Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Transformácia – kam smeruje IT?
Marián Kováčik
Sales Engineer
Dell EMC
+421 917 777 663
is a unique family
of businesses that
provides the
essential
infrastructure for
organizations to
build their digital
future.
Consists of 7 brands:
Recognized as a market
leader by Gartner in 20+
Gartner MQs
#1Converged
Inrastructure
#1STORAGE
#1DC AUTOMATION
#1PCs
#1CLOUD
#1VIRTUALIZATION
According to IDC…
4 of 72
Digital
Transformation
Security
TransformationWorkforce
Transformation
IT
Transformation
Transforming the
businessWe help organizations
reinvent themselves and
realize their digital future.
5 of 72
Dell Technologies – A Force Multiplier
Cloud
Applications
Infrastructure
UsersWorkforce
Transformation
Digital
Transformation
IT
Transformation
Security
Transformation
Dell - Internal Use - Confidential
6
We want everything now and we want it anywhere
Technology is transforming the way we live and work
IoE is transforming how every industry operates
Now is a time of unprecedented change
Digital Transformation
The next industrial revolution is here
Faster Cycles = Competitive Advantage
Data Analytics
Deliver New
Insights
Agile Development With
Continuous Delivery
Accelerates improvement
New Applications
& Smart Devices
Transform The
Business
Dell Technologies Offers You ChoiceOpen Source Platform, Deploy To Any Infrastructure
Native Hybrid Cloud
On-premises Off-premises
Cloud Service Providers
9
Workforce TransformationIn a fast-moving world,
connection is everything
Modernise user experiences and empower
new ways of working
Get connected anytime, anywhere
Enjoy a highly mobile and interconnected workforce
Transform your digital workplace to enable optimal
performance and productivity
10 © Copyright 2017 Dell Inc.10
Where we work + how we work has changed
Say technology
influences the job
they take
Would quit a job with
poor technologyDo some business
from home
And will continue to change
44% of millennials think their workspace isn’t smart enough
Work after
business hours
60% 42%2/3 82%
One place
In a meeting On a plane
At a desk On a couch
Off PremisesOn Premises
Many places
The way people work (and live) is changing
See the Workforce Transformation Sales Guide for Dell’s solutions for the way people work.
Accessories & Displays
Security & Manageability
Latitude &
XPSPrecision
Vostro
Latitude Rugged
PrecisionTower
OptiPlex
Wyse thin client
Vostro
PrecisionRack
Embedded | IoTFixed Mobile
The most complete portfolio for every work style
Security & Manageability
Services and Support
13
IT Transformation
We transform you by transforming your IT
We help you make the move to a hybrid cloud
We modernise your infrastructure, automate your IT
service delivery, and transform people & processes
We manage, store, protect and analyse your most
precious asset – information
All this gives you a unique, competitive advantage
14 of 72
IT Transformation
Orchestration
Virtualization
Servers, storage & network
Applications
Cloud
Infrastructure
Modernize
Infrastructure
Automate
Service
DeliveryTransform
IT Operations
• Modernize
• Automate
• Transform
15 of 72
IT TransformationModernize
Applications
Cloud
Infrastructure
Modernize
Infrastructure
16 of 72
Modern ArchitectureApplications
Cloud
InfrastructureFlash Cloud-enabled Scale-out Software-defined Trust
Attributes of Modern Architecture
5 Core Attributes
17 of 72
Servers
OS10OS9
NetworkingStorage
Built for NVMe and Flash
Agent-Free Management
Foundation for SDDC
Flash Everywhere
Cloud Array/Pools
Software Control Plane
SDN solutions
Open-networking leader
Maximum choice
18 of 72
Applications
Infrastructure
OrchestratedAPI Driven
IaaS and PaaS
Software
18 of 72 Dell - Internal Use -Confidential
19 of 72
Applications
Infrastructure
Enterprise Hybrid Cloud
Native Hybrid Cloud
Hybrid Cloud
Platforms
19 of 72 Dell - Internal Use -Confidential
20
Security Transformation
Futureproof is present peace of mind.
95%
of data breaches
originate at the endpoint
63%
of breaches are due to
compromised identities
new malware variants
every day
1M45%
of corporate data is
stored on the endpoint
21
Security Transformation
Better security = better business
Protect Data
• Wherever it goes
• Control/monitor data activity & location
• Mitigate identity risk
• Exceed compliance
Prevent Threats
• Stop attacks before they occur
• Endpoint detection & response
• Remediate data loss, ensure
business continuity
Security Transformation
BE THE TRUSTED ADVISOR
Secure Infrastructure
DESIGN IT IN
Endpoint
Data
Security
Network
NSX
Data
IRS
Advanced Security
Operations
AUTOMATE RESPONSE
DFYDIY
Netwitness
Risk Management
TRANSLATE TO
BUSINESS RISK
All Risk
Archer
Individually we specialize, collectively we transform
Ďakujem