GLOBAL SPONSORS Internal Use - Confidential · TWITTER HANDLE OR EMAIL. 3 Internal Use -...

Preview:

Citation preview

GLOBAL SPONSORS

Internal Use - Confidential

REALIZE YOUR

DIGITAL FUTURE

SPEAKER NAME

SPEAKER TITLE, DELL EMC

TWITTER HANDLE OR EMAIL

3

Internal Use - Confidential

© 2016 Dell Technologies

How did we get here – and where are we going ?

1964 200519941981

Volume of Data

Collected /Stored

Generations of DataCentre Computing Platforms

Phases of the Internet

High innovation

Low innovation

High innovation

Source : Bill Chamberlain. HorizonWatching Report

2010 2012 2014 2016 2020

Cloud

Mainframe

Client Server

Internet Web 2.0Web 3.0

(SoLoMo)

Web 4.0

(IoT)

Source: IDC

IT IN

VE

ST

ME

NT

S $

20302000 2015

IT TransformationOptimize IT For The Business

Digital TransformationIT Is The Business

6

Internal Use - Confidential

Legacy

%

Emerging

%

Evolving

%

IT Transformation Maturity

Transformed

%

Source: ESG & Dell EMC

8

Internal Use - Confidential

Digital Transformation

ITTransformation

WorkforceTransformation

SecurityTransformation

The Four Pillars of transformation

9

Internal Use - Confidential

Software DNA Is CriticalDigital

Transformation

10

Internal Use - Confidential

Start With Cloud-NativeApplication Development

Digital Transformation

11

Internal Use - Confidential

New Applications

And Smart Devices

Drive Customer

Engagement

Transform The Business

Agile Development With

Continuous Delivery

Accelerate

Improvement

Data Analytics

Deliver New

Insights

Digital Transformation

Adopt Modern Architectures

Flash Software-

defined

TrustedScale-out Cloud-

enabled

ITTransformation

MODERNIZE AUTOMATE TRANSFORM

Eliminate Siloes Of Complexity

Converged / Hyper-Converged Infrastructure

Blocks Appliances RacksIT

Transformation

MODERNIZE AUTOMATE TRANSFORM

Protect Your Most Critical Asset – Data

Data Protection Portfolio

MODERNIZE AUTOMATE TRANSFORM

ITTransformation

Orchestrated API Driven

ITTransformation

MODERNIZE AUTOMATE TRANSFORM

Simplify And Automate Operations

Simplify And Automate Operations

MODERNIZE AUTOMATE TRANSFORM

ITTransformation

Custom Apps

General-Purpose

Applications

Cloud-Native

ApplicationsMission-Critical

Applications

Hybrid And Multi Cloud Strategy

MODERNIZE AUTOMATE TRANSFORM

OF

F

PR

EM

ISE

S

ON

PR

EM

ISE

S

Enterprise Hybrid CloudEnterprise Hybrid Cloud for Virtustream

Native Hybrid Cloud

General-Purpose

Applications

Cloud-Native

Applications

Cloud Service Providers

Mission-Critical

Applications

Hybrid And Multi Cloud Strategy

MODERNIZE AUTOMATE TRANSFORM

OF

F

PR

EM

ISE

S

ON

PR

EM

ISE

S

Enterprise Hybrid CloudEnterprise Hybrid Cloud for Virtustream

Native Hybrid Cloud

General-Purpose

Applications

Cloud-Native

ApplicationsMission-Critical

Applications

Hybrid And Multi Cloud Strategy

MODERNIZE AUTOMATE TRANSFORM

AgilityProcessPeople

ITTransformation

Power The Business In New Ways

MODERNIZE AUTOMATE TRANSFORM

Power The Business In New Ways

Managed

Services

Transform

Your Team

MODERNIZE AUTOMATE TRANSFORM

ITTransformation

Consulting Services

Arm The Workforce With Purpose-Built Devices

Desk

Workers

Remote

Workers

Corridor

Workers

On-the-Go

Professionals

Specialized

Users

WorkforceTransformation

ENABLE STREAMLINE

Arm IT With Innovative Solutions

PLAN & DESIGN

DEPLOY & INTEGRATE

MANAGE & SUPPORT

OPTIMIZE OR REFRESH

WorkforceTransformation

ENABLE STREAMLINE

Transform Your Approach To Security

Secure Infrastructure

Advanced Security Operations

Risk Management

SecurityTransformation

Protect Before Breaches Occur

Reactive infrastructure

Proactive infrastructure

SECURE INFRASTRUCTURE

ADVANCED SECURITY OPERATIONS

RISK MANAGEMENT

SecurityTransformation

Secure The Endpoints

Endpoints

Data Security

Network Data Center

ISOLATED RECOVERY

SecurityTransformation

SECURE INFRASTRUCTURE

ADVANCED SECURITY OPERATIONS

RISK MANAGEMENT

Protection Automated response

SECURE INFRASTRUCTURE

ADVANCED SECURITY OPERATIONS

RISK MANAGEMENT

SecurityTransformation

Manage Risk In A New Way

Secure Your Way

NetWitness Suite

+

Do It Yourself (DIY) Done For You (DFY)

SecurityTransformation

SECURE INFRASTRUCTURE

ADVANCED SECURITY OPERATIONS

RISK MANAGEMENT

Align Security With The Needs Of The Business

ARCHER SUITESecurity

Transformation

SECURE INFRASTRUCTURE

ADVANCED SECURITY OPERATIONS

RISK MANAGEMENT

39

Internal Use - Confidential

Applications

Users

Spanning The Entire IT Ecosystem

Cloud

Infrastructure

Digital

Transformation

IT

Transformation

Workforce

Transformation

Security

Transformation

40

Internal Use - Confidential

Cloud

Infrastructure

Applications

Services Consumption

Users

From The Edge To The Core To The Cloud

IT

Transformation

Digital

Transformation

Workforce

Transformation

Security

Transformation

ServicesDell Financial

ServicesTM

41

Internal Use - Confidential

Legacy Emerging Evolving

Driving Transformation Maturity

Transformed

INNOVATION

VALUE

LEADERSHIP

45

Internal Use - Confidential

Driving Transformation Maturity

Emerging Evolving TransformedLegacy

REALIZE YOUR DIGITAL FUTURE

47

Internal Use - Confidential

Recommended