berlin, 19. november 2019 · gradually embracing digital transformation & planning for the...

31

Upload: others

Post on 14-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security
Page 2: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

Berlin, 19. November 2019

Page 3: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.

Page 4: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

Volker Seidel

Stefan Schmugge

DIRECTOR ENTERPRISE PRESALES

DIRECTOR COMMERCIAL PRESALES

Page 5: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.7Internal Use - Confidential

What do you see?

Page 6: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.8Internal Use - Confidential

© Copyright 2019 Dell Inc.

Page 7: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.9Internal Use - Confidential

Socialtech

3G/4G

Smartphones

Search

Advancedanalytics

Speechrecognition

Blockchain

5G

3D printing

Genomics

Naturallanguage

Smartrobots

Drones

GPS

Machinelearning

I oT

Smart dataaggregation

Wearables

Bioprinting

Effectivecomputing

Biometrics

Storage& cloud

LiFi

VR/AR

Autonomousvehicles

Fullyubiquitous

Internet

Biochips

Micro datacenters

33ZBdata in 2018

Page 8: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.10Internal Use - Confidential

How ready is your organization?

15% 32% 34% 14% 5%

Digital LaggardsDo not have a digital plan;

limited initiatives & investments in place

Digital FollowersVery few digital investments;

tentatively planning for the future

Digital EvaluatorsGradually embracing digital transformation & planning

for the future

Digital AdoptersHave a mature digital plan,

investments & innovations in

place

Digital LeadersDigital transformation is

ingrained in the

DNA of the business

2016

Page 9: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.11Internal Use - Confidential

How ready is your organization?

15%

9%

32%

30%

34%

33%

14%

23%

5%

5%

Digital LaggardsDo not have a digital plan;

limited initiatives & investments in place

Digital FollowersVery few digital investments;

tentatively planning for the future

Digital EvaluatorsGradually embracing digital transformation & planning

for the future

Digital AdoptersHave a mature digital plan,

investments & innovations in

place

Digital LeadersDigital transformation is

ingrained in the

DNA of the business

2016

2018

Page 10: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.12Internal Use - Confidential

How ready is your organization?

15%

9%

9%

32%

30%

33%

34%

33%

31%

14%

23%

21%

5%

5%

6%

Digital LaggardsDo not have a digital plan;

limited initiatives & investments in place

Digital FollowersVery few digital investments;

tentatively planning for the future

Digital EvaluatorsGradually embracing digital transformation & planning

for the future

Digital AdoptersHave a mature digital plan,

investments & innovations in

place

Digital LeadersDigital transformation is

ingrained in the

DNA of the business

2016

2018

2018 DE

Page 11: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.13Internal Use - Confidential

Every organization needs to be a digital organization,

powered by data, running in a multi-cloud world.

SECURITYtransformation

APPLICATIONtransformation

ITtransformation

WORKFORCEtransformation

Page 12: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.14Internal Use - Confidential

ITtransformation

Modern infrastructure

Modern and consistent operations

Modern service delivery

Page 13: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.15Internal Use - Confidential

Servers & Networking CI & HCI Data Protection

Next-Generation

Media

Multi-Dimension

al Scale

Hybrid, Multi-Cloud

Security & Data Protection

Software-DefinedArchitectures

AI/ML

Storage

ITtransformation

Page 14: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.16 of YInternal Use - Confidential

WHAT

IS

MISSING?

SRC: Don’t Slip by Alex Brown / CC-BY-2.0

Page 15: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.17Internal Use - Confidential

Current State of the Enterprise

BRANCH OFFICES, ETC.

MOBILE USERS

FACTORIES, HOSPITALS,R&D CENTERS, ETC.

SAASPUBLIC CLOUDS

ENTERPRISEDATA CENTERS

ITtransformation

Page 16: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.18Internal Use - Confidential

Does this Multicloud thing work?

BRANCH OFFICES, ETC.

MOBILE USERS

FACTORIES, HOSPITALS,R&D CENTERS, ETC.

SAASPUBLIC CLOUDS

ENTERPRISEDATA CENTERS

ITtransformation

Page 17: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.19Internal Use - Confidential

Current State of the Enterprise

BRANCH OFFICES, ETC.

MOBILE USERS

FACTORIES, HOSPITALS,R&D CENTERS, ETC.

SAASPUBLIC CLOUDS

ENTERPRISEDATA CENTERS

ITtransformation

Multi-

cloud?

Page 18: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.20Internal Use - Confidential

SELF - SERVICE

POR TAL / C ATALOG

APPVM

I aaS C aaS / PaaSD E C I S I O N C R I T E R I A

ON - PR EM

LAN D IN G ZON E

OFF - PREM

L AN D IN G Z ON E

CSP

Dell Technologies Cloud

ITtransformation

Page 19: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.21Internal Use - Confidential

SELF - SERVICE

POR TAL / C ATALOG

APPVM

I aaS C aaS / PaaSD E C I S I O N C R I T E R I A

ON - PR EM

LAN D IN G ZON E

OFF - PREM

L AN D IN G Z ON E

CSP

Cloud Foundation

Visibility OperationsAutomation SecurityGovernance Container Mgmt.

Consistent Infrastructure

Consistent Operations

Cloud Foundation

AppVM App ConVM

Dell Technologies Cloud

ITtransformation

Page 20: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.22Internal Use - Confidential

Page 21: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.23Internal Use - Confidential

WORKFORCEtransformation

Trusted, transparent and innovative security

Integrated & intelligent modern management

Smarter, faster & inspired user experiences

Page 22: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.24Internal Use - Confidential

1

MATERIALS

PERFORMANCE

UX

DISPLAY

SECURITY

POWER

Modern Devices

144Awards, Honors,

& Inclusions

3AAS

From One Device to a Unified Workspace

WORKFORCEtransformation 2

Modern Operations

DEPLOYMENT SECURITY APP WORKSPACE OPERATIONS

Page 23: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.25Internal Use - Confidential

APPLICATIONtransformation

Minimize application delivery risk

Streamline application operations

Accelerate software innovation

Page 24: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.26Internal Use - Confidential

How change events impact cloud adoption

Applications experience

change events

RepurchaseTransition to SaaS

RehostLift and shift

RewriteBuild new

RetireDecommission

Re-platformContainerize

RetainNo change

Multiple options to

manage these changes

IT must determine how to

“catch” these workloads

Virtual Environment

Physical Environment

SaaS

Public Cloud

Private Cloud

PaaS

CaaS

IaaS

Page 25: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.27Internal Use - Confidential

SECURITYtransformation

Embrace risk

Simplify security

Empower people

Page 26: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.28Internal Use - Confidential

SECURITYtransformation

From Security Today…to the Future

Cloud

APPS CONNECT STORAGE COMPUTE 5G

SDN / SDWAN

INTRINSIC SECURITY VIA VIRTUAL SERVICES

Firewall

Anti-Virus

AppSecurity

IntrusionPrevention

NetworkMonitoring

EndpointSecurity

DataSecurity

MobileSecurity

CloudSecurity

DeepPacket

Inspection

Page 27: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.29Internal Use - Confidential

DZ Bank Group

Worldwide Rollout BCM across a

Banking Group (with RSA Archer GRC)

• Manage all Business Continue Plans at

DZ Bank and „Genossenschaftliche

Finanzgruppe der Volksbanken/

Raiffeisenbanken

• Visualize internal and external Risk

• Manage Compliance and Governance

Page 28: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.30Internal Use - Confidential

SECURITYtransformation

APPLICATIONtransformation

ITtransformation

WORKFORCEtransformation

Every organization needs to be a digital organization,

powered by data, running in a multi-cloud world.

Page 29: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.31Internal Use - Confidential

The Dell Digital WayDell IT practitioners sharing expert knowledge and best practices to help customers

create world class experiences & accelerate their business outcomes

Executive BriefingsCIO to CIO sharing of

Transformation best practices

and strategic guidance

Best Practice SharingOn infrastructure, end-user

experience, next gen apps and

multi-cloud IT Peer EngagementFor collaboration, insight and

guidance

Page 30: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security

© Copyright 2019 Dell Inc.32Internal Use - Confidential

Page 31: Berlin, 19. November 2019 · Gradually embracing digital transformation & planning for the future Digital Adopters ... Network Monitoring Endpoint Security Data Security Mobile Security