Post on 06-Jun-2020
po
we
r solu
tion
s2
014
Issue
02
DP
S-2
014
02
-ST
D
2014 Issue 02
Your guide to maximizing IT efficiency Dell.com/powersolutions
Mobility: Going your wayConstant connectivity is the new norm. As work styles morph along with lifestyles, end-to-end Dell Mobility Solutions give businesses a competitive edge — empowering users without compromising essential IT controls.
Mo
bility: G
oin
g yo
ur w
ay
Transforming mobility management through a unified approach
Tailoring enterprise applications for mobile environments
Michael Dell on the data economy, entrepreneurism and start-up advice
Jim Stikeleather on shape-shifting software innovations and the Internet of Things
US$
18.9
5
CA
N$
19.9
5
http://www.dell.com/powersolutions
©2014 Dell Inc. All rights reserved.
Amerijet Whole Foods Market The Knot
Shazam Overstock.com Shutterfly
Zoosk salesforce.com Gilt.com
TripAdvisor
Dell helps companies of all sizes domore for their customers every day.See the stories at Dell.com/DoMore.
50140422-delldomore.indd 1 5/6/14 5:42 PM
http://Dell.com/DoMorehttp://Overstock.comhttp://Gilt.comhttp://salesforce.com
Dell.com/powersolutions | 2014 Issue 02 1
12 Transforming mobility management through a unified approach
By Roger Bjork
As the mobile workplace and the nature of
business itself continue to evolve, IT teams
must support a multiplicity of devices, operating
systems and work habits. Dell Enterprise Mobility
Management helps simplify administration and
secure vital data.
16 Tailoring enterprise applications for mobile environments
By Travis Brown
To provide employees with the performance they
need to stay productive on the go, enterprises
can take several approaches to transform
applications for the mobile workplace —
including new app development, app
modernization and desktop virtualization.
20 Agile security for the mobile workforce
By Roger Bjork
Flexible, end-to-end security enables enterprises to
speed adoption of transformative technologies for a
competitive edge. Best-practice deployments help
deliver on the business promise of mobility with
integrated protection throughout the workplace.
Dell.com/powersolutions
2014 Issue 02
30Propel start-up dreams from humble roots to household names with the right technology
60Drive business results with integrated solutions platform for remote, branch and small offices
56Speed application and website response with a SAN-connected, scale-out cache pool approach
45Upgrade campus network capacity and performance with innovative switches
24Optimize mobility infrastructure with flexible, wireless network access
8 Cover storyMobility: Going your wayBy Anna-Lee Muck and Sean Wisdom
Constant connectivity is the new norm —
causing a shift in worker expectations that
may not align with enterprise requirements.
An effective mobility strategy empowers users
and improves business performance without
compromising essential IT controls.
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
http://qrs.ly/eq43nq5http://qrs.ly/eq43nq5http://qrs.ly/cw43nq7http://qrs.ly/cw43nq7http://qrs.ly/zy43nq8http://Dell.com/powersolutionshttp://qrs.ly/il43nq3http://qrs.ly/il43nq3http://qrs.ly/il43nq3http://qrs.ly/6843nq9http://qrs.ly/r743nqnhttp://qrs.ly/qt43nqvhttp://qrs.ly/bq43nr4http://qrs.ly/ww43nr7
2 2014 Issue 02 | Dell.com/powersolutions
Publisher’s comments
6 Modes and mobility
By Tom Kolnowski
Customer perspective
30 Think bigBehind every start-up is a dreamer who pursues
game-changing innovation through the power
of an idea and unrelenting passion. By providing
visionaries with access to the right technology,
Dell helps ignite the same entrepreneurial spirit that
propelled the company from its own humble roots.
Perspective
42 Desktop virtualization: Enjoying the best of all worlds
By Mark Bowker
When enterprise mobility initiatives demand high-
performance, customizable workspaces, IT leaders
can respond with a virtual desktop delivery model
that uses complementary technologies to meet
business requirements while keeping costs in check.
34 A new gold rush is on. Who will strike it rich?By Michael Dell
Data is arguably the most important natural
resource of this century. Welcome to the
data economy, which holds the promise for
significantly advancing society and economic
growth on a global scale.
Features
24 Bolstering campus networking infrastructure to optimize wireless access
By Steve Davis and Pratik Mehta
A panoply of mobile users and devices calls
for an enhanced mobility infrastructure that
supports the demands of today’s content-rich
applications. Four key components form
the basis of a flexible, end-to-end network
access solution.
27 Maintaining data center uptime — anytime, from anywhere
By Srikanth Vijayaraghavan and Pritesh Prabhu
Enterprises that rely on continuous IT
infrastructure availability must identify and
resolve potentially adverse events without delay.
Dell OpenManage Mobile app helps maintain
system availability from a mobile device —
wherever administrators may be.
45 Step up performance with a campus network upgrade
By Ted Curtin
Changing traffic patterns and bandwidth-
intensive workload demands make a
convincing case for modernization.
Standards-based switches enable IT
organizations to easily add capacity and
innovative functionality into existing wired
and wireless networks.
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
http://qrs.ly/1m43npzhttp://qrs.ly/1m43npzhttp://qrs.ly/r743nqnhttp://qrs.ly/oe43nqthttp://qrs.ly/oe43nqthttp://qrs.ly/jy43nqphttp://qrs.ly/jy43nqphttp://qrs.ly/jy43nqphttp://qrs.ly/6843nq9http://qrs.ly/6843nq9http://qrs.ly/k543nrshttp://qrs.ly/k543nrshttp:///qrs.ly/qt43nqvhttp:///qrs.ly/qt43nqv
Dell.com/powersolutions | 2014 Issue 02 3
38 Shape-shifting software innovations and the new value propositionBy Jim Stikeleather
As the Internet of Things expands,
the next generation of software is
poised to transform how businesses
and consumers create value.
48 High-performance, cost-effective storage for mixed workloads
By Chhandomay Mandal
Flash-based storage delivers the speed that
performance-hungry applications need.
The latest generation of Dell EqualLogic
arrays unlocks the power of flash to provide
cost-effective, high-performance storage
for data-intensive virtual environments.
56 Turbocharging application response
By Kishore Gagrani and Karen Makransky
If it takes more than a few seconds for an
application or website to respond, staff
productivity can erode and customers will
move on. Dell Fluid Cache for SAN enables
remarkable I/O performance to keep IT
operating at the speed of business.
60 Driving better business outcomes with office-optimized IT
By Tad Walsh
The Dell PowerEdge VRTX integrated solutions
platform spurs exceptional business results
for remote, branch and small offices.
64 Service-centric approach to IT automation
By Scott Powers
By boosting data center agility and efficiency,
IT can spark untold business and organizational
advances. Dell Active System Manager is
designed to unify and simplify IT service
delivery, enabling IT to respond quickly to
changing enterprise needs.
68 Accelerate IT service delivery with open private-cloud infrastructure
By Brent Doncaster
Private clouds offer scalability and self-service
benefits of public clouds while allaying
concerns about data security, control and
reliability. Dell Red Hat Cloud Solutions help
transform IT into a highly available, dynamic
service-delivery center.
32 Picture-perfect IT managementShutterfly deploys a Dell systems
management appliance and Dell
servers — delivering an outstanding
experience that brings customers
back for more.
51 Uncovering the hidden costs of doing nothing: Backup and recoveryIntegrated, targeted backup and
recovery solutions fortify an
organization’s ability to withstand
unexpected IT disasters. A top-down
approach helps decision makers
justify the investment.
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
http://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/rp43nqrhttp://qrs.ly/qm43nqxhttp://qrs.ly/qm43nqxhttp://qrs.ly/bq43nr4http://qrs.ly/ww43nr7http://qrs.ly/ww43nr7http://qrs.ly/v343nrahttp://qrs.ly/v343nrahttp://qrs.ly/lw43nrdhttp://qrs.ly/lw43nrdhttp://qrs.ly/9e43nqohttp://qrs.ly/9e43nqohttp://qrs.ly/9e43nqohttp:///qrs.ly/9u43nr1http:///qrs.ly/9u43nr1http:///qrs.ly/9u43nr1http:///qrs.ly/9u43nr1
Index to featured Dell customerseResearch South Australia................................................................80Generali China Life Insurance Company .....................................80Gilt .......................................................................................................... 30Glasgow 2014 Ltd ...............................................................................79Shutterfly, Inc. .......................................................................................32The Knot ............................................................................................... 30TripAdvisor .............................................................................................31Whole Foods Market. .........................................................................31
Index to advertisersBrocade Communications Systems ..............................................C3 Dell Inc. ..................................................................................5, 7, 55, C2Microsoft Corporation ......................................................................C4Qualcomm, Inc. ...................................................................................75Sprint Corporation .............................................................................. 71Trend Micro, Inc. .................................................................................. 15
Going mobile? Take us with you
Dell Power Solutions
Magazine — your guide to
maximizing IT efficiency —
offers the latest in expert
advice, solutions and
technology for enterprises
of all sizes. The digital
edition enables anytime, anywhere interaction
from any device supporting the Zinio reader app.
For instant access to Dell Power Solutions on
Zinio, scan this QR (quick response) code using
a mobile device equipped with a camera and QR
reader app, or visit zinio.com/powersolutions.
Dell Power Solutions Magazine and special
edition articles are also available online at
Dell.com/powersolutions. Check our website
for early-release articles, how-tos, case studies,
best practices and expert tips you won’t find
anywhere else.
72 Seamless cellular connectivity: A new freedom for mobile workers
By Monte Giles and Kylee Stephens
The mobile workforce needs dependable,
high-speed network connectivity to get the
job done. Refreshing client fleets with built-in
4G LTE technology lets employees take the
internet with them — boosting flexibility,
productivity and cost-efficiency.
76 Adaptable IT infrastructure to keep advanced technologies humming
By Michael Maiello
An evolving technology landscape underscores
the need for flexible IT infrastructure designed to
handle intensifying demands on power, cooling
and network access. APC-engineered products
speed deployment and enhance management
of servers and switches.
Around the globe
79 Dell innovatorsMeet businesses building success
with technology.
Sponsored content: Solution showcase
59 Dell PowerEdge R220: Packing a performance punch
63 Dell Smart-UPS: Intelligent power protection for IT network connections
67 Samsung SSDs: Rev up laptops with solid-state drives
Dell, EqualLogic, OpenManage and PowerEdge are trademarks of Dell Inc.
79
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
http://zinio.com/powersolutionshttp://Dell.com/powersolutionshttp://qrs.ly/8542phfhttp://qrs.ly/ci43nrlhttp://qrs.ly/ci43nrlhttp://qrs.ly/4r43nrfhttp://qrs.ly/4r43nrfhttp://qrs.ly/gs43nrqhttp://qrs.ly/4543nrchttp://qrs.ly/4543nrchttp://qrs.ly/av43nrihttp://qrs.ly/av43nrihttp://qrs.ly/eb43nrmhttp://qrs.ly/eb43nrm
TripAdvisor® Dell helps TripAdvisor power the world’s largest travel community so travelers can make every experience count. See the whole story at Dell.com/DoMore. #DoMore
©2
014
De
ll Inc
. All rig
hts re
serve
d.
50140425-tripadv.indd 1 5/5/14 7:19 PM
http://Dell.com/DoMore
6 2014 Issue 02 | Dell.com/powersolutions
In today’s world, many consumers of IT expect anytime, anywhere access
to, well, just about anything — from any computing device they are carrying
or wearing at the moment. In my book, these mobile consumers are more
appropriately described as prosumers, where the distinctions between their
workplace professional computing mode and personal consumer social media
mode are permanently blurred. For a prosumer, there is no obvious switching
from one mode to another, but rather a seamless stream of clicks, swipes, touches
and words emanating from their browsers and apps: digital responses to workday
requirements and the personal social environments they thrive in. And behind all
of this transparency lies the linchpin of secure and ubiquitous network services,
from which prosumers expect an always-viable networking path and adequate
bandwidth to support that moment’s need.
This lofty expectation of safe, universal network access manifests itself as one
of IT’s bigger challenges, particularly as the Internet of Things (IoT) expands its
footprint. For those in charge of safekeeping corporate networks and enabling the
company’s workforce — likely to include a growing population of prosumers — this
networking dilemma should be addressed as a crucial component of a broader,
next-generation mobility strategy. For this issue of Power Solutions, we connected
with mobility experts to produce the first installment of what will be an ongoing
stream of relevant content to help you formulate and manage your own mobility
strategy. In our feature story beginning on page 8, “Mobility: Going your way,”
we cover the fundamental baseline elements of what should be considered for
an effective mobility strategy.
For prosumers, bring-your-own-device (BYOD) programs may be just the
ticket for safely integrating many non-company computing devices. Read about
how flexible, end-to-end security and BYOD network infrastructure can be
deployed today in our feature, “Agile security for the mobile workforce,” beginning
on page 20. Look for more content streams around related mobility topics on
Dell.com/powersolutions and techpageone.com.
Editorial staffPublisher Tom KolnowskiManaging editor Debra McDonaldFeatures editor Kathryn WhiteSenior editors Julie Addicott, Myriam Darmon,
Dawn Davidson, James Hurd and Catherine LuoArt director and cover designer David ChanDesigner and illustrator Cynthia WebbCirculation and logistics manager Sharon Mendoza
Staff writers Archie Lawhorne and Chris Young
Contributing writers Roger Bjork, Mark Bowker, Travis Brown, Ted Curtin, Steve Davis, Michael Dell, Brent Doncaster, Kishore Gagrani, Monte Giles, Michael Maiello, Karen Makransky, Chhandomay Mandal, Pratik Mehta, Anna-Lee Muck, Scott Powers, Pritesh Prabhu, Kylee Stephens, Jim Stikeleather, Srikanth Vijayaraghavan, Tad Walsh and Sean Wisdom
Advertising and sponsorship salesSales director Kyle Walkenhorst (626-396-9400)Sales manager/Western U.S. and South/Central America
sales Shaun Mehr (949-923-1660)Eastern U.S. and Canada sales Steve Branda (201-483-7871)EMEA and APJ sales Mark Makinney (805-709-4745) Advertising sales assistant Cindy Elhaj (626-396-9400)Ad coordinator Catherine Luo
Reader servicesSubscriptions are complimentary to qualified readers who complete the online subscription form. To subscribe to the regular quarterly edition of Dell Power Solutions Magazine, visit the Subscription Center at Dell.com/powersolutions. Once there, you can sign up for a new subscription, change your mailing address for a current subscription or unsubscribe. Going mobile? Visit the digital edition online at zinio.com/powersolutions. For other subscription services, please email our Reader Services team via us_power_solutions@dell.com.
About DellDell Inc., headquartered in Round Rock, Texas, near Austin, listens to its customers and delivers innovative technology and services they trust and value. Uniquely enabled by its direct business model, Dell is a leading global systems and services company and No. 51 on the Fortune 500 list. For more information, visit our website at Dell.com.
Dell cannot be responsible for errors in typography or photography. Dell, the Dell logo, Dell Precision, AppAssure, Compellent, EqualLogic, KACE, Latitude, Mobile Connect, NetVault, OpenManage, PowerEdge, PowerVault, ProSupport, SonicWALL, Venue, Venue Pro, vWorkspace, Wyse and XPS are trademarks of Dell Inc. Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others.
Dell Power Solutions (ISSN 2325-6281, print; ISSN 2325-6273, online) is published quarterly by Dell Inc., Dell Power Solutions, One Dell Way, Mail Stop RR3-68, Round Rock, TX 78682, U.S.A. No part of this publication may be reprinted or otherwise reproduced without permission from the publisher. Dell does not provide any warranty as to the accuracy of any information provided through Dell Power Solutions. Opinions expressed in this magazine may not be those of Dell. The information in this publication is subject to change without notice. Any reliance by the end user on the information contained herein is at the end user’s risk. Dell will not be liable for information in any way, including but not limited to its accuracy or completeness. Dell does not accept responsibility for the advertising content of the magazine or for any claims, actions or losses arising therefrom. Goods, services and/or advertisements within this publication other than those of Dell are not endorsed by or in any way connected with Dell Inc.
Copyright © 2014 Dell Inc. All rights reserved.
Printed in the U.S.A.
Cover photo: Sam Robinson/FITCH
2014 Issue 2
Modes and mobility
Tom Kolnowski
Publisher
tom_kolnowski@dell.com
Follow usDell.com/powersolutions
zinio.com/powersolutions
twitter.com/powersolutions
techpageone.com
Publisher’s comments
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
http://Dell.com/powersolutionshttp://techpageone.comhttp://Dell.com/powersolutionshttp://zinio.com/powersolutionsmailto:us_power_solutions%40dell.com?subject=http://Dell.comhttp://Dell.com/powersolutionshttp://zinio.com/powersolutionshttp://twitter.com/powersolutionshttp://techpageone.com
Whole Foods MarketDell helps Whole Foods Market nourish millions with the highest quality natural and organic foods available. See the whole story at Dell.com/DoMore. #DoMore
©2
014
De
ll Inc
. All rig
hts re
serve
d.
50140423-wholefoods.indd 1 5/1/14 5:57 PM
http://Dell.com/DoMore
Features Cover story
8 2014 Issue 02 | Dell.com/powersolutions
Mobile computing is transforming the way
people interact with each other and with the
world around them. As work styles morph
along with lifestyles, it’s no surprise to see
mobility also transforming today’s enterprise computing
landscape. Employees and business leaders expect constant
connectivity, diverse collaboration tools and on-demand
access to enterprise applications and content. Employees
want to use a variety of devices for work, including their own,
to facilitate remote and mobile productivity, but security and
personal privacy are big concerns.
In response, enterprises of all sizes are developing mobile
enablement strategies to support a variety of device types,
including laptops, tablets and smartphones. They may issue
corporate-owned devices or allow employees to use personal
devices through a bring-your-own-device (BYOD) program.
Or they may implement a choose-your-own-device (CYOD)
approach that enables employees to use personally owned
devices, which they select from a preapproved list. Some
organizations combine multiple models.
Anytime, anywhere access opens the way to exceptional
gains in personal productivity and organizational efficiency.
At the same time, it exposes enterprises to added risk and
complexity. If user expectations don’t align with business
requirements, decision makers must find a common ground
for delivering on workforce mobility benefits without
compromising the underlying IT environment.
Constant connectivity is the new
norm — causing a shift in worker
expectations that may not align with
enterprise requirements. An effective
mobility strategy empowers users and
improves business performance without
compromising essential IT controls.
By Anna-Lee Muck and Sean Wisdom
Mobility: Going your way
Features
Sam
Ro
bin
son
/FIT
CH
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Dell.com/powersolutions | 2014 Issue 02 9
Steer through
multifaceted demands
An adaptable, end-to-end mobility
strategy helps organizations achieve
a significant uplift in workforce
productivity and collaboration,
together with enhanced operational
agility. But first, to realize the full
potential of enterprise mobility,
decision makers must understand and
balance multifaceted expectations and
requirements of key stakeholders across
the organization: end users, line-of-
business (LOB) owners and IT leaders.
End users are driven by the desire
to improve personal performance. They
want easy-to-use personal productivity
tools to help them identify what needs
to be done and how to do it. They also
want tools that facilitate collaboration
with team members and provide
access to needed applications and data
wherever they are. It’s all about getting
the flexibility end users require to make
their jobs easier.
But the advantages of flexibility
are tempered by privacy and security
concerns. Many end users will do
whatever it takes to get their work
done, such as using personal devices
and free file-sharing tools. Although
they want the freedom to work on their
devices of choice, end users expect
privacy: They don’t want IT to track
them, monitor their personal data or
delete their personal data if a device
wipe is needed. When enterprises try to
impose security policies that limit the
use of applications and devices, some
workers go around the policies to get
their work done efficiently — inviting
risk into the organization.
Likewise, LOB owners feel constant
pressure to improve organizational
performance. For example, they may
be plagued by confusion or lack of
collaboration among workers in the
field. All too frequently, their end users
spend significant time trying to get
information and help and perhaps
worst of all, doing paperwork.
LOB owners need workforce
productivity tools to satisfy business
goals, but many see IT as too slow or
too inefficient to create those tools
quickly enough. Today, 55 percent
of North American business decision
makers agree with the statement
“Technology is too important for the
business not to be involved.”1 As a
result, LOB owners look for work-
arounds, perhaps bypassing their own
IT department to turn to shadow IT —
outside vendors — as a quick fix. This
behavior leads to serious security
repercussions as well as integration
issues and additional cost.
For IT leaders, mobility adds
complexity to the operating
environment (see figure). IT leaders are
spending more time than ever before
on business justifications and business
cases, yet they are dealing with less
money and fewer people than they
need to effectively meet end-user and
LOB-owner requirements. They must
manage a growing number of operating
systems, form factors and devices —
typically, three per user. Plus, IT is
responsible for ensuring security, not
only of the device but also of the data
as it travels with the end user.
Factors driving the need for mobile enterprise management
Anytime, anywhere
access opens the way
to exceptional gains in
personal productivity
and organizational
efficiency.
As personally owned units flood the workplace, enterprise IT mustsupport myriad device types.
83%of companies
plan to support tablets
45%of enterprises plan to support
three or more mobileoperating systems
77%plan to support two or more
mobile operating systems
This is in addition to desktop operating systems.
Device fragmentation leads to security concerns.
72% of all enterprises surveyed said enhancing security is their number-one future mobility initiativeFigure based on “The Evolution of Mobile Enterprise Management,” an IDC infographic, sponsored by Dell, November 2013.
1 “Infrastructure Will Drive the Retail Store Experience of the Future,” Forrester Research, Inc., April 17, 2014.
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
10 2014 Issue 02 | Dell.com/powersolutions
Cover story
To handle changing mobility needs
as they arise, many IT organizations have
turned to point solutions. However, an ad
hoc approach may not easily integrate
with the existing infrastructure and typically
requires managing several different
vendors, which adds further complexity.
Considering all the priorities IT decision
makers must juggle, end-user productivity
can fall lower on the list than they or
their internal customers would like.
Dell Mobility Solutions help bridge
the gulf between business expectations
and IT realities. End-to-end offerings
are designed to increase workforce
flexibility, heighten productivity and
optimize business processes — while
providing the essential control IT needs
to help simplify management, minimize
complexity and mitigate risk.
Travel an open road, from
endpoint to data center to cloud
Because there is no one-size-fits-all
approach, Dell provides objective
recommendations that help
organizations develop mobility strategies
tailored to meet the needs of specific
user groups, environments and business
goals. Effective mobility strategies
encompass four major capabilities:
• Deliver data through modern apps that
are optimized for mobile platforms to
enhance end-user productivity
• Manage devices and containers
from a central location to maximize
IT efficiency
• Secure data from endpoint to data
center to cloud — regardless of who
owns the device — and differentiate
network access privileges to minimize
risk of loss, theft and downtime
• Optimize IT infrastructure to handle
exponential growth of both data and
the number of users accessing that data
The Dell Mobility portfolio of
integrated solutions is designed to
address these requirements end to end,
from handheld devices to back-end
infrastructure. The solutions encompass
a comprehensive range of mobile
devices with security, network access,
systems management, application
enablement and services — the key
to planning a secure and scalable
environment that best serves an
organization’s stakeholders.
Dell helps enterprises empower
employees to use the devices they
prefer with the apps they need. For
example, Dell supports flexible device
options to accommodate different
mobile enablement strategies, whether
organizations deploy secure, manageable
and reliable corporate-owned devices or
let employees bring their own. Dell Mobile
Application Services help organizations
create mobile-optimized apps through
approaches that include modernization
and custom development. In addition, the
Dell Wyse Datacenter portfolio of desktop
virtualization solutions gives employees
the flexibility to work from anywhere
while enabling IT to protect individual
user profiles, data, OS and applications
on secure servers in the data center.
Through Dell Enterprise Mobility
Management (EMM), IT staff can
secure and manage their containers
and endpoints, including mobile
devices, laptops and desktops.
This unified solution integrates the
following common functions: systems,
mobile devices, applications, content,
encryption and policy management;
secure access to corporate resources;
user self-service; and real-time
reporting and alerts. Dell EMM
eases the adoption of mobility and
BYOD by integrating into existing IT
environments and helping enterprises
manage complexity.
Dell Mobility Solutions also
enable enterprises to strengthen data
protection and access throughout
the IT infrastructure. For example,
Dell SonicWALL solutions protect
network resources against attacks and
enable organizations to set policies
for secure remote access. Dell One
Identity solutions are designed to
simplify access governance with an
automated framework that manages
user identities, privileges and security
across the enterprise — enabling LOB
owners to provide individuals with the
correct access to perform their jobs.
Dell Mobility Solutions encompass a
comprehensive range of mobile devices
with security, network access, systems
management, application enablement and
services — the key to designing a secure
and scalable environment that best serves
an organization’s stakeholders.
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Dell.com/powersolutions | 2014 Issue 02 11
And Dell Data Protection solutions
deliver comprehensive encryption,
advanced authentication and malware
prevention to help safeguard data
wherever it goes — devices, external
media or public cloud storage.
The solution set also helps
administrators tune network
infrastructure to support the mobile
workforce of today and tomorrow.
In particular, administrators can
enhance workload capacity and
adjust network bandwidth and
coverage for wireless and wired
networks through offerings such as
Dell Networking W-Series switches.
Drive business transformation
and success
Because it takes a holistic approach
to create an end-to-end mobility
strategy that successfully addresses
end-user wants, LOB-owner needs
and IT leadership requirements, Dell
Mobility Solutions are designed to
cover every aspect of mobility, not just
parts of it. This portfolio helps remove
the complexity of dealing with multiple
point solutions and vendors, enabling
organizations to quickly launch fresh
mobility programs and enhance
existing ones.
Moreover, Dell Mobility Solutions
enable enterprises to embrace mobility
in a way that best suits specific
organizational needs, no matter
their size, mobility requirements or
progress in the mobility journey. (See
the sidebar, “3 common use cases.”)
Because Dell Mobility Solutions
support heterogeneous infrastructures
and diverse devices, organizations
can tailor computing solutions for
individual user groups in a way that
integrates easily within the existing
IT landscape. Through this approach,
organizations gain the flexibility
to meet diverse needs and the
agility to expand capabilities quickly
and efficiently to keep up with
changing requirements.
When an integrated solution
set works together seamlessly, IT
leaders are able to deliver just the
right touch of technology where
needed to accelerate business
and organizational outcomes and
optimize the user experience and
customer experience. As a result,
an end-to-end mobility strategy can
become an engine for unprecedented
innovation and growth.
3 common use casesThe progression toward enterprise-wide mobility covers three typical use
cases. At any given time, a mobility program may have workgroups or
users who fit any one of the three.
1. Enabling mobile devices: Often the first step is to enhance and expand
the capabilities of mobile devices to provide secure, easy access to end-
user productivity tools such as email, calendar and contacts. This level
of application access is all that many end users need to improve their
productivity, regardless of where or when they’re working.
2. Delivering full application access: The second use case involves a
large section of the mobile enterprise workforce that could benefit
from expanded access to job-specific applications, such as customer-
relationship management (CRM) tools for the sales team. The focus
shifts to secure delivery of required apps to a variety of device types and
platforms that IT can manage centrally.
3. Transforming mobile use cases: In the third use case, the focus is
on mission-critical roles, such as clinicians and educators, as well as
transportation, distribution, retail and construction workers. These
individuals are almost completely mobile, and they traditionally have
some type of performance metric associated with their roles. For
exceptional performance, organizations should consider developing
and delivering native applications on business-grade devices to redesign
workflows and streamline business processes.
By adopting a comprehensive, integrated solution, organizations can
quickly and flexibly add capabilities as their mobility programs expand and
business requirements change. Dell mobility consulting services meet
organizations wherever they may be on their mobility journey: from assessing
needs to helping IT decision makers become effective partners who enable
end users and line-of-business (LOB) owners to achieve their goals.
Authors
Anna-Lee Muck is a senior messaging
manager for Dell Mobility. She has been at
Dell for 10 years.
Sean Wisdom is director of global mobility
solutions marketing at Dell. He is responsible
for engaging customers in how mobility
solutions can transform their performance,
processes and business plans.
Learn more
Dell Mobility Solutions:
www.dellmobilitysolutions.com
Dell, SonicWALL and Wyse are trademarks of Dell Inc.
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
http://www.dellmobilitysolutions.com
12 2014 Issue 02 | Dell.com/powersolutions
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
It’s no secret: People who use mobile devices are
industrious. To capitalize on all that productivity,
enterprises need to provide employees with access to
corporate data and applications anytime, anywhere. But
there’s a catch. As a plethora of smartphones, tablets, laptops
and desktops enters mainstream use — each with different
operating systems — the task of managing and controlling
these devices becomes unwieldy.
The situation is compounded when employees resist
corporate control and security policies that impede productivity
or appear to encroach on personal privacy. Organizations need
ways to expand access to corporate networks and increase
user adoption of enterprise solutions without exposing the
organization to a large and growing array of threats.
IT groups also must account for changing mobile
enablement strategies. Many organizations are beginning to
implement choose-your-own-device (CYOD) programs and
allow employees themselves to manage corporate-issued
devices. At the same time, the rise in adoption of bring-your-
own-device (BYOD) policies has employees clamoring to use
personally owned devices for work, and many organizations
recognize the potential productivity and cost advantages of
the BYOD approach.
In the midst of constant change, IT groups must
continuously adjust the way they provision devices,
deploy enterprise applications, enable remote access,
As the mobile workplace and the
nature of business itself continue
to evolve, IT teams must support
a multiplicity of devices, operating
systems and work habits. Dell Enterprise
Mobility Management helps simplify
administration and secure vital data.
By Roger Bjork
Transforming mobility management through a unified approach
Dell
Inc.
Dell.com/powersolutions | 2014 Issue 02 13
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
secure corporate information and
more. Many IT organizations add
point solutions for mobile device
management and security as the need
arises. But a piecemeal approach that
involves managing multiple vendor
relationships also can saddle IT teams
with solutions that don’t talk to each
other or fail to address evolving
enterprise requirements.
Organizations must have the flexibility
to accommodate a wide range of
variables today and lay the groundwork
for future developments. A big piece of
the puzzle is accommodating effective
mobile enablement strategies to support
the influx of diverse devices, operating
systems and work habits. IT groups need
a way to provision, manage and secure
devices, data and applications — and the
flexibility to handle functions independent
of the mobile enablement strategies and
devices supported today or tomorrow.
At the same time, IT leaders have the
opportunity to improve connectivity and
empower line-of-business owners with
the productivity and collaboration tools
they need to help their teams excel.
Flexible, end-to-end management
To help organizations deal with a
complex and changing landscape, Dell
Enterprise Mobility Management (EMM)
enables IT groups to implement security
and management capabilities that match
precise requirements. Dell EMM is a
comprehensive mobile enablement
solution built with field-tested, leading-
edge security and management
technology designed to support a variety
of devices, operating systems, worker
requirements and profiles.
Dell EMM integrates common
functions for managing corporate-
issued or personally owned endpoints,
as well as enterprise workspaces, or
Through Dell EMM,
IT leaders can be
ready to support
evolving mobile
enablement strategies
designed to provide
secure anytime,
anywhere access to
corporate resources
from a changing mix
of devices — while
helping simplify
administration.
containers, that isolate enterprise
resources from the personal operating
environment (see figure):
• Mobile device management (MDM)
• Mobile application management (MAM)
• Mobile content management (MCM)
• Endpoint systems management (ESM)
• Secure access to corporate resources
• Integrated management console
• End-user self-service
• Real-time, consolidated reporting
and alerts
Facilitating BYOD
Dell EMM lets administrators take
a traditional approach to endpoint
management. However, in cases such
as a BYOD environment, administrators
can manage a secure enterprise
workspace on the device instead of
managing the entire device.
Dell EMM provides a container for
personally owned smartphones, tablets
and laptops. The container — which
includes managed encryption, policy
Comprehensive mobile enablement
Endpoint management Container management
Dell MobileManagement
Dell KACEK1000 as aService
Dell MobileWorkspace
Dell DesktopWorkspace
Dell Enterprise Mobility Management: Flexible management and security for current and evolving mobility/BYOD strategies
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.14 2014 Issue 02 | Dell.com/powersolutions
Features
management and data loss protection
(DLP) — separates enterprise data and
applications from personal data
and applications and helps simplify
integration with existing IT infrastructure
and processes.
The container benefits end
users as well. They can access the
corporate resources they need simply
by downloading an easy-to-use,
noninvasive app. The container helps
assure end users that their privacy won’t
be violated and their personal data
won’t be compromised, especially in
the instance of a remote wipe — which
takes place inside the container only.
Employees get the tools and privacy
they want so they can embrace the
organization’s security measures
instead of trying to work around them.
By enabling offline productivity,
container-based solutions support an
increasingly mobile workforce that often
must deal with poor internet connectivity
while traveling. Containers allow workers
to capitalize on a responsive, native-
like experience wherever they are. In
addition, containers help organizations
accommodate a diversity of device types,
including smartphones and small tablets,
for which virtualization solutions are often
a poor fit because of small screen size.
For BYOD smartphones and tablets,
the container is designed to provide
built-in, secure remote access with DLP
and a single, secure corporate mobile
app for productivity and collaboration.
The app includes email, calendar,
contacts, secure mobile browser and
secure local file explorer.
While smartphone and tablet
operating systems allow for fewer
changes from IT than PC operating
systems, laptops and desktops
may require deployment of a full
corporate OS image. For that reason,
the container for BYOD laptops and
desktops delivers a corporate Windows
image that can be installed in an Apple®
Mac OS® or Windows environment.
Controlling complexity
Unlike point solutions, Dell EMM is
designed to simplify endpoint management
and security through a unified approach.
Wide range of management
options. Dell EMM enables
administrators to manage everything
from smartphones, tablets and
containers to laptops and desktops,
regardless of who owns the endpoint.
Moreover, administrators can decide
how they manage each endpoint,
whether by user identity or use case.
Integration of field-tested
technologies. Dell has integrated its
best-of-breed intellectual property (IP) for
management and security into Dell EMM.
Industry-leading security. Woven
across Dell EMM are advanced security
functions that can be controlled from
a centralized management console,
including setting up configurations,
policies, data loss protection, secure
remote access, encryption and passwords.
Single-vendor support. Working
with a single vendor helps ensure
integration of capabilities and
management consoles, streamline
deployment and simplify support.
Comprehensive professional services.
Dell offers Image Consulting services
to help organizations create and
manage images deployed to personal
devices. Dell Client Mobility and BYOD
Consulting assists IT leaders in analyzing
organizational needs and defining a
road map for mobility technologies.
EMM Migration Consulting from Dell
helps smooth the move from a current
management service to EMM. The Dell
Mobility User Experience Prototype
Workshop is designed to provide IT
leaders with a clear landscape of their
requirements and produce visual
mock-ups of desired solutions. And Dell
has established a Mobility Center of
Excellence that delivers the resources
necessary to help IT decision makers
become mobility experts, enhancing
their partnership with line-of-business
owners and end users.
Mobile strategy support for today
and tomorrow
As mobile technologies and work
habits continue to evolve, IT leaders
need ways to accommodate existing
requirements, prepare strategies for
change and protect investments. Dell
EMM provides the tools needed to
enhance mobile device security and
management in several ways:
• Comprehensive endpoint
management: The mobile
enablement capabilities of Dell EMM
streamline administrative functions
Employees get the tools and privacy they
want so they can embrace the organization’s
security measures instead of trying to work
around them.
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Dell.com/powersolutions | 2014 Issue 02 15
while also helping IT understand
which devices employees are using
and how they are using them.
• Secure enterprise environment:
Dell EMM provides the flexibility
to support an array of current
technologies plus technologies that
may not yet have been implemented,
such as machine-to-machine (M2M)
management. Dell EMM also enables
administrators to deploy and support
the business applications and services
end users need.
• Protected access to data: Embedded
security features, such as secure
remote access and encryption, as
well as containerization capabilities,
help keep corporate information,
applications and networks safe.
• Heightened management efficiency: A
centralized management console helps
control the complexity that can come
with expanding mobility or BYOD
programs; user self-service functions
offload tasks from IT. Integrated
capabilities enable components to
be added seamlessly, avoiding time-
consuming integration work.
• IT innovation: Dell EMM facilitates
innovation by supporting diverse
devices as well as emerging
technologies. With Dell EMM, IT
groups can deliver a responsive,
modern experience for a growing
range of use cases.
Through Dell EMM, IT leaders can
be ready to support evolving mobile
enablement strategies designed to
provide secure anytime, anywhere access
from a changing mix of devices — while
helping simplify administration.
Author
Roger Bjork is director of global product
marketing, responsible for overall mobility/
BYOD solutions for Dell.
Learn more
Dell Enterprise Mobility Management:
Dell.com/EMM
Dell Client Mobility Solutions Consulting:
qrs.ly/3k41rm8
Dell Mobility Solutions:
www.dellmobilitysolutions.com
Dell and KACE are trademarks of Dell Inc.
Designed in collaboration with VMware for integrated, agentless security
1.
Trend Micro is #1 in Cloud, Data Security and here are 5 reasons why:
Secure your Dell™ infrastructures with Trend MicroFor more information visit www.trendmicro.com or call 888-977-4200
Provides an immediate defense against targeted attacks & zero-day exploits
Delivers real-time visibility and simple managemenacross
Drives higher security and lower TCO through integration with your environment
Consistently ranked #1 by analysts and customers
2.
3.
4.
5.
tthe network
http://Dell.com/EMMhttp://qrs.ly/3k41rm8http://www.dellmobilitysolutions.com
16 2014 Issue 02 | Dell.com/powersolutions
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
The rapid expansion of workplace
mobility has led to a corresponding rise
in users who need to access enterprise
applications and data from a wide
range of devices and locations. In many cases,
organizations are implementing hybrid mobility
strategies that may include issuing corporate-
owned devices, instituting bring-your-own-device
(BYOD) policies or permitting employees to select
from preapproved choose-your-own-device
(CYOD) alternatives.
Preparing enterprise applications for an
increasingly diverse array of mobile devices is
particularly challenging. In addition to email,
calendaring, collaboration and web browser
applications, many employees must work with
customer relationship management (CRM) software
and enterprise resource planning (ERP) systems,
as well as industry-specific applications such as
electronic medical records (EMRs) and delivery-
tracking software.
To deliver these applications effectively to
mobile environments, IT groups need to support a
wide variety of screen sizes and operating systems,
as well as the different ways in which users interact
with mobile devices — for example, multi-touch
gestures or hands-free input. At the same time,
organizations must meet specific application and
data security requirements.
Identifying the right approach
There are different ways to bring enterprise
applications to mobile environments. Determining
the most suitable approach involves a thorough
assessment of business goals, technical requirements
and possible constraints imposed by the existing
application or infrastructure.
Development
Organizations should consider developing a
new mobile app if they want to deliver essential
application capabilities in an efficient, user-friendly
interface designed specifically for mobile platforms.
Apps can be optimized for the desired mobile
devices, operating systems and use cases.
Modernization
In some cases, modifying existing mobile apps or
desktop applications for mobile environments may
be the preferred approach. Transforming existing
applications helps reduce cost and accelerate time
to value. Application modernization also enables
organizations to benefit from end-user familiarity
with the functionality of existing apps.
Virtualization
Desktop virtualization may be desirable when end
users require access to the full capabilities of existing
desktop applications. This may be the case when
To provide employees with the performance they need to stay
productive on the go, enterprises can take several approaches to
transform applications for the mobile workplace — including new app
development, app modernization and desktop virtualization.
By Travis Brown
Tailoring enterprise applications for mobile environments
Dell.com/powersolutions | 2014 Issue 02 17
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
an organization is using closed software with proprietary
application programming interfaces (APIs) or when security or
compliance requirements mandate heightened IT control over
the application and the data it accesses.
Designing and developing mobile apps
Some enterprises lack in-house resources to prepare
applications for mobile environments. In response, the
Dell Application Modernization and Development Solution
Set offers products and services that help organizations
develop new apps, modernize existing apps and implement
desktop virtualization.
Dell has established best practices for delivering
enterprise applications across diverse mobile environments
using this solution set. The Dell Mobility Application Services
team follows a five-step process to determine the optimal
approach for an organization’s specific mobile application
needs (see figure).
Define
Dell consultants start by assessing organizational requirements
and goals to gain an understanding of how users should
access information and what types of devices and platforms
must be supported. As part of that process, the consultants
determine whether existing applications need to be
modernized first, such as migrating applications from
outdated mainframes to modern, industry-standard platforms.
Next, Dell consultants and the organization’s team
members decide whether to develop a new app, modify an
existing app, implement a virtualized desktop environment or
take another approach.
Design
If the team determines that a new app should be designed,
Dell custom mobile application development consultants
work to build the optimal user interface. The user interface
accounts for the supported devices and platforms, application
requirements and the way users interact with mobile devices.
The plan might call for optimizing an existing interface or
website for use on mobile platforms. Ultimately, the goal is to
produce a design that heightens mobile functionality, enables
secure mobile access and helps improve productivity.
Develop
Once the design is approved, Dell mobile application
developers can create a custom native app for a single
platform. Another option is to develop a separate app for
each platform that the organization wants to support.
Alternatively, developers can build a cross-platform app for
multiple mobile or desktop operating systems.
Because security is a top concern in the development
process, developers incorporate industry-standard encryption
capabilities. They also follow best practices designed to prevent
mobile access to enterprise data from compromising the
security of that data. At the same time, developers help ensure
that organizations maintain compliance with internal policies
and external regulations concerning data security and privacy.
Test
As a key part of the app development process, the Dell team
creates test cases and automated scripts and then conducts
end-to-end testing across the planned deployment
platforms. For example, testing can cover performance,
security, app compatibility with operating systems and
browsers, and integration with business intelligence, data
warehousing and ERP solutions.
Boost mobile productivity and customer engagement through a five-step process based on industry best practices
The Dell Application Modernization
and Development Solution Set offers
products and services that help
organizations develop new apps,
modernize existing apps and
implement desktop virtualization.
Define Design Develop TestDeploy andsupport
1 2 3 4 5
18 2014 Issue 02 | Dell.com/powersolutions
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Deploy and support
Once testing is complete, the Dell team can help simplify the
deployment and distribution processes by performing app
store certifications and uploading to the Apple® App Store,
Google Play, Windows Store or BlackBerry World, as well as
to the organization’s own app store. Dell also offers mobile-
application support options ranging from proactive — with
help-desk and remediation capabilities — to reactive —
with call-out support on a per-incident basis.
Implementing desktop virtualization
Depending on the number of applications in a company,
building or modernizing apps might be cost-prohibitive.
Desktop virtualization offers a cost-effective alternative
that enables end users to easily access all their applications
from any device through single sign-on. IT staff can quickly
set up a new user by creating a virtual machine and then
assigning a new user name and password. Part of Dell cloud
client-computing, the Dell Wyse Datacenter portfolio offers
pre-configured end-to-end solutions, including endpoints,
data center hardware, services and virtualization software, to
address the needs of a mobile workforce.
Pre-configured, integrated solutions
The Dell Wyse Datacenter portfolio includes pre-configured,
pretested, partner-verified desktop virtualization solutions
that can be hosted on-site or in a Dell data center. These
solutions incorporate software, servers, storage, networking,
endpoints and services to help accelerate deployment and
simplify ongoing management of desktop virtualization. The
following Wyse Datacenter offerings enable organizations
to start with a small proof of concept and then scale the
environment seamlessly and cost-effectively, leveraging
existing investments:
• Wyse Datacenter for Citrix: Production-ready, highly
scalable virtual desktop infrastructure (VDI) solution that
uses Citrix® XenDesktop® software with a wide variety of
prequalified components.
• Wyse Datacenter for VMware® Horizon View:
Comprehensive end-to-end solution for desktop virtualization
that integrates VMware Horizon View virtualization software
and the Wyse Datacenter hardware and software stack.
• Wyse Datacenter for Microsoft VDI and vWorkspace:
Integrated solution based on Microsoft® Windows Server®
2012 R2 and Dell vWorkspace virtualization software that
enables organizations to select from multiple approaches
to desktop virtualization.
Converged platform
Wyse Datacenter with VRTX is well suited to small and
medium-sized organizations looking for cost-effective, per-seat
solutions. Dell PowerEdge VRTX provides enterprise-level VDI
capabilities within a converged infrastructure that can be used
in a normal office environment.
Cloud-based service
Organizations of any size can consider Dell Workspace-as-a-
Service (WaaS), a cloud-based desktop virtualization offering
that offloads implementation, hosting and support to Dell.
The WaaS approach helps accelerate deployment, eliminate
capital expenditures and significantly ease management
burdens while delivering a robust, secure user experience.
Administrators can rapidly provision desktops to end users
and manage virtual desktop images through an intuitive self-
service portal.
Software solutions
While cloud client-computing supports an organization’s
choice of virtualization software, Dell software solutions for
desktop virtualization provide another alternative to deploy
the desktop virtualization model — or models — that fit
specific organizational needs:
• Dell vWorkspace enables organizations to select a hosted
VDI, an offline/local VDI, a Terminal Server/Remote
Desktop Session Host (TS/RDSH) solution or a blended
model to match the right technologies to individual user
needs and to maximize cost-effectiveness.
• Wyse Cloud Client Manager is a cloud-based management
tool designed to securely and seamlessly manage
By transforming applications for
mobile environments, enterprises can
move business forward — facilitating
anytime, anywhere productivity and
boosting employee satisfaction.
Dell.com/powersolutions | 2014 Issue 02 19
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Welcome to the app-centric worldPeople have more computing power at their fingertips
than ever before, with cloud-based apps and services
just a few clicks away — bypassing the IT department.
While CIOs are under pressure to reduce costs and
improve efficiency, application developers have
become the new kingmakers, capable of driving
revenues and differentiating new products and services.
To brainstorm ways of working within the
app-centric landscape, in January 2014 a panel of 10
IT experts gathered at a think-tank discussion hosted
by the Menlo Park, California–based venture capital
firm NEA. Moderated by Dell director Barton George,
“The New Age of Apps and Delivery Gaps” think tank was
streamed live, enabling viewers to follow and contribute
questions and comments through Twitter.
With experiences ranging from start-ups to
established enterprises, the panelists observed that IT
organizations must meet the demands of their app-
centric users, who expect apps and services to be
delivered more quickly and to be better designed than
they are today. Also, users want access from any device,
anywhere, at any time. But most importantly, concluded
the panel, IT leaders need to change the culture of
their departments to embrace risk-taking, tolerate
failure and value knowledge-sharing. This step is key to
transforming the IT organization into a service-oriented
consultancy that ties into the core of the business.
To watch the Livestream video broadcast of the
event, visit new.livestream.com/Dell/theappgap.
Organizations should consider
developing a new mobile app if they
want to deliver essential application
capabilities in an efficient,
user-friendly interface designed
specifically for mobile platforms.
Dell, vWorkspace and Wyse are trademarks of Dell Inc.
Author
Travis Brown is a senior product manager at Dell, specializing in
desktop virtualization. He has been in the virtualization delivery
industry for 12 years.
Learn more
Dell Application Services:
qrs.ly/nb41rmb
Dell Custom Mobile Application Development:
qrs.ly/fz41rmf
Dell Mobility Solutions:
www.dellmobilitysolutions.com
thin clients as well as iOS and Google® Android™
mobile devices.
• Wyse Device Manager is powerful on-premises
management software for configuring, updating and
administering Wyse thin-client devices.
• Wyse WSM enables virtually any Windows application
to run on a cloud-client endpoint just as it would on a
traditional PC, while avoiding security exposures and
management and maintenance costs.
• Wyse TCX desktop virtualization software provides a rich
multimedia experience and supports multiple displays on
Wyse endpoints.
Supporting mobile workforce productivity
As organizations continue to expand their mobility
programs, they need efficient and effective ways to bring
enterprise applications across an increasing variety of mobile
environments to meet both user requirements and business
goals. (For more information, see the sidebar, “Welcome to
the app-centric world.”)
Dell offers comprehensive solutions and expert
resources for application development, modernization and
virtualization that help organizations accelerate time to value
and control costs. By transforming applications for mobile
environments, enterprises can move business forward —
facilitating anytime, anywhere productivity and boosting
employee satisfaction.
http://new.livestream.com/Dell/theappgaphttp://qrs.ly/nb41rmbhttp://qrs.ly/fz41rmfhttp://www.dellmobilitysolutions.com
20 2014 Issue 02 | Dell.com/powersolutions
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Flexible, end-to-end security
enables enterprises to speed adoption
of transformative technologies for
a competitive edge. Best-practice
deployments help deliver on the
business promise of mobility with
integrated protection throughout
the workplace.
By Roger Bjork
Agile security for the mobile workforce
Increased mobility and seamless access to cloud services
allow today’s employees to work more creatively and
collaboratively than ever before. For organizations,
mobile enablement means a productive workforce, close
connections with customers and partners, and heightened
potential for innovation and growth.
To support mobility initiatives and bring-your-own-device
(BYOD) programs, IT groups are facilitating access to a
broadening array of computing device types running various
operating systems. But in doing so, they face a balancing
act: preventing costly security breaches while simultaneously
ensuring compliance and expanding access to corporate
applications and data for authorized individuals.
In this diverse and highly competitive landscape, best-
practice security has become a key business enabler — not a
process of restriction and denial. For example, if employees
feel that security policies impede productivity or encroach
Steve
n E
rric
o/G
ett
y
Dell.com/powersolutions | 2014 Issue 02 21
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
As enterprises facilitate
remote access to corporate
information and expand their
BYOD programs, bolstering
network security is of
paramount importance.
on personal data, they look for individual work-arounds to
protect their privacy. Addressing security risks from theft,
unauthorized access and malware can be especially difficult
when employees are using personally owned laptops and
mobile devices.
At the same time, IT groups must control the
administrative complexity caused by adding multiple,
distinct security solutions from different vendors. These
solutions often operate in silos, working to lock down
different parts of the enterprise: the network or the
endpoint, the user or the data. A siloed approach creates
gaps and inefficiencies, forcing IT to manage each silo
separately and impeding progress for everybody, especially
users, with unnecessary complexity.
Several best practices enable organizations to address
security issues throughout the enterprise workspace by
bolstering security across enterprise networks and mobile
platforms. In addition, integrated solutions that avoid
overlapping functionality and streamline management
can help organizations maintain tight security and ensure
compliance, no matter what use cases, device types,
platforms and enablement strategies they support.
Strengthening network security
As enterprises facilitate remote access to corporate
information and expand their BYOD programs, bolstering
network security is of paramount importance. Key best
practices help IT decision makers maintain security of
corporate information and sustain compliance with
regulations even as they widen access to information
anytime, anywhere.
Build a BYOD network infrastructure. Employees may
connect to the enterprise network through their own devices
for personal use, which can severely limit the bandwidth
available for work-related tasks. These devices also can
introduce security threats to corporate resources and put
regulatory compliance at risk. However, relegating employees
to the guest network could reduce the bandwidth available to
customers and other visitors. Instead, creating a separate
BYOD network enables employees to stream media without
affecting the corporate network. A BYOD network also
can check that devices are validated for compliance with
corporate security requirements before connecting.
Set up secure mobile and remote access. Many
employees use mobile devices for work-related purposes
away from the corporate campus. However, unauthorized
users could gain access to sensitive apps and data
through unsecured WiFi connections or theft. Accordingly,
organizations should set up secure mobile access with
context-aware authentication, network access controls
and a virtual private network (VPN). These measures
enable mobile workers to securely connect to corporate
information when using public networks, and they help
prevent unauthorized access.
Inspect all network traffic. The increasing numbers of
personal mobile devices represent more vectors for security
and compliance breaches. In addition, bandwidth-intensive
applications can slow performance across the network.
Organizations must monitor and control incoming and
outgoing traffic to help maintain performance, security
and compliance. Next-generation firewalls are designed to
provide insight into traffic across all ports and protocols,
helping identify applications that consume excessive
bandwidth or pose significant threats. This insight enables
administrators to set granular usage policies that help
guarantee bandwidth prioritization and maximize network
security and productivity.
Establish a security baseline. An effective identity and
access management (IAM) solution helps prevent intrusions
that take advantage of abused or compromised access
credentials. In particular, a unified approach that is designed
to raise all access to a secure baseline helps mitigate many
risks typically associated with today’s heterogeneous access
needs. Suitable IAM solutions provide a unified approach
to identity governance, privileged account management
and access management — including single sign-on —
so organizations can effectively control access while
streamlining important operations.
22 2014 Issue 02 | Dell.com/powersolutions
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Safeguarding mobile devices
In addition to protecting the enterprise network, organizations
must keep data from leaking out of the enterprise through
mobile devices. Several best practices help lay a foundation
for mobile security that addresses the diversity of user work
preferences, device types, operating systems and enablement
strategies employed across the enterprise.
Institute a password policy. As a first step, organizations
should implement PIN- or password-governed access to the
operating environment of all devices. Doing so potentially
buys time in which to report a missing device and to disable
its functionality remotely. Unifying application access through
single sign-on helps improve security while reducing the need
for IT assistance.
Implement user education programs. Enterprises should
educate mobile and remote users on how to avoid basic
behaviors that can expose devices to malware or allow
unauthorized access to corporate information. For example,
employees should refrain from using public wireless networks
for work unless they are connecting over VPN.
Keep the OS up-to-date. An effective way to guard
against vulnerabilities is to keep current with OS vendor
updates. IT groups should regularly install, or require the
installation of, OS updates on mobile devices to avoid
exploitation of flaws in earlier versions.
Encrypt devices and data. Mobile device encryption
helps protect data that falls into the wrong hands. IT
decision makers should deploy encryption solutions that let
administrators set encryption policies based on user, user
group and data sensitivity.
Create secure containers. A contained environment, or
container, can cordon off enterprise applications from personal
ones, or an enterprise workspace from a personal workspace.
This approach is designed to prevent personal applications and
data from commingling with corporate information.
Alternatively, desktop virtualization allows employees to
access applications and data directly from the secure data
center without moving that data onto a mobile device.
Or enterprises can deploy a virtual desktop model that
keeps data in motion on a device’s container, allowing users
to work offline.
Implement IAM. Effective IAM solutions are designed
to provide a foundation for secure access and dramatically
reduce the incidence of security breaches. By helping ensure
that individuals access only what they need, IAM avoids
unauthorized or malicious access to sensitive data in a wide
range of situations, scenarios and use cases.
Adopting robust mobile security solutions
The comprehensive Dell Mobility Solutions portfolio
includes many security offerings that address current and
emerging threats. Many of these solutions can aid in the
implementation of best practices for network security:
• Dell Networking W-Series wireless access: Centralized
controllers, access points and instant access points,
coupled with network management and access
management software, provide the security, functionality
and manageability needed for implementing BYOD and
guest access networks.
• Dell SonicWALL Mobile Connect: This application works with
SonicWALL appliances to deliver policy-enforced mobile access
and help protect against mobile threats. Using the Mobile
Connect app, workers can get fast, simple access to enterprise
resources from their smartphones, tablets and laptops.
• Dell SonicWALL Secure Remote Access (SRA): To validate
essential device security information, the appliances provide
interrogation capabilities that allow only mobile devices meeting
configured security policy requirements to access the network.
• Dell SonicWALL Next-Generation Firewall (NGFW):
Combining intrusion prevention, anti-malware prevention
and Secure Sockets Layer (SSL) decryption and inspection,
the NGFWs are designed to scan every byte of every packet
for deep network protection.
• Dell One Identity: The family of IAM solutions unifies
identity governance, privileged account management and
access management to help secure and control access to
information and systems.
The comprehensive
Dell Mobility Solutions
portfolio includes many
security offerings that
address current and
emerging threats.
Dell.com/powersolutions | 2014 Issue 02 23
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
Dell also offers security solutions to enable a wide range of
use cases, device types and enablement strategies:
• Dell Enterprise Mobility Management (EMM): A
comprehensive mobile enablement solution, EMM provides
systems and policy management for endpoints and
containers. Built-in secure remote access with data-loss
protection helps avoid breaches and protect data.
• Dell Data Protection | Encryption (DDP | E): The
solution encrypts files residing on a variety of devices
and external media.
• Dell Data Protection | Mobile Edition (DDP | ME): The
solution encrypts and decrypts data accessed by tablets
and smartphones running the Google® Android™ and iOS
operating systems.
• Dell Data Protection | Protected Workspace (DDP | PW):
The software helps protect users against untrusted content
by placing highly targeted apps in a secure container.
• Dell Data Protection | Security Tools (DDP | ST): The set of
tools enables advanced authentication, single sign-on and
preboot authentication.
• Dell Custom Factory Integration (CFI): The service allows
enterprises to standardize on a customized, secure system
image for desktops and laptops, which Dell installs at the
factory to simplify deployment.
• Dell KACE K1000 Management Appliance: The appliance
helps identify and remediate vulnerabilities, centralizing
management and enforcing security policy compliance
across diverse systems.
• Dell KACE K2000 Systems Deployment Appliance: The
appliance streamlines and automates system provisioning.
• Dell Wyse Datacenter: The solutions portfolio for
desktop virtualization includes pre-configured, integrated
offerings that accelerate deployment and help simplify
ongoing management.
Prospering in a highly connected world
Getting security right is key to success as the scale and scope
of the mobile workforce expands. Adopting best practices
for network and mobile device security helps organizations
strengthen protection without hindering access to required
applications and data.
Dell Mobility Solutions for security accommodate an
ever-expanding array of use cases, device types, platforms
and enablement strategies. These solutions help enterprises
implement best practices that boost employee productivity,
accelerate organizational outcomes and enable regulatory
compliance. Implementing a comprehensive, integrated
approach to security enables organizations to capitalize on
mobility advances while streamlining management and filling
gaps created by legacy security silos. Ultimately, security
measures that safeguard sensitive enterprise information
across diverse systems allow IT leaders to embrace promising
new technologies quickly and effectively — delivering the
business agility to capitalize on exciting innovations in ever-
shortening windows of opportunity.
Dell, KACE, Mobile Connect, SonicWALL and Wyse are trademarks of Dell Inc.
Adopting best practices for
network and mobile device
security helps organizations
strengthen protection without
hindering access to required
applications and data.
Author
Roger Bjork is director of global product marketing, responsible for
overall mobility/BYOD solutions for Dell.
Learn more
Dell security and data protection software:
qrs.ly/dc42oub
Dell secure mobile access solutions:
qrs.ly/oc42oud
Dell Data Protection Solutions:
Dell.com/dataprotection
Dell One Identity Solutions:
qrs.ly/4k42oue
Dell Mobility Solutions:
www.dellmobilitysolutions
http://qrs.ly/dc42oubhttp://qrs.ly/oc42oudhttp://Dell.com/dataprotectionhttp://qrs.ly/4k42ouehttp://www.dellmobilitysolutions.com
24 2014 Issue 02 | Dell.com/powersolutions
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
The groundswell of bring-
your-own-device (BYOD)
initiatives has become a
major force driving mobility
and wireless network access, leading
all types and sizes of organizations to
rethink their mobility infrastructure.
Over the course of any given work day,
an employee typically uses a mix of two
or more devices, such as smartphones,
tablets and laptops. Moreover, workers
are using mobile devices to access
content that is richer than before.
They need minimal latency for
multimedia-heavy, real-time applications,
including the Microsoft® Lync® unified
communications platform and Citrix®
virtual desktop infrastructure. Data-
intensive usage, such as uploading and
downloading to Dropbox® or Microsoft®
OneDrive cloud-based hosting services,
requires high bandwidth.
To deliver the performance
demanded by burgeoning ranks of mobile
workers and an exponentially growing
number of devices, organizations must
tune the IT infrastructure for optimal
network bandwidth and capacity.
A panoply of mobile users and devices calls for an enhanced mobility infrastructure
that supports the demands of today’s content-rich applications. Four key
components form the basis of a flexible, end-to-end network access solution.
By Steve Davis and Pratik Mehta
Bolstering campus networking infrastructure to optimize wireless access
Sam
Ro
bin
son
Ph
oto
gra
ph
y LT
D
Dell.com/powersolutions | 2014 Issue 02 25
Features
Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2014 Issue 2. Copyright © 2014 Dell Inc. All rights reserved.
IT organizations also need ways to
maintain control over data, applications
and networks as they expand access to
online resources.
Making the right infrastructure
choices can help organizations meet
evolving performance and security
requirements while avoiding the
cost and complexity of maintaining
numerous point solutions. In particular,
an infrastructure built on industry
standards helps keep capital expenses
low by enabling easy integration of a
wide range of options.
Creating a modern mobility
infrastructure
Four main infrastructure components
are required to support wireless access
needs and deliver an excellent end-
user experience — keeping in mind
that any solution is only as good as its
weakest link. For example, increasing
the number of wireless access points
can be a good first step. However, if the
network does not support the added
capacity, the organization may not
obtain the desired results.
1. Intelligent wireless access points
and controllers
To handle the increasing density of
mobile devices without sacrificing
performance, organizations can add
wireless access points and adopt high-
performance solutions based on the latest
IEEE 802.11ac st