mobility: going your way - delli.dell.com/sites/doccontent/business/large...mobility: going your way...

84
power solutions 2014 Issue 02 DPS-201402-STD 2014 Issue 02 Your guide to maximizing IT efficiency Dell.com/powersolutions Mobility: Going your way Constant connectivity is the new norm. As work styles morph along with lifestyles, end-to-end Dell Mobility Solutions give businesses a competitive edge — empowering users without compromising essential IT controls. Mobility: Going your way Transforming mobility management through a unified approach Tailoring enterprise applications for mobile environments Michael Dell on the data economy, entrepreneurism and start-up advice Jim Stikeleather on shape-shifting software innovations and the Internet of Things US$18.95 CAN$19.95

Upload: others

Post on 06-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

  • po

    we

    r solu

    tion

    s2

    014

    Issue

    02

    DP

    S-2

    014

    02

    -ST

    D

    2014 Issue 02

    Your guide to maximizing IT efficiency Dell.com/powersolutions

    Mobility: Going your wayConstant connectivity is the new norm. As work styles morph along with lifestyles, end-to-end Dell Mobility Solutions give businesses a competitive edge — empowering users without compromising essential IT controls.

    Mo

    bility: G

    oin

    g yo

    ur w

    ay

    Transforming mobility management through a unified approach

    Tailoring enterprise applications for mobile environments

    Michael Dell on the data economy, entrepreneurism and start-up advice

    Jim Stikeleather on shape-shifting software innovations and the Internet of Things

    US$

    18.9

    5

    CA

    N$

    19.9

    5

    http://www.dell.com/powersolutions

  • ©2014 Dell Inc. All rights reserved.

    Amerijet Whole Foods Market The Knot

    Shazam Overstock.com Shutterfly

    Zoosk salesforce.com Gilt.com

    TripAdvisor

    Dell helps companies of all sizes domore for their customers every day.See the stories at Dell.com/DoMore.

    50140422-delldomore.indd 1 5/6/14 5:42 PM

    http://Dell.com/DoMorehttp://Overstock.comhttp://Gilt.comhttp://salesforce.com

  • Dell.com/powersolutions | 2014 Issue 02 1

    12 Transforming mobility management through a unified approach

    By Roger Bjork

    As the mobile workplace and the nature of

    business itself continue to evolve, IT teams

    must support a multiplicity of devices, operating

    systems and work habits. Dell Enterprise Mobility

    Management helps simplify administration and

    secure vital data.

    16 Tailoring enterprise applications for mobile environments

    By Travis Brown

    To provide employees with the performance they

    need to stay productive on the go, enterprises

    can take several approaches to transform

    applications for the mobile workplace —

    including new app development, app

    modernization and desktop virtualization.

    20 Agile security for the mobile workforce

    By Roger Bjork

    Flexible, end-to-end security enables enterprises to

    speed adoption of transformative technologies for a

    competitive edge. Best-practice deployments help

    deliver on the business promise of mobility with

    integrated protection throughout the workplace.

    Dell.com/powersolutions

    2014 Issue 02

    30Propel start-up dreams from humble roots to household names with the right technology

    60Drive business results with integrated solutions platform for remote, branch and small offices

    56Speed application and website response with a SAN-connected, scale-out cache pool approach

    45Upgrade campus network capacity and performance with innovative switches

    24Optimize mobility infrastructure with flexible, wireless network access

    8 Cover storyMobility: Going your wayBy Anna-Lee Muck and Sean Wisdom

    Constant connectivity is the new norm —

    causing a shift in worker expectations that

    may not align with enterprise requirements.

    An effective mobility strategy empowers users

    and improves business performance without

    compromising essential IT controls.

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    http://qrs.ly/eq43nq5http://qrs.ly/eq43nq5http://qrs.ly/cw43nq7http://qrs.ly/cw43nq7http://qrs.ly/zy43nq8http://Dell.com/powersolutionshttp://qrs.ly/il43nq3http://qrs.ly/il43nq3http://qrs.ly/il43nq3http://qrs.ly/6843nq9http://qrs.ly/r743nqnhttp://qrs.ly/qt43nqvhttp://qrs.ly/bq43nr4http://qrs.ly/ww43nr7

  • 2 2014 Issue 02 | Dell.com/powersolutions

    Publisher’s comments

    6 Modes and mobility

    By Tom Kolnowski

    Customer perspective

    30 Think bigBehind every start-up is a dreamer who pursues

    game-changing innovation through the power

    of an idea and unrelenting passion. By providing

    visionaries with access to the right technology,

    Dell helps ignite the same entrepreneurial spirit that

    propelled the company from its own humble roots.

    Perspective

    42 Desktop virtualization: Enjoying the best of all worlds

    By Mark Bowker

    When enterprise mobility initiatives demand high-

    performance, customizable workspaces, IT leaders

    can respond with a virtual desktop delivery model

    that uses complementary technologies to meet

    business requirements while keeping costs in check.

    34 A new gold rush is on. Who will strike it rich?By Michael Dell

    Data is arguably the most important natural

    resource of this century. Welcome to the

    data economy, which holds the promise for

    significantly advancing society and economic

    growth on a global scale.

    Features

    24 Bolstering campus networking infrastructure to optimize wireless access

    By Steve Davis and Pratik Mehta

    A panoply of mobile users and devices calls

    for an enhanced mobility infrastructure that

    supports the demands of today’s content-rich

    applications. Four key components form

    the basis of a flexible, end-to-end network

    access solution.

    27 Maintaining data center uptime — anytime, from anywhere

    By Srikanth Vijayaraghavan and Pritesh Prabhu

    Enterprises that rely on continuous IT

    infrastructure availability must identify and

    resolve potentially adverse events without delay.

    Dell OpenManage Mobile app helps maintain

    system availability from a mobile device —

    wherever administrators may be.

    45 Step up performance with a campus network upgrade

    By Ted Curtin

    Changing traffic patterns and bandwidth-

    intensive workload demands make a

    convincing case for modernization.

    Standards-based switches enable IT

    organizations to easily add capacity and

    innovative functionality into existing wired

    and wireless networks.

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    http://qrs.ly/1m43npzhttp://qrs.ly/1m43npzhttp://qrs.ly/r743nqnhttp://qrs.ly/oe43nqthttp://qrs.ly/oe43nqthttp://qrs.ly/jy43nqphttp://qrs.ly/jy43nqphttp://qrs.ly/jy43nqphttp://qrs.ly/6843nq9http://qrs.ly/6843nq9http://qrs.ly/k543nrshttp://qrs.ly/k543nrshttp:///qrs.ly/qt43nqvhttp:///qrs.ly/qt43nqv

  • Dell.com/powersolutions | 2014 Issue 02 3

    38 Shape-shifting software innovations and the new value propositionBy Jim Stikeleather

    As the Internet of Things expands,

    the next generation of software is

    poised to transform how businesses

    and consumers create value.

    48 High-performance, cost-effective storage for mixed workloads

    By Chhandomay Mandal

    Flash-based storage delivers the speed that

    performance-hungry applications need.

    The latest generation of Dell EqualLogic

    arrays unlocks the power of flash to provide

    cost-effective, high-performance storage

    for data-intensive virtual environments.

    56 Turbocharging application response

    By Kishore Gagrani and Karen Makransky

    If it takes more than a few seconds for an

    application or website to respond, staff

    productivity can erode and customers will

    move on. Dell Fluid Cache for SAN enables

    remarkable I/O performance to keep IT

    operating at the speed of business.

    60 Driving better business outcomes with office-optimized IT

    By Tad Walsh

    The Dell PowerEdge VRTX integrated solutions

    platform spurs exceptional business results

    for remote, branch and small offices.

    64 Service-centric approach to IT automation

    By Scott Powers

    By boosting data center agility and efficiency,

    IT can spark untold business and organizational

    advances. Dell Active System Manager is

    designed to unify and simplify IT service

    delivery, enabling IT to respond quickly to

    changing enterprise needs.

    68 Accelerate IT service delivery with open private-cloud infrastructure

    By Brent Doncaster

    Private clouds offer scalability and self-service

    benefits of public clouds while allaying

    concerns about data security, control and

    reliability. Dell Red Hat Cloud Solutions help

    transform IT into a highly available, dynamic

    service-delivery center.

    32 Picture-perfect IT managementShutterfly deploys a Dell systems

    management appliance and Dell

    servers — delivering an outstanding

    experience that brings customers

    back for more.

    51 Uncovering the hidden costs of doing nothing: Backup and recoveryIntegrated, targeted backup and

    recovery solutions fortify an

    organization’s ability to withstand

    unexpected IT disasters. A top-down

    approach helps decision makers

    justify the investment.

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    http://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/qm43nqxhttp://qrs.ly/qm43nqxhttp://qrs.ly/bq43nr4http://qrs.ly/ww43nr7http://qrs.ly/ww43nr7http://qrs.ly/v343nrahttp://qrs.ly/v343nrahttp://qrs.ly/lw43nrdhttp://qrs.ly/lw43nrdhttp://qrs.ly/9e43nqohttp://qrs.ly/9e43nqohttp://qrs.ly/9e43nqohttp:///qrs.ly/9u43nr1http:///qrs.ly/9u43nr1http:///qrs.ly/9u43nr1http:///qrs.ly/9u43nr1

  • Index to featured Dell customerseResearch South Australia................................................................80Generali China Life Insurance Company .....................................80Gilt .......................................................................................................... 30Glasgow 2014 Ltd ...............................................................................79Shutterfly, Inc. .......................................................................................32The Knot ............................................................................................... 30TripAdvisor .............................................................................................31Whole Foods Market. .........................................................................31

    Index to advertisersBrocade Communications Systems ..............................................C3 Dell Inc. ..................................................................................5, 7, 55, C2Microsoft Corporation ......................................................................C4Qualcomm, Inc. ...................................................................................75Sprint Corporation .............................................................................. 71Trend Micro, Inc. .................................................................................. 15

    Going mobile? Take us with you

    Dell Power Solutions

    Magazine — your guide to

    maximizing IT efficiency —

    offers the latest in expert

    advice, solutions and

    technology for enterprises

    of all sizes. The digital

    edition enables anytime, anywhere interaction

    from any device supporting the Zinio reader app.

    For instant access to Dell Power Solutions on

    Zinio, scan this QR (quick response) code using

    a mobile device equipped with a camera and QR

    reader app, or visit zinio.com/powersolutions.

    Dell Power Solutions Magazine and special

    edition articles are also available online at

    Dell.com/powersolutions. Check our website

    for early-release articles, how-tos, case studies,

    best practices and expert tips you won’t find

    anywhere else.

    72 Seamless cellular connectivity: A new freedom for mobile workers

    By Monte Giles and Kylee Stephens

    The mobile workforce needs dependable,

    high-speed network connectivity to get the

    job done. Refreshing client fleets with built-in

    4G LTE technology lets employees take the

    internet with them — boosting flexibility,

    productivity and cost-efficiency.

    76 Adaptable IT infrastructure to keep advanced technologies humming

    By Michael Maiello

    An evolving technology landscape underscores

    the need for flexible IT infrastructure designed to

    handle intensifying demands on power, cooling

    and network access. APC-engineered products

    speed deployment and enhance management

    of servers and switches.

    Around the globe

    79 Dell innovatorsMeet businesses building success

    with technology.

    Sponsored content: Solution showcase

    59 Dell PowerEdge R220: Packing a performance punch

    63 Dell Smart-UPS: Intelligent power protection for IT network connections

    67 Samsung SSDs: Rev up laptops with solid-state drives

    Dell, EqualLogic, OpenManage and PowerEdge are trademarks of Dell Inc.

    79

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    http://zinio.com/powersolutionshttp://Dell.com/powersolutionshttp://qrs.ly/8542phfhttp://qrs.ly/ci43nrlhttp://qrs.ly/ci43nrlhttp://qrs.ly/4r43nrfhttp://qrs.ly/4r43nrfhttp://qrs.ly/gs43nrqhttp://qrs.ly/4543nrchttp://qrs.ly/4543nrchttp://qrs.ly/av43nrihttp://qrs.ly/av43nrihttp://qrs.ly/eb43nrmhttp://qrs.ly/eb43nrm

  • TripAdvisor® Dell helps TripAdvisor power the world’s largest travel community so travelers can make every experience count. See the whole story at Dell.com/DoMore. #DoMore

    ©2

    014

    De

    ll Inc

    . All rig

    hts re

    serve

    d.

    50140425-tripadv.indd 1 5/5/14 7:19 PM

    http://Dell.com/DoMore

  • 6 2014 Issue 02 | Dell.com/powersolutions

    In today’s world, many consumers of IT expect anytime, anywhere access

    to, well, just about anything — from any computing device they are carrying

    or wearing at the moment. In my book, these mobile consumers are more

    appropriately described as prosumers, where the distinctions between their

    workplace professional computing mode and personal consumer social media

    mode are permanently blurred. For a prosumer, there is no obvious switching

    from one mode to another, but rather a seamless stream of clicks, swipes, touches

    and words emanating from their browsers and apps: digital responses to workday

    requirements and the personal social environments they thrive in. And behind all

    of this transparency lies the linchpin of secure and ubiquitous network services,

    from which prosumers expect an always-viable networking path and adequate

    bandwidth to support that moment’s need.

    This lofty expectation of safe, universal network access manifests itself as one

    of IT’s bigger challenges, particularly as the Internet of Things (IoT) expands its

    footprint. For those in charge of safekeeping corporate networks and enabling the

    company’s workforce — likely to include a growing population of prosumers — this

    networking dilemma should be addressed as a crucial component of a broader,

    next-generation mobility strategy. For this issue of Power Solutions, we connected

    with mobility experts to produce the first installment of what will be an ongoing

    stream of relevant content to help you formulate and manage your own mobility

    strategy. In our feature story beginning on page 8, “Mobility: Going your way,”

    we cover the fundamental baseline elements of what should be considered for

    an effective mobility strategy.

    For prosumers, bring-your-own-device (BYOD) programs may be just the

    ticket for safely integrating many non-company computing devices. Read about

    how flexible, end-to-end security and BYOD network infrastructure can be

    deployed today in our feature, “Agile security for the mobile workforce,” beginning

    on page 20. Look for more content streams around related mobility topics on

    Dell.com/powersolutions and techpageone.com.

    Editorial staffPublisher Tom KolnowskiManaging editor Debra McDonaldFeatures editor Kathryn WhiteSenior editors Julie Addicott, Myriam Darmon,

    Dawn Davidson, James Hurd and Catherine LuoArt director and cover designer David ChanDesigner and illustrator Cynthia WebbCirculation and logistics manager Sharon Mendoza

    Staff writers Archie Lawhorne and Chris Young

    Contributing writers Roger Bjork, Mark Bowker, Travis Brown, Ted Curtin, Steve Davis, Michael Dell, Brent Doncaster, Kishore Gagrani, Monte Giles, Michael Maiello, Karen Makransky, Chhandomay Mandal, Pratik Mehta, Anna-Lee Muck, Scott Powers, Pritesh Prabhu, Kylee Stephens, Jim Stikeleather, Srikanth Vijayaraghavan, Tad Walsh and Sean Wisdom

    Advertising and sponsorship salesSales director Kyle Walkenhorst (626-396-9400)Sales manager/Western U.S. and South/Central America

    sales Shaun Mehr (949-923-1660)Eastern U.S. and Canada sales Steve Branda (201-483-7871)EMEA and APJ sales Mark Makinney (805-709-4745) Advertising sales assistant Cindy Elhaj (626-396-9400)Ad coordinator Catherine Luo

    Reader servicesSubscriptions are complimentary to qualified readers who complete the online subscription form. To subscribe to the regular quarterly edition of Dell Power Solutions Magazine, visit the Subscription Center at Dell.com/powersolutions. Once there, you can sign up for a new subscription, change your mailing address for a current subscription or unsubscribe. Going mobile? Visit the digital edition online at zinio.com/powersolutions. For other subscription services, please email our Reader Services team via [email protected].

    About DellDell Inc., headquartered in Round Rock, Texas, near Austin, listens to its customers and delivers innovative technology and services they trust and value. Uniquely enabled by its direct business model, Dell is a leading global systems and services company and No. 51 on the Fortune 500 list. For more information, visit our website at Dell.com.

    Dell cannot be responsible for errors in typography or photography. Dell, the Dell logo, Dell Precision, AppAssure, Compellent, EqualLogic, KACE, Latitude, Mobile Connect, NetVault, OpenManage, PowerEdge, PowerVault, ProSupport, SonicWALL, Venue, Venue Pro, vWorkspace, Wyse and XPS are trademarks of Dell Inc. Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others.

    Dell Power Solutions (ISSN 2325-6281, print; ISSN 2325-6273, online) is published quarterly by Dell Inc., Dell Power Solutions, One Dell Way, Mail Stop RR3-68, Round Rock, TX 78682, U.S.A. No part of this publication may be reprinted or otherwise reproduced without permission from the publisher. Dell does not provide any warranty as to the accuracy of any information provided through Dell Power Solutions. Opinions expressed in this magazine may not be those of Dell. The information in this publication is subject to change without notice. Any reliance by the end user on the information contained herein is at the end user’s risk. Dell will not be liable for information in any way, including but not limited to its accuracy or completeness. Dell does not accept responsibility for the advertising content of the magazine or for any claims, actions or losses arising therefrom. Goods, services and/or advertisements within this publication other than those of Dell are not endorsed by or in any way connected with Dell Inc.

    Copyright © 2014 Dell Inc. All rights reserved.

    Printed in the U.S.A.

    Cover photo: Sam Robinson/FITCH

    2014 Issue 2

    Modes and mobility

    Tom Kolnowski

    Publisher

    [email protected]

    Follow usDell.com/powersolutions

    zinio.com/powersolutions

    twitter.com/powersolutions

    techpageone.com

    Publisher’s comments

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    http://Dell.com/powersolutionshttp://techpageone.comhttp://Dell.com/powersolutionshttp://zinio.com/powersolutionsmailto:us_power_solutions%40dell.com?subject=http://Dell.comhttp://Dell.com/powersolutionshttp://zinio.com/powersolutionshttp://twitter.com/powersolutionshttp://techpageone.com

  • Whole Foods MarketDell helps Whole Foods Market nourish millions with the highest quality natural and organic foods available. See the whole story at Dell.com/DoMore. #DoMore

    ©2

    014

    De

    ll Inc

    . All rig

    hts re

    serve

    d.

    50140423-wholefoods.indd 1 5/1/14 5:57 PM

    http://Dell.com/DoMore

  • Features Cover story

    8 2014 Issue 02 | Dell.com/powersolutions

    Mobile computing is transforming the way

    people interact with each other and with the

    world around them. As work styles morph

    along with lifestyles, it’s no surprise to see

    mobility also transforming today’s enterprise computing

    landscape. Employees and business leaders expect constant

    connectivity, diverse collaboration tools and on-demand

    access to enterprise applications and content. Employees

    want to use a variety of devices for work, including their own,

    to facilitate remote and mobile productivity, but security and

    personal privacy are big concerns.

    In response, enterprises of all sizes are developing mobile

    enablement strategies to support a variety of device types,

    including laptops, tablets and smartphones. They may issue

    corporate-owned devices or allow employees to use personal

    devices through a bring-your-own-device (BYOD) program.

    Or they may implement a choose-your-own-device (CYOD)

    approach that enables employees to use personally owned

    devices, which they select from a preapproved list. Some

    organizations combine multiple models.

    Anytime, anywhere access opens the way to exceptional

    gains in personal productivity and organizational efficiency.

    At the same time, it exposes enterprises to added risk and

    complexity. If user expectations don’t align with business

    requirements, decision makers must find a common ground

    for delivering on workforce mobility benefits without

    compromising the underlying IT environment.

    Constant connectivity is the new

    norm — causing a shift in worker

    expectations that may not align with

    enterprise requirements. An effective

    mobility strategy empowers users and

    improves business performance without

    compromising essential IT controls.

    By Anna-Lee Muck and Sean Wisdom

    Mobility: Going your way

    Features

    Sam

    Ro

    bin

    son

    /FIT

    CH

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

  • Dell.com/powersolutions | 2014 Issue 02 9

    Steer through

    multifaceted demands

    An adaptable, end-to-end mobility

    strategy helps organizations achieve

    a significant uplift in workforce

    productivity and collaboration,

    together with enhanced operational

    agility. But first, to realize the full

    potential of enterprise mobility,

    decision makers must understand and

    balance multifaceted expectations and

    requirements of key stakeholders across

    the organization: end users, line-of-

    business (LOB) owners and IT leaders.

    End users are driven by the desire

    to improve personal performance. They

    want easy-to-use personal productivity

    tools to help them identify what needs

    to be done and how to do it. They also

    want tools that facilitate collaboration

    with team members and provide

    access to needed applications and data

    wherever they are. It’s all about getting

    the flexibility end users require to make

    their jobs easier.

    But the advantages of flexibility

    are tempered by privacy and security

    concerns. Many end users will do

    whatever it takes to get their work

    done, such as using personal devices

    and free file-sharing tools. Although

    they want the freedom to work on their

    devices of choice, end users expect

    privacy: They don’t want IT to track

    them, monitor their personal data or

    delete their personal data if a device

    wipe is needed. When enterprises try to

    impose security policies that limit the

    use of applications and devices, some

    workers go around the policies to get

    their work done efficiently — inviting

    risk into the organization.

    Likewise, LOB owners feel constant

    pressure to improve organizational

    performance. For example, they may

    be plagued by confusion or lack of

    collaboration among workers in the

    field. All too frequently, their end users

    spend significant time trying to get

    information and help and perhaps

    worst of all, doing paperwork.

    LOB owners need workforce

    productivity tools to satisfy business

    goals, but many see IT as too slow or

    too inefficient to create those tools

    quickly enough. Today, 55 percent

    of North American business decision

    makers agree with the statement

    “Technology is too important for the

    business not to be involved.”1 As a

    result, LOB owners look for work-

    arounds, perhaps bypassing their own

    IT department to turn to shadow IT —

    outside vendors — as a quick fix. This

    behavior leads to serious security

    repercussions as well as integration

    issues and additional cost.

    For IT leaders, mobility adds

    complexity to the operating

    environment (see figure). IT leaders are

    spending more time than ever before

    on business justifications and business

    cases, yet they are dealing with less

    money and fewer people than they

    need to effectively meet end-user and

    LOB-owner requirements. They must

    manage a growing number of operating

    systems, form factors and devices —

    typically, three per user. Plus, IT is

    responsible for ensuring security, not

    only of the device but also of the data

    as it travels with the end user.

    Factors driving the need for mobile enterprise management

    Anytime, anywhere

    access opens the way

    to exceptional gains in

    personal productivity

    and organizational

    efficiency.

    As personally owned units flood the workplace, enterprise IT mustsupport myriad device types.

    83%of companies

    plan to support tablets

    45%of enterprises plan to support

    three or more mobileoperating systems

    77%plan to support two or more

    mobile operating systems

    This is in addition to desktop operating systems.

    Device fragmentation leads to security concerns.

    72% of all enterprises surveyed said enhancing security is their number-one future mobility initiativeFigure based on “The Evolution of Mobile Enterprise Management,” an IDC infographic, sponsored by Dell, November 2013.

    1 “Infrastructure Will Drive the Retail Store Experience of the Future,” Forrester Research, Inc., April 17, 2014.

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

  • 10 2014 Issue 02 | Dell.com/powersolutions

    Cover story

    To handle changing mobility needs

    as they arise, many IT organizations have

    turned to point solutions. However, an ad

    hoc approach may not easily integrate

    with the existing infrastructure and typically

    requires managing several different

    vendors, which adds further complexity.

    Considering all the priorities IT decision

    makers must juggle, end-user productivity

    can fall lower on the list than they or

    their internal customers would like.

    Dell Mobility Solutions help bridge

    the gulf between business expectations

    and IT realities. End-to-end offerings

    are designed to increase workforce

    flexibility, heighten productivity and

    optimize business processes — while

    providing the essential control IT needs

    to help simplify management, minimize

    complexity and mitigate risk.

    Travel an open road, from

    endpoint to data center to cloud

    Because there is no one-size-fits-all

    approach, Dell provides objective

    recommendations that help

    organizations develop mobility strategies

    tailored to meet the needs of specific

    user groups, environments and business

    goals. Effective mobility strategies

    encompass four major capabilities:

    • Deliver data through modern apps that

    are optimized for mobile platforms to

    enhance end-user productivity

    • Manage devices and containers

    from a central location to maximize

    IT efficiency

    • Secure data from endpoint to data

    center to cloud — regardless of who

    owns the device — and differentiate

    network access privileges to minimize

    risk of loss, theft and downtime

    • Optimize IT infrastructure to handle

    exponential growth of both data and

    the number of users accessing that data

    The Dell Mobility portfolio of

    integrated solutions is designed to

    address these requirements end to end,

    from handheld devices to back-end

    infrastructure. The solutions encompass

    a comprehensive range of mobile

    devices with security, network access,

    systems management, application

    enablement and services — the key

    to planning a secure and scalable

    environment that best serves an

    organization’s stakeholders.

    Dell helps enterprises empower

    employees to use the devices they

    prefer with the apps they need. For

    example, Dell supports flexible device

    options to accommodate different

    mobile enablement strategies, whether

    organizations deploy secure, manageable

    and reliable corporate-owned devices or

    let employees bring their own. Dell Mobile

    Application Services help organizations

    create mobile-optimized apps through

    approaches that include modernization

    and custom development. In addition, the

    Dell Wyse Datacenter portfolio of desktop

    virtualization solutions gives employees

    the flexibility to work from anywhere

    while enabling IT to protect individual

    user profiles, data, OS and applications

    on secure servers in the data center.

    Through Dell Enterprise Mobility

    Management (EMM), IT staff can

    secure and manage their containers

    and endpoints, including mobile

    devices, laptops and desktops.

    This unified solution integrates the

    following common functions: systems,

    mobile devices, applications, content,

    encryption and policy management;

    secure access to corporate resources;

    user self-service; and real-time

    reporting and alerts. Dell EMM

    eases the adoption of mobility and

    BYOD by integrating into existing IT

    environments and helping enterprises

    manage complexity.

    Dell Mobility Solutions also

    enable enterprises to strengthen data

    protection and access throughout

    the IT infrastructure. For example,

    Dell SonicWALL solutions protect

    network resources against attacks and

    enable organizations to set policies

    for secure remote access. Dell One

    Identity solutions are designed to

    simplify access governance with an

    automated framework that manages

    user identities, privileges and security

    across the enterprise — enabling LOB

    owners to provide individuals with the

    correct access to perform their jobs.

    Dell Mobility Solutions encompass a

    comprehensive range of mobile devices

    with security, network access, systems

    management, application enablement and

    services — the key to designing a secure

    and scalable environment that best serves

    an organization’s stakeholders.

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

  • Dell.com/powersolutions | 2014 Issue 02 11

    And Dell Data Protection solutions

    deliver comprehensive encryption,

    advanced authentication and malware

    prevention to help safeguard data

    wherever it goes — devices, external

    media or public cloud storage.

    The solution set also helps

    administrators tune network

    infrastructure to support the mobile

    workforce of today and tomorrow.

    In particular, administrators can

    enhance workload capacity and

    adjust network bandwidth and

    coverage for wireless and wired

    networks through offerings such as

    Dell Networking W-Series switches.

    Drive business transformation

    and success

    Because it takes a holistic approach

    to create an end-to-end mobility

    strategy that successfully addresses

    end-user wants, LOB-owner needs

    and IT leadership requirements, Dell

    Mobility Solutions are designed to

    cover every aspect of mobility, not just

    parts of it. This portfolio helps remove

    the complexity of dealing with multiple

    point solutions and vendors, enabling

    organizations to quickly launch fresh

    mobility programs and enhance

    existing ones.

    Moreover, Dell Mobility Solutions

    enable enterprises to embrace mobility

    in a way that best suits specific

    organizational needs, no matter

    their size, mobility requirements or

    progress in the mobility journey. (See

    the sidebar, “3 common use cases.”)

    Because Dell Mobility Solutions

    support heterogeneous infrastructures

    and diverse devices, organizations

    can tailor computing solutions for

    individual user groups in a way that

    integrates easily within the existing

    IT landscape. Through this approach,

    organizations gain the flexibility

    to meet diverse needs and the

    agility to expand capabilities quickly

    and efficiently to keep up with

    changing requirements.

    When an integrated solution

    set works together seamlessly, IT

    leaders are able to deliver just the

    right touch of technology where

    needed to accelerate business

    and organizational outcomes and

    optimize the user experience and

    customer experience. As a result,

    an end-to-end mobility strategy can

    become an engine for unprecedented

    innovation and growth.

    3 common use casesThe progression toward enterprise-wide mobility covers three typical use

    cases. At any given time, a mobility program may have workgroups or

    users who fit any one of the three.

    1. Enabling mobile devices: Often the first step is to enhance and expand

    the capabilities of mobile devices to provide secure, easy access to end-

    user productivity tools such as email, calendar and contacts. This level

    of application access is all that many end users need to improve their

    productivity, regardless of where or when they’re working.

    2. Delivering full application access: The second use case involves a

    large section of the mobile enterprise workforce that could benefit

    from expanded access to job-specific applications, such as customer-

    relationship management (CRM) tools for the sales team. The focus

    shifts to secure delivery of required apps to a variety of device types and

    platforms that IT can manage centrally.

    3. Transforming mobile use cases: In the third use case, the focus is

    on mission-critical roles, such as clinicians and educators, as well as

    transportation, distribution, retail and construction workers. These

    individuals are almost completely mobile, and they traditionally have

    some type of performance metric associated with their roles. For

    exceptional performance, organizations should consider developing

    and delivering native applications on business-grade devices to redesign

    workflows and streamline business processes.

    By adopting a comprehensive, integrated solution, organizations can

    quickly and flexibly add capabilities as their mobility programs expand and

    business requirements change. Dell mobility consulting services meet

    organizations wherever they may be on their mobility journey: from assessing

    needs to helping IT decision makers become effective partners who enable

    end users and line-of-business (LOB) owners to achieve their goals.

    Authors

    Anna-Lee Muck is a senior messaging

    manager for Dell Mobility. She has been at

    Dell for 10 years.

    Sean Wisdom is director of global mobility

    solutions marketing at Dell. He is responsible

    for engaging customers in how mobility

    solutions can transform their performance,

    processes and business plans.

    Learn more

    Dell Mobility Solutions:

    www.dellmobilitysolutions.com

    Dell, SonicWALL and Wyse are trademarks of Dell Inc.

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    http://www.dellmobilitysolutions.com

  • 12 2014 Issue 02 | Dell.com/powersolutions

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    It’s no secret: People who use mobile devices are

    industrious. To capitalize on all that productivity,

    enterprises need to provide employees with access to

    corporate data and applications anytime, anywhere. But

    there’s a catch. As a plethora of smartphones, tablets, laptops

    and desktops enters mainstream use — each with different

    operating systems — the task of managing and controlling

    these devices becomes unwieldy.

    The situation is compounded when employees resist

    corporate control and security policies that impede productivity

    or appear to encroach on personal privacy. Organizations need

    ways to expand access to corporate networks and increase

    user adoption of enterprise solutions without exposing the

    organization to a large and growing array of threats.

    IT groups also must account for changing mobile

    enablement strategies. Many organizations are beginning to

    implement choose-your-own-device (CYOD) programs and

    allow employees themselves to manage corporate-issued

    devices. At the same time, the rise in adoption of bring-your-

    own-device (BYOD) policies has employees clamoring to use

    personally owned devices for work, and many organizations

    recognize the potential productivity and cost advantages of

    the BYOD approach.

    In the midst of constant change, IT groups must

    continuously adjust the way they provision devices,

    deploy enterprise applications, enable remote access,

    As the mobile workplace and the

    nature of business itself continue

    to evolve, IT teams must support

    a multiplicity of devices, operating

    systems and work habits. Dell Enterprise

    Mobility Management helps simplify

    administration and secure vital data.

    By Roger Bjork

    Transforming mobility management through a unified approach

    Dell

    Inc.

  • Dell.com/powersolutions | 2014 Issue 02 13

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    secure corporate information and

    more. Many IT organizations add

    point solutions for mobile device

    management and security as the need

    arises. But a piecemeal approach that

    involves managing multiple vendor

    relationships also can saddle IT teams

    with solutions that don’t talk to each

    other or fail to address evolving

    enterprise requirements.

    Organizations must have the flexibility

    to accommodate a wide range of

    variables today and lay the groundwork

    for future developments. A big piece of

    the puzzle is accommodating effective

    mobile enablement strategies to support

    the influx of diverse devices, operating

    systems and work habits. IT groups need

    a way to provision, manage and secure

    devices, data and applications — and the

    flexibility to handle functions independent

    of the mobile enablement strategies and

    devices supported today or tomorrow.

    At the same time, IT leaders have the

    opportunity to improve connectivity and

    empower line-of-business owners with

    the productivity and collaboration tools

    they need to help their teams excel.

    Flexible, end-to-end management

    To help organizations deal with a

    complex and changing landscape, Dell

    Enterprise Mobility Management (EMM)

    enables IT groups to implement security

    and management capabilities that match

    precise requirements. Dell EMM is a

    comprehensive mobile enablement

    solution built with field-tested, leading-

    edge security and management

    technology designed to support a variety

    of devices, operating systems, worker

    requirements and profiles.

    Dell EMM integrates common

    functions for managing corporate-

    issued or personally owned endpoints,

    as well as enterprise workspaces, or

    Through Dell EMM,

    IT leaders can be

    ready to support

    evolving mobile

    enablement strategies

    designed to provide

    secure anytime,

    anywhere access to

    corporate resources

    from a changing mix

    of devices — while

    helping simplify

    administration.

    containers, that isolate enterprise

    resources from the personal operating

    environment (see figure):

    • Mobile device management (MDM)

    • Mobile application management (MAM)

    • Mobile content management (MCM)

    • Endpoint systems management (ESM)

    • Secure access to corporate resources

    • Integrated management console

    • End-user self-service

    • Real-time, consolidated reporting

    and alerts

    Facilitating BYOD

    Dell EMM lets administrators take

    a traditional approach to endpoint

    management. However, in cases such

    as a BYOD environment, administrators

    can manage a secure enterprise

    workspace on the device instead of

    managing the entire device.

    Dell EMM provides a container for

    personally owned smartphones, tablets

    and laptops. The container — which

    includes managed encryption, policy

    Comprehensive mobile enablement

    Endpoint management Container management

    Dell MobileManagement

    Dell KACEK1000 as aService

    Dell MobileWorkspace

    Dell DesktopWorkspace

    Dell Enterprise Mobility Management: Flexible management and security for current and evolving mobility/BYOD strategies

  • Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.14 2014 Issue 02 | Dell.com/powersolutions

    Features

    management and data loss protection

    (DLP) — separates enterprise data and

    applications from personal data

    and applications and helps simplify

    integration with existing IT infrastructure

    and processes.

    The container benefits end

    users as well. They can access the

    corporate resources they need simply

    by downloading an easy-to-use,

    noninvasive app. The container helps

    assure end users that their privacy won’t

    be violated and their personal data

    won’t be compromised, especially in

    the instance of a remote wipe — which

    takes place inside the container only.

    Employees get the tools and privacy

    they want so they can embrace the

    organization’s security measures

    instead of trying to work around them.

    By enabling offline productivity,

    container-based solutions support an

    increasingly mobile workforce that often

    must deal with poor internet connectivity

    while traveling. Containers allow workers

    to capitalize on a responsive, native-

    like experience wherever they are. In

    addition, containers help organizations

    accommodate a diversity of device types,

    including smartphones and small tablets,

    for which virtualization solutions are often

    a poor fit because of small screen size.

    For BYOD smartphones and tablets,

    the container is designed to provide

    built-in, secure remote access with DLP

    and a single, secure corporate mobile

    app for productivity and collaboration.

    The app includes email, calendar,

    contacts, secure mobile browser and

    secure local file explorer.

    While smartphone and tablet

    operating systems allow for fewer

    changes from IT than PC operating

    systems, laptops and desktops

    may require deployment of a full

    corporate OS image. For that reason,

    the container for BYOD laptops and

    desktops delivers a corporate Windows

    image that can be installed in an Apple®

    Mac OS® or Windows environment.

    Controlling complexity

    Unlike point solutions, Dell EMM is

    designed to simplify endpoint management

    and security through a unified approach.

    Wide range of management

    options. Dell EMM enables

    administrators to manage everything

    from smartphones, tablets and

    containers to laptops and desktops,

    regardless of who owns the endpoint.

    Moreover, administrators can decide

    how they manage each endpoint,

    whether by user identity or use case.

    Integration of field-tested

    technologies. Dell has integrated its

    best-of-breed intellectual property (IP) for

    management and security into Dell EMM.

    Industry-leading security. Woven

    across Dell EMM are advanced security

    functions that can be controlled from

    a centralized management console,

    including setting up configurations,

    policies, data loss protection, secure

    remote access, encryption and passwords.

    Single-vendor support. Working

    with a single vendor helps ensure

    integration of capabilities and

    management consoles, streamline

    deployment and simplify support.

    Comprehensive professional services.

    Dell offers Image Consulting services

    to help organizations create and

    manage images deployed to personal

    devices. Dell Client Mobility and BYOD

    Consulting assists IT leaders in analyzing

    organizational needs and defining a

    road map for mobility technologies.

    EMM Migration Consulting from Dell

    helps smooth the move from a current

    management service to EMM. The Dell

    Mobility User Experience Prototype

    Workshop is designed to provide IT

    leaders with a clear landscape of their

    requirements and produce visual

    mock-ups of desired solutions. And Dell

    has established a Mobility Center of

    Excellence that delivers the resources

    necessary to help IT decision makers

    become mobility experts, enhancing

    their partnership with line-of-business

    owners and end users.

    Mobile strategy support for today

    and tomorrow

    As mobile technologies and work

    habits continue to evolve, IT leaders

    need ways to accommodate existing

    requirements, prepare strategies for

    change and protect investments. Dell

    EMM provides the tools needed to

    enhance mobile device security and

    management in several ways:

    • Comprehensive endpoint

    management: The mobile

    enablement capabilities of Dell EMM

    streamline administrative functions

    Employees get the tools and privacy they

    want so they can embrace the organization’s

    security measures instead of trying to work

    around them.

  • Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    Dell.com/powersolutions | 2014 Issue 02 15

    while also helping IT understand

    which devices employees are using

    and how they are using them.

    • Secure enterprise environment:

    Dell EMM provides the flexibility

    to support an array of current

    technologies plus technologies that

    may not yet have been implemented,

    such as machine-to-machine (M2M)

    management. Dell EMM also enables

    administrators to deploy and support

    the business applications and services

    end users need.

    • Protected access to data: Embedded

    security features, such as secure

    remote access and encryption, as

    well as containerization capabilities,

    help keep corporate information,

    applications and networks safe.

    • Heightened management efficiency: A

    centralized management console helps

    control the complexity that can come

    with expanding mobility or BYOD

    programs; user self-service functions

    offload tasks from IT. Integrated

    capabilities enable components to

    be added seamlessly, avoiding time-

    consuming integration work.

    • IT innovation: Dell EMM facilitates

    innovation by supporting diverse

    devices as well as emerging

    technologies. With Dell EMM, IT

    groups can deliver a responsive,

    modern experience for a growing

    range of use cases.

    Through Dell EMM, IT leaders can

    be ready to support evolving mobile

    enablement strategies designed to

    provide secure anytime, anywhere access

    from a changing mix of devices — while

    helping simplify administration.

    Author

    Roger Bjork is director of global product

    marketing, responsible for overall mobility/

    BYOD solutions for Dell.

    Learn more

    Dell Enterprise Mobility Management:

    Dell.com/EMM

    Dell Client Mobility Solutions Consulting:

    qrs.ly/3k41rm8

    Dell Mobility Solutions:

    www.dellmobilitysolutions.com

    Dell and KACE are trademarks of Dell Inc.

    Designed in collaboration with VMware for integrated, agentless security

    1.

    Trend Micro is #1 in Cloud, Data Security and here are 5 reasons why:

    Secure your Dell™ infrastructures with Trend MicroFor more information visit www.trendmicro.com or call 888-977-4200

    Provides an immediate defense against targeted attacks & zero-day exploits

    Delivers real-time visibility and simple managemenacross

    Drives higher security and lower TCO through integration with your environment

    Consistently ranked #1 by analysts and customers

    2.

    3.

    4.

    5.

    tthe network

    http://Dell.com/EMMhttp://qrs.ly/3k41rm8http://www.dellmobilitysolutions.com

  • 16 2014 Issue 02 | Dell.com/powersolutions

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    The rapid expansion of workplace

    mobility has led to a corresponding rise

    in users who need to access enterprise

    applications and data from a wide

    range of devices and locations. In many cases,

    organizations are implementing hybrid mobility

    strategies that may include issuing corporate-

    owned devices, instituting bring-your-own-device

    (BYOD) policies or permitting employees to select

    from preapproved choose-your-own-device

    (CYOD) alternatives.

    Preparing enterprise applications for an

    increasingly diverse array of mobile devices is

    particularly challenging. In addition to email,

    calendaring, collaboration and web browser

    applications, many employees must work with

    customer relationship management (CRM) software

    and enterprise resource planning (ERP) systems,

    as well as industry-specific applications such as

    electronic medical records (EMRs) and delivery-

    tracking software.

    To deliver these applications effectively to

    mobile environments, IT groups need to support a

    wide variety of screen sizes and operating systems,

    as well as the different ways in which users interact

    with mobile devices — for example, multi-touch

    gestures or hands-free input. At the same time,

    organizations must meet specific application and

    data security requirements.

    Identifying the right approach

    There are different ways to bring enterprise

    applications to mobile environments. Determining

    the most suitable approach involves a thorough

    assessment of business goals, technical requirements

    and possible constraints imposed by the existing

    application or infrastructure.

    Development

    Organizations should consider developing a

    new mobile app if they want to deliver essential

    application capabilities in an efficient, user-friendly

    interface designed specifically for mobile platforms.

    Apps can be optimized for the desired mobile

    devices, operating systems and use cases.

    Modernization

    In some cases, modifying existing mobile apps or

    desktop applications for mobile environments may

    be the preferred approach. Transforming existing

    applications helps reduce cost and accelerate time

    to value. Application modernization also enables

    organizations to benefit from end-user familiarity

    with the functionality of existing apps.

    Virtualization

    Desktop virtualization may be desirable when end

    users require access to the full capabilities of existing

    desktop applications. This may be the case when

    To provide employees with the performance they need to stay

    productive on the go, enterprises can take several approaches to

    transform applications for the mobile workplace — including new app

    development, app modernization and desktop virtualization.

    By Travis Brown

    Tailoring enterprise applications for mobile environments

  • Dell.com/powersolutions | 2014 Issue 02 17

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    an organization is using closed software with proprietary

    application programming interfaces (APIs) or when security or

    compliance requirements mandate heightened IT control over

    the application and the data it accesses.

    Designing and developing mobile apps

    Some enterprises lack in-house resources to prepare

    applications for mobile environments. In response, the

    Dell Application Modernization and Development Solution

    Set offers products and services that help organizations

    develop new apps, modernize existing apps and implement

    desktop virtualization.

    Dell has established best practices for delivering

    enterprise applications across diverse mobile environments

    using this solution set. The Dell Mobility Application Services

    team follows a five-step process to determine the optimal

    approach for an organization’s specific mobile application

    needs (see figure).

    Define

    Dell consultants start by assessing organizational requirements

    and goals to gain an understanding of how users should

    access information and what types of devices and platforms

    must be supported. As part of that process, the consultants

    determine whether existing applications need to be

    modernized first, such as migrating applications from

    outdated mainframes to modern, industry-standard platforms.

    Next, Dell consultants and the organization’s team

    members decide whether to develop a new app, modify an

    existing app, implement a virtualized desktop environment or

    take another approach.

    Design

    If the team determines that a new app should be designed,

    Dell custom mobile application development consultants

    work to build the optimal user interface. The user interface

    accounts for the supported devices and platforms, application

    requirements and the way users interact with mobile devices.

    The plan might call for optimizing an existing interface or

    website for use on mobile platforms. Ultimately, the goal is to

    produce a design that heightens mobile functionality, enables

    secure mobile access and helps improve productivity.

    Develop

    Once the design is approved, Dell mobile application

    developers can create a custom native app for a single

    platform. Another option is to develop a separate app for

    each platform that the organization wants to support.

    Alternatively, developers can build a cross-platform app for

    multiple mobile or desktop operating systems.

    Because security is a top concern in the development

    process, developers incorporate industry-standard encryption

    capabilities. They also follow best practices designed to prevent

    mobile access to enterprise data from compromising the

    security of that data. At the same time, developers help ensure

    that organizations maintain compliance with internal policies

    and external regulations concerning data security and privacy.

    Test

    As a key part of the app development process, the Dell team

    creates test cases and automated scripts and then conducts

    end-to-end testing across the planned deployment

    platforms. For example, testing can cover performance,

    security, app compatibility with operating systems and

    browsers, and integration with business intelligence, data

    warehousing and ERP solutions.

    Boost mobile productivity and customer engagement through a five-step process based on industry best practices

    The Dell Application Modernization

    and Development Solution Set offers

    products and services that help

    organizations develop new apps,

    modernize existing apps and

    implement desktop virtualization.

    Define Design Develop TestDeploy andsupport

    1 2 3 4 5

  • 18 2014 Issue 02 | Dell.com/powersolutions

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    Deploy and support

    Once testing is complete, the Dell team can help simplify the

    deployment and distribution processes by performing app

    store certifications and uploading to the Apple® App Store,

    Google Play, Windows Store or BlackBerry World, as well as

    to the organization’s own app store. Dell also offers mobile-

    application support options ranging from proactive — with

    help-desk and remediation capabilities — to reactive —

    with call-out support on a per-incident basis.

    Implementing desktop virtualization

    Depending on the number of applications in a company,

    building or modernizing apps might be cost-prohibitive.

    Desktop virtualization offers a cost-effective alternative

    that enables end users to easily access all their applications

    from any device through single sign-on. IT staff can quickly

    set up a new user by creating a virtual machine and then

    assigning a new user name and password. Part of Dell cloud

    client-computing, the Dell Wyse Datacenter portfolio offers

    pre-configured end-to-end solutions, including endpoints,

    data center hardware, services and virtualization software, to

    address the needs of a mobile workforce.

    Pre-configured, integrated solutions

    The Dell Wyse Datacenter portfolio includes pre-configured,

    pretested, partner-verified desktop virtualization solutions

    that can be hosted on-site or in a Dell data center. These

    solutions incorporate software, servers, storage, networking,

    endpoints and services to help accelerate deployment and

    simplify ongoing management of desktop virtualization. The

    following Wyse Datacenter offerings enable organizations

    to start with a small proof of concept and then scale the

    environment seamlessly and cost-effectively, leveraging

    existing investments:

    • Wyse Datacenter for Citrix: Production-ready, highly

    scalable virtual desktop infrastructure (VDI) solution that

    uses Citrix® XenDesktop® software with a wide variety of

    prequalified components.

    • Wyse Datacenter for VMware® Horizon View:

    Comprehensive end-to-end solution for desktop virtualization

    that integrates VMware Horizon View virtualization software

    and the Wyse Datacenter hardware and software stack.

    • Wyse Datacenter for Microsoft VDI and vWorkspace:

    Integrated solution based on Microsoft® Windows Server®

    2012 R2 and Dell vWorkspace virtualization software that

    enables organizations to select from multiple approaches

    to desktop virtualization.

    Converged platform

    Wyse Datacenter with VRTX is well suited to small and

    medium-sized organizations looking for cost-effective, per-seat

    solutions. Dell PowerEdge VRTX provides enterprise-level VDI

    capabilities within a converged infrastructure that can be used

    in a normal office environment.

    Cloud-based service

    Organizations of any size can consider Dell Workspace-as-a-

    Service (WaaS), a cloud-based desktop virtualization offering

    that offloads implementation, hosting and support to Dell.

    The WaaS approach helps accelerate deployment, eliminate

    capital expenditures and significantly ease management

    burdens while delivering a robust, secure user experience.

    Administrators can rapidly provision desktops to end users

    and manage virtual desktop images through an intuitive self-

    service portal.

    Software solutions

    While cloud client-computing supports an organization’s

    choice of virtualization software, Dell software solutions for

    desktop virtualization provide another alternative to deploy

    the desktop virtualization model — or models — that fit

    specific organizational needs:

    • Dell vWorkspace enables organizations to select a hosted

    VDI, an offline/local VDI, a Terminal Server/Remote

    Desktop Session Host (TS/RDSH) solution or a blended

    model to match the right technologies to individual user

    needs and to maximize cost-effectiveness.

    • Wyse Cloud Client Manager is a cloud-based management

    tool designed to securely and seamlessly manage

    By transforming applications for

    mobile environments, enterprises can

    move business forward — facilitating

    anytime, anywhere productivity and

    boosting employee satisfaction.

  • Dell.com/powersolutions | 2014 Issue 02 19

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    Welcome to the app-centric worldPeople have more computing power at their fingertips

    than ever before, with cloud-based apps and services

    just a few clicks away — bypassing the IT department.

    While CIOs are under pressure to reduce costs and

    improve efficiency, application developers have

    become the new kingmakers, capable of driving

    revenues and differentiating new products and services.

    To brainstorm ways of working within the

    app-centric landscape, in January 2014 a panel of 10

    IT experts gathered at a think-tank discussion hosted

    by the Menlo Park, California–based venture capital

    firm NEA. Moderated by Dell director Barton George,

    “The New Age of Apps and Delivery Gaps” think tank was

    streamed live, enabling viewers to follow and contribute

    questions and comments through Twitter.

    With experiences ranging from start-ups to

    established enterprises, the panelists observed that IT

    organizations must meet the demands of their app-

    centric users, who expect apps and services to be

    delivered more quickly and to be better designed than

    they are today. Also, users want access from any device,

    anywhere, at any time. But most importantly, concluded

    the panel, IT leaders need to change the culture of

    their departments to embrace risk-taking, tolerate

    failure and value knowledge-sharing. This step is key to

    transforming the IT organization into a service-oriented

    consultancy that ties into the core of the business.

    To watch the Livestream video broadcast of the

    event, visit new.livestream.com/Dell/theappgap.

    Organizations should consider

    developing a new mobile app if they

    want to deliver essential application

    capabilities in an efficient,

    user-friendly interface designed

    specifically for mobile platforms.

    Dell, vWorkspace and Wyse are trademarks of Dell Inc.

    Author

    Travis Brown is a senior product manager at Dell, specializing in

    desktop virtualization. He has been in the virtualization delivery

    industry for 12 years.

    Learn more

    Dell Application Services:

    qrs.ly/nb41rmb

    Dell Custom Mobile Application Development:

    qrs.ly/fz41rmf

    Dell Mobility Solutions:

    www.dellmobilitysolutions.com

    thin clients as well as iOS and Google® Android™

    mobile devices.

    • Wyse Device Manager is powerful on-premises

    management software for configuring, updating and

    administering Wyse thin-client devices.

    • Wyse WSM enables virtually any Windows application

    to run on a cloud-client endpoint just as it would on a

    traditional PC, while avoiding security exposures and

    management and maintenance costs.

    • Wyse TCX desktop virtualization software provides a rich

    multimedia experience and supports multiple displays on

    Wyse endpoints.

    Supporting mobile workforce productivity

    As organizations continue to expand their mobility

    programs, they need efficient and effective ways to bring

    enterprise applications across an increasing variety of mobile

    environments to meet both user requirements and business

    goals. (For more information, see the sidebar, “Welcome to

    the app-centric world.”)

    Dell offers comprehensive solutions and expert

    resources for application development, modernization and

    virtualization that help organizations accelerate time to value

    and control costs. By transforming applications for mobile

    environments, enterprises can move business forward —

    facilitating anytime, anywhere productivity and boosting

    employee satisfaction.

    http://new.livestream.com/Dell/theappgaphttp://qrs.ly/nb41rmbhttp://qrs.ly/fz41rmfhttp://www.dellmobilitysolutions.com

  • 20 2014 Issue 02 | Dell.com/powersolutions

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    Flexible, end-to-end security

    enables enterprises to speed adoption

    of transformative technologies for

    a competitive edge. Best-practice

    deployments help deliver on the

    business promise of mobility with

    integrated protection throughout

    the workplace.

    By Roger Bjork

    Agile security for the mobile workforce

    Increased mobility and seamless access to cloud services

    allow today’s employees to work more creatively and

    collaboratively than ever before. For organizations,

    mobile enablement means a productive workforce, close

    connections with customers and partners, and heightened

    potential for innovation and growth.

    To support mobility initiatives and bring-your-own-device

    (BYOD) programs, IT groups are facilitating access to a

    broadening array of computing device types running various

    operating systems. But in doing so, they face a balancing

    act: preventing costly security breaches while simultaneously

    ensuring compliance and expanding access to corporate

    applications and data for authorized individuals.

    In this diverse and highly competitive landscape, best-

    practice security has become a key business enabler — not a

    process of restriction and denial. For example, if employees

    feel that security policies impede productivity or encroach

    Steve

    n E

    rric

    o/G

    ett

    y

  • Dell.com/powersolutions | 2014 Issue 02 21

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    As enterprises facilitate

    remote access to corporate

    information and expand their

    BYOD programs, bolstering

    network security is of

    paramount importance.

    on personal data, they look for individual work-arounds to

    protect their privacy. Addressing security risks from theft,

    unauthorized access and malware can be especially difficult

    when employees are using personally owned laptops and

    mobile devices.

    At the same time, IT groups must control the

    administrative complexity caused by adding multiple,

    distinct security solutions from different vendors. These

    solutions often operate in silos, working to lock down

    different parts of the enterprise: the network or the

    endpoint, the user or the data. A siloed approach creates

    gaps and inefficiencies, forcing IT to manage each silo

    separately and impeding progress for everybody, especially

    users, with unnecessary complexity.

    Several best practices enable organizations to address

    security issues throughout the enterprise workspace by

    bolstering security across enterprise networks and mobile

    platforms. In addition, integrated solutions that avoid

    overlapping functionality and streamline management

    can help organizations maintain tight security and ensure

    compliance, no matter what use cases, device types,

    platforms and enablement strategies they support.

    Strengthening network security

    As enterprises facilitate remote access to corporate

    information and expand their BYOD programs, bolstering

    network security is of paramount importance. Key best

    practices help IT decision makers maintain security of

    corporate information and sustain compliance with

    regulations even as they widen access to information

    anytime, anywhere.

    Build a BYOD network infrastructure. Employees may

    connect to the enterprise network through their own devices

    for personal use, which can severely limit the bandwidth

    available for work-related tasks. These devices also can

    introduce security threats to corporate resources and put

    regulatory compliance at risk. However, relegating employees

    to the guest network could reduce the bandwidth available to

    customers and other visitors. Instead, creating a separate

    BYOD network enables employees to stream media without

    affecting the corporate network. A BYOD network also

    can check that devices are validated for compliance with

    corporate security requirements before connecting.

    Set up secure mobile and remote access. Many

    employees use mobile devices for work-related purposes

    away from the corporate campus. However, unauthorized

    users could gain access to sensitive apps and data

    through unsecured WiFi connections or theft. Accordingly,

    organizations should set up secure mobile access with

    context-aware authentication, network access controls

    and a virtual private network (VPN). These measures

    enable mobile workers to securely connect to corporate

    information when using public networks, and they help

    prevent unauthorized access.

    Inspect all network traffic. The increasing numbers of

    personal mobile devices represent more vectors for security

    and compliance breaches. In addition, bandwidth-intensive

    applications can slow performance across the network.

    Organizations must monitor and control incoming and

    outgoing traffic to help maintain performance, security

    and compliance. Next-generation firewalls are designed to

    provide insight into traffic across all ports and protocols,

    helping identify applications that consume excessive

    bandwidth or pose significant threats. This insight enables

    administrators to set granular usage policies that help

    guarantee bandwidth prioritization and maximize network

    security and productivity.

    Establish a security baseline. An effective identity and

    access management (IAM) solution helps prevent intrusions

    that take advantage of abused or compromised access

    credentials. In particular, a unified approach that is designed

    to raise all access to a secure baseline helps mitigate many

    risks typically associated with today’s heterogeneous access

    needs. Suitable IAM solutions provide a unified approach

    to identity governance, privileged account management

    and access management — including single sign-on —

    so organizations can effectively control access while

    streamlining important operations.

  • 22 2014 Issue 02 | Dell.com/powersolutions

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    Safeguarding mobile devices

    In addition to protecting the enterprise network, organizations

    must keep data from leaking out of the enterprise through

    mobile devices. Several best practices help lay a foundation

    for mobile security that addresses the diversity of user work

    preferences, device types, operating systems and enablement

    strategies employed across the enterprise.

    Institute a password policy. As a first step, organizations

    should implement PIN- or password-governed access to the

    operating environment of all devices. Doing so potentially

    buys time in which to report a missing device and to disable

    its functionality remotely. Unifying application access through

    single sign-on helps improve security while reducing the need

    for IT assistance.

    Implement user education programs. Enterprises should

    educate mobile and remote users on how to avoid basic

    behaviors that can expose devices to malware or allow

    unauthorized access to corporate information. For example,

    employees should refrain from using public wireless networks

    for work unless they are connecting over VPN.

    Keep the OS up-to-date. An effective way to guard

    against vulnerabilities is to keep current with OS vendor

    updates. IT groups should regularly install, or require the

    installation of, OS updates on mobile devices to avoid

    exploitation of flaws in earlier versions.

    Encrypt devices and data. Mobile device encryption

    helps protect data that falls into the wrong hands. IT

    decision makers should deploy encryption solutions that let

    administrators set encryption policies based on user, user

    group and data sensitivity.

    Create secure containers. A contained environment, or

    container, can cordon off enterprise applications from personal

    ones, or an enterprise workspace from a personal workspace.

    This approach is designed to prevent personal applications and

    data from commingling with corporate information.

    Alternatively, desktop virtualization allows employees to

    access applications and data directly from the secure data

    center without moving that data onto a mobile device.

    Or enterprises can deploy a virtual desktop model that

    keeps data in motion on a device’s container, allowing users

    to work offline.

    Implement IAM. Effective IAM solutions are designed

    to provide a foundation for secure access and dramatically

    reduce the incidence of security breaches. By helping ensure

    that individuals access only what they need, IAM avoids

    unauthorized or malicious access to sensitive data in a wide

    range of situations, scenarios and use cases.

    Adopting robust mobile security solutions

    The comprehensive Dell Mobility Solutions portfolio

    includes many security offerings that address current and

    emerging threats. Many of these solutions can aid in the

    implementation of best practices for network security:

    • Dell Networking W-Series wireless access: Centralized

    controllers, access points and instant access points,

    coupled with network management and access

    management software, provide the security, functionality

    and manageability needed for implementing BYOD and

    guest access networks.

    • Dell SonicWALL Mobile Connect: This application works with

    SonicWALL appliances to deliver policy-enforced mobile access

    and help protect against mobile threats. Using the Mobile

    Connect app, workers can get fast, simple access to enterprise

    resources from their smartphones, tablets and laptops.

    • Dell SonicWALL Secure Remote Access (SRA): To validate

    essential device security information, the appliances provide

    interrogation capabilities that allow only mobile devices meeting

    configured security policy requirements to access the network.

    • Dell SonicWALL Next-Generation Firewall (NGFW):

    Combining intrusion prevention, anti-malware prevention

    and Secure Sockets Layer (SSL) decryption and inspection,

    the NGFWs are designed to scan every byte of every packet

    for deep network protection.

    • Dell One Identity: The family of IAM solutions unifies

    identity governance, privileged account management and

    access management to help secure and control access to

    information and systems.

    The comprehensive

    Dell Mobility Solutions

    portfolio includes many

    security offerings that

    address current and

    emerging threats.

  • Dell.com/powersolutions | 2014 Issue 02 23

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    Dell also offers security solutions to enable a wide range of

    use cases, device types and enablement strategies:

    • Dell Enterprise Mobility Management (EMM): A

    comprehensive mobile enablement solution, EMM provides

    systems and policy management for endpoints and

    containers. Built-in secure remote access with data-loss

    protection helps avoid breaches and protect data.

    • Dell Data Protection | Encryption (DDP | E): The

    solution encrypts files residing on a variety of devices

    and external media.

    • Dell Data Protection | Mobile Edition (DDP | ME): The

    solution encrypts and decrypts data accessed by tablets

    and smartphones running the Google® Android™ and iOS

    operating systems.

    • Dell Data Protection | Protected Workspace (DDP | PW):

    The software helps protect users against untrusted content

    by placing highly targeted apps in a secure container.

    • Dell Data Protection | Security Tools (DDP | ST): The set of

    tools enables advanced authentication, single sign-on and

    preboot authentication.

    • Dell Custom Factory Integration (CFI): The service allows

    enterprises to standardize on a customized, secure system

    image for desktops and laptops, which Dell installs at the

    factory to simplify deployment.

    • Dell KACE K1000 Management Appliance: The appliance

    helps identify and remediate vulnerabilities, centralizing

    management and enforcing security policy compliance

    across diverse systems.

    • Dell KACE K2000 Systems Deployment Appliance: The

    appliance streamlines and automates system provisioning.

    • Dell Wyse Datacenter: The solutions portfolio for

    desktop virtualization includes pre-configured, integrated

    offerings that accelerate deployment and help simplify

    ongoing management.

    Prospering in a highly connected world

    Getting security right is key to success as the scale and scope

    of the mobile workforce expands. Adopting best practices

    for network and mobile device security helps organizations

    strengthen protection without hindering access to required

    applications and data.

    Dell Mobility Solutions for security accommodate an

    ever-expanding array of use cases, device types, platforms

    and enablement strategies. These solutions help enterprises

    implement best practices that boost employee productivity,

    accelerate organizational outcomes and enable regulatory

    compliance. Implementing a comprehensive, integrated

    approach to security enables organizations to capitalize on

    mobility advances while streamlining management and filling

    gaps created by legacy security silos. Ultimately, security

    measures that safeguard sensitive enterprise information

    across diverse systems allow IT leaders to embrace promising

    new technologies quickly and effectively — delivering the

    business agility to capitalize on exciting innovations in ever-

    shortening windows of opportunity.

    Dell, KACE, Mobile Connect, SonicWALL and Wyse are trademarks of Dell Inc.

    Adopting best practices for

    network and mobile device

    security helps organizations

    strengthen protection without

    hindering access to required

    applications and data.

    Author

    Roger Bjork is director of global product marketing, responsible for

    overall mobility/BYOD solutions for Dell.

    Learn more

    Dell security and data protection software:

    qrs.ly/dc42oub

    Dell secure mobile access solutions:

    qrs.ly/oc42oud

    Dell Data Protection Solutions:

    Dell.com/dataprotection

    Dell One Identity Solutions:

    qrs.ly/4k42oue

    Dell Mobility Solutions:

    www.dellmobilitysolutions

    http://qrs.ly/dc42oubhttp://qrs.ly/oc42oudhttp://Dell.com/dataprotectionhttp://qrs.ly/4k42ouehttp://www.dellmobilitysolutions.com

  • 24 2014 Issue 02 | Dell.com/powersolutions

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    The groundswell of bring-

    your-own-device (BYOD)

    initiatives has become a

    major force driving mobility

    and wireless network access, leading

    all types and sizes of organizations to

    rethink their mobility infrastructure.

    Over the course of any given work day,

    an employee typically uses a mix of two

    or more devices, such as smartphones,

    tablets and laptops. Moreover, workers

    are using mobile devices to access

    content that is richer than before.

    They need minimal latency for

    multimedia-heavy, real-time applications,

    including the Microsoft® Lync® unified

    communications platform and Citrix®

    virtual desktop infrastructure. Data-

    intensive usage, such as uploading and

    downloading to Dropbox® or Microsoft®

    OneDrive cloud-based hosting services,

    requires high bandwidth.

    To deliver the performance

    demanded by burgeoning ranks of mobile

    workers and an exponentially growing

    number of devices, organizations must

    tune the IT infrastructure for optimal

    network bandwidth and capacity.

    A panoply of mobile users and devices calls for an enhanced mobility infrastructure

    that supports the demands of today’s content-rich applications. Four key

    components form the basis of a flexible, end-to-end network access solution.

    By Steve Davis and Pratik Mehta

    Bolstering campus networking infrastructure to optimize wireless access

    Sam

    Ro

    bin

    son

    Ph

    oto

    gra

    ph

    y LT

    D

  • Dell.com/powersolutions | 2014 Issue 02 25

    Features

    Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.

    IT organizations also need ways to

    maintain control over data, applications

    and networks as they expand access to

    online resources.

    Making the right infrastructure

    choices can help organizations meet

    evolving performance and security

    requirements while avoiding the

    cost and complexity of maintaining

    numerous point solutions. In particular,

    an infrastructure built on industry

    standards helps keep capital expenses

    low by enabling easy integration of a

    wide range of options.

    Creating a modern mobility

    infrastructure

    Four main infrastructure components

    are required to support wireless access

    needs and deliver an excellent end-

    user experience — keeping in mind

    that any solution is only as good as its

    weakest link. For example, increasing

    the number of wireless access points

    can be a good first step. However, if the

    network does not support the added

    capacity, the organization may not

    obtain the desired results.

    1. Intelligent wireless access points

    and controllers

    To handle the increasing density of

    mobile devices without sacrificing

    performance, organizations can add

    wireless access points and adopt high-

    performance solutions based on the latest

    IEEE 802.11ac st