Aucune remarque pour cette diapositive
How we work, how we interact in both the real and virtual world, and what we expect from our workplaces all reflect the virtual era and trends in the consumerization of IT.Today’s work environments – from corporation to the classroom; from healthcare to government entities are changing. A new generation of employees, raised on gaming, social networking and the Internet are bringing new expectations about how they work, teach, interact with their constituencies, provide healthcare – into their work environments. The pervasiveness of mobile, smart technology today combined with the expectations of today’s workforce is driving change and resetting the CIO agenda for how IT departments support today’s generation of workers.
Organizations must embrace new models of end user computing that provide for a balance between end user productivity and IT control. We recognize that embracing new computing models is a significant change for IT departments. Over the years IT has had strict control over the devices allowed in the environment, and for good reasons. Control meant simplification, security and lower costs. But embracing these changes is a business decision, not a technology decision.
End user computing is no longer about the device or technology. It’s about IT delivering a seamless and secure end user experience that provides for anywhere, anytime connectivity and access to work, play, learn, tweet and blog. And do all of that often from the same device.
Of course, with changes come challenges. IT must figure out how to integrate and manage a broader range of devices, operating systems and applications. Security is always a top concern, especially with a workforce that is increasingly mobile and with data residing on devices that may or may not be owned by IT. And IT staffs need to determine where and how to implement new computing architectures, like cloud solutions and desktop virtualization.For end users, there can be significant cultural changes required to encourage people to work outside of the office. Some people might need to figure out how to use new technology and applications to collaborate with a dispersed and global workforce. And people managers might need to re-think work schedules and performance metrics for a more flexible workforce.
Dell is uniquely positioned to help you navigate the challenges of the virtual era. Our commitment to end user computing has never been stronger. For end users, we deliver technology and devices designed for specific usage but can adapt to the needs of an evolving workforce. For IT, we provide tools that allow them to deliver that user experience in a secure and manageable environment, using solutions that are open, capable and affordable.
Where are you regarding a comprehensive end user computing strategy? Have you done an analysis to fully understand what is the right technology for your end users? Do you have security policies and solutions for an increasingly mobile and global workforce? Are you centrally managing all of the end point devices in your environment, including ones that are not owned by IT? And what are your formal policies regarding personally owned smartphones and tablets?
We have a plan to get you started. It begins by developing a 3-to-5 year plan that increases productivity and cost savings by taking advantage of advances in end user computing.First, CIOs must identify and better understand their end users. Analysis should include roles and responsibilities of the entire organization, as well as the technology and tools needed to perform each role. Then, for each end user determine: • What level of access is needed? • What applications are needed to perform their role? • How does the employee use and interact with information? Next, determine end users’ enterprise mobility requirements. Not every employee requires a corporate smartphone or tablet. Contract workers, for example, may require data access, but not a corporate issued client device. Use this data to design cost effective strategies based on end user needs rather than a ‘one size fits all’ strategy. Second, CIOs should protect their organizations by using enterprise and IT governance as guidelines to develop and deploy a risk-based approach to security that balances the organization’s risk, costs, and overall end user strategy. • Examine security risk points – devices, networks and data center/cloud solutions. • Consider client virtualization for groups of remote end users to improve network access security and to separate corporate system image from personal use. • Implement a solution for security monitoring and remediation. • Ensure Web security is multilayered and protects the network from phishing, spam and malware. • Avoid a ‘one size fits all’ mentality for protected data access across end users and devices. Mobile devices create additional challenges for securing enterprise application data. Simply strengthening the enterprise firewall is no longer an adequate solution. Other areas for analysis should include password authentication, encryption, containers for separating personal and corporate data on end points, and anti-virus/anti-malware solutions.The third best practice: Optimize the deployment and management of all end point devices. This requires three steps: assess, optimize and manage. • Assess: CIOs should perform a comprehensive asset inventory of all hardware, devices, software applications, and license agreements. Performing this complete asset inventory provides opportunities for cost control and risk mitigation. Once you know what you have, you can map the appropriate device to the end user. • Optimize: Client lifecycle management is another area for CIOs to gain efficiency and cost savings. With automated PC client lifecycle practices, organizations can potentially achieve 62% cost savings. • Manage: Centralized management pays off in improved uptime and IT efficiency through automating time and resource intensive processes, improving IT control, reducing support costs, and freeing up IT to focus on other innovative projects.Fourth, organizations should virtualize when and where beneficial for your environment and end user based on your analysis of end user roles. Desktop virtualization solutions not only offer centralized IT control and secure data management, but also provide security benefits by centralizing the storage of data in the data center. IT administrators can manage each user’s digital identity securely and can limit end user access according to policies. This enables anytime, anyplace access to productivity resources without exposing those resources to outside threats. Desktop virtualization infrastructure solutions can also provide the following benefits across the organization: • Fast, centralized client deployment and management • Simplified compliance and policy management • Secure information protection without limiting workforce access • Anywhere/anytime workforce access to productivity data and resources • Access to virtual resources without a network connection • Improved application performance • Automatic information backups Finally, organizations should implement pilot programs to allow for the phased adoption of personally-owned devices into your environment where applicable. First, determine which employees should be allowed to use their own smartphones, tablets and PCs to connect anytime and from any location to your organization’s IT environment. Then, implement the pilot program with a platform that is flexible enough to support MAC OS, Windows, LINUX, and Android and scalable enough to easily add and support personally owned devices as you bring them on line. In addition, having a comprehensive security program in place is critically important.
Organizations can reap significant benefits from updating their end user computing strategy.Improved management provides for increased IT efficiency and flexibility; a simplified and automated infrastructure; and fewer desk-side visits.Updated security policies and solutions allow for holistic data protection, from the data center to the end point device. IT can enable more mobile, flexible and productive end users while confidently protecting sensitive information, even on personally owned devices.Organizations can achieve productivity gains, for both IT and end users. Your IT staff can simplify the deployment and management of end point devices, and automate many of the tasks they manually perform. This can free them up to focus on innovative projects that provide value back to the business. End users will have a more flexible and attractive work environment, while also having technology for improved collaboration and innovation.And all of this can lead to reduced operating expenses. Enabling a mobile workforce can allow you to reduce facilities costs. IT can reduce the costs of deploying and managing endpoints, and IT can better control mobility expenses.
Let’s talk about how Dell can help.
Dell is uniquely positioned to help you implement a comprehensive end user strategy. We are dedicated to end user computing, and we have a complete portfolio of devices, services and solutions. We offer smartphones, tablets and ruggedized devices designed to operate in specific environments, often under very demanding conditions.We’ve designed desktop virtualization solutions to meet the unique requirements of vertical markets in healthcare and education, and our Integrated Solution Stack delivers pre-tested, pre-configured architectures that remove the burden of design and configuration, speeding the time to implementation.And we have software and hardware-based encryption solutions; cloud-based SaaS tools; and KACE appliances that allow you to optimize system deployment, management and security in a heterogeneous environment.
Vision:Pousser des appli Windows (installed base) surdifferents Devices/OSWindows 7 and Metro/Win8 => get apps ready to Windows 7/8 migration; Focus On apps/content rather than DesktopUse Cases: Tablets, Trai
Desktop virtualization is an enabling technology that allows IT to deliver applications and workloads to a heterogeneous environment; it’s an alternative to tuning applications and building images to support various platforms and operating systems. Dell offers flexible delivery models that best meet the needs of your environment, and our Integrated Solution Stack provides pre-tested and pre-configured architectures. Desktop virtualization provides improved management for IT. You can streamline and automate OS migrations and application updates and reduce desk-side visits.For end users, they can have greater choice and flexibility regarding their devices. They can have what’s important to them – a unified experience across end point devices, with access to their data and applications from practically any device.And desktop virtualization can deliver improved security by centralizing control of sensitive data.
Dell can help you minimize the risk and speed time to solution by implementing a set of best practices, all whiledelivering a right-sized, scalable solution. Our flexible deliver models allow you to consume desktop virtualization in a manner that best meets the needs of your environment.Our Integrated Solution Stack is a pre-configured, pre-testing datacenter architecture. We’ve spent over 50,000 hours testing the solution stack to ensure optimal integration and performance. And we can deliver the same infrastructure and user experience, whether on-site or through the cloud as an on-demand service.
A typical application management/migration process.The process starts with Inventory to find out the application the customer has installed.Rationalisation will help the customer to reduce the number of applications to only those needed. This will save on licensing costs and on packaging costs.Application Compatibility will check if the application is compatible with the proposed operating system. Dell also offer a remediation service which can fix some incompatibilities.Discovery is the process of obtaining the installation media, install instructions, testing instructions etc for each individual application.Packaging/ Virtualization is the off-site process of packaging the application in the format, and to the standards agreed.Remediation is the process of repairing issues of compatibility with a new operating system, where possible.Quality Assurance is the process of testing the application, against a standard set of tests, and any extra ones requested by the customer.In User Acceptance Testing the user checks that the application functions as requested in their environment.The process is over seen by a proven project management methodology, and off-site progress, can be monitored online using Dells Application Packaging workbench (APW)
Dell provides a full portfolio of Enterprise Mobility Solutions that allow you to unleash end user productivity, while also giving IT the ability to deploy apps, manage devices, and protect corporate data.Dell Mobile Device Management gives you the ability to provision, deploy, and manage smartphones and tablets – regardless of platform or OS.Our Telecom Expense Management delivers an end-to-end approach to management of voice, data, wireless and VoIP spend.Dell’s application services provide rapid development of custom apps in almost any programming language.Our Mobile Application Platform provides a suite of mobile business apps that you can customize and deliver to any mobile device. Write an app once, and deploy to any device.And our secure email solutions provides peace of mind when allowing access to corporate email on personally owned devices.
120 000 utilisateurs dans notre propre système interne12 500 de ces utilisateurs en font usage comme leur système de téléphonie au quotidien16 000 utilisent la messagerie unifiée pour la messagerie vocale
CEBP, intégration CRM, SharePoint
Tablets, smartphones and virtualization are certainly the dominant trends in end user computing. But you still have hundreds, if not thousands, of traditional PCs in your environment. And it’s critical that you centralize the management of all of those devices.We can help you do that with a traditional ISV console, like Microsoft SCCM or Symantec. Those are comprehensive solutions, offering the tools and capabilities that a mature organization needs. However, they can be expensive and typically require significant investment in consulting and implementation services, as well as dedicated, specially-trained staff to operate.The Dell KACE appliances deliver the functionality that most small and mid-size organization require for asset discovery, inventory, patch management, application monitoring, and security compliance. And the KACE appliances are designed for the IT generalist.For those who prefer cloud-based SaaS tools to an onsite solutions, Dell offers Distributed Device Management, an integrated set of offerings that can help you:Inventory and track dispersed hardware and software assets over the Internet, no matter where those assets are located Distribute software and upgrades Manage patches and security applications Reduce costs through policy-based management, as well as Dell hosted and managed infrastructure Minimize the network and end-user impact of OS and application updates
INNOVATION (CLOUD SECURITY):- Do you know that 69% of cloud security providers don’t believe securing data is their responsibility?? Dell is definitely not one of these providers who believes that. We think security is integral to the development and use of cloud (Source: 2011 Ponemon Institute Report on Security of Cloud Computing Providers)COMPLIANCE:- 67% of PCI-regulated companies are NOT compliant with the standard. Source: 2011 PCI DSS Compliance Trends Study, Ponemon InstituteREACTIVE COST:The cost of mitigating a data breach is likely to be vastly greater than the cost of preventing the breach beforehand — perhaps by a 70-to-1 margin Source:Predicts 2011: Infrastructure Protection is Becoming More Complex, More Difficult, and More Business-Critical Than Ever, Gartner, November 2010.
This integration allows for efficiencies to be gained through innovation, security intelligence and strategic planning… freeing up resources that can be leveraged where the business most needs them.
This integration allows for efficiencies to be gained through innovation, security intelligence and strategic planning… freeing up resources that can be leveraged where the business most needs them.
I think one of the easier ways to describe layered security is to think about your house. Every house has multiple doors as points of entry, we don’t simply just close the door, we lock it with maybe even multiple locks. If the locks fail, typically there is a sensor on the door that can trip an alarm. This represents the first layer of security, it proactively filters who or what can get into the house. If someone does get in the alarm offers additional protection and alerts anyone in the house that an intrusion has occurred.Dell brings industry expertise, 20 years of services experience, and a reputation for end-to-end services success. This end-to-end solution ensures the solution is easy to find, easy to purchase, easy to grow, easy to implement, simple to operate, and with a comprehensive portfolio of services delivers proactive and self-healing capabilities. We bring the expertise to minimize complexity by delivering end-to-end complete solutions – to be able to make life easier for our customers. I think one of the easier ways to describe layered security is to think about your house. Every house has multiple doors as points of entry, we don’t simply just close the door, we lock it with maybe even multiple locks. If the locks fail, typically there is a sensor on the door that can trip an alarm. This represents the first layer of security, it proactively filters who or what can get into the house. If someone does get in the alarm offers additional protection and alerts anyone in the house that an intrusion has occurred.Think of the doors, windows, etc. as network security and the alarm is an alert to the IT admin that a possible threat is or has occurred. This is where the homeowner takes over either by calling the police, protecting themselves and family and ultimately trying to remedy the situation and lessen the security threat.Think of the homeowner as endpoint security. If something gets past the network security layer, it is up to endpoint security to remedy the situation and minimize damage and quarantine the threat.If someone breaks and steals your valuables you hopefully have insurance or have your valuables in a safe. Data security works similar in that it prevents unauthorized access to your data. It can encrypt the data so no one can read it, provide access controls such as fingerprint readers to further prevent access.Plus our Managed Security Services set of services with the expertise to monitor, manage & maintain your security infrastructure, all within a single point of contact: 24 x 7 x 365 support + With a worldwide visibility to security attacks + Compliance expertiseThe bottom line is that this new Security solution is an approach to security that simplifies security so any company can design a security strategy that encompasses numerous security technologies and combines them into a layered approach that enables IT admins to create a robust comprehensive security strategy that provides proactive and reactive data protection. Partnerships and New OfferingsDell and JuniperBack in July we announced that Dell is working alongside Juniper to develop new SMB-focused, Dell-exclusive Unified Threat Management devices that are setting the standard for on-premise network security. The Dell and Juniper partnership allows customers to build a cost effective and dynamic network infrastructure – to serve data centers, branch offices, telecommuters, customers and partners. This is an infrastructure which addresses the new challenges posed by server virtualization in the data center and a highly mobile workforce which is increasingly remote.Dell and SecureWorksLater this month, we will announce a new solution with SecureWorks for customers wanting to secure their business 24/7. The Dell | SecureWorks solution will provide security experts that proactively recognize known and unknown attacks, take the necessary action and remediate attacks, enabling you to focus on your business knowing that experts are managing your security. This managed security solution includes various versions that can be full blown managed services or a scaled down version, it is very flexible.Credant EncryptionJust last month we announced Dell Data Protection | Encryption to provide a simple to use encryption solution that provides one touch compliance as well as a management console for auditing purposes. The solution encrypts data at rest no matter if it is stored on their hard drive or external storage. For businesses wanting a more robust encryption offering, Dell Data Protection | Encryption can use the remote console that enables the software to be pushed out to users, policies to be set and enforced and audit capabilities to be established.
We can also help you get there with our comprehensive services portfolio. Working with Dell Services, you can assess the needs of your workforce to understand the workloads, workflow, mobility, and collaboration needs of workers to match them with the right products and solutions.With this consultative approach and Dell’s open architecture, you can, for example, virtualize over time at a pace that’s right for you. Instead of taking a large hit to CapEx, you can pay as you go, adding increased capabilities over time based on a clear roadmap for the future. This enables you to take advantage of the latest technology innovation on a schedule that fits your needs.Our portfolio includes assessment and planning services to uncover the insights you need to empower your workforce.
Add detractors – size, features, performance, no keyboards, etc.