Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95%...

25
Transformácia – kam smeruje IT? Marián Kováčik Sales Engineer Dell EMC Marian.kovacik @dell.com +421 917 777 663

Transcript of Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95%...

Page 1: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Transformácia – kam smeruje IT?

Marián Kováčik

Sales Engineer

Dell EMC

[email protected]

+421 917 777 663

Page 2: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

is a unique family

of businesses that

provides the

essential

infrastructure for

organizations to

build their digital

future.

Consists of 7 brands:

Page 3: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Recognized as a market

leader by Gartner in 20+

Gartner MQs

#1Converged

Inrastructure

#1STORAGE

#1DC AUTOMATION

#1PCs

#1CLOUD

#1VIRTUALIZATION

According to IDC…

Page 4: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

4 of 72

Digital

Transformation

Security

TransformationWorkforce

Transformation

IT

Transformation

Transforming the

businessWe help organizations

reinvent themselves and

realize their digital future.

Page 5: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

5 of 72

Dell Technologies – A Force Multiplier

Cloud

Applications

Infrastructure

UsersWorkforce

Transformation

Digital

Transformation

IT

Transformation

Security

Transformation

Dell - Internal Use - Confidential

Page 6: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

6

We want everything now and we want it anywhere

Technology is transforming the way we live and work

IoE is transforming how every industry operates

Now is a time of unprecedented change

Digital Transformation

The next industrial revolution is here

Page 7: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Faster Cycles = Competitive Advantage

Data Analytics

Deliver New

Insights

Agile Development With

Continuous Delivery

Accelerates improvement

New Applications

& Smart Devices

Transform The

Business

Page 8: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Dell Technologies Offers You ChoiceOpen Source Platform, Deploy To Any Infrastructure

Native Hybrid Cloud

On-premises Off-premises

Cloud Service Providers

Page 9: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

9

Workforce TransformationIn a fast-moving world,

connection is everything

Modernise user experiences and empower

new ways of working

Get connected anytime, anywhere

Enjoy a highly mobile and interconnected workforce

Transform your digital workplace to enable optimal

performance and productivity

Page 10: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

10 © Copyright 2017 Dell Inc.10

Where we work + how we work has changed

Say technology

influences the job

they take

Would quit a job with

poor technologyDo some business

from home

And will continue to change

44% of millennials think their workspace isn’t smart enough

Work after

business hours

60% 42%2/3 82%

Page 11: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

One place

In a meeting On a plane

At a desk On a couch

Off PremisesOn Premises

Many places

The way people work (and live) is changing

See the Workforce Transformation Sales Guide for Dell’s solutions for the way people work.

Page 12: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Accessories & Displays

Security & Manageability

Latitude &

XPSPrecision

Vostro

Latitude Rugged

PrecisionTower

OptiPlex

Wyse thin client

Vostro

PrecisionRack

Embedded | IoTFixed Mobile

The most complete portfolio for every work style

Security & Manageability

Services and Support

Page 13: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

13

IT Transformation

We transform you by transforming your IT

We help you make the move to a hybrid cloud

We modernise your infrastructure, automate your IT

service delivery, and transform people & processes

We manage, store, protect and analyse your most

precious asset – information

All this gives you a unique, competitive advantage

Page 14: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

14 of 72

IT Transformation

Orchestration

Virtualization

Servers, storage & network

Applications

Cloud

Infrastructure

Modernize

Infrastructure

Automate

Service

DeliveryTransform

IT Operations

• Modernize

• Automate

• Transform

Page 15: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

15 of 72

IT TransformationModernize

Applications

Cloud

Infrastructure

Modernize

Infrastructure

Page 16: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

16 of 72

Modern ArchitectureApplications

Cloud

InfrastructureFlash Cloud-enabled Scale-out Software-defined Trust

Attributes of Modern Architecture

5 Core Attributes

Page 17: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

17 of 72

Servers

OS10OS9

NetworkingStorage

Built for NVMe and Flash

Agent-Free Management

Foundation for SDDC

Flash Everywhere

Cloud Array/Pools

Software Control Plane

SDN solutions

Open-networking leader

Maximum choice

Page 18: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

18 of 72

Applications

Infrastructure

OrchestratedAPI Driven

IaaS and PaaS

Software

18 of 72 Dell - Internal Use -Confidential

Page 19: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

19 of 72

Applications

Infrastructure

Enterprise Hybrid Cloud

Native Hybrid Cloud

Hybrid Cloud

Platforms

19 of 72 Dell - Internal Use -Confidential

Page 20: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

20

Security Transformation

Futureproof is present peace of mind.

95%

of data breaches

originate at the endpoint

63%

of breaches are due to

compromised identities

new malware variants

every day

1M45%

of corporate data is

stored on the endpoint

Page 21: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

21

Security Transformation

Better security = better business

Protect Data

• Wherever it goes

• Control/monitor data activity & location

• Mitigate identity risk

• Exceed compliance

Prevent Threats

• Stop attacks before they occur

• Endpoint detection & response

• Remediate data loss, ensure

business continuity

Page 22: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Security Transformation

BE THE TRUSTED ADVISOR

Secure Infrastructure

DESIGN IT IN

Endpoint

Data

Security

Network

NSX

Data

IRS

Advanced Security

Operations

AUTOMATE RESPONSE

DFYDIY

Netwitness

Risk Management

TRANSLATE TO

BUSINESS RISK

All Risk

Archer

Page 23: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Individually we specialize, collectively we transform

Page 24: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised

Ďakujem

Page 25: Transformácia – kam smeruje IT?Security Transformation Futureproof is present peace of mind. 95% of data breaches originate at the endpoint 63% of breaches are due to compromised