GLOBAL SPONSORS
Internal Use - Confidential
REALIZE YOUR
DIGITAL FUTURE
SPEAKER NAME
SPEAKER TITLE, DELL EMC
TWITTER HANDLE OR EMAIL
3
Internal Use - Confidential
© 2016 Dell Technologies
How did we get here – and where are we going ?
1964 200519941981
Volume of Data
Collected /Stored
Generations of DataCentre Computing Platforms
Phases of the Internet
High innovation
Low innovation
High innovation
Source : Bill Chamberlain. HorizonWatching Report
2010 2012 2014 2016 2020
Cloud
Mainframe
Client Server
Internet Web 2.0Web 3.0
(SoLoMo)
Web 4.0
(IoT)
Source: IDC
IT IN
VE
ST
ME
NT
S $
20302000 2015
IT TransformationOptimize IT For The Business
Digital TransformationIT Is The Business
6
Internal Use - Confidential
Legacy
%
Emerging
%
Evolving
%
IT Transformation Maturity
Transformed
%
Source: ESG & Dell EMC
8
Internal Use - Confidential
Digital Transformation
ITTransformation
WorkforceTransformation
SecurityTransformation
The Four Pillars of transformation
9
Internal Use - Confidential
Software DNA Is CriticalDigital
Transformation
10
Internal Use - Confidential
Start With Cloud-NativeApplication Development
Digital Transformation
11
Internal Use - Confidential
New Applications
And Smart Devices
Drive Customer
Engagement
Transform The Business
Agile Development With
Continuous Delivery
Accelerate
Improvement
Data Analytics
Deliver New
Insights
Digital Transformation
Adopt Modern Architectures
Flash Software-
defined
TrustedScale-out Cloud-
enabled
ITTransformation
MODERNIZE AUTOMATE TRANSFORM
Eliminate Siloes Of Complexity
Converged / Hyper-Converged Infrastructure
Blocks Appliances RacksIT
Transformation
MODERNIZE AUTOMATE TRANSFORM
Protect Your Most Critical Asset – Data
Data Protection Portfolio
MODERNIZE AUTOMATE TRANSFORM
ITTransformation
Orchestrated API Driven
ITTransformation
MODERNIZE AUTOMATE TRANSFORM
Simplify And Automate Operations
Simplify And Automate Operations
MODERNIZE AUTOMATE TRANSFORM
ITTransformation
Custom Apps
General-Purpose
Applications
Cloud-Native
ApplicationsMission-Critical
Applications
Hybrid And Multi Cloud Strategy
MODERNIZE AUTOMATE TRANSFORM
OF
F
PR
EM
ISE
S
ON
PR
EM
ISE
S
Enterprise Hybrid CloudEnterprise Hybrid Cloud for Virtustream
Native Hybrid Cloud
General-Purpose
Applications
Cloud-Native
Applications
Cloud Service Providers
Mission-Critical
Applications
Hybrid And Multi Cloud Strategy
MODERNIZE AUTOMATE TRANSFORM
OF
F
PR
EM
ISE
S
ON
PR
EM
ISE
S
Enterprise Hybrid CloudEnterprise Hybrid Cloud for Virtustream
Native Hybrid Cloud
General-Purpose
Applications
Cloud-Native
ApplicationsMission-Critical
Applications
Hybrid And Multi Cloud Strategy
MODERNIZE AUTOMATE TRANSFORM
AgilityProcessPeople
ITTransformation
Power The Business In New Ways
MODERNIZE AUTOMATE TRANSFORM
Power The Business In New Ways
Managed
Services
Transform
Your Team
MODERNIZE AUTOMATE TRANSFORM
ITTransformation
Consulting Services
Arm The Workforce With Purpose-Built Devices
Desk
Workers
Remote
Workers
Corridor
Workers
On-the-Go
Professionals
Specialized
Users
WorkforceTransformation
ENABLE STREAMLINE
Arm IT With Innovative Solutions
PLAN & DESIGN
DEPLOY & INTEGRATE
MANAGE & SUPPORT
OPTIMIZE OR REFRESH
WorkforceTransformation
ENABLE STREAMLINE
Transform Your Approach To Security
Secure Infrastructure
Advanced Security Operations
Risk Management
SecurityTransformation
Protect Before Breaches Occur
Reactive infrastructure
Proactive infrastructure
SECURE INFRASTRUCTURE
ADVANCED SECURITY OPERATIONS
RISK MANAGEMENT
SecurityTransformation
Secure The Endpoints
Endpoints
Data Security
Network Data Center
ISOLATED RECOVERY
SecurityTransformation
SECURE INFRASTRUCTURE
ADVANCED SECURITY OPERATIONS
RISK MANAGEMENT
Protection Automated response
SECURE INFRASTRUCTURE
ADVANCED SECURITY OPERATIONS
RISK MANAGEMENT
SecurityTransformation
Manage Risk In A New Way
Secure Your Way
NetWitness Suite
+
Do It Yourself (DIY) Done For You (DFY)
SecurityTransformation
SECURE INFRASTRUCTURE
ADVANCED SECURITY OPERATIONS
RISK MANAGEMENT
Align Security With The Needs Of The Business
ARCHER SUITESecurity
Transformation
SECURE INFRASTRUCTURE
ADVANCED SECURITY OPERATIONS
RISK MANAGEMENT
39
Internal Use - Confidential
Applications
Users
Spanning The Entire IT Ecosystem
Cloud
Infrastructure
Digital
Transformation
IT
Transformation
Workforce
Transformation
Security
Transformation
40
Internal Use - Confidential
Cloud
Infrastructure
Applications
Services Consumption
Users
From The Edge To The Core To The Cloud
IT
Transformation
Digital
Transformation
Workforce
Transformation
Security
Transformation
ServicesDell Financial
ServicesTM
41
Internal Use - Confidential
Legacy Emerging Evolving
Driving Transformation Maturity
Transformed
INNOVATION
VALUE
LEADERSHIP
45
Internal Use - Confidential
Driving Transformation Maturity
Emerging Evolving TransformedLegacy
REALIZE YOUR DIGITAL FUTURE
47
Internal Use - Confidential