21
Dell World 2014 Securely managing all Dell and non-Dell end user devices Roger Bjork, Director, Dell Mobile/BYOD Solutions Bill Odell, Director, Dell Endpoint Systems Management November 5-6, 2014 Dell World 2014

Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

Embed Size (px)

DESCRIPTION

How do you securely include personally-owned devices into your standardized management scheme? And how can you quickly update all of your endpoints to include the latest security patches and have an audit report to confirm that all of them were updated successfully? This focuses on specific use cases to securely manage mobility and bring-your-own-device (BYOD) client devices offered by Dell and other manufacturers. It also demonstrates exclusive secure management advantages available only from Dell.

Citation preview

Page 1: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

1 Dell World 2014

Securely managing all Dell and non-Dell end user devices

Roger Bjork, Director, Dell Mobile/BYOD Solutions Bill Odell, Director, Dell Endpoint Systems Management November 5-6, 2014

Dell World 2014

Page 2: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

Dell World 2014

The biggest barriers to mobility

Risk of data breach

Cost of maintaining mobile

devices

Complexity of managing

multiple platforms and devices

50% 40% 36% According to Dell’s Global Technology Adoption Index:

Page 3: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

3 Dell World 2014

Only Dell’s end-to-end portfolio addresses mobility challenges across the enterprise One-off solutions increase complexity, cost and risk

Choose one strategic partner who can provide unified support

IT decision maker

$ Vendor complexity

?

$

Too many vendors to choose from

Disparate support teams

Disconnected back ends

Small vendors bought out

One strategic partner

Page 4: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

4 Dell World 2014

Dell’s end-to-end mobility heritage Single partner with breadth and leadership

Dell - Internal Use - Confidential - Privileged 4

Dell KACE/EMM systems

management

Dell Secure Mobile Access

Dell Networking

W-Series

Dell Data Protection | Encryption Enterprise

Dell One Identity Cloud

Access Manager

Application Services

Dell’s entry into enterprise mobile management extends from leadership across ESM, UTM, networking, MDP, IAM and ITO industry segments

Page 5: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

Dell World 2014

KACE and EMM “Better together”

Page 6: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

6 Dell World 2014

Integrated solutions for a multi device world

for ALL devices

across MULTIPLE platforms

Corporate issued Employee owned (BYOD)

across the LIFECYCLE

Deploy Manage Secure Service

Page 7: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

7 Dell World 2014

Dell ESM – KACE, EMM and Desktop Authority K1000 Management Appliance

Comprehensive systems management for laptops, desktops, servers and tablets. Improve security, meet compliance requirements and decrease user downtime

K2000 Deployment Appliance

Integrated systems provisioning and deployment, fulfilling tasks including inventory assessment, OS and application provisioning, migration and recovery

Enterprise Mobility Management (EMM)

Flexible, comprehensive, K1000 integrated solution for securely, managing mobile devices – both BYOD and corporate owned

Desktop Authority Management Suite (DAMS)

Provides a centralized, secure and consistent management of the Windows user environment that automates users’ access to resources and applications

Page 8: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

8 Dell World 2014

KACE K1000 Management Appliance

Know Manage Enforce

Asset management Configuration

scans

Inventory

Dell Warranty Patch management

Software metering Help desk

Software distribution

Reporting

Page 9: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

9 Dell World 2014

New: K1000 v6.0 – Securely Managing IoT

SECURE

• Machine configuration

• Security scanning

Security

• Software blacklisting

• Full OS and device

inventory

Expertise

• Deployment &

maintenance

• User interface

• K1000 GO mobile app

Visibility

• Robust discovery

• Broader platform support

• Agentless technology

Page 10: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

10 Dell World 2014

Flexible deployment options

Physical appliance

Virtual appliance

Hosted appliance

Page 11: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

11 Dell World 2014

Dell Enterprise Mobility Management (EMM)

Your devices, your users, your mobile strategy

• Complete, secure endpoint management

• Secure enterprise workspace on all devices

• Secure access to enterprise data

• Integrated console management

• User self-service

• Identity management

• Business apps and services you need

• Flexibility for future-proofing

Comprehensive mobile enablement

Endpoint management

Smartphones

Tablets

M2M

Laptops

Desktops

Smartphones

Tablets

Laptops

Workspace management

Corporate issued User owned (BYOD)

Page 12: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

12 Dell World 2014

Dell Enterprise Mobility Management (EMM)

• Complete, secure endpoint management

• Secure enterprise workspace on all devices

• Secure access to enterprise data

• Integrated console management

• User self-service

• Identity management

• Business apps and services you need

• Flexibility for future-proofing

Your devices, your users, your mobile strategy

Comprehensive mobile enablement

Endpoint management

Smartphones

Tablets

M2M

Laptops

Desktops

Smartphones

Tablets

Laptops

Workspace management

Corporate issued User owned (BYOD)

Dell Mobile Management

Dell KACE K1000 & K1000 as a Service

Dell Mobile Workspace

Dell Desktop Workspace

Page 13: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

13 Dell World 2014

EMM – An integrated platform for all endpoints

Dell KACE K1000

Corporate owned

Dell Mobile Management

Corporate owned BYOD

Dell Mobile Workspace

Dell Desktop Workspace

BYOD

K1000 manages all corporate owned PCs

• Manages secure applications on BYOD mobile

• Manages corporate owned mobile

• Passes inventory to K1000

Creates secure applications on BYOD mobile

• Creates secure applications on BYOD PCs

• Manages PC owner privileges

• K1000 can manage virtual secure application

Page 14: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

14 Dell World 2014

Dell Mobile Management

Enterprise benefits

• Security and compliance

• Policy management

• Rapid deployment

• Automatic upgrades

• OpEx instead of CapEx

• Targeted tools for the job

Central management

Mobile device, application and content management

User self-service portal

Real-time reporting, alerts and analytics

Securely manage and provision enterprise smartphones and tablets with a SaaS-based solution

Page 15: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

15 Dell World 2014

Dell Mobile Workspace

Secure email, calendar, contacts,

browser and file manager

Optional productivity applications

Secure remote access and data

separation

Central management

User benefits Enterprise benefits • Productivity and

collaboration

• Device choice (smartphones and tablets)

• Personal privacy

• Security & data loss protection

• Management and control

• Increased user productivity

• Rapid deployment

• Automatic upgrades

• OpEx instead of CapEx

• Encourages adoption

Increase productivity by enabling your users to work remotely and securely on enterprise or personal mobile devices

Page 16: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

16 Dell World 2014

Dell Business Phone Powered by Vonage Business Solutions™

• Make your telecom budget go further

• Manage and control calling plans and records

• Secure enterprise phone data with Dell Mobile Workspace

• Deliver robust features, like a conference bridge, call recording and group text messaging

• Extend coverage with calling over Wi-Fi

• Improve productivity and collaboration

Make the move to BYO by providing a business phone service on personal smartphones and tablets with robust features, security and control

Page 17: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

17 Dell World 2014

Box for Dell File sync and share capabilities

Safeguard content on personally-owned mobile devices Use Box for Dell with Dell Mobile Workspace or Dell Desktop Workspace.

Share content in the partner’s cloud or your cloud, sync it between devices and collaborate across your business

Secure Connect Collaborate

Page 18: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

18 Dell World 2014

Dell Desktop Workspace

Enterprise benefits: • Four layers of security

• Management and control

• Increased user productivity

• Low-friction integration

• Rapid onboarding

• No hardware to purchase

• Access to legacy applications

Dell – Internal Use – Confidential

4 layers of security

1 2 3 4 DLP Encryption Secure remote access

Firewall

• Best application performance

• Consistent experience

• Work while offline

• Laptop of your choice

User benefits:

• Remote employees

• Contractors and consultants

• Mobile employees

• Mergers and acquisitions

• Offshore software development

• Executives who prefer Macs

Use cases:

Provide a secure, managed environment for your enterprise Windows image on corporate-managed or personally-owned PCs and Macs

Page 19: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

19 Dell World 2014

Next steps

Visit us in the Solutions Expo to: • See a demo • Learn about FREE 1-YEAR KACE and EMM offers.

Attend other Mobility sessions: • MT54: The new reality of mobile solutions: Everything you

have been told about mobility is wrong • MT24: Enabling mobility without compromising security

Page 20: Securely managing all Dell and non-Dell end user devices: Endpoint systems management and enterprise mobility management

Dell World 2014

Thank you.