Your SlideShare is downloading. ×
Dell Software vous propose de maitriser vos environnements Microsoft avec une stratégie BYOD robuste.
Prochain SlideShare
Chargement dans... 5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Dell Software vous propose de maitriser vos environnements Microsoft avec une stratégie BYOD robuste.


Published on

Découvrez comment Maitriser, Contrôler, Gérer vos environnements IT de manière simples et innovantes que ce soit sur les environnements physiques ou virtuels.

Découvrez comment Maitriser, Contrôler, Gérer vos environnements IT de manière simples et innovantes que ce soit sur les environnements physiques ou virtuels.

0 commentaires
0 mentions J'aime
  • Soyez le premier à commenter

  • Be the first to like this

Aucun téléchargement
Total des vues
Sur Slideshare
À partir des ajouts
Nombre d'ajouts
Ajouts 0
No embeds

Signaler un contenu
Signalé comme inapproprié Signaler comme inapproprié
Signaler comme inapproprié

Indiquez la raison pour laquelle vous avez signalé cette présentation comme n'étant pas appropriée.

No notes for slide
  • Intro Serveurs / Entreprise / Reseaux / IT
  • Who is Quest? Founded in 1987 we have over 25 years of experience simplifying common IT challenges Some of the largest customers in the world depend on Quest products We have a history of innovation and acquisition that strengthen our product portfolio to deliver increased customer value We’ve historically invested more than our competition, allowing us to out-innovate our peers Nearly 4,000 employees worldwide
  • Dell is very different than it was just a couple of years ago, and now uniquely positioned to provide End to End solutions from the device to the data center to the cloud Servers, we’re a leader around the world and our latest Server launch has proven that with time to market and differentiated capabilities Networking, we’ve gotten best in class technology with Force10 and will continue to grow Storage, we’ve acquired best in class technology, we’ve developed the ISCSI market with EqualLogic and are scaling Compellent Services, we grew 8% last year and see continued strong growth in backlog and new signings Cloud, customers simply want solutions that fit – on premise/private, public, hybrid.. we’re making investments in Cloud End User Computing .. seeing many new use cases for moving client compute out of the device and into the data center or the cloud Software.. We already have software capability across these domains, but we’ve brought in John Swainson who will continue to build out and expand our Dell IP in these domains and in software, driving true differentiation from our competitors
  • Quest, now a part of Dell, offers six solution families in the areas of systems management, security and BI. Our simple approach ensures that IT is equipped to deliver value to the business faster than ever before.We are the clear leader in Windows Management. Best known for our ability to migrate and consolidate with zero impact to the business. But we have a whole management suite that optimizes the MSFT infrastructure, increases security and greatly improves the productivity of your admins.We are the #1 independent leader in database development & management tools. Our Toad product line has over 2 million users – and we’re now taking that market-leading technology and simplifying business intelligence.No matter how great your IT dept is, you will always be measured by your end users and customers on one thing: how are the applications performing. Foglight is an award-winning performance monitoring solution that quickly finds and resolves performance issues across physical, virtual and now cloud environments.Our Data Protection product family, led by NetVault, simplifies backup and recovery across physical, virtual and application environments.Access to data is more complex than ever to manage, Quest One is the most flexibility and cost-effective Identity and Access Management solution on the market today.With today’s mobile workforce, it’s not about managing the device anymore, it’s about managing the user and ensuring they have secure access to everything they need to get their job done without creating risk to the organization. Together, Quest and Dell deliver the most comprehensive solutions for securely managing the “bring your own device” (BYOD) movement.All of these solutions combined enable IT to deliver greater value to the business, faster.
  • In a perfect world, your network would suffer no downtime and be locked down tight. You'd be in perfect compliance with all government regulations, and your users would all be self-supporting. The cloud would take care of nearly all your infrastructure needs, and there wouldn't be a single device accessing the network you didn't first approve of and control.Also: You'd finally get the respect and admiration you truly deserve.Good luck with all that. The gap between your dreams and cold hard reality just gets wider every day. That doesn't mean you should give up, but it does mean you need to get real about what you can change and what you must accept.Here are 10 things IT must learn to live with.
  • The BYOD revolution is here to stayMore workplaces these days resemble a geeky party that's BYOD (bring your own device). The problem? Many IT departments never got an invitation or failed to RSVP."Users will simply go around IT and use personal tech for business purposes," says Nathan Clevenger, chief software architect at ITR Mobility. "That is a much more dangerous situation from a security standpoint than supporting the consumer devices in the first place.“IT needs to steer a course between blocking consumer tech and allowing unfettered access to the network from any device, notes RaffiTchakmakjian, VP of product management at Trellia."BYOD is a scenario IT departments are learning to live with, but they struggle to manage them from a security, cost, and operations perspective," he says.
  • Disruptive change driven by technology change is happening at a faster rate than ever before. In my 30+ years in this industry, I have always observed changes in technology that created new ways to create business value, and put at risk the old ways of doing things. However, today we are seeing these trends converging and putting concurrent demands on IT like never before. The pace has never been faster. The risks have never been greater. The demands have never been higher.And yet, within these trends lies opportunity.Part of the reason is that the role of IT has never been so important, so critical to the success of companies both large and small. Some businesses are built around IT (Amazon, eBay, Intuit). The role of IT today, when executed properly, drives value, protects the company and enables access to information anytime, anywhere, and on most any device.DATA CENTER: Inside the datacenter, we have seen the relentless advance of Moore’s law making computing, data and networking resources vastly more powerful …now we are seeing these capabilities physically converged and virtualized both within the enterprise and to the public cloud. The challenge is to manage the applications so that they can be securely and seamlessly deployed to new platforms or to the cloud without disrupting the businessINFORMATION MANAGEMENT: Data is everywhere, the challenge for businesses large and small is to gain insights from increasing volumes of data more rapidly, using standardized hardware and software that doesn’t require a phd in computer science to operate. MOBILITY: Businesses are looking for ways to allow their employees to bring personal devices to work without putting at risk key corporate data. It requires that IT has the tools to implement a holistic solution that encompasses all device categories without compromising key elements like security SECURITY: Privacy and Security are becoming more and more important. Given the value of the information that most businesses have on line, it is key that you can secure your data, network, and applications from the threat of attack or loss.
  • Device & Application Management Dell Quest Management eXtensions (QMX) allowsorganizations that use Microsoft System Center Configuration Manager (SCCM) to safely incorporate more than 120 non-Microsoft platforms, including Android, iPad, and iPhone devices, as well as Macs. QMX also extends System Center Operations Manager to over 250 non-Windows extensions, further increasing control while decreasing the need for multiple systems.  Dell Quest ChangeBASEautomates application testing and remediation, as well as conversion to virtualization, so corporations can ensure their applications are up and running quickly, and operating in their most optimal state. In addition, ChangeBASE automates application fixes for batches of applications, rather than one at a time, thus keeping users productive, while eliminating much of the time and expense associated with migrations.  Dell vWorkspace and vWorkspace – MokaFiveSuite offer a web access portal that gives corporations the tools needed to create app stores and portals for virtual and offline desktops, thus providing a system for effectively delivering applications in virtual environments with controlled user access and authorization. vWorkspace ensures the most secure user and administrator access, resulting in a protected environment that balances user freedom with corporate control. vWorkspace – MokaFive Suite allows management of users who have limited connectivity, yet require secure access to their applications and data anytime, and from anywhere.  Access Management  Dell Quest One Identity Manager is an enterprise-wide solution that streamlines the access governance process of managing user identities, privileges, and security, enabling IT to address major identity and access management challenges at a fraction of the time or expense associated with traditional framework solutions. Acts as one point of control for all devices – those provisioned by the company and those brought in by employees – to ensure consistent policy and enforcement of access and audits.  Dell Mobile IT enables administrators to securely access critical IT applications from a mobile device. The platform delivers mobile administration and remote IT management to Dell solutions and many other IT applications, so administrators can respond to issues quickly even when they’re not on site.  Dell Quest Webthoritygranularly secures remote employee access to applications and systems, based on established policy, infrastructure, and authentication and authorization practices. With Webthority, organizations can provide users with access to critical internal resources (including corporate cloud and web-based applications) from outside of the corporate network on an individual computer. It ensures a consistent and convenient end-user experience, including single sign-on, while protecting sensitive resources from direct exposure via the web.  Dell Quest Defender secures and controls access to critical corporate data and applications, providing an additional layer of authentication security, a multifactor authentication platform solution that augments BYOD authentication attempts with a more secure second factor, including the ability for the device itself to be the second factor delivery mechanism. Dell Quest One Authorization Policy Server enables organizations to manage the massive influx of users linking their smartphones and other devices to corporate networks as a result of the BYOD movement. It enables consistent management of access to heterogeneous applications, Web services, and data across the enterprise through fine-grained authorization using the XACML standard, thus enabling organizations to secure and control the process by which critical internal resources are accessed from outside of the corporate network or via a desktop.
  • From a technology perspective, Dell has a unique position as a true end-to-end IT solutions provider. While there is driving change at the device level, this in turn requires investment in the back-end infrastructure to support new devices and use-cases. We have a robust portfolio at the device level as well as a suite services and solutions which spans servers, storage, networking, software, security and systems management. Some of our products and solutions include: Business client portfolio – business class tools with consumer appeal means optimal control for IT with the best security and manageability available, and a range of form factors for workers to choose fromXPS 13 – aligns with the Dell consumerization vision by delivering devices that intersect the needs on consumer preferences and ITDell Quest systems management and security capabilities- extensive portfolio of solutions enable organizations to assess, manage & govern and support their environmentsDell KACE systems management capabilities - distributed PC and device management to manage the flow of information of workforcesDell Desktop Virtualization Solutions (DVS) - allows users to access their desktops on any capable device and allows IT professionals to keep company data secure and protected and reduces data duplication. And with the acquisition of Wyse, Dell is now the leader in thin clientsDell Security Solutions – offers a range of solutions to protect data and intellectual property – from the end-point to the cloud Dell Boomi – integration technology allows customers to connect nearly any combination of SaaS and on-premise applications easily and cost effectively
  • IT is filled with unprecedented challenges. Challenges that strike at the very core of your productivity and success. Dell has listened and we’ve invested in a portfolio of software solutions that build off of our core strengths, address these challenges, and SIMPLIFIES I.T., MITIGATES RISK, and ACCELERATES business and IT results.We highlighted six customers that are using these products. Thousands more of our customers, including many of you, are using these products today to: Manage and migrate data across physical, virtual, or cloud Monitor and administer applications and users to maximize performance Backup and recover data quickly Gain needed insights into data with powerful analytic tools Democratize information-based decision making and empower users Embrace BYOD without sacrificing IT imperatives (security, access, bandwidth management, data protection) Secure everything, everywhere, at all times Dell Software has the scale, expertise, and industry recognition needed to deliver IT solutions that are dramatically different than the enterprise software you have come to expect.NOTE: discuss who else in IT you should discuss these challenges with. For example, the person in charge of the storage network; the person in charge of data management. There are a variety of personas that have influence in the consideration of new solutions that may be new inputs into a sales process
  • Transcript

    • 1. Maitriser vos environnements Microsoft avec une stratégie BYOD robuste Anthony Moillic Directeur des Services - EMEA Dell Software Group @amoillic / Entreprise / Réseaux / IT
    • 2. 25 ans Depuis 1987, Quest a offert une large gamme de solutions qui répond au besoin standard de l’IT 100k Les solutions Quest sont 30 Plus de trente acquisitions ont utilisées par plus de 100.000 renforcé notre portefeuille de clients tous les jours produits18%Quest a favorisé linnovation en 3,900 Employés de Quest proposent desinvestissant régulièrement 18% solutions dans plus de soixante bureauxou plus dans la R & D dans le monde entier
    • 3. Intégration dans la statégie DELLFournir des solutions allant du terminal à l’application Scalable, mid-market design point IT Solutions End-to-end3
    • 4. Systems Management & Security solutions Permettre à l’IT de délivrer de la valeur plus rapidement1 Migrer et consolider les données avec zéro impact sur lactivité, améliorer la productivité de Windows ladministrateur en automatisant les tâches répétitives et accroître la conformité et la sécurité tout en Management réduisant les coûts, la complexité et les risques.2 Simplifier le développement, la qualité du code et améliorer les performances des bases de données Database sur de multiples plateformes. Business intelligence rapide, simple et maitrisé qui vient compléter les Management investissements informatiques et BI existants.3 Gérer et résoudre les problèmes de performances quelle que soit la taille de votre organisation Performance informatique ou quelle que soit linfrastructure supportant vos applications. Quil sagisse dun modèle Monitoring physique, virtuel ou Cloud.4 Simplifier la protection des données dans les environnements physiques, virtuels et applicatifs, ce qui Data Protection minimise les temps darrêt du système et la perte de données, tout en assurant la continuité des activités.5 Rendre votre entreprise plus agile et sûr en, réduisant les risques de sécurité, accroissant lefficacité IT Identity and Access et en minimisant les coûts associés aux contrôles - tout en permettant aux métiers de fonctionner Management dans un monde piloté par les données. Gérer efficacement, inventorier et sécuriser les PC, Mac et les appareils mobiles de façon6 User Workspace Management transparente. Proposer des postes de travail virtuels et des applications compatibles avec ces environnements. Assurer la compatibilité des mises à jour de version poste de travail. 4
    • 5. Dell Software a lancé son étude sur le BYOD• Comprendre les attentes des entreprises• Se concentrer sur les gains pour l’utilisateur final• Au-delà de la technologie, les points à surveiller• Etude globale: 1485 décisionnaires dans le monde• Des particularités Françaises !
    • 7. Les dix véritésles plus duresavec lesquellesl’IT doitapprendre àvivre l’IT 10 hard truths IT must learn to accept - Source: InfoWorld, 11/29/12
    • 8. 1:La révolutiondu BYOD est làpour durer
    • 9. Pourquoi cette étude• Le BYOD va rester• Dans quelques mois le BYOD sera le moyen premier d’arrivée des périphériques dans l’entreprise• C’est déjà le cas dans quelques pays• Changement culturel majeur• Peur de perte de contrôle de la part de l’IT• Il faut se préparer à cette arrivée, notamment dans l’environnement Microsoft, un des tout premier à être impacté • Messagerie • Office • Données non-structurées (Fichiers, Sharepoint …) • Applications • Environnement virtualisé
    • 10. Qu’est-ce qu’il en ressort ?• La manière dont les entreprises ont adopté le BYOD et les bénéfices qu’en tirent les entreprises ayant mis en place une vraie politique en la matière• L’impact positif et négatif du BYOD sur les entreprises et leurs salariés• La différence entre une approche centrée sur les utilisateurs et celle centrée sur les terminaux• La vision de Dell sur la meilleure manière de gérer une approche BYOD est de valoriser la perception de l’utilisateur, de s’intéresser à ses usages
    • 11. S’intéresser au périphérique ou à l’utilisateur ? 63% 56% 53% 46% 46% 41% 42% 42% 34% 30% UK France Germany Spain Italy US Australia Singapore India Beijing Region• La raison principale pour laquelle les entreprises n’ont pas le succès escompté• BYOD n’est pas majoritairement une problématique de gestion des périphériques• Il faut s’intéresser aux utilisateurs !
    • 12. Quels sont les gains pour l’entreprise ?• 70% des entreprises constatent une augmentation de la productivité (100 % en France)• Le temps de réponse aux utilisateurs est également amélioré• 59% pensent que sans BYOD, leur entreprise serait moins compétitives (69 % en France)
    • 13. Et pour les utilisateurs ?• Une stratégie basée sur l’utilisateur final à un impact significatif très positif• La productivité, le moral et la créativité sont meilleurs• Le sentiment d’être considéré par son entreprise• Le mix travail/perso
    • 14. Les challenges à gérer …• 36%: abus de l’usage• 33%: vol/perte du périphérique• 33%: manque de contrôle des applications et des données sur le périphérique• 32%: employés partant de l’entreprise avec des données sensibles• 29%: distribution de données non-autorisées
    • 15. Accepter totalement le BYODLe retour des premiers adopteurs• 64%: les gains ne seront maximisés que si nous comprenons les besoins de chaque utilisateur• 56%: le BYOD a complètement changé la culture IT de l’entreprise• 54%: le BYOD a complètement changé la culture d’entreprise de notre société
    • 16. Les technologies existentLes plus couramment utilisées:• 23%: Virtualisation du poste de travail (28% en France)• 21%: Mobile Device Management – MDM (10% en France)L’environnement Microsoft, un accélérateur de BYOD• Office 365• Données non-structurées: • Sharepoint • Mais aussi Skydrive en comparaison à d’autres solutions• System Center• …
    • 18. La clé: s’intéresser à l’utilisateur finalFinalement, une problématique d’IT exacerbée par l’arrivée de périphériques innovants• Lier les périphériques aux utilisateurs et pas le contraire• Identifier les rôles de chaque utilisateurs• Mesurer leur besoin en mobilité• Délivrer les applications auprès des utilisateurs en fonction de leur rôleLes entreprises ayant les meilleurs résultats sont celles qui ont adoptées cette démarche.27% des entreprises avec une démarche BYOD atteignent cet objectifSeulement 3% lorsqu’il n’y a pas de projets BYOD
    • 19. La vision de Dell Cloud Explosion des Consumérisation de données l’IT Mise en conformité et Risque19 Confidential Software
    • 20. Une stratégie BYOD robuste• Focus sur l’utilisateur final, pas sur le périphérique• Mis en œuvre de solution de bout en bout• Tout au long de la vie professionnelle de l’utilisateur au sein de l’entreprise• Mitiger le risque avec l’usage, la liberté avec le contrôle• Fournir les bons outils et les bonnes solutions aux bons utilisateurs sur le bon périphérique
    • 21. 3 étapesAudit• Besoin des utilisateurs• Ecosystem IT: legacy, infrastructure, réseau• Nouveaux usages: périphériques, applications, offres SaaS …Administrer & Gouverner• Bien plus que le périphérique• Les données, les accès• Les applications, qu’elles soient virtualisées ou pasSupporter• L’IT doit supporter la mouvance BYOD sur tous les périphériques. Les données et les applications doivent être accessibles• Mesurer le service rendu aux utilisateursConclusion• Le BYOD ne doit pas être vu que le prisme du périphérique mais doit être considéré comme une vraie rupture permettant de remettre l’utilisateur au centre de la conversation
    • 22. Et que propose Dell Software?Device & Application ManagementDell Quest Management eXtensions (QMX)Dell Quest ChangeBASEDell vWorkspace and vWorkspace – MokaFive SuiteAccess ManagementDell Quest One Identity ManagerDell Mobile IT (disponible sur Windows 8 RT notamment)Dell Quest WebthorityDell Quest DefenderDell Quest One Authorization Policy Server
    • 23. Et que propose Dell Software ?SupporterDell FoglightDell Foglight for Virtual DesktopsDell Foglight NMSDell RemoteScanDell NetVault Extended Architecture (NetVault XA)
    • 24. Et que propose Dell ?Un positionnement unique, du matériel au logiciel en passant par une vision solutioncomplète • Tablettes Windows 8: XPS 10, XPS 12, Latitude 10 • PC portable, look moderne: XPS 13 • Solution de gestion des systèmes et de sécurité Dell Quest • Solution de gestion de parc Dell KACE • Dell Desktop Virtualization Solutions (DVS) (Wyse) • Solution de sécurité Dell SonicWall • Intégration de données Dell Boomi
    • 25. Solutions Dell Software Data center & cloud Information Mobile workforce management management  Windows Server mgmt  Data management  BYOD  Performance monitoring  App/data integration  Endpoint management  Virtualization mgmt  Business intelligence and analytics Security management & data protection  Identity and access management  Endpoint security  Virtual protection  Network security  Backup and recovery  Application protection25 Confidential Software
    • 26. Participez à notre grand jeu concours ! Venezsur le stand Dell n 47
    • 27. 27 Confidential Software