End User Computing
#1 Consumerization of IT will make the biggest impact on enterprise IT in the next decade (Gartner 1)
Percent growth in the number of devices IT is expected to support by 2012 (IDC 2)
66% In 2011, the first students to grow up with the Internet will graduate from college.
2011
Market size of media tablet in units by 2014. (Gartner 3) 208M
2 Confidential
1,400 The minutes per month the average Facebook user spends on the site
63M Number of employees who will telecommute by 2016. Equals 43% of the American workforce.
77% 28% Of large businesses said securing corporate data on mobile devices was their most important security objective.1
Users who already use their personal devices while at work to access social networking sites such as Facebook. 6
The landscape is changing
Technology End Users
End User Computing 5 Confidential
Resulting in a computing transformation
Always on, anywhere Limited connectivity
Primary device is fixed
IT chooses the PC
Email or IM (one-to-one) communications
Primary device is mobile
Devices that reflect “me”
Freedom to participate (one to many)
Moving from… …to
One device Multi-device ecosystem
Management and security inside the firewall
Management and security inside the firewall
Boundary-less security and manageability
End User Computing 6 Confidential
With change comes organizational challenges:
• Meet the needs of end users
• Cultural changes
• Determine what devices best suit end user needs
• Implement more flexible work schedules, KPIs
• Talent acquisition tied to IT tools and devices for workforce
• Device, OS and application integration and management
• Secure data from data center to device
• New virtualization & cloud computing architectures
• Identify and manage all end points
• Automating device lifecycle management
Managing technology Managing people
End User Computing
End user computing is no longer just about the device or technology…
8 Confidential
It’s about the overall experience: • Enabling end users to do more without making IT sacrifices
• Making data access pervasive anytime, anywhere, on any device
• Developing a deeper understanding of end users, roles and needs
It’s about maximizing end user productivity and IT control:
9 Confidential
• Making users more productive than ever by mapping to technology interaction, data access and device usage
• Empowering IT professionals with tools to more efficiently deploy, manage, secure and support their changing workforce
It’s about meeting end user needs on their terms: • Forming in-depth insights into technology
usage and interaction
• Delivering mission-driven and user-focused devices and solutions
• Designing the experience and enhancing it with professional tools that have consumer appeal
10 Confidential End User Computing
End User Computing
Dell End User Computing
11 Confidential
• Customer inspired design across a complete portfolio of systems, services and solutions
• Seamless experience across multiple devices, operating systems and applications
• Tailored solutions optimized for management, security and productivity
is about:
End User Computing
Dell End User Computing
12 Confidential
delivering open, capable and affordable solutions for an evolving workforce.
is about:
13 Confidential
• Improve data security for a mobile workforce
• Redirect IT’s role to innovation
• Simplify IT deployment and management
• Improve IT process and policy adherence
• Improve productivity
across the organization
• Improve employee satisfaction
• Improve talent acquisition & retention
• Increase brand awareness
CEO/Organization CIO and IT Staff
• Attractive/flexible work environment
• Improved productivity
• Broader device choice and OS flexibility
• Improved ability to innovate & collaborate
Employees
Simplify technology and people management, improve productivity
End User Computing
Mobility & Collaboration
Management
Desktop Virtualization
Systems and services designed & certified for optimal mobility and collaboration experience to maximize productivity and provide the best solutions for your workforce.
Enhance workforce productivity, improve security, and streamlining desktop management with simplified, preconfigured solution stacks and integrated virtual desktops
KACE Appliances and management utilities designed to automate processes, centralize management, and reduce support costs
Cloud, Service and Support
Flexible deployment, licensing and image management, global asset recovery and support
Security The most comprehensive and flexible data protection with Dell Data Protection|Encryption
14 Confidential
Delivering a Solution Continuum •Maximizing end user productivity and IT Control
•Optimized to business & end-user workload needs •End-to-end capabilities and pervasive across device portfolio
End User Computing
Dell Desktop Virtualization Solutions Minimize risk while empowering end users
15 Confidential
Integrated solution
Flexible delivery models
Managed Cloud Managed Customer
Custom
Best practices implementation
Open Standards
• Pre-configured, pre-tested data center architecture
• Reduces deployment time
• Removes the burden of design and configuration – delivering a right-sized, scalable solution
• Thousands of hours of integration testing
• Same infrastructure, on-site or through the cloud
• Includes Implementation Services and ProSupport
You manage Dell manages
Feasibility Discovery Blueprint
Assessment
Design &
Implement
Operate &
Manage
End User Computing
Dell Enterprise Mobility Solutions Boost user productivity and secure your data and devices
Connect mobile devices to enterprise resources, enabling IT to remotely manage and secure.
16 Confidential
Mobile Device Management
Telecom Expense Management
Custom Application Development
Application Management
Security & Compliance
Develop an end-to-end best practice approach to management of voice, data, wireless and VOIP spend with Telecom Lifecycle Management.
Adapt quickly to today's fast-changing environment with rapid application development on newly emerging mobility devices like phones and tablets with multi-platform, multi-carrier enablement.
Deploy with Dell Mobility Application Platform (DMAP) and mobilize business applications across any user, device and location — on any network or platform.
Secure email solutions on both personal and corporate owned devices as well as virtualization for any screen secure access.
End User Computing 17 Confidential
Centralized management provides cost savings and a foundation for user protection
17
* Source: KACE Annual Customer Survey, November 2009
Centralized management can reduce support costs 42%
• Implement a KACE management appliance – 61%* report the appliance paid for itself in less than 3 months
• Have Dell do it for you with Dell Distributed Device Manager – helps reduce your TCO by up to 50%
• Do it yourself with a leading client management solution
Centralized Management
End User Computing
Dell Security Solutions Protect data no matter where it is
Powerful, ultra-flexible encryption
Physical
protection no matter where your
end user is
One of the most secure paths to
strong authentication
Integrated systems
and security management
• Encryption that doesn’t hinder IT
• Built for real IT environments
• Protects data for every user need
• Meets real business need
• Ecosystem of manageable authentication
• More secure credential processing
• Integrated solutions to meet your needs
• Lightweight yet comprehensive solution
• One console for asset, patch, software and security management
• Helping you delete, destroy or recover data
• Track systems for recovery
Delivered the way you want to deploy: SaaS, managed service or on-premise
18 Confidential
End User Computing
Dell Cloud (SaaS) Solutions Address high-impact IT problems
19 Confidential
Offload and automate manual, resource-intensive tasks such as: • email management • software license management • desktop management
Easy to Scale Quickly scale up or
down without additional costs (servers,
resources, time)
Rapid Deployment No army of consultants
to deploy services
Automatic Updates New capabilities added
automatically
Built-in High Availability
without the cost of purchasing/building
redundancy
No Complex VPN Needed
Updates occur in the background without employee assistance
End User Computing
We can do everything for you, on location or offsite
After we build it, we operate it for as long as you want us to
• We design and implement
• You run it
• We design it
• You build and operate
Tailored services Simplify delivery and maximize efficiency
Business Ready Configurations
Build & transfer
Build & operate
As-a-Service delivery
Dell Confidential 20
FLEXIBLE DELIVERY MODELS
+ Our comprehensive portfolio includes assessment and planning services to uncover the insights you need to empower your workforce as well as ProSupport for ongoing support.
+ With Dell’s consultative approach and open architecture, you can implement your strategy step by step, pay as you go, avoid a hit to capex, and add increased capabilities over time.
End User Computing
Commercial brands evolving with end user needs, enabling them to do more than ever before
Dell Confidential 21
Latitude & OptiPlex Dell Precision Vostro
Big Ideas for Small Business
Professional Class Laptops & Desktops
The Ultimate in Workstation Performance
XPS
Empower your passions
Driving enterprise efficiency and TCO. Elevating design. Redefining durable,
powerful, secure, manageable.
Worry-free business solutions
and services designed for small
business.
Artful blend of high performance
and purposeful design for consumers.
End User Computing
Latitude and OptiPlex Inspired Design Long-lasting durability, uncompromised reliability and flexible integration into your organization with environmentally conscious principles to respect our planet. Smart/Go-Anywhere Productivity Performance, versatility and collaboration features that that help end users be more productive than ever. Business-Class Control Efficient manageability, confident security, long-term stability and proven service and support for uncompromised IT control over your client systems. Integrated Solutions Tailored solutions for cost effective security, management, and productivity in next-generation end user computing environments.
Dell Confidential 22
End User Computing
Dell Precision Rock Solid Dependability Maximize uptime and efficiency with workstations that are designed and ISV certified for professional grade software.
Voracious Productivity ISV certified to create whenever and wherever you are with superb scalability and performance precisely tuned to your specific needs.
Harmonious Manageability Secure, manageable and serviceable workstations that seamlessly integrate into your environment.
End User Computing Dell Confidential 23
End User Computing
Vostro Enduring value for big ideas Delivering the right features and technology for small business. Vostro systems are easy to configure, simple to run and highly productive – all for a reasonable price. IT support that gets small business Dedicated support to small businesses without an IT staff. Vostro provides experts who understand the nature of small businesses and the technology they depend on. Reliable and secure Focused on protecting valuable data. Offering security solutions ranging from strong authentication to data protection services that are simple to use and require little or no maintenance.
Dell Confidential 24 End User Computing
End User Computing
XPS Tailored experiences Delivering superior experiences with no details overlooked. Meaningful and targeted performance with software and services that stand behind you. Thoughtful design Thoughtfully designed for performance and function. Every material was selected to enhance performance and create an object that the user can experience without boundary. Sleek and beautiful overall design is a side effect of careful performance driven construction. Uncompromised mobility We keep you up, running, and on the move. Thin with uncompromised power, keeping users connected anytime, anywhere.
Dell Confidential 25 End User Computing
End User Computing
Dell Tablets and Smartphones Inspired Design Designed for both personal and professional usage with consumer appeal and an easy-to-use, seamless experience across multiple devices. Go-Anywhere Productivity Dedicated to keeping end users connected with easy access to data and business applications anywhere/anytime. Integrated Solutions Focused on seamless integration within an IT environment with security, management, virtualization, and applications solutions.
Dell Confidential 26 End User Computing
End User Computing
Get started today.
Deploy end point devices (new and repurposed) that best meet individual usage needs of end users in your environment.
27 Confidential
Develop a 3 to 5 year strategic end user computing plan that increases productivity and cost savings:
1
2
3
4
5
Secure corporate data from data center to endpoint according to updated security policies.
Optimize the deployment and management of all end point devices.
Virtualize when/where it’s beneficial for your environment and end user based on your analysis of end user roles.
Implement pilot programs for the phased adoption of personally-owned devices into your environment where applicable.
Top Related