Searching...
Friday, April 28, 2017

Dell-Precision-M5510-Display-Laptop


[music playing] so as a serviceprovider, security is important to you-- isimportant to our customers-- for a number of reasons. so availability of ourinfrastructure and services, the confidentiality ofour customer experiences, and the integrity ofour customer experiences are absolutely paramount and topof mind for the security team. as an airport authority, beingable to have an infrastructure

and a team that wasvery flexible and fluid was absolutely critical for us. after meeting with ourdell rep, not only would it solve the problems ofbeing very flexible, it allowed us todeploy very quickly, allowed us to manage theservers, the storage, and the networking gearall in a single bit. given gopro's breakneckspeed of growth, i really believe thatthe company could not

have scaled assuccessfully as it has without serviceslike dell [inaudible]. network security for us isimportant as quarterback protection or playingdefense for the broncos. so we work hard at makingsure that all the systems stay up and are protected and keepeverything going on a game day as well as during the week. what dell haddelivered for us is a kind of end-to-endsystem-- security around all

of that-- that let'sus focus on yachting. we're a sports team. we're here to go yachting. ladies and gentlemen,please welcome president software,john swainson. [music playing - pitbull, "give me everything"] thank you, very much. the problem with coming onafter david schmook is i now have to contend withall these cool devices

and a stand-up comedy act. i'm delighted to be with you. i want to talk about a numberof things related to security and protect, and reallyhow our software portfolio is helping customersget the most out of information technology. now, as we've heard today, thereare incredible things going on in this industry, incrediblenew ways of using technology. and those new waysof using technology

are bringing new challengesfor information technology. it's up to all ofus to figure out how to respond and keeppace with the heightened expectations of usersand the business itself. in the next few minutes, i'mgoing to talk about the role that i think software needsto play in information technology-- is the abilityto provide end-to-end systems and solutions, enablingin business acceleration, and how our portfolioof offerings

is designed to align aroundthe rest of the great products that you've heard today. the mission for dell softwarebusiness is really very simple. we're trying tosimplify it management. we're trying to helpyou mitigate risk. so that ultimately, you canaccelerate the business results that great hardwarelike this brings you. i almost made the title ofthis keynote "software defined everything," becausei really do believe

that software iscompletely changing the way the informationtechnology world works. it's a change that'sbeen going on for years. but it's becomingmore and more real as we see how software impactsthe data center, networking storage, devices of all kinds. these things are allpowered by software. it's literally everywhere. we saw it in thingslike the tesla model

s, that sort ofcomputer on wheels that came in this morning. we see it in theentertainment industry. we see it in health care. we see it everywhere. software has the power toenhance and dynamically add new value to justabout everything we do. and the combination of smartsoftware and smart hardware allows us to do thingswe could never do before.

we can optimize toget the most value out of the hardware infrastructure. we can personalize it. we can respond to changingbusiness needs at a speed that we could never do witha hardware-only solution. the prior age of hardwaredefined systems was great. but it meant that businesseshad to adapt to those systems as they were. with today's new softwaredefined approach,

we can flexibly adjust tochanges in the business on the fly, changingenvironment, changing competitive pressures. we can personalize these things. we can tailor them tospecific capabilities and match unique customer needs. our software enablesa continuous flow of improvement and functionalitywith updates and enhancements from really end to end.

and from an roiperspective, it means that i can get morevalue of that hardware over time, because i can keepupdating the functionality. nowhere is this moretrue in mobility. software is the key reason thatthis next generation of devices have become so importantand so pervasive. for generations, peoplehad to show up at work, show up at a physicallocation to do stuff. today, the dataincreasingly shows

that we can work from anywhere. and dell's at the forefrontof powering this trend. going to a physical workplaceis becoming a thing of the past. a study from the 2013 regisglobal economic indicator shows that roughly halfof all business managers worldwide work remotelyfor at least half of their working week. and that trend appearsto be continuing as the technology enablesmore and more productive

interactions, fasterpipes, better machine, displays like this that arealmost as good as being there. they allow us to usethat time productively, instead of sitting at our cardriving up and down the highway to work. it's just long gone when wedidn't have the connection-- the connectivity-- across ourhome and office environments. in fact, many of today'shome environments have more capability thanpeople have in their offices.

now, hardware clearly is animportant element of this. the software has torun on something. but it's the softwarethat is defining a lot of the functionalcharacteristics. software, by its verynature, is dynamic. it's fluid. it allows you to evolveas your workforce evolves and as the work itself evolves. and at dell, we're walking thewalk when it comes to this.

in a recent eweekarticle, we were quoted as saying that ourgoal is that about half of our workforce isgoing to telecommute at least part ofthe time by 2020. so now, let's switchand talk about what's happening in thisnew digital world. in the world of thepast, everything lived in these protectedglass houses and mainframes and minicomputers, ranthe business function.

and the stuff came out ofit through a single pipe and people accessed it throughvery low function displays. and it was, in many ways,a very simple world. in today's world,computing is everywhere. assets are everywhere. they're interconnected. computing and data isall over the place. the backbone is the cloud. and we're delivering informationover wired and wireless

networks to all kinds ofdifferent devices-- things that look like this, thingsthat fit in my pocket. each link in this chainis a challenge for it, because the systemreally is only as strong as its weakest link. and we've now gotmany more links that we have to deal with. there's no point inhaving a secure data center if the informationcan be accessed

from an unsecure laptop, or ifdata is on a smartphone that gets left in the back of a cab. as you heard from david, it'sa world of multiple devices. users have on averagesomething like three devices. and it has to figure out howto manage those devices, which is increasingly a challenge whenat least one of those devices might not be ownedby the corporation. so what do i do? how do i deal with aprivately owned device?

in the old days, itwas kind of easy. it was a corporate owned device. if you lost it somewhere,it could wipe it. in this new world of peopleusing personally owned devices, am i going to wipe theirpersonally owned devices? some people do, by the way. but increasingly, that that'sa pretty rough solution. and what we think you needis a whole new category of solutions, whereyou really start

to get much morediscriminating about which data and which applicationsyou're using. we call this new categoryof bring your own device enterprise mobilitymanagement, or emm. and it's really now aboutmanaging at a finer grained level. it's about managing theworkspace on the device, particularly on personallyowned devices, instead of the whole device itself.

so let's take a lookat some data points here and understand whythis trend is so important. first of all, i thinkyou all know this, but companies are adapting tothe world of mobile computing and bring your own device. and according to a recentstudy by ernst and young, something like overhalf of companies have already made changesto their security policy in order to adapt to it.

well, that's ok. so what happens now to the riskposture of these companies? are they seeing risksassociated with this? and as you might notbe surprised, in fact, another survey shows thatabout 80 percent of companies have seen some incidentcaused, at least in part, by the availabilityof unprotected devices accessing corporate informationor corporate systems. both of these issueshighlight the need

to protect when you connect. you can't just attachthings to your network without thinkingabout, how i am i going to protect the datathat those things access? so let's look atwhat dell is trying to do to address these problems. our solutions are reallydesigned with the customer imperatives that you heardkaren and suresh talk about-- transform, inform,connect, and protect.

and our products range fromour endpoint management devices to our dataprotection solutions, our network security solutions,our systems management solutions, our email messagemanagement solutions, and our cloudmanagement solutions. all of these are partof this portfolio. it really spans the gamutfrom application management on premises toworkspace management across distributed locationsand through the cloud.

a very key theme that you'rehearing from all of us today is the importance ofthis idea of protection. how do we secure andprotect information on devices, in the datacenter, across the environment? protection is nota standalone thing. it has to be woven throughoutall of our other solutions. we've given significant thoughtand placed significant priority on protection ineverything we do. so let's doubleclick and take a look

at a couple of these things. in these solutions, we'relooking at the capability to solve it andbusiness problems across many differentkinds of companies. if you've had a chance to goto some of the show tracks or the some of the hands-onlabs or go to the exhibit hall, you've seen someof them already. and i hope you'll takea chance to do more, because we've got some greatinnovation in both our security

and our enterprise mobileworkforce management solutions. we're talking particularly abouttwo initiatives that we think are particularly relevant--connected security and dell's new solution forenterprise mobility management. so please, take a look at thoseover the next few minutes. let me describe themquickly for you now, just to give you a bit of ateaser on what they're about. let's start withconnected security. connected security is reallyall about providing people

a balanced approach to security. it needs to be simple. it needs to be unified. it needs to be easy to use. it needs to be connectedto the business. and it can't get inthe way of what people are trying to get donein their business job. it has to be balanced. if you're too lax in security,you introduce too much risk.

but if you applytoo much security, the end users eithercan't do their jobs or will find cleverways to go around you. so what are we doing? we start by embeddingsecurity natively at the time of manufacture intoevery piece of infrastructure, every device. so when it connectsinto the network, we can interrogate that device.

and we can understandthat that, in fact, is a device thathas been secured and hasn't been tampered with. dave schmook talked alittle bit about that. we then allow you to detectand therefore protect your environment, so that ifyou see threats coming in, you can understand theconsequences of them. and we can even usepredictive analytics to look at thepatterns of behavior

and start recommending actionsthat you would take-- changing firewall settings ordoing other things that will improve yoursecurity posture. our solutions arereally designed to help you gather,analyze, report, and enable, so that you can act quicklyand connect security through the layers ofinfrastructure and applications that are criticalto your business. we're eliminating the silosof the security information

so that you canreally prevent people from getting inbetween the cracks. let's take a shortvideo break and look at how this might work. i have so manynames-- spam soldier, blackhole toolkit,gameover zeus. aka, your worstcase cyber scenario. i could be a hacktivistfrom a rogue nation state or a former employeewith an axe to grind.

i'm smarter and moredangerous than ever, especially since most companieskeep their security in silos. silos mean gaps. i like gaps. give me the smallest opening. i'll wreck your network,snatch your data, and cost your company millions. in a highly connected world,i'm your highly connected nightmare.

so this is thenightmare we're trying to make sure thatyou don't have. make sure that there aren'tgaps in your security infrastructure. now, let me switch gears andtalk very quickly about emm. a year ago at thisevent, we talked about mobile device management. and mobile device managementis really important. we've introduced acouple of solutions

in the last year formobile device management from case and from wyse. but mobile device management,we've come to realize, is not enough. it's important, butit's not enough. the dynamics of thesepersonally owned bring your own devices versuscorporate owned devices really need to be addressed. so we needed toget finer grained

about how we managethese devices, particularly if they'repersonally owned. we needed a solutionthat treated the business part of the personal deviceas a container or a workspace. and that's one of thethings that dell emm does, not just forsmartphones and tablets but also for full desktopand laptop systems too. we continue to offerleading functionality for managing the endpointfor all classes of devices--

whether it's windows or macs,as well now as ios and android and other kinds ofmobile devices-- and have a commonmanagement interface, a common console for doing that. what differentiates our offeringand makes it so compelling is that we've nowadded the capability to bring in some of ournetwork security capabilities and our endpoint encryptioncapabilities and our identity and access capabilities.

so you really start to getthat connected security all the way throughyour environment. and when you think aboutconnected security, you've got to takethings like a firewall and the endpointencryption capability and really startusing the firewall as a point ofmonitoring and managing these from anend-to-end perspective. so one of the thingswe love to do at dell

is to take acustomer's perspective. and we ran this by oneof our major customers. and in fact, he got a chanceto help define it with us. and here's what he said. he said, "i'm reallyimpressed with dell's vision to deliver manage workspacesacross multiple use cases and platforms, especially as theneed for consistent workspaces regardless of device,location, or other variables is becoming a major imperative.

with dell's mobileworkspace, dell is innovating and providinga full collaboration-- including integratingmessaging, documents, and real-timecommunication-- to secure containerized workspaces." and the author ofthat quote was a guy by the name of mikeloftus at td bank. so let me wrap up. protect, as you'veheard from all of us,

is a really keyinitiative for dell, because we think it's areally key initiative for you. we're doing a lot of thingsin that space-- in the data center on devices--but importantly, as we start to introducemobility management we at software are proudto play an important role in integrating all that stuff. we think that, as wego into next year, our focus is goingto continue to be

to provide moreintegration, more power, more easy to use solutions, andmore better together for you for you to used to be ableto innovate and create business value foryour customers.

0 comments:

Post a Comment