SlideShare a Scribd company logo
Dell World 2014 
Securely managing all Dell and non-Dell end user devices 
Roger Bjork, Director, Dell Mobile/BYOD Solutions 
Bill Odell, Director, Dell Endpoint Systems Management 
November 5-6, 2014 
Dell World 2014
Dell World 2014 
The biggest barriers to mobility 
Risk of data breach 
Cost of maintaining mobile devices 
Complexity of managing multiple platforms and devices 
50% 
40% 
36% 
According to Dell’s Global Technology Adoption Index:
Dell World 2014 
Only Dell’s end-to-end portfolio addresses mobility challenges across the enterprise One-off solutions increase complexity, cost and risk 
Choose one strategic partner who can provide unified support 
IT decision 
maker 
$ 
Vendor complexity 
? 
$ 
Too many vendors 
to choose from 
Disparate 
support teams 
Disconnected 
back ends 
Small vendors 
bought out 
One strategic partner
Dell World 2014 
Dell’s end-to-end mobility heritage 
Single partner with breadth and leadership 
Dell - Internal Use - Confidential - Privileged 
4 
Dell KACE/EMM systems management 
Dell Secure Mobile Access 
Dell Networking W-Series 
Dell Data Protection | Encryption Enterprise 
Dell One Identity Cloud Access Manager 
Application Services 
Dell’s entry into enterprise mobile management extends from leadership across ESM, UTM, networking, MDP, IAM and ITO industry segments
Dell World 2014 
KACE and EMM “Better together”
Dell World 2014 
Integrated solutions for a multi device world 
for ALL devices 
across MULTIPLE platforms 
Corporate issued 
Employee owned (BYOD) 
across the LIFECYCLE 
Deploy 
Manage 
Secure 
Service
Dell World 2014 
Dell ESM – KACE, EMM and Desktop Authority 
K1000 Management Appliance 
Comprehensive systems management for laptops, desktops, servers and tablets. Improve security, meet compliance requirements and decrease user downtime 
K2000 Deployment Appliance 
Integrated systems provisioning and deployment, fulfilling tasks including inventory assessment, OS and application provisioning, migration and recovery 
Enterprise Mobility Management (EMM) 
Flexible, comprehensive, K1000 integrated solution for securely, managing mobile devices – both BYOD and corporate owned 
Desktop Authority Management Suite (DAMS) 
Provides a centralized, secure and consistent management of the Windows user environment that automates users’ access to resources and applications
Dell World 2014 
KACE K1000 Management Appliance 
Know 
Manage 
Enforce 
Asset management 
Configuration scans 
Inventory 
Dell Warranty 
Patch management 
Software metering 
Help desk 
Software distribution 
Reporting
Dell World 2014 
New: K1000 v6.0 – Securely Managing IoT 
SECURE 
•Machine configuration 
•Security scanning 
Security 
•Software blacklisting 
•Full OS and device inventory 
Expertise 
•Deployment & maintenance 
•User interface 
•K1000 GO mobile app 
Visibility 
•Robust discovery 
•Broader platform support 
•Agentless technology
Dell World 2014 
Flexible deployment options 
Physical appliance 
Virtual appliance 
Hosted appliance
Dell World 2014 
Dell Enterprise Mobility Management (EMM) 
Your devices, your users, your mobile strategy 
•Complete, secure endpoint management 
•Secure enterprise workspace on all devices 
•Secure access to enterprise data 
•Integrated console management 
•User self-service 
•Identity management 
•Business apps and services you need 
•Flexibility for future-proofing 
Comprehensive mobile enablement 
Endpoint management 
Smartphones 
Tablets 
M2M 
Laptops 
Desktops 
Smartphones 
Tablets 
Laptops 
Workspace management 
Corporate issued 
User owned (BYOD)
Dell World 2014 
Dell Enterprise Mobility Management (EMM) 
•Complete, secure endpoint management 
•Secure enterprise workspace on all devices 
•Secure access to enterprise data 
•Integrated console management 
•User self-service 
•Identity management 
•Business apps and services you need 
•Flexibility for future-proofing 
Your devices, your users, your mobile strategy 
Comprehensive mobile enablement 
Endpoint management 
Smartphones 
Tablets 
M2M 
Laptops 
Desktops 
Smartphones 
Tablets 
Laptops 
Workspace management 
Corporate issued 
User owned (BYOD) 
Dell Mobile Management 
Dell KACE K1000 & K1000 as a Service 
Dell Mobile Workspace 
Dell Desktop Workspace
Dell World 2014 
EMM – An integrated platform for all endpoints 
Dell KACE K1000 
Corporate owned 
Dell Mobile Management 
Corporate owned 
BYOD 
Dell Mobile Workspace 
Dell Desktop Workspace 
BYOD 
K1000 manages all corporate owned PCs 
•Manages secure applications on BYOD mobile 
•Manages corporate owned mobile 
•Passes inventory to K1000 
Creates secure applications on BYOD mobile 
•Creates secure applications on BYOD PCs 
•Manages PC owner privileges 
•K1000 can manage virtual secure application
Dell World 2014 
Dell Mobile Management 
Enterprise benefits 
• Security and compliance 
• Policy management 
• Rapid deployment 
• Automatic upgrades 
• OpEx instead of CapEx 
• Targeted tools for the job 
Central 
management 
Mobile device, 
application and 
content 
management 
User self-service 
portal 
Real-time 
reporting, 
alerts and 
analytics 
Securely manage and provision enterprise smartphones and tablets with a 
SaaS-based solution
Dell World 2014 
Dell Mobile Workspace 
Secure email, calendar, contacts, browser and file manager 
Optional productivity applications 
Secure remote access and data separation 
Central management 
User benefits 
Enterprise benefits 
•Productivity and collaboration 
•Device choice (smartphones and tablets) 
•Personal privacy 
•Security & data loss protection 
•Management and control 
•Increased user productivity 
•Rapid deployment 
•Automatic upgrades 
•OpEx instead of CapEx 
•Encourages adoption 
Increase productivity by enabling your users to work remotely and securely on enterprise or personal mobile devices
Dell World 2014 
Dell Business Phone 
Powered by Vonage Business Solutions™ 
•Make your telecom budget go further 
•Manage and control calling plans and records 
•Secure enterprise phone data with Dell Mobile Workspace 
•Deliver robust features, like a conference bridge, call recording and group text messaging 
•Extend coverage with calling over Wi-Fi 
•Improve productivity and collaboration 
Make the move to BYO by providing a business phone service on personal smartphones and tablets with robust features, security and control
Dell World 2014 
Box for Dell 
File sync and share capabilities 
Safeguard content on personally-owned 
mobile devices 
Use Box for Dell with Dell Mobile Workspace or 
Dell Desktop Workspace. 
Share content in the partner’s cloud or your cloud, 
sync it between devices and collaborate across your business 
Secure Connect Collaborate
Dell World 2014 
Dell Desktop Workspace 
Enterprise benefits: 
•Four layers of security 
•Management and control 
•Increased user productivity 
•Low-friction integration 
•Rapid onboarding 
•No hardware to purchase 
•Access to legacy applications 
Del – Internal Use – Confidential 
4 layers of security 
1 
2 
3 
4 
DLP 
Encryption 
Secure remote access 
Firewall 
•Best application performance 
•Consistent experience 
•Work while offline 
•Laptop of your choice 
User benefits: 
•Remote employees 
•Contractors and consultants 
•Mobile employees 
•Mergers and acquisitions 
•Offshore software development 
•Executives who prefer Macs 
Use cases: 
Provide a secure, managed environment for your enterprise Windows image on corporate-managed or personally-owned PCs and Macs
Dell World 2014 
Next steps 
Visit us in the Solutions Expo to: 
•See a demo 
•Learn about FREE 1-YEAR KACE and EMM offers. 
Attend other Mobility sessions: 
•MT54: The new reality of mobile solutions: Everything you have been told about mobility is wrong 
•MT24: Enabling mobility without compromising security
Dell World 2014 
Thank you.
Want to learn more about 
Dell’s mobility solutions? 
Learn via email. Start here. 
Sign me up!

More Related Content

What's hot

Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Kenneth de Brucq
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Uni Systems S.M.S.A.
 
CA Unified Endpoint Management
CA Unified Endpoint ManagementCA Unified Endpoint Management
CA Unified Endpoint ManagementCA Technologies
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategyMicro Focus
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Uni Systems S.M.S.A.
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”Kenneth de Brucq
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagMicrosoft
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 

What's hot (20)

Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
CA Unified Endpoint Management
CA Unified Endpoint ManagementCA Unified Endpoint Management
CA Unified Endpoint Management
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Byod
ByodByod
Byod
 
Merlin Software presentation for ARDA World Convention 2012
Merlin Software presentation for ARDA World Convention 2012Merlin Software presentation for ARDA World Convention 2012
Merlin Software presentation for ARDA World Convention 2012
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 

Viewers also liked

(Applicatie-)migratie naar de Cloud
(Applicatie-)migratie naar de Cloud(Applicatie-)migratie naar de Cloud
(Applicatie-)migratie naar de CloudArno Flapper
 
TS31103 ISIM introduction
TS31103 ISIM introductionTS31103 ISIM introduction
TS31103 ISIM introductionKimmy Yang
 
Employee Fraud Prevention and Remedies
Employee Fraud Prevention and RemediesEmployee Fraud Prevention and Remedies
Employee Fraud Prevention and RemediesSSDlaw
 
Vendor Selection
Vendor SelectionVendor Selection
Vendor SelectionPMG-I
 
Software Selection & Evaluation
Software Selection & EvaluationSoftware Selection & Evaluation
Software Selection & EvaluationAlaa Sadik
 
Multi Vendor Management
Multi Vendor ManagementMulti Vendor Management
Multi Vendor ManagementMuratSelcuk
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Best Practices in Software Vendor Selection
Best Practices in Software Vendor SelectionBest Practices in Software Vendor Selection
Best Practices in Software Vendor SelectionAdvantiv Solutions, LLC
 
Vendor Selection Process
Vendor Selection ProcessVendor Selection Process
Vendor Selection Processgrinehart
 
Supplier evaluation & selection
Supplier evaluation & selectionSupplier evaluation & selection
Supplier evaluation & selectionAnkit
 
Supplier selection
Supplier selectionSupplier selection
Supplier selectionjoecobe
 
Supplier evaluation criteria
Supplier evaluation criteriaSupplier evaluation criteria
Supplier evaluation criteriaArt Acosta
 
Vendor Management Systems Best Practices
Vendor Management Systems Best PracticesVendor Management Systems Best Practices
Vendor Management Systems Best Practicesjeffmonaghan
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor managementRaminder Pal Singh
 
SUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATIONSUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATIONZamri Yahya
 

Viewers also liked (20)

(Applicatie-)migratie naar de Cloud
(Applicatie-)migratie naar de Cloud(Applicatie-)migratie naar de Cloud
(Applicatie-)migratie naar de Cloud
 
TS31103 ISIM introduction
TS31103 ISIM introductionTS31103 ISIM introduction
TS31103 ISIM introduction
 
Employee Fraud Prevention and Remedies
Employee Fraud Prevention and RemediesEmployee Fraud Prevention and Remedies
Employee Fraud Prevention and Remedies
 
Evaluating and selecting software packages a review
Evaluating and selecting software packages a reviewEvaluating and selecting software packages a review
Evaluating and selecting software packages a review
 
Vendor Selection
Vendor SelectionVendor Selection
Vendor Selection
 
Software Selection & Evaluation
Software Selection & EvaluationSoftware Selection & Evaluation
Software Selection & Evaluation
 
Multi Vendor Management
Multi Vendor ManagementMulti Vendor Management
Multi Vendor Management
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Best Practices in Software Vendor Selection
Best Practices in Software Vendor SelectionBest Practices in Software Vendor Selection
Best Practices in Software Vendor Selection
 
Vendor Selection Process
Vendor Selection ProcessVendor Selection Process
Vendor Selection Process
 
Vendor rating
Vendor ratingVendor rating
Vendor rating
 
Supplier evaluation & selection
Supplier evaluation & selectionSupplier evaluation & selection
Supplier evaluation & selection
 
Supplier selection
Supplier selectionSupplier selection
Supplier selection
 
Vendor rating system
Vendor rating systemVendor rating system
Vendor rating system
 
Supplier evaluation criteria
Supplier evaluation criteriaSupplier evaluation criteria
Supplier evaluation criteria
 
Vendor Management Systems Best Practices
Vendor Management Systems Best PracticesVendor Management Systems Best Practices
Vendor Management Systems Best Practices
 
Vendor Management
Vendor ManagementVendor Management
Vendor Management
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 
Vendor Management
Vendor ManagementVendor Management
Vendor Management
 
SUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATIONSUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATION
 

Similar to Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...Dell World
 
Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!Kenneth de Brucq
 
Finding a Simpler Path to Cloud
Finding a Simpler Path to CloudFinding a Simpler Path to Cloud
Finding a Simpler Path to CloudDell World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
Tablets and Mobility Solutions For Your Evolving Workforce
Tablets and Mobility Solutions For Your Evolving WorkforceTablets and Mobility Solutions For Your Evolving Workforce
Tablets and Mobility Solutions For Your Evolving WorkforceDell World
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
Achieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityAchieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityDell World
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentationsolarisyourep
 
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Dell World
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Dell World
 
5 Key Elements Of A Complete Virtual Desktop Solution
5 Key Elements Of A Complete Virtual Desktop Solution5 Key Elements Of A Complete Virtual Desktop Solution
5 Key Elements Of A Complete Virtual Desktop SolutionvDesk.Works
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionDell EMC World
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Kenneth de Brucq
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
VMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonVMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonRichard Common
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventAruj Thirawat
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell World
 

Similar to Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management (20)

The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...
 
Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!
 
Finding a Simpler Path to Cloud
Finding a Simpler Path to CloudFinding a Simpler Path to Cloud
Finding a Simpler Path to Cloud
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Tablets and Mobility Solutions For Your Evolving Workforce
Tablets and Mobility Solutions For Your Evolving WorkforceTablets and Mobility Solutions For Your Evolving Workforce
Tablets and Mobility Solutions For Your Evolving Workforce
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Achieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityAchieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email Security
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
 
5 Key Elements Of A Complete Virtual Desktop Solution
5 Key Elements Of A Complete Virtual Desktop Solution5 Key Elements Of A Complete Virtual Desktop Solution
5 Key Elements Of A Complete Virtual Desktop Solution
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
Citrix Workspace Suite
Citrix Workspace SuiteCitrix Workspace Suite
Citrix Workspace Suite
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
VMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonVMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware Horizon
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
 

More from Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterpriseDell World
 

More from Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready Enterprise
 

Recently uploaded

Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfGutaMengesha1
 
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case StudyTransforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case StudyPMaps Assessments
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridHolger Mueller
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationAUDIJEAngelo
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)linciy03
 
Easy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your ComputerEasy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your ComputerSAG Infotech
 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseirhcs
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...ssuserf63bd7
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfinsightssuccess2
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.FelixPerez547899
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content MarketingChuck Aikens
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.smalmahmud11
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumzyqmx62fgm
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxSymbio Agency Ltd
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceDragon Dream Bar
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesDragon Dream Bar
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBen Wann
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptxrdishurana
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small businessBen Wann
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxWorkforce Group
 

Recently uploaded (20)

Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdf
 
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case StudyTransforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
Easy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your ComputerEasy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your Computer
 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings release
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdf
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 

Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

  • 1. Dell World 2014 Securely managing all Dell and non-Dell end user devices Roger Bjork, Director, Dell Mobile/BYOD Solutions Bill Odell, Director, Dell Endpoint Systems Management November 5-6, 2014 Dell World 2014
  • 2. Dell World 2014 The biggest barriers to mobility Risk of data breach Cost of maintaining mobile devices Complexity of managing multiple platforms and devices 50% 40% 36% According to Dell’s Global Technology Adoption Index:
  • 3. Dell World 2014 Only Dell’s end-to-end portfolio addresses mobility challenges across the enterprise One-off solutions increase complexity, cost and risk Choose one strategic partner who can provide unified support IT decision maker $ Vendor complexity ? $ Too many vendors to choose from Disparate support teams Disconnected back ends Small vendors bought out One strategic partner
  • 4. Dell World 2014 Dell’s end-to-end mobility heritage Single partner with breadth and leadership Dell - Internal Use - Confidential - Privileged 4 Dell KACE/EMM systems management Dell Secure Mobile Access Dell Networking W-Series Dell Data Protection | Encryption Enterprise Dell One Identity Cloud Access Manager Application Services Dell’s entry into enterprise mobile management extends from leadership across ESM, UTM, networking, MDP, IAM and ITO industry segments
  • 5. Dell World 2014 KACE and EMM “Better together”
  • 6. Dell World 2014 Integrated solutions for a multi device world for ALL devices across MULTIPLE platforms Corporate issued Employee owned (BYOD) across the LIFECYCLE Deploy Manage Secure Service
  • 7. Dell World 2014 Dell ESM – KACE, EMM and Desktop Authority K1000 Management Appliance Comprehensive systems management for laptops, desktops, servers and tablets. Improve security, meet compliance requirements and decrease user downtime K2000 Deployment Appliance Integrated systems provisioning and deployment, fulfilling tasks including inventory assessment, OS and application provisioning, migration and recovery Enterprise Mobility Management (EMM) Flexible, comprehensive, K1000 integrated solution for securely, managing mobile devices – both BYOD and corporate owned Desktop Authority Management Suite (DAMS) Provides a centralized, secure and consistent management of the Windows user environment that automates users’ access to resources and applications
  • 8. Dell World 2014 KACE K1000 Management Appliance Know Manage Enforce Asset management Configuration scans Inventory Dell Warranty Patch management Software metering Help desk Software distribution Reporting
  • 9. Dell World 2014 New: K1000 v6.0 – Securely Managing IoT SECURE •Machine configuration •Security scanning Security •Software blacklisting •Full OS and device inventory Expertise •Deployment & maintenance •User interface •K1000 GO mobile app Visibility •Robust discovery •Broader platform support •Agentless technology
  • 10. Dell World 2014 Flexible deployment options Physical appliance Virtual appliance Hosted appliance
  • 11. Dell World 2014 Dell Enterprise Mobility Management (EMM) Your devices, your users, your mobile strategy •Complete, secure endpoint management •Secure enterprise workspace on all devices •Secure access to enterprise data •Integrated console management •User self-service •Identity management •Business apps and services you need •Flexibility for future-proofing Comprehensive mobile enablement Endpoint management Smartphones Tablets M2M Laptops Desktops Smartphones Tablets Laptops Workspace management Corporate issued User owned (BYOD)
  • 12. Dell World 2014 Dell Enterprise Mobility Management (EMM) •Complete, secure endpoint management •Secure enterprise workspace on all devices •Secure access to enterprise data •Integrated console management •User self-service •Identity management •Business apps and services you need •Flexibility for future-proofing Your devices, your users, your mobile strategy Comprehensive mobile enablement Endpoint management Smartphones Tablets M2M Laptops Desktops Smartphones Tablets Laptops Workspace management Corporate issued User owned (BYOD) Dell Mobile Management Dell KACE K1000 & K1000 as a Service Dell Mobile Workspace Dell Desktop Workspace
  • 13. Dell World 2014 EMM – An integrated platform for all endpoints Dell KACE K1000 Corporate owned Dell Mobile Management Corporate owned BYOD Dell Mobile Workspace Dell Desktop Workspace BYOD K1000 manages all corporate owned PCs •Manages secure applications on BYOD mobile •Manages corporate owned mobile •Passes inventory to K1000 Creates secure applications on BYOD mobile •Creates secure applications on BYOD PCs •Manages PC owner privileges •K1000 can manage virtual secure application
  • 14. Dell World 2014 Dell Mobile Management Enterprise benefits • Security and compliance • Policy management • Rapid deployment • Automatic upgrades • OpEx instead of CapEx • Targeted tools for the job Central management Mobile device, application and content management User self-service portal Real-time reporting, alerts and analytics Securely manage and provision enterprise smartphones and tablets with a SaaS-based solution
  • 15. Dell World 2014 Dell Mobile Workspace Secure email, calendar, contacts, browser and file manager Optional productivity applications Secure remote access and data separation Central management User benefits Enterprise benefits •Productivity and collaboration •Device choice (smartphones and tablets) •Personal privacy •Security & data loss protection •Management and control •Increased user productivity •Rapid deployment •Automatic upgrades •OpEx instead of CapEx •Encourages adoption Increase productivity by enabling your users to work remotely and securely on enterprise or personal mobile devices
  • 16. Dell World 2014 Dell Business Phone Powered by Vonage Business Solutions™ •Make your telecom budget go further •Manage and control calling plans and records •Secure enterprise phone data with Dell Mobile Workspace •Deliver robust features, like a conference bridge, call recording and group text messaging •Extend coverage with calling over Wi-Fi •Improve productivity and collaboration Make the move to BYO by providing a business phone service on personal smartphones and tablets with robust features, security and control
  • 17. Dell World 2014 Box for Dell File sync and share capabilities Safeguard content on personally-owned mobile devices Use Box for Dell with Dell Mobile Workspace or Dell Desktop Workspace. Share content in the partner’s cloud or your cloud, sync it between devices and collaborate across your business Secure Connect Collaborate
  • 18. Dell World 2014 Dell Desktop Workspace Enterprise benefits: •Four layers of security •Management and control •Increased user productivity •Low-friction integration •Rapid onboarding •No hardware to purchase •Access to legacy applications Del – Internal Use – Confidential 4 layers of security 1 2 3 4 DLP Encryption Secure remote access Firewall •Best application performance •Consistent experience •Work while offline •Laptop of your choice User benefits: •Remote employees •Contractors and consultants •Mobile employees •Mergers and acquisitions •Offshore software development •Executives who prefer Macs Use cases: Provide a secure, managed environment for your enterprise Windows image on corporate-managed or personally-owned PCs and Macs
  • 19. Dell World 2014 Next steps Visit us in the Solutions Expo to: •See a demo •Learn about FREE 1-YEAR KACE and EMM offers. Attend other Mobility sessions: •MT54: The new reality of mobile solutions: Everything you have been told about mobility is wrong •MT24: Enabling mobility without compromising security
  • 20. Dell World 2014 Thank you.
  • 21. Want to learn more about Dell’s mobility solutions? Learn via email. Start here. Sign me up!