SlideShare a Scribd company logo
1 of 31
Dell Software
Your Today Partner for The
World of Tomorrow
Adrian Dumitrescu
Dell Software
adrian.dumitrescu@qeast.ro
2
LIFE
WORK
CULTURE
3
4
LIFE…
1. We have the first strips that auto-tie
2. The bionic finger can sense surface texture
3. Researcher can easily re-write living organisms genetic code
4. Leukemia, Alzheimer, brain and heart injuries, and so on can
now be cured
5. New applications for grafen, hydrogen, wind and solar panels
could fasten an energy revolution
6. Elon Munsk, Jeff Bezos and space odissey
5
TECHNOLOGY…
1. Electric cars are becoming a daily reality…
2. … and they are autonomous…
3. Fully replacing current technologies
4. Autonomus robots get out of the factory and in to our homes:
Domino Pizza deliverers, bellboys, housekeepers
5. DRONES!
6. Powerful lasers (ELI-NP)
7. And holodecs (INCAS)
6
CULTURE…
1. Interactive digital manuals for TVs and tablets
2. Amazing archeological discoveries that model history as we
know it
3. Who was really the Neanderthal?
4. The periodic table of Mendeleev has four new elements
5. Personal jouneys to out-of-space
6. Travelling with 347 kmph across the world
7
Digital Presence Means Strategy, Policy, and Standards
8
The Business Case for Digital Governance
Overcoming key risks:
• Loss of credibility
• Loss of market share
• Resource waste
• Risk of litigation
9
Dell Software is Future Ready
https://www.youtube.com/watch?v=_exc_FR56is
10
Dell Software – Your Today Partner for The World of
Tomorrow
It’s not about technology but about creating the culture to allow and drive the
RIGHT people to do the RIGHT job by using the RIGHT tools
11
End-to-End software solutions for End-to-End needs
12
Dell is uniquely positioned to meet organizations needs
Information Management
Identity Management
Data Protection
13
Information Management is about PROCESSES
#1 Application Performance Management
#2 Big Data & BI
14
Information management: END-TO-END APM
15
Information management: END-TO-END APM
16
Information management: TRANSFORM
17
Information management: INTEGRATE
18
Information management: DEVELOP
19
Identity Management is about PEOPLE
#1 User provisioning
#2 Access control
20
…in other words
21
Dell ONE: Broad portofolio of products that are modular
and integrated
Access Governance
Privileged Account Management
Identity Administration
User Activity Monitoring
22
Dell ONE: Complete Identity & Access Management
DELL
Single Sign-On
Provisioning
Role
Management
Identity
Intelligence
Multifactor
Authentication
Password
Management
Privileged Account
Management
Optimizing an
IAM Framework
Migration and
Consolidation
23
Data Protection is about INFORMATION
#1 Backup and Replication
#2 Information Security
24
Foundational Backup & Recovery
25
Simple, affordable zero-impact replication
26
Dell Connected Security: Data that is safe and secure
38B security
events
analyzed daily
1m devices
WW reporting
on 40m users
638B
intrusions
prevented in
2011
$14 trillion in
assets
protected daily
40,000 new
malware
samples
analyzed
every day
4.2B malware
attacks
blocked in
2011
Data
encrypted and
protected on
7m devices
Dell
SonicWALL
Dell Dell Secureworks
Dell Credant
Dell KaceDell Quest
Email Security
Endpoint Security
Network Security
Remote Access Security
27
Did You Know That…
1. Our Information Management solutions are traditional Gartner leaders for
over 6 years?
2. Statistica and Toad are the oldest solutions still on the market today? They
were both released in 1986 and continually developed to meet your needs
3. Boomi Atomsphere is largest PaaS in the world?
4. The largest IAM-enabled organization in the world uses Dell Software
solutions?
5. Dell’s SharePlex is the “de facto” replication solution for Oracle
environments worldwide?
6. SonicWALL is the NSS Labs recommended solution for Application Firewall?
It is also the solution with the largest number of developers currently
engaged (800) and has the second largest sensors network worldwide
28
A Sustained and Continuous Effort
$18 billion in investments
Seamless cloud
enablement
End-to-end
connected
security
Business-class
connected
devices
Data- driven
insights
Flexible
transition
services
Intelligent
converged
infrastructure
Connect
your workforce
Protect
your
organization
Transform
your IT efficiency
Inform
your decisions
Disciplined M&A strategy aligned with our design philosophy
29
Dell Software: International Leadership
1M
customers
90%
of Global 1000 are Dell
Software customers
3M
community members
Highest overall protection
Next-Gen Firewall
NSS Labs EMA
Radar Report Value Leader
for Boomi Cloud Integration
6,000
team members
Gartner
$2B
software revenue
9 Magic Quadrants
1,600 software
engineers
2,500 software
sales
Thank You
Transform the way you do business so you can transform the lives of
the people you serve
http://futureready.dell.com/

More Related Content

What's hot

Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final reportDuggirala Madhu
 
Latest innovation in technology
Latest innovation in technologyLatest innovation in technology
Latest innovation in technologyrichard786
 
Project oxygen seminar report
Project oxygen seminar reportProject oxygen seminar report
Project oxygen seminar reportniharmishra13
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellaryAjay kumar
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery pptNida Khan
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellerysanith123
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hintsYoga Kkg
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery harish kumar
 
Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhanJana Vontari
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Prachi Jain
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewelleryChitradevi
 

What's hot (20)

Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
Latest innovation in technology
Latest innovation in technologyLatest innovation in technology
Latest innovation in technology
 
Project oxygen seminar report
Project oxygen seminar reportProject oxygen seminar report
Project oxygen seminar report
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery
 
DIGITAL JEWELERY
DIGITAL JEWELERYDIGITAL JEWELERY
DIGITAL JEWELERY
 
Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhan
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to Dell Software is Future Ready - no movie

Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...
Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...
Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...The Research Council of Norway, IKTPLUSS
 
1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkom1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkomArry Widodo
 
Dr Jimmy Schwarzkopf Keynote @STKI Summit 2011
Dr Jimmy Schwarzkopf  Keynote @STKI Summit 2011Dr Jimmy Schwarzkopf  Keynote @STKI Summit 2011
Dr Jimmy Schwarzkopf Keynote @STKI Summit 2011Dr. Jimmy Schwarzkopf
 
Science & Technology - Past and Future Development
Science & Technology - Past and Future DevelopmentScience & Technology - Past and Future Development
Science & Technology - Past and Future DevelopmentMenhariq Noor
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha Maheshwari
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.Laurie Lamberth
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsAmr Elaziz
 

Similar to Dell Software is Future Ready - no movie (20)

2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov
 
Dna computers
Dna computers Dna computers
Dna computers
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...
Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...
Research in ICT - what we should do, and why it matters, Olav Lysne, Simula R...
 
1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkom1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkom
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
 
Dr Jimmy Schwarzkopf Keynote @STKI Summit 2011
Dr Jimmy Schwarzkopf  Keynote @STKI Summit 2011Dr Jimmy Schwarzkopf  Keynote @STKI Summit 2011
Dr Jimmy Schwarzkopf Keynote @STKI Summit 2011
 
Science & Technology - Past and Future Development
Science & Technology - Past and Future DevelopmentScience & Technology - Past and Future Development
Science & Technology - Past and Future Development
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Smart homes
Smart homesSmart homes
Smart homes
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Mobile August 2011
Mobile   August 2011Mobile   August 2011
Mobile August 2011
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Dell
Dell Dell
Dell
 
The connected utility
The connected utilityThe connected utility
The connected utility
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
iot_ppt.pptx
iot_ppt.pptxiot_ppt.pptx
iot_ppt.pptx
 

More from Adrian Dumitrescu

OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
Dell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled EnterprisesDell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled EnterprisesAdrian Dumitrescu
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestAdrian Dumitrescu
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallAdrian Dumitrescu
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 

More from Adrian Dumitrescu (8)

OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Dell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled EnterprisesDell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled Enterprises
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWall
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 

Recently uploaded

Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 

Recently uploaded (20)

Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 

Dell Software is Future Ready - no movie

  • 1. Dell Software Your Today Partner for The World of Tomorrow Adrian Dumitrescu Dell Software adrian.dumitrescu@qeast.ro
  • 3. 3
  • 4. 4 LIFE… 1. We have the first strips that auto-tie 2. The bionic finger can sense surface texture 3. Researcher can easily re-write living organisms genetic code 4. Leukemia, Alzheimer, brain and heart injuries, and so on can now be cured 5. New applications for grafen, hydrogen, wind and solar panels could fasten an energy revolution 6. Elon Munsk, Jeff Bezos and space odissey
  • 5. 5 TECHNOLOGY… 1. Electric cars are becoming a daily reality… 2. … and they are autonomous… 3. Fully replacing current technologies 4. Autonomus robots get out of the factory and in to our homes: Domino Pizza deliverers, bellboys, housekeepers 5. DRONES! 6. Powerful lasers (ELI-NP) 7. And holodecs (INCAS)
  • 6. 6 CULTURE… 1. Interactive digital manuals for TVs and tablets 2. Amazing archeological discoveries that model history as we know it 3. Who was really the Neanderthal? 4. The periodic table of Mendeleev has four new elements 5. Personal jouneys to out-of-space 6. Travelling with 347 kmph across the world
  • 7. 7 Digital Presence Means Strategy, Policy, and Standards
  • 8. 8 The Business Case for Digital Governance Overcoming key risks: • Loss of credibility • Loss of market share • Resource waste • Risk of litigation
  • 9. 9 Dell Software is Future Ready https://www.youtube.com/watch?v=_exc_FR56is
  • 10. 10 Dell Software – Your Today Partner for The World of Tomorrow It’s not about technology but about creating the culture to allow and drive the RIGHT people to do the RIGHT job by using the RIGHT tools
  • 11. 11 End-to-End software solutions for End-to-End needs
  • 12. 12 Dell is uniquely positioned to meet organizations needs Information Management Identity Management Data Protection
  • 13. 13 Information Management is about PROCESSES #1 Application Performance Management #2 Big Data & BI
  • 19. 19 Identity Management is about PEOPLE #1 User provisioning #2 Access control
  • 21. 21 Dell ONE: Broad portofolio of products that are modular and integrated Access Governance Privileged Account Management Identity Administration User Activity Monitoring
  • 22. 22 Dell ONE: Complete Identity & Access Management DELL Single Sign-On Provisioning Role Management Identity Intelligence Multifactor Authentication Password Management Privileged Account Management Optimizing an IAM Framework Migration and Consolidation
  • 23. 23 Data Protection is about INFORMATION #1 Backup and Replication #2 Information Security
  • 26. 26 Dell Connected Security: Data that is safe and secure 38B security events analyzed daily 1m devices WW reporting on 40m users 638B intrusions prevented in 2011 $14 trillion in assets protected daily 40,000 new malware samples analyzed every day 4.2B malware attacks blocked in 2011 Data encrypted and protected on 7m devices Dell SonicWALL Dell Dell Secureworks Dell Credant Dell KaceDell Quest Email Security Endpoint Security Network Security Remote Access Security
  • 27. 27 Did You Know That… 1. Our Information Management solutions are traditional Gartner leaders for over 6 years? 2. Statistica and Toad are the oldest solutions still on the market today? They were both released in 1986 and continually developed to meet your needs 3. Boomi Atomsphere is largest PaaS in the world? 4. The largest IAM-enabled organization in the world uses Dell Software solutions? 5. Dell’s SharePlex is the “de facto” replication solution for Oracle environments worldwide? 6. SonicWALL is the NSS Labs recommended solution for Application Firewall? It is also the solution with the largest number of developers currently engaged (800) and has the second largest sensors network worldwide
  • 28. 28 A Sustained and Continuous Effort $18 billion in investments Seamless cloud enablement End-to-end connected security Business-class connected devices Data- driven insights Flexible transition services Intelligent converged infrastructure Connect your workforce Protect your organization Transform your IT efficiency Inform your decisions Disciplined M&A strategy aligned with our design philosophy
  • 29. 29 Dell Software: International Leadership 1M customers 90% of Global 1000 are Dell Software customers 3M community members Highest overall protection Next-Gen Firewall NSS Labs EMA Radar Report Value Leader for Boomi Cloud Integration 6,000 team members Gartner $2B software revenue 9 Magic Quadrants 1,600 software engineers 2,500 software sales
  • 30.
  • 31. Thank You Transform the way you do business so you can transform the lives of the people you serve http://futureready.dell.com/

Editor's Notes

  1. Hello World My name is Adrian Dumitrescu and I am here TODAY to talk to you about TOMORROW
  2. In less than 10 years, life as we know will change dramatically. New research and findings in technologies will change the way we live, the way we work and the way we access and process information
  3. And just like recently discovered gravitational waves changes for ever the world of physics, recent discoveries in how to enable, process, and use technology opens a one-way door to what becomes more and more clearly – THE FUTURE
  4. Well people, we live interesting times… [enumerate LIFE]
  5. New technology enablers will allow us to live a more meaningful life by simply giving us more time to do what we like, how we like [enumerate TECHNOLOGY]
  6. Time that we can spend for personal achievement [enumerate CULTURE]
  7. So what does that has to do anything with our subject today? Digital governance is a framework for establishing accountability, roles, and decision-making authority for an organization’s DIGITAL PRESENCE - which means its websites, mobile sites, social channels, and any other Internet and Web-enabled products and services
  8. Over the years, the organizational online presence has grown organically to such an extent that ad hoc and informal business processes and management and production guidelines are no longer adequate to manage it. The continued growth of the organizational digital presence managed by informal processes and guidelines exposes organizations to risk and liability.  Key risks include loss of credibility, loss of market share, resource waste, and risk of litigation. While the risks associated with a corporate digital presence can not be completely eliminated, they can certainly be mitigated and the liabilities which come along with an underperforming online presence reduced - but only if organizations apply sensible governance constraints over digital operational practices.
  9. Transform the way you do business so you can transform the lives of the people you serve
  10. Everyone should understand that for organizations to be successful in the World of Tomorrow, it’s not about the technology but about enterprise collaboration and about creating the culture to allow and drive the RIGHT people to do the RIGHT job by using the RIGHT tools The right technology, in the right situation can go a long way towards enabling teams and people to manage business processes and by that, collaborate for the common goal of maximizing business productivity
  11. It’s easier than ever to drive value in organizations with innovative IT management solutions. Whether it’s managing virtualization and cloud computing, secure mobility user access governance, or the untapped potential of data, there are dozens of ways to unlock the power of IT in a business. The best way to start: by drastically reducing complexity and risk. Scalable, integrated business and enterprise software solutions from Dell make it easy to secure and manage networks, applications, systems, endpoints, devices and data to help business deliver on the full promise of technology Dell Software simplifies IT management, mitigates risk and accelerates results with end-to-end IT solutions for end-to-end needs.
  12. No matter the size, or the activities an organization is focused on, adopting technology is always a matter of PROCESSES, PEOPLE and INFORMATION. And this is why Dell Software solution proposals will always focus on Information Management, Identity Management and Data Protection
  13. For IT personnel, Information Management is about implementing and maintaining APPLICATIONS that will be used by non-IT PEOPLE in order to manage PROCESSES that transform DATA into INFORMATION… in other words, it’s about APPLICATION PERFORMANCE and DATA MANAGEMENT There are two major areas of interest: #1 Application Performance Management #2 Big Data Analytics and Business Intelligence
  14. Accelerates IT and helps cuts operational costs by reducing infrastructure complexity with end-to-end visibility and best practice advice built on years of virtualization management experience Enables effective, rapid implementation of virtualization and cloud computing initiatives with the insight required to optimize configuration management, resource utilization and storage
  15. Dell’s APM solution blends business context with deep technical insight, unifying all users and data within a structured model built around transactions. Dell allows your customers to build business services around technology, from network to OS and virtualization infrastructure and storage, from databases to applications and web user experience, giving an end-to-end view of the whole picture, and also helping organizations to meet SLA
  16. TRANSFORM – INTEGRATE - DEVELOP The big data analytics solutions from Dell enable business users to rapidly transform structured and unstructured data into analytic insights without the time, complexity and costs of other solutions. By combining natural language processing, machine learning and sentiment analysis technologies with easy-to use search and visualization capabilities, our big data analytics solution lets you mine content, discover relationships and realize the full value of big data Note to presenter: We discuss about StatSoft Statistica
  17. TRANSFORM – INTEGRATE - DEVELOP Second, Dell enables data synchronization across application – the business can take benefit of the industry’s largest integration PaaS to connect any combination of cloud and on-premises applications. There is no limit in to the target audience: whether your customer works in a business, ISV or system integrator environment, and regardless of organization size and budget
  18. TRANSFORM – INTEGRATE - DEVELOP Toad is now Dell. The best known family of tools dedicated to database development & administration, but also to BI, with roots going back to the 90’s! Dell enables self-service business intelligence, which means easily and secure access to structured and unstructured data from nearly any source, within a collaborative analysis environment that streamlines data sharing between IT and business, thru intuitive interfaces and leading visualization capabilities that enable business and technical users to easily discover new insight. Going back to Development, Toad is the world’s #1 name for DBAs everywhere. Dell guarantees application success through improved code quality, performance and maintainability and gives you access to a community of 3 mil. users
  19. Identity and Access Management is about creating, maintaining and mapping user accounts for the PEOPLE that will access corporate SYSTEMS and APPLICATIONS And also to control and make sure each PERSON has the RIGHT access to do the RIGHT job by using the RIGHT tools, nothing more and nothing less Identity Management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals
  20. IAM is concerned with four fundamental concepts: 1. Authentication – ensuring that the person logging on to a system is who they say they are 2. Authorization – the parameters placed around what a user is allowed to do (access) once they are authenticated 3. Administration – in order to enable someone to authenticate and to be correctly authorized, there are managerial tasks that must be undertaken to set up the user account 4. Audit (Compliance) – those activities that help „prove” that authentication, authorization and administration are done at a level of security sufficient to satisfy established standards All of the „A”assume there is an identity established for each user. This identity or account resides somewhere (typically in a directory) so it can be authenticated, authorized, managed and audited. And typically the directory is tied specifically and exclusively to the application or system that controls user access. If all this is done correctly, the four „A” are easily satisfied. All systems include these requirements for authentication, authorization, administration and audit.
  21. Dell is uniquelly positioned to meet your customer identity access management needs across the enterprise. Dell One Identity solution include a broad portofolio of products. They are built to provide business driven solution simplicity with granular access controls and rapid time to value when implemented. Dell One enables easier accountability while providing greater transparency throughout the business. IAM is simplified by delivering: - modular and integrated products that leverage existing investments in technology and supports other relevant components of the Dell One suite - solutions are simple with rapid time to value Dell One provides the most comprehensive fine grained access controls across users, systems and applications Solutions are business driven and designed to be easy to use and configure with a user friendly interface Additionally: - There is no requirement for an underlying framework upon which capabilities must be built - Control is placed in the hands of the business and data owners
  22. Dell understands that every organization is unique and that you need the right IAM solution for your customer environment, challenges and goals. That’s why the Dell One offering is designed with flexibility in mind. Use the solutions you need now to address the short-term challenges and rely on an unparalleled depth of capabilities to meet whatever needs come down the road. Single Sign-on Often considered the mythical “Holy Grail” of IAM, single sign-on (SSO) is a reality through Dell One. By removing identity from a high number of systems (Unix, Linux, Mac, Java and many applications) in favor of the ubiquitous Active Directory identity, Dell One provides true SSO for a major portion of your enterprise. But Dell One doesn’t stop there. For systems that cannot be integrated with Active Directory, Dell One delivers enterprise single sign-on that initiates non-Windows authentication from initial AD logon—and it’s transparent to the user. No other solution can offer world-class “true” SSO combined with enterprise SSO for complete coverage. Provisioning The traditional first step in IAM, provisioning is often one of the most time-consuming, error-prone and troublesome aspects of IAM in complex environments. Dell One drives provisioning with a layer of identity intelligence that delivers automation, workflows and attestation based on your business objectives, not the limitations of your technologies or resources. Our solutions enable you to “codelessly” provision, re-provision and de-provision users across the entire enterprise. We provide self-service for end users and line-of-business personnel that frees IT from the tedious burden of many provisioning tasks. The Dell One approach lets you realize benefits in a matter of months, not years, and at a fraction of the cost of traditional provisioning frameworks. Role Management A key to effective IAM is establishing roles to associate your users with the appropriate policies, access rights and business processes that IAM should control. Dell One gives you the power to build a single set of roles and apply them across the enterprise. Our capabilities for consolidating identities and implementing identity intelligence make ad hoc role definition and enforcement things of the past. Dell One can even mine your existing role structure and provide you with the easy-to-use tools to normalize the roles enterprise-wide. Then, you can apply them according to the business driven policies, rules and objectives you’ve established. Identity Intelligence What makes IAM especially tough is correlating the disparate components (identities, roles, rules, workflows, policies and approvals) with the systems and entitlements required for users to do their jobs. Dell One delivers the 360-degree visibility and enterprise-wide control necessary to actually achieve your IAM objectives—based on your business needs, not the limitations of specific technologies. This intelligent approach (combined with key, unifying IAM components) dramatically streamlines and secures IAM, including provisioning, role management, compliance and access control. Multifactor Authentication Chances are, you’re moving toward multifactor authentication to further secure user access and satisfy regulations. Dell One lets you affordably implement this important technology—without having to add infrastructure. Our multifactor authentication options rely on Active Directory—not a proprietary identity store—and allow you to manage authentication through interfaces you already use. When combined with Dell One’s identity consolidation capabilities, your single solution can be applied to the largest possible portion of your environment. Password Management Analysts report that as much as 35 percent of help desk workload is dedicated to helping users reset forgotten passwords. Dell One helps you address this productivity-killing burden by reducing the number of passwords for each user through identity consolidation. We also strengthen and standardize policy across systems and relieve IT of the password-reset burden entirely. With fewer passwords to forget and the power to securely help themselves, users have fewer interruptions and IT can focus on more critical work. Privileged Account Management Let’s face it, in some IT departments today there are too many administrators who have too much power on too many systems. Native tools can’t address this issue of too many with “keys to the kingdom” because they rarely provide compliance visibility or the flexibility to manage privilege delegation or command control. Dell One gives you the power to granularly delegate administrative rights and execute command control on Windows-, AD- and Unix based systems and devices, while providing a compliance ready audit trail of administrative activities, rights and permissions that spans the entire enterprise. In addition, Dell One secures and automates the request, approval, release, use, return and changing of administrative credentials regardless of which system or which administrator account is required. Optimizing an IdAM Framework Perhaps you have already invested heavily in an IAM framework. Dell One can help you achieve more value from existing solutions by accelerating their deployment and reducing their complexity. By consolidating a high number of identities (from Unix, Linux, Mac, Java and other applications) into Active Directory, Dell One gives you the power to immediately secure and control those other systems without custom coding and dedicated synchronization points. In addition, the Dell One approach perfectly complements an existing deployment with enhanced, business-driven identity intelligence. We also fill critical functionality gaps with capabilities such as single sign-on, strong authentication, efficient Active Directory administration and privileged account management.
  23. Data Protection covers two major areas: #1 – Ensuring information exists and is always actual within systems and applications, which is done via data backup and replication In other words, data backup and replication technologies ensure that PEOPLE will always be able to use and exchange most recent corporate INFORMATION in their day-to-day job activities #2 - Ensuring information is safe and secure In other words, security technologies ensure that INFORMATION will be accessed, changed and shared only by the RIGHT people, at the RIGHT time and by using the RIGHT tools so that corporate intellectual property is safe from theft or loss, and the information management tools used are working without downtime
  24. Dell backup and recovery solutions range from scalable software designed for almost any platform, to CDP & deduplication appliances as well as database & application specific data protection. Dell solutions cut backup windows from hours to minutes – and recovering data takes only seconds. Only Dell allows your customers to back up physical and virtual machines with either agent-based or agentless backup, giving them the best of both worlds. Plus, our broad portofolio lets IT choose the speed at which they recover data to meet business-driven SLAs, as well as choose the levels of protection based on how vital data and applications are to the business Note to presenter: Comprehensive data protection software: NetVault Backup CDP solutions: AppAssure Deduplication applicances: DR4000 \ DR6000 Application Specific: Recovery Manager for AD / Exchange / SharePoint, vRanger Database Specific: LiteSpeed for SQL Server
  25. Dell is the only player on the market that provides high-speed replication for both physical and virtual environments and at any layer: infrastructure, database and application. Your customer will be able to achieve high availability, offload operational reporting to a cost-effective secondary system and integrate existing data stores by copying only changed data to VMware, Hyper-V, Windows and Linux, File Systems, Exchange, Oracle, Hadoop, SQL Server, IBM DB2 and other platforms. Our solutions also simplify and accelerate backup and recovery while dramatically reducing storage costs. Note to presenter: we are discussing about Shareplex, AppAssure, vRanger Also, we’d like to mention here that Dell Compellent is the only solution on the market that leverages thin remote replication at block level. Thin replication transfers only blocks of data that have changed and does not require pre-allocation, consuming less space and helping to lower bandwidth costs.
  26. Dell is firmly committed to providing end-to-end IT solutions that enable customers to grow and thrive. This includes continuous protection of customers data, applications, systems and networks. SonicWALL simplifies and strengthens security of critical systems and data with seamless security management solutions. It fully protects organizations with highly effective intrusion prevention, anti-malware, content/URL filtering, and application control, no matter the size, budget and structure. SonicWALL also adds Active Directory®-based, two-factor authentication and strong password enforcement. Plus, provide visibility and reporting for security and permissions across Microsoft® servers and non-Windows environments. From servers to desktops to data, trust Dell to streamline security management.
  27. DELL’S STRATEGY HAS BEEN ENHANCED BY SOME IMPORTANT ACQUISITIONS: We’ve spend $18 Billion dollars to acquire 20 companies for the future strategy Put a different way, these acquisitions improve our ability to help our customers deliver transformative agility, efficiency, and scalability. Acquisitions are only a part of a larger Dell strategy: They are not Dell's only strategy. We continue to develop solutions internally as well. Acquisitions help complete Dell's journey to become a better, more responsive end-to-end solutions provider to our customers. Having this technology in-house allows us to integrate more deeply across all IT solutions, to embed best-of-breed technologies into existing and new solutions, and to ensure that solutions continue to be easy to buy, deploy, run and use. Acquisitions are building greater Dell competency in several key areas: TRANSFORMING THE EFFICIENCY OF IT Modernize the foundation (PowerEdge) Converge management of virtual, cloud, workloads & apps together (Quest, Gale, Enstratius) Virtualize memory for performance (RNA) Maximize network performance (High-performance Ethernet switching Force10) Modernize apps and rehost them (Quest, Make, Clerity) INFORMING THE ORGANIZATION BY TURNING DATA INTO INSIGHTS Converge storage (Exanet, EqualLogic, Compellent) Automate storage management (Ocarina & AppAssure) Simplify data integration (Boomi) Manage and protect physical and virtual apps and data (Quest, AppAssure, Credant) Improve DR, backup and recovery (Quest, SonicWALL, EqualLogic) CONNECTING PEOPLE FOR MORE PRODUCTIVITY Simplify management of remote clients (KACE) Embrace cloud client computing (WYSE) Protect mobile data in transit (Credant) PROTECTING EVERYTHING EVERYWHERE Unify threat management (SonicWall) Proactively and remotely manage & monitor network security (SecureWorks) Automate identity and access management (Quest & KACE) Improve endpoint security and data protection (Quest & SonicWALL) Secure email and web (SonicWall) How many of you have customers with Mainframes? Did you know we have complete solutions for migrating and even hosting mainframes? With the purchase of software components such as Make and Clerity, these fill out services solutions for migrating mainframes. Why do they live with services? Think about it… how many times do you think your customer will “migrate from their mainframe”?
  28. Dell Software gives you 30 years of experience in Information Management, Identity Management and Data Protection. This continuous effort enabled us to position the company as an international leader with over 1 mil. customers, 90% of the Global 1000 being among them Dell Software is Future Ready
  29. In everything we do, we’re focused on delivering solutions to enable smarter decisions and more effective outcomes – giving customer the power to do more – so they can overcome obstacles, achieve their ideas and pursue their dreams. Above all, we are committed to helping them realize the superior long-term value they need to grow and thrive.