the dell software revolution
TRANSCRIPT
Introduction to Dell Software
2 Software
Mega trends bring huge potential and risk
Big data MobilityCloud
Security and risk mitigation
3 Software
Cloud
of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years.
85%
68%
of spend in private cloud solutions.
- Bain and Dell
4 Software
Big data
2009 2020
Volume of data storedZettabytes
0.8
35
- IDC
5 Software
Mobility
Smartphone and tablets used at work% of total customer type
Corporate
growth in smartphones and tablets used at work…
2010
Personal
Corporate
5X
2015
…and source shifts from 62% / 38% corporate / personal owned to 37% corporate owned and 63% personal owned- IDC, Dell internal analysis
6 Software
Security and risk mitigation
of the surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact
average data loss impact for reactive organizations
79%
$1.1M- McAfee
7 Software
Dell Software solutions
Information management
Mobile workforce management
Data center and cloud
management
Security and data protection
8 Software
Why Dell Software?
9 Software
Dell Software addresses key trendsTr
end
SecurityCloud
Security
Management
MobilityBig data
10 Software
End-user computing
Services, Security, Cloud
Server, storage andnetworking capabilities
Software that leverages Dell core strengths
No legacy to protect
Dell Software leverages our core strengths
11 Software
Dell Software drives business outcomes
Driving greater operational efficiency and accelerating results
Differentiated with a scalable design point
Business-class connected solutions
Integrated, optimized enterprise
Software that simplifies IT and
mitigates risk
Flexible, next-generation
services
ConnectTransform Inform Protect
The power to do more
12 Software
Scalable design point
Enterprise features to scale up or down
Comprehensive and standards based
Easy-to-use and manage, reliable and secure
Flexible solutions, delivery and support
Modular, scalable solutions with quickest time-to-value
Expertise embedded in solution and delivery
13 Software
Multi-channel approach
20K+ channel partners
Partner Direct network
35% of all Commercial revenue
2.7million2.7million2.7million
2,500Dell Software sales-makers
20K+Dell sales makers
5th largest e-commerce site
Frictionless modelPremier Pages
14 Software
Dell leadership in software
2Muser community
members
90%of Global 1000 are Dell
Software customers
+1Mcustomers
Highest overall protection Next-Gen
Firewall
NSS LabsEMARadar Report Value
Leader for Boomi Cloud Integration
+6,000team members
Gartner
+$1.5Bsoftware revenue
(approx. based on run rate)
9 Magic Quadrants
1,600 +software engineers
2,500 +software sales
15 Software
We make the complex simple and the powerful easy to use
We drive out inefficiency and risk
We enable organizations to seamlessly integrate and scale
We deliver superior results more quickly
15
Dell Software purposeWe believe complexity and risk prevent companies from unlocking the power of technology
We make software that simplifies IT management, mitigates security risks, and accelerates results
Software
16 Software
Dell Software solutions
17 Software
Data center and cloud management
Transform: Simplify application management
whether running on-premise, virtualized, private cloud, or multi-cloud
Automate workload administration and migration for Exchange, SharePoint, Active Directory and Lync
Improve performance monitoring and systems management across servers, desktops, laptops, and mobile devices
Cloud management
Endpoint management
Performance monitoring
Windows server management
Virtualization management
18 Software
Information management
Inform: Simplify database design and
administration, database monitoring, and database replication
Transform structured, semi-structured, and unstructured data into actionable insights to turn big data into big ideas
Integrate applications and data from multiple, disparate silos across your business whether on premise or in the cloud
Application and data integration
Business intelligence and analytics
Data warehousing
Replication and disaster recovery
Master data management
Database management and design
Database backup and recovery
19 Software
Mobile workforce management
Connect: Streamline deployment of desktop
virtualization and provide users secure remote access, no matter where they are located
Implement network security and endpoint security from the device through the infrastructure to the application
Reduce complexity with endpoint management solutions that centralize a variety of endpoint devices – iOS, Android and Windows
Desktop virtualization
Endpoint management
Endpoint security
Secure remote access
Network security
20 Software
Security
Email security
Endpoint security
Identity and access management
Web security
Protect: Protect your network perimeter
with powerful threat detection and content filtering
Control access to enterprise applications and information, including privileged user accounts
Provide secure remote access, including email and web application protection, from any device and any locationSecure remote access
Network security
21 Software
Data protection
Protect: Back up data and applications
continuously across your physical and virtual environments
Recover applications and data quickly, from complete systems to individual files and objects
Replicate critical data to other locations for off-site protection and improved availability
Application protection
Backup and recovery
Disaster recovery
Virtual protection
Endpoint protection
22 Software
Dell Software solutions capabilities
Data center & cloud
management• Endpoint management• Performance
management• Virtualization & cloud
mgmt• Windows server mgmt
• Application enablement/delivery
• Desktop virtualization• Mobile device mgmt• Mobile security
Information management
• Application & data integration
• Big data analytics• Business
intelligence/analytics• Database management
Mobile workforce management
• Email security• Endpoint security• Identity & access
management• Network security
Security Data protection• Application protection• Disaster recovery• Enterprise backup/recovery• Virtual protection
23 Software
Simplify IT
Mitigate risk
Accelerate results
24 Software
Appendix AThe following slide can be substituted for the TREND SLIDES (3-6). It summarizes the content on a single slide and reduces the overall length of the presentation.
25 Software
Security and risk
of the surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact
79%
of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 85%Cloud
MobilityMobility source shifts from 62%/38% corporate/personal owned to 37% corporate owned and 63% personal owned
5X
Big Data By 2020 volume of data stored will reach 35 Zettabytes35
26 Software
Appendix BThe following slides can be inserted into the presentation as necessary. They are customer case studies aligned (by color) with each of the solution areas and are intended to be placed between the solution area slides (17-21)
27 Software
Snapshot• $6 billion corporation• Operates 20 hospitals and 80 clinics• Serves 500,000 patients
Challenge HHC’s infrastructure was broken up into eight Active Directory domains for email, messaging and records. HHC decided to consolidate into a single directory
Results • With all of its information under one AD
structure, HHC now has better control over its data, enhancing security and reducing cost
• Single ID access for doctors and staff from any facility, increasing productivity
Software
28 Software
Snapshot• Public research university specializing in
science, engineering, medicine and business
• Serving 20,000 faculty and students with 200 IT-delivered end-user services
Challenge Existing monitoring tools were reactive resulting in dissatisfied users and low systems performance
Results • Dell Foglight provided a correlated
proactive 360-degree view of critical IT system and application performance
• $200k savings
• Reduced help desk callsSoftware
29 Software
Snapshot• The premier global airline alliance• 11 airline members• Carrying ~1 million passengers per day
Challenge Required to link 11 different airline systems, the program needed a solution for ease data exchange across a complex web of disparate member infrastructures
Results • Dell Boomi AtomSphere allowed
oneworld to create a hub and spoke-modeled data exchange in the cloud.
• New IT hub allows member airlines to quickly integrate their IT systems into the alliance.
• Time and cost savings for all oneworld airlines.
Software
30 Software
Snapshot• Wearable cameras used by more
consumers, professional athletes, and video production professionals than any other camera in the world
• 300% year-over-year company growth
Challenge Meeting the stringent EDI compliance standards of key retailers who sell GoPro cameras
Results • Dell Boomi cloud solutions scaled IT to
meet demands of 300% company growth
• Achieved EDI and application integration: 25 to 30% of transactions now flow through EDI
• Saved 30% over competitive EDI solutionSoftware
31 Software
Snapshot• Public school district with 26,000
students and 4,800 teachers /staff• 21 elementary schools, six middle
schools and seven high schools
Challenge District is tasked with securing on its network over 9,000 student and employee mobile devices at any one time.
Results • By deploying a Dell SonicWALL solution,
district cuts costs by 50%• Students increase access to critical
educational resources; teachers can access other schools around the world
• Mobile device users are authenticated, ensuring secure BYOD Software
32 Software
Snapshot• Non-profit, independent preparatory
school educating 1,250 students
Challenge The IT team lacked a solution to efficiently manage the growing number of student-assigned laptops and tablets
Results • Experienced nearly 700% ROI
• Reduced service desk calls by 56%
• Utilizing Dell KACE appliances, MICDS efficiently reimages several hundred devices
Software
33 Software
Snapshot• Eighth largest svc provider in the U.S. • Serving 5.8M customers in 26 states• 9000+ employees• $4 billion in revenue
Challenge Company needed to protect its 4G LTE network from outside attacks and a multitude of ever-evolving threats
Results • Dell SuperMassive Next-Generation
Firewalls works with the complex 4G LTE architecture handling volumes of traffic for the expanding business
• Supports 40GB throughput per second for extreme scalability and performance
Software
34 Software
Snapshot• One of the largest providers of energy
infrastructure in North America• Employs over 4,000 people
Challenge Old in-house access request application was time-consuming for users and lacked an access review process.
Results • Dell Identity and Access Management
software provided an enterprise wide customized access request portal enabling end-users to “shop” for, and request access
• Frictionless full visibility and control now in the hands of the right people.
Software