dell technologies unified workspace€¦ · dell technologies refers to our family of brands, and...
TRANSCRIPT
1 of 30
Internal Use - Confidential
Dell Technologies
Unified Workspace
Daniel Schoberegger
Business Development Manager, ALPS, Dell Austria GmbH
The Digital Future
2
Workforce Transformation
We believe technology should:
• Help people work the way they
want
• Improve productivity, simplify
management, enhance security
• Enable you to put your
employees first.
2 of 30 Internal Use - Confidential
3 of 30
The new workforce
Engage in some work outside
a traditional office81%
Work in 2+ places76%
Work in 3+ places52%
Internal Use - Confidential
4 of 30
Internal Use - Confidential
Balancing workforce transformation complexity
Nearly 7 full workdays
to deploy 1000 devices
ITDMs spend up to 25% of
their time monitoring and
troubleshooting
53% of IT leaders are struggling
to keep up with the increasing
diversity of devices
5 of 30
Internal Use - Confidential
A partner with
knowledge and
expertise
77%
A partner who helps
free up internal IT
resources
A partner with the ability
to scale deployment
on demand
89% 48%
What our customers told us they need most:
Trusted
Security
Modern
Management
Services &
SupportAward-winning
Devices
DEPLOY SECURE MANAGE SUPPORT
Dell Technologies Unified Workspace
Industry’s most comprehensive solution to deploy, secure, manage, support
virtually all devices from the cloud
6 of 30 Internal Use - Confidential
7 of 30
Internal Use - Confidential
We deliver an intelligent, unified approach to IT that enables choice and business innovation
with simplified lifecycle management solutions for IT and
ready-to-work experiences for end users.
ProDeploy Client Suite in the Unified Workspace
Legacy PC deployment
ProDeploy in the Unified Workspace
Contact Sales
or Channel
Provisioning systems with Dell saves up to nearly a week of IT time
per 1,000 devices deployed
9 of 30 Internal Use - Confidential
10 of 30
Internal Use - Confidential
Five steps to day-one productivity
• Export apps from Workspace ONE as PPKG filetype
• Use VMware configuration tool to create Windows Unattend.XML file
• Send PPKG and Unattend.XML file to Dell via secure FTP
• Choose from latest 3 versions of Windows 10 to apply on device
• Dell boots device in audit mode and applies OS, drivers and PPKG
• Dell reseals device with Unattend.XML file
• Dell ships device directly to user or to IT based on customer preference
• User powers on, enters credentials and starts working
• Workspace ONE applies policy, user specific apps and more with continued management
Define user workspace in Workspace
ONE
1
Send desired workspace
set-up to Dell
Dell applies workspace to
device in factory
Dell ships device directly to user or IT
User is ready to work on first
boot of device
2 3 4 5
11 of 30
Internal Use - Confidential
Customers choose their pathto modern deployment
Enroll into VMware Workspace ONE for
modern management
ProDeploy in the Unified Workspace
Our flagship Dell Technologies deployment solution using VMware
Workspace ONE
Ideal for hybrid environments with diverse devices and operating systems
ProDeploy Plus can reduce
deployment time by up to 56%
Register into Microsoft Intune
or enroll into VMware
Workspace ONE for
management
ProDeploy and ProDeploy Plus
For customers early in their Windows 10 or cloud app
journey
Ideal for customers needing onsite installation and data
migration
Dell Provisioning for Windows Autopilot
For customers using Microsoft solutions
Need Azure AD Premium for directory service
Ideal for remote workers using SaaS applications
12 of 30
Internal Use - Confidential
ProDeploy Client SuiteDeploy PCs with greater speed, lesser effort and more control
ProDeploy PlusProDeploy Basic Deployment
ProDeploy Plus can reduce deployment time by up to 56%*
NEW & Add-on: Dell Provisioning for
VMware Workspace ONE
NEW & included: Dell Provisioning for
VMware Workspace ONE
NEW & included: Dell Provisioning for
VMware Workspace ONE
Add-on Imaging Imaging (included) Imaging (included)
TechDirect Portal
BIOS settings
Asset tagging and reporting
+ 24x7 onsite installation
+ Data and settings migration
+ Connected Configuration
+ 30-day post-deploy configuration
assistance
14 of 30
Internal Use - Confidential
Days before a silent
attack is detected
Of end users share
confidential data
externally
Security professionals
needed by 2021 to fill
labour shortage
Cyber attacks are evolving and creating new challenges
!
External
threats
User
behaviorLimited security
resources
3.5M108 72%
Make the impossible possible with
Dell Technologies for Trusted Endpoint Securitydelivers security solutions that help protect the entire ecosystem,
giving customers the freedom and peace of mind to focus on other strategic workforce transformation initiatives (like moving to the cloud
or enabling remote work).
15 of 30 Internal Use - Confidential
16 of 30
Internal Use - Confidential
Trusted Devices
Protect your business and retain your competitive advantage with cutting edge threat protection.
Trusted Devices
Security begins with the endpoint and creates a foundation for protecting your environment, knowing the device is trusted.
Dell is your trusted security partner
Built-in security
Most securecommercial devices
Comprehensive ecosystem protection
Integrated solutions with security leaders
Smart collaboration
• SafeID
• SafeBIOS
• SafeScreen (2H)
• VMware
Workspace ONE
• SafeGuard &
Response
• SafeData
Trusted Access
Securely access your work from any device anywhere.
17 of 30
Internal Use - Confidential
Built-in security on Trusted Devices
SafeIDOnly Dell secures end user credentials
with a dedicated security chip1
SafeBIOSVisibility to unplanned BIOS
changes with Dell exclusive off-host
BIOS verification
SafeScreenDigital privacy screen with 30% less
battery drain than the competition
18 of 30
Internal Use - Confidential
Trusted Access with VMware Workspace ONE
Validate:Validate the state of the end user, device, apps and network to determine appropriate corporate access level
Monitor:Continuously access risk, trust and other conditional details to providereal-time compliance state
Prevent:Require multi-factor authentication, remove data with enterprise wipe or block access when high-risk usage is detected
✓
✓
✓
19 of 30
Internal Use - Confidential
Trusted Data with SafeGuard and Responsepowered by Secureworks
DetectPrevent Respond
Next Gen
AntiVirus (NGAV)
Stops unknowns
AI / machine learning
Efficient processing
Endpoint Detection &
Response (EDR)
Stops non-malware
Requires significant security
personnel (EDR)
Managed Endpoint
Detection & Response
Managed EDR gives customers
actionable insight
Incident Response
Highly skilled security
personnel to hunt, detect and
remediate threats
Augments existing security staff
– flex model
20 of 30
Internal Use - Confidential
Trusted Data withSafeData
Protect, control and monitor data
across any application, device or OS
all without disrupting user workflows—
enabling smart collaboration
Foundations to Trusted Data
• Collaboration must be secure
• Fines and penalties for not protecting data are growing
• Data breaches cause brand damage
22 of 30
Internal Use - Confidential
VMware Workspace ONE enables IT and end usersYou don’t need to compromise IT time and resources to transform the business
Flexible, simplified, secure
environment for IT
Faster, smarter experiences
for end users
23 of 30
Internal Use - Confidential
Unified endpoint
management for a heterogeneous
environment
Mo
bile
De
skto
pT
hin
gs Non-
Traditional
Endpoints
Simplified management across rugged, wearables,
sleds, kiosks and IoT
Best-in-class iOS support with DEP, VPP and Apple
School ManageriOS
Modernise management for macOS High Sierra
support with MDM + Apple DEPmacOS
Windows 10
Not just Win10 MDM, but complete PCLM across
policy, patch, security and software distribution
Localised in 17+ languages
with 24/7 global support
Scalable, cloud-first,
multi-tenant architecture
EMM/UEM leader with
largest market share
Integrated Workspace
ONE identity-defined app
catalog
Unique Chrome OS device management,
in partnership with GoogleChrome OS
The deepest Android Enterprise and
Samsung Knox supportAndroid
24 of 30
Internal Use - Confidential
Deliver a unified experience regardless of device or OS
Self-service
empowermentReady to work
experience
Always
up to dateActionable
insights
Zero-trust
security
Simplification through intelligent automation
Managed from the Cloud
25 of 30
Internal Use - Confidential
Partnering with Dell and VMware for a Unified Workspace
AWAR D - W I N N I N G P C s
144 awards and honors for product
innovation from CES
E AS I E S T D E P L O Y M E N T
Simplified low-touch provisioning and
cloud configuration
ALWAY S U P - T O - D AT E
OS updates, patches and firmware changes
over-the-air on any network
M O D E R N M AN AG E M E N T
Comprehensive management across PC
stack (firmware, OS, app and data)
M O S T S E C U R E
Predict, prevent and protect the most secure
commercial devices
E N D - T O - E N D S E R V I C E S
Real-time, end-to-end services from Dell
to ensure 24/7 support
Workspace ONE powered by AirWatch technologyDell Client Command Suite
27 of 30
Internal Use - Confidential
ProSupport Plus
All the features of ProSupport and:
Predictive, proactive, automated support
Designated Technology Service Manager*
Repair services for accidental drops, spills and surges
Hard drive retention after replacement
Maintenance to innovation ProSupport Client Suite
ProSupport
24x7 direct access to ProSupport engineers
Same and next business day onsite parts and labour response
Single source support for hardware and software issues
Automated, proactive support
Same and next business day onsite service
after remote diagnosis
Automated case creation with notification
Easy, self-service online portal to manage
support requests and dispatch parts
Ease
Access to consistent, single-source expertise for hardware and software
6 Global Command Centers monitor field service events
24,000+ support engineers in 165+ countries
Experts
Predictive analysis for issue prevention and optimisation enabled by SupportAssist
Up to 13 fewer steps to resolve a failed hard drive than key competitors*
Monthly history & contract reporting*
Insights
*Remote TSM is mandatory minimum offer requirement for ProSupport Flex; Available for ProSupport Plus customers with 500 or more ProSupport Plus systems.
Customers must commit to purchase 1,000 Dell client assets with ProSupport Flex within 12 months.
27 of 30 Internal Use - Confidential
28 of 30
Internal Use - Confidential
Faster resolutions with ProSupport Plus with SupportAssist
* Source: Based on a Principled Technologies test report, “Spend Less Time and Effort Troubleshooting Laptop Hardware Failures” dated April 2018. Testing commissioned by Dell, conducted in the United States. Actual results will vary.
Full report: http://facts.pt/L52XKM
Significantly reduce time
to resolve a hard drive
failure*
11x faster than the competition
Up to
92%lesser time
to resolve
Up to
68%fewer steps
in the support process
98% of Secureworks
clients say they see value within 60 days
Reduce time to deliver
core applications to
employee from 2
hours to just over12 minutes
92% lesser time
spent resolving a failed hard drive
Provisioning systems
with Dell saves IT up
to a week of time per
1,000 users
DEPLOY SECURE MANAGE SUPPORT
Dell Technologies Unified Workspace
your answer to Workforce Transformation
29 of 30 Internal Use - Confidential