables data synchronization across application – the business can take benefit of the industry’s largest integration PaaS to connect any combination of cloud and on-premises applications. There is no limit in to the target audience: whether your customer works in a business, ISV or system integrator environment, and regardless of organization size and budget
TRANSFORM – INTEGRATE - DEVELOP
Toad is now Dell. The best known family of tools dedicated to database development & administration, but also to BI, with roots going back to the 90’s!
Dell enables self-service business intelligence, which means easily and secure access to structured and unstructured data from nearly any source, within a collaborative analysis environment that streamlines data sharing between IT and business, thru intuitive interfaces and leading visualization capabilities that enable business and technical users to easily discover new insight.
Going back to Development, Toad is the world’s #1 name for DBAs everywhere. Dell guarantees application success through improved code quality, performance and maintainability and gives you access to a community of 3 mil. users
Identity and Access Management is about creating, maintaining and mapping user accounts for the PEOPLE that will access corporate SYSTEMS and APPLICATIONS
And also to control and make sure each PERSON has the RIGHT access to do the RIGHT job by using the RIGHT tools, nothing more and nothing less
Identity Management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals
IAM is concerned with four fundamental concepts:
1. Authentication – ensuring that the person logging on to a system is who they say they are
2. Authorization – the parameters placed around what a user is allowed to do (access) once they are authenticated
3. Administration – in order to enable someone to authenticate and to be correctly authorized, there are managerial tasks that must be undertaken to set up the user account
4. Audit (Compliance) – those activities that help „prove” that authentication, authorization and administration are done at a level of security sufficient to satisfy established standards
All of the „A”assume there is an identity established for each user. This identity or account resides somewhere (typically in a directory) so it can be authenticated, authorized, managed and audited. And typically the directory is tied specifically and exclusively to the application or system that controls user access. If all this is done correctly, the four „A” are easily satisfied.
All systems include these requirements for authentication, authorization, administration and audit.
Dell is uniquelly positioned to meet your customer identity access management needs across the enterprise.
Dell One Identity solution include a broad portofolio of products. They are built to provide business driven solution simplicity with granular access controls and rapid time to value when implemented.
Dell One enables easier accountability while providing greater transparency throughout the business.
IAM is simplified by delivering:
- modular and integrated products that leverage existing investments in technology and supports other relevant components of the Dell One suite
- solutions are simple with rapid time to value
Dell One provides the most comprehensive fine grained access controls across users, systems and applications
Solutions are business driven and designed to be easy to use and configure with a user friendly interface
Additionally:
- There is no requirement for an underlying framework upon which capabilities must be built
- Control is placed in the hands of the business and data owners
Dell understands that every organization is unique and that you need the right IAM solution for your customer environment, challenges and goals. That’s why the Dell One offering is designed with flexibility in mind. Use the solutions you need now to address the short-term challenges and rely on an unparalleled depth of capabilities to meet whatever needs come down the road.
Single Sign-on
Often considered the mythical “Holy Grail” of IAM, single sign-on (SSO) is a reality through Dell One. By removing identity from a high number of systems (Unix, Linux, Mac, Java and many applications) in favor of the ubiquitous Active Directory identity, Dell One provides true SSO for a major portion of your enterprise. But Dell One doesn’t stop there. For systems that cannot be integrated with Active Directory, Dell One delivers enterprise single sign-on that initiates non-Windows authentication from initial AD logon—and it’s transparent to the user. No other solution can offer world-class “true” SSO combined with enterprise SSO for complete coverage.
Provisioning
The traditional first step in IAM, provisioning is often one of the most time-consuming, error-prone and troublesome aspects of IAM in complex environments. Dell One drives provisioning with a layer of identity intelligence that delivers automation, workflows and attestation based on your business objectives, not the limitations of your technologies or resources. Our solutions enable you to “codelessly” provision, re-provision and de-provision users across the entire enterprise. We provide self-service for end users and line-of-business personnel that frees IT from the tedious burden of many provisioning tasks. The Dell One approach lets you realize benefits in a matter of months, not years, and at a fraction of the cost of traditional provisioning frameworks.
Role Management
A key to effective IAM is establishing roles to associate your users with the appropriate policies, access rights and business processes that IAM should control. Dell One gives you the power to build a single set of roles and apply them across the enterprise. Our capabilities for consolidating identities and implementing identity intelligence make ad hoc role definition and enforcement things of the past. Dell One can even mine your existing role structure and provide you with the easy-to-use tools to normalize the roles enterprise-wide. Then, you can apply them according to the business driven policies, rules and objectives you’ve established.
Identity Intelligence
What makes IAM especially tough is correlating the disparate components (identities, roles, rules, workflows, policies and approvals) with the systems and entitlements required for users to do their jobs. Dell One delivers the 360-degree visibility and enterprise-wide control necessary to actually achieve your IAM objectives—based on your business needs, not the limitations of specific technologies. This intelligent approach (combined with key, unifying IAM components) dramatically streamlines and secures IAM, including provisioning, role management, compliance and access control.
Multifactor Authentication
Chances are, you’re moving toward multifactor authentication to further secure user access and satisfy regulations. Dell One lets you affordably implement this important technology—without having to add infrastructure. Our multifactor authentication options rely on Active Directory—not a proprietary identity store—and allow you to manage authentication through interfaces you already use. When combined with Dell One’s identity consolidation capabilities, your single solution can be applied to the largest possible portion of your environment.
Password Management
Analysts report that as much as 35 percent of help desk workload is dedicated to helping users reset forgotten passwords. Dell One helps you address this productivity-killing burden by reducing the number of passwords for each user through identity consolidation. We also strengthen and standardize policy across systems and relieve IT of the password-reset burden entirely. With fewer passwords to forget and the power to securely help themselves, users have fewer interruptions and IT can focus on more critical work.
Privileged Account Management
Let’s face it, in some IT departments today there are too many administrators who have too much power on too many systems. Native tools can’t address this issue of too many with “keys to the kingdom” because they rarely provide compliance visibility or the flexibility to manage privilege delegation or command control. Dell One gives you the power to granularly delegate administrative rights and execute command control on Windows-, AD- and Unix based systems and devices, while providing a compliance ready audit trail of administrative activities, rights and permissions that spans the entire enterprise. In addition, Dell One secures and automates the request, approval, release, use, return and changing of administrative credentials regardless of which system or which administrator account is required.
Optimizing an IdAM Framework
Perhaps you have already invested heavily in an IAM framework. Dell One can help you achieve more value from existing solutions by accelerating their deployment and reducing their complexity. By consolidating a high number of identities (from Unix, Linux, Mac, Java and other applications) into Active Directory, Dell One gives you the power to immediately secure and control those other systems without custom coding and dedicated synchronization points. In addition, the Dell One approach perfectly complements an existing deployment with enhanced, business-driven identity intelligence. We also fill critical functionality gaps with capabilities such as single sign-on, strong authentication, efficient Active Directory administration and privileged account management.
Data Protection covers two major areas:
#1 – Ensuring information exists and is always actual within systems and applications, which is done via data backup and replication
In other words, data backup and replication technologies ensure that PEOPLE will always be able to use and exchange most recent corporate INFORMATION in their day-to-day job activities
#2 - Ensuring information is safe and secure
In other words, security technologies ensure that INFORMATION will be accessed, changed and shared only by the RIGHT people, at the RIGHT time and by using the RIGHT tools so that corporate intellectual property is safe from theft or loss, and the information management tools used are working without downtime
Dell backup and recovery solutions range from scalable software designed for almost any platform, to CDP & deduplication appliances as well as database & application specific data protection. Dell solutions cut backup windows from hours to minutes – and recovering data takes only seconds.
Only Dell allows your customers to back up physical and virtual machines with either agent-based or agentless backup, giving them the best of both worlds. Plus, our broad portofolio lets IT choose the speed at which they recover data to meet business-driven SLAs, as well as choose the levels of protection based on how vital data and applications are to the business
Note to presenter:
Comprehensive data protection software: NetVault Backup
CDP solutions: AppAssure
Deduplication applicances: DR4000 \ DR6000
Application Specific: Recovery Manager for AD / Exchange / SharePoint, vRanger
Database Specific: LiteSpeed for SQL Server
Dell is the only player on the market that provides high-speed replication for both physical and virtual environments and at any layer: infrastructure, database and application. Your customer will be able to achieve high availability, offload operational reporting to a cost-effective secondary system and integrate existing data stores by copying only changed data to VMware, Hyper-V, Windows and Linux, File Systems, Exchange, Oracle, Hadoop, SQL Server, IBM DB2 and other platforms. Our solutions also simplify and accelerate backup and recovery while dramatically reducing storage costs.
Note to presenter: we are discussing about Shareplex, AppAssure, vRanger
Also, we’d like to mention here that Dell Compellent is the only solution on the market that leverages thin remote replication at block level. Thin replication transfers only blocks of data that have changed and does not require pre-allocation, consuming less space and helping to lower bandwidth costs.
Dell is firmly committed to providing end-to-end IT solutions that enable customers to grow and thrive. This includes continuous protection of customers data, applications, systems and networks.
SonicWALL simplifies and strengthens security of critical systems and data with seamless security management solutions. It fully protects organizations with highly effective intrusion prevention, anti-malware, content/URL filtering, and application control, no matter the size, budget and structure. SonicWALL also adds Active Directory®-based, two-factor authentication and strong password enforcement. Plus, provide visibility and reporting for security and permissions across Microsoft® servers and non-Windows environments. From servers to desktops to data, trust Dell to streamline security management.
DELL’S STRATEGY HAS BEEN ENHANCED BY SOME IMPORTANT ACQUISITIONS: We’ve spend $18 Billion dollars to acquire 20 companies for the future strategy
Put a different way, these acquisitions improve our ability to help our customers deliver transformative agility, efficiency, and scalability.
Acquisitions are only a part of a larger Dell strategy: They are not Dell's only strategy. We continue to develop solutions internally as well.
Acquisitions help complete Dell's journey to become a better, more responsive end-to-end solutions provider to our customers.
Having this technology in-house allows us to integrate more deeply across all IT solutions, to embed best-of-breed technologies into existing and new solutions, and to ensure that solutions continue to be easy to buy, deploy, run and use.
Acquisitions are building greater Dell competency in several key areas:
TRANSFORMING THE EFFICIENCY OF IT
Modernize the foundation (PowerEdge)
Converge management of virtual, cloud, workloads & apps together (Quest, Gale, Enstratius)
Virtualize memory for performance (RNA)
Maximize network performance (High-performance Ethernet switching Force10)
Modernize apps and rehost them (Quest, Make, Clerity)
INFORMING THE ORGANIZATION BY TURNING DATA INTO INSIGHTS
Converge storage (Exanet, EqualLogic, Compellent)
Automate storage management (Ocarina & AppAssure)
Simplify data integration (Boomi)
Manage and protect physical and virtual apps and data (Quest, AppAssure, Credant)
Improve DR, backup and recovery (Quest, SonicWALL, EqualLogic)
CONNECTING PEOPLE FOR MORE PRODUCTIVITY
Simplify management of remote clients (KACE)
Embrace cloud client computing (WYSE)
Protect mobile data in transit (Credant)
PROTECTING EVERYTHING EVERYWHERE
Unify threat management (SonicWall)
Proactively and remotely manage & monitor network security (SecureWorks)
Automate identity and access management (Quest & KACE)
Improve endpoint security and data protection (Quest & SonicWALL)
Secure email and web (SonicWall)
How many of you have customers with Mainframes? Did you know we have complete solutions for migrating and even hosting mainframes? With the purchase of software components such as Make and Clerity, these fill out services solutions for migrating mainframes. Why do they live with services? Think about it… how many times do you think your customer will “migrate from their mainframe”?
Dell Software gives you 30 years of experience in Information Management, Identity Management and Data Protection. This continuous effort enabled us to position the company as an international leader with over 1 mil. customers, 90% of the Global 1000 being among them
Dell Software is Future Ready
In everything we do, we’re focused on delivering solutions to enable smarter decisions and more effective outcomes – giving customer the power to do more – so they can overcome obstacles, achieve their ideas and pursue their dreams.
Above all, we are committed to helping them realize the superior long-term value they need to grow and thrive.