• No results found

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

N/A
N/A
Protected

Academic year: 2021

Share "Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework"

Copied!
14
0
0

Loading.... (view fulltext now)

Full text

(1)

Mobile workforce

management

software solutions

(2)

© 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. (“Dell”).

Dell, Dell Software, the Dell Software logo and products—as identified in this document—are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners.

The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN DELL’S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document.

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology, business solutions and

services they trust and value. For more information, visit www.dell.com.

If you have any questions regarding your potential use of this material, contact:

Dell Software 5 Polaris Way Aliso Viejo, CA 92656 www.dell.com

(3)

Table of contents

Introduction IV

Challenges V

BYOD: Supporting a wide range of devices

VI

Data security: Protecting critical enterprise information

VI

Application modernization: Delivering applications on

an array of devices

VI

Solutions VII

Desktop virtualization

VIII

Secure mobile access

VIII

Mobile network security

IX

Mobile endpoint security

IX

Mobile endpoint management

X

Case studies

XI

Simplifying identity and access management

XII

Challenge XII

Solution XII

Results XII

Ensuring the right access at the right time

XII

Challenge XII

Solutions XII

Results XII

(4)

IV Mobile workforce management solutions | 2013 Dell. All rights reserved..

Balancing user freedom

with IT control

As organizations expand their mobile workforces, IT groups must find new ways to support a growing and diverse collection of mobile computer systems and devices without adding costs, increasing complexity, or sacrificing security. Employees now expect freedom of choice in device support, so IT groups must work to enhance user flexibility, promote productivity and provide secure access—anytime, anywhere—to

information that employees require—all while maintaining tight control of sensitive corporate information.

The expanding bring-your-own-device (BYOD) trend makes that mission more difficult, however. IT groups must support a broad array of platforms, operating systems and configurations. They also need solutions designed to help streamline administrative tasks, deliver the right content and applications to the right people, and keep business information secure—all while keeping costs down.

To enable the mobile workforce with a solid and flexible BYOD approach, organizations must:

• Define IT policies and acceptable devices

• Protect data while securing and managing the infrastructure • Empower the workforce with access to data anytime, anywhere

Introduction

(5)

V Mobile workforce management solutions | 2013 Dell. All rights reserved.

(6)

VI Mobile workforce management solutions | 2013 Dell. All rights reserved.

BYOD: Supporting a wide range of devices

The BYOD trend presents new challenges for IT groups, which must support a much wider variety of end-user devices than ever before. Consumer devices are flooding into business settings, challenging IT groups to respond quickly with a robust platform that meets all requirements and helps maintain user productivity without compromising network security or without exposing the network to potential

cyberthreats.

Companies allow employees to use personal devices in part to help improve productivity and job satisfaction. Mobile smart devices are driving a new workplace paradigm that fosters collaboration anytime and anywhere, and enhances communication through social networking and online presence. The use of personal devices also enables organizations to embrace the concept of virtual teams, leveraging geographically dispersed talent working in different time zones.

IT groups need efficient ways to conduct a full range of management tasks on these diverse devices, from provisioning business applications to installing security patches. At the same time, IT groups must be able to sustain compliance with regulations such as the Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry (PCI) regulations and the Sarbanes-Oxley Act (SOX). Digital rights management and software licensing issues can add layers of device management complexity.

Data security: Protecting critical enterprise information

With this new mobile workplace paradigm comes the need for even greater data security to protect critical enterprise information. Cloud-based applications allow greater flexibility for workers on the go, but they also introduce new data security risks. With mobile and remote employees accessing business applications and data beyond the firewall, organizations must take extra steps to protect data residing on devices as well as data in transit. Most employees think it is someone else’s responsibility to protect corporate information.

Organizations must also protect the company network, ensuring that malware, viruses and other threats cannot enter through these mobile devices. Mobile workers often use public WiFi hotspots to access data—but

these hotspots are not always secure and may introduce additional risks. For the IT group, this access presents a difficult challenge of balancing gateway security and control with network performance and system complexity.

Application modernization: Delivering applications on an array of devices

(7)

VII Mobile workforce management solutions | 2013 Dell. All rights reserved.

(8)

VIII Mobile workforce management solutions | 2013 Dell. All rights reserved.

Desktop virtualization

Dell software solutions for desktop virtualization can help you simplify implementation and management of desktop virtualization no matter what virtualization model—or models—you choose. Deploy a hosted virtual desktop infrastructure (VDI), offline/local VDI, Terminal Server/RD Session Host (TS/RDSH) solution, or a blended model that matches the right technologies to individual user needs. You can take advantage of monitoring and management capabilities that help optimize performance and ensure a robust user experience.

Dell solutions include capabilities that help you accelerate deployment and simplify ongoing management. For example, the Desktop Cloud capability helps speed deployment of virtual desktop environments of any size using the free Microsoft® Hyper-V® Server.

With Dell solutions, you can easily add diagnostics, rich visualization and reporting to virtual desktop management. Access real-time and historical data from Dell vWorkspace™ VDI and TS/RDSH implementations to optimize performance. Use analytics and diagnostic capabilities to identify and resolve issues before they affect users.

Related products:

• vWorkspace™

• Foglight™ for Virtual Desktops

Secure mobile access

Dell solutions for secure mobile access facilitate anywhere access to corporate resources while helping you to ensure tight security for your

information and systems. Secure Sockets Layer (SSL) virtual private network (VPN) platforms for large businesses provide complete, secure mobile access for up to 20,000 concurrent mobile enterprise users from a single appliance while controlling costs and complexity. Employees and extranet business partners gain secure, client—or clientless—access to the resources they need from virtually any device, anywhere.

SSL VPN platforms for small and medium businesses (SMBs) offer powerful, easy-to-use and cost-effective secure remote access solutions. You can enable users to easily and securely access e-mail, files, intranets, applications, remote desktops, servers and other resources on the corporate local area network (LAN) from any location through a standard Web browser.

With Web single sign-on and strong authentication solutions, you can provide a single user identity for each authorized user to simplify access across devices and platforms. Give employees, customers and partners simple browser-based access to Web resources while protecting systems and information. Select solutions that enhance security with two-factor and multifactor authentication.

Dell also offers solutions that enable mobile IT administrators to securely access critical applications and Dell solutions from a mobile device. Your administrators can respond rapidly to issues even when they are not on-site. Alerting and reporting capabilities help them make informed decisions. Secure connections, authentication capabilities and additional controls help prevent authorized access.

Related products:

• Dell SonicWALL™ Aventail E-Class Secure Remote Access (SRA)

• Dell SonicWALL Secure Remote Access (SRA) Series

• Quest Mobile IT

• Quest One User Identity Management

• Defender™

• Webthority™

"Dell solutions for secure mobile access

facilitate anywhere access to

corporate resources while helping you

to ensure tight security for your

(9)

IX Mobile workforce management solutions | 2013 Dell. All rights reserved.

Mobile network security

Dell network security solutions help you secure your network while sustaining performance and simplifying management.

Next-generation firewall

Next-generation firewall solutions allow you to implement a

comprehensive layer of defense that combines gateway virus, anti-spyware, intrusion prevention, content filtering and application intelligence with real-time traffic visualization and inspection. These solutions scan every byte of every packet for the deepest level of network protection. You can scale to extend state-of-the-art security to growing and distributed enterprise networks.

Unified threat management

Unified threat management solutions are designed for small businesses, retail deployments, government organizations, remote sites and branch offices. These solutions allow you to move beyond consumer-level products with a solution that combines gateway anti-virus, anti-malware, intrusion prevention, content/URL filtering and application control capabilities along with broad mobile platform support for laptops, smartphones and tablets with the SSL VPN client and Mobile Connect. Clean wireless

Dell wireless security solutions can deliver outstanding performance for employees, customers and corporate visitors while protecting the corporate network. Plug-and-play deployment and centralized management of access devices allow you to provide the connectivity that users expect while avoiding administrative complexity. Clean Wireless combines Next-Generation Firewall solutions with high-speed wireless to make sure wireless traffic is scrutinized with the same intensity as wired network traffic.

WAN acceleration

Dell also offers solutions designed to improve WAN application performance and enhance the end-user experience for distributed organizations with remote and branch offices. You can reduce application latency and conserve bandwidth by transmitting only new and changed data across the network. Combine with firewall security, application intelligence and control service capabilities to optimize performance.

Security and analytics management

Dell offers management and reporting solutions to help simplify security solution administration and analytics reporting. With these solutions, you can centralize management of security policies and appliance-based solutions. Use real-time monitoring and alerting capabilities to optimize the performance, utilization and security of your network.

Related products:

• Dell SonicWALL SuperMassive™ Series

• Dell SonicWALL E-Class Network Security Appliance (NSA) Series

• Dell SonicWALL NSA Series

• Dell SonicWALL TZ Series

• Dell SonicPoint-N Series

• Dell SonicWALL WAN Acceleration Appliance (WXA) Series

• Dell SonicWALL Global Management System

• Dell SonicWALL Scrutinizer

• Dell SonicWALL Analyzer

Mobile endpoint security

As organizations increasingly support and facilitate mobile productivity, maintaining tight security must be a top priority. Dell solutions for mobile endpoint security can help protect mobile endpoint devices and company resources while streamlining management. You can address potential problems and maintain compliance with internal and external regulations. Protect endpoints from threats by making sure anti-virus and anti-spyware software are always up-to-date.

An appliance-based solution helps you uncover and remediate endpoint security problems rapidly. You can scan endpoint systems to identify

"

Next-generation firewall solutions scan every byte

of every packet for the deepest level of network

(10)

X Mobile workforce management solutions | 2013 Dell. All rights reserved.

vulnerabilities, enforce compliance with company policies and create a complete audit trail. Reduce risks while minimizing the potential for downtime caused by infections and other breaches. The appliance-based approach helps simplify deployment and management while controlling the costs of security audit and enforcement.

An enhanced endpoint security solution allows you to protect servers, desktops and laptops from a growing number and increasingly diverse range of threats, from viruses and spyware to spam and phishing attempts. Working with next-generation firewalls, the anti-virus and anti-spyware solution helps ensure that all endpoints have the latest versions of anti-virus and anti-spyware software installed and active. An anti-spam solution provides client-based anti-spam and anti-phishing protection for Microsoft Outlook®, Outlook Express, or Windows® Mail e-mail clients on Microsoft

Windows–based desktops or laptops. Related products:

• Dell KACE™ Systems Management Appliance

• Dell SonicWALL endpoint security

Mobile endpoint management

To support the BYOD trend, IT groups must find efficient ways to provision business applications, install security patches and ensure compliance with company and government regulations. Dell solutions for mobile endpoint management can help you discover, provision, upgrade and secure mobile devices easily, accurately and cost-effectively. Manage smartphones,

tablets, laptops and desktops running a wide variety of operating systems and virtual platforms, all from a centralized console.

Appliance-based solutions can help accelerate endpoint deployments while reducing costs and complexity. You can automate a wide range of deployment functions, from discovery and imaging to upgrades and system repairs. Provision Microsoft Windows and Mac platforms from a single, centralized administrative console. An easy-to-use, Web-based interface enables administrators of all levels to handle deployment tasks. A solution designed for tablets and smartphones can help simplify provisioning and security policy enforcement on those devices. Manage corporate and personal devices while protecting sensitive business content on all devices. Adopt a platform that enables you to manage these mobile devices alongside laptops, desktops, servers and virtual machines. Related products:

• Dell KACE Systems Deployment Appliance

• Dell KACE Mobile Management Appliance

"An enhanced endpoint security

solution allows you to protect servers,

desktops and laptops from a growing

number and increasingly diverse

(11)

XI Mobile workforce management solutions | 2013 Dell. All rights reserved.

(12)

XII Mobile workforce management solutions | 2013 Dell. All rights reserved.

Simplifying identity and

access management

Challenge

One of the leading integrated natural gas companies in the United States wanted to reduce the costs and complexity of its identity and access management (IAM) solution. To better support its mobile workforce, the company wanted to add an access request capability that was lacking in its existing remote access system.

Solution

The company decided to implement the Quest One Identity Solution from Dell to help substantially simplify tasks and reduce costs. Identity intelligence capabilities offer the access request functionality that the company wanted, together with the 360-degree visibility and complete control that results from the next-generation, object-based approach of Quest One Identity Manager.

Results

• Secured the entire population of Unix and Linux systems efficiently through Microsoft Active Directory®

• Deployed self-service capabilities for end users and managers through both the Quest One Identity Manager and Password Manager offerings, further simplifying administrative tasks and supporting end-user preferences

• Provided a business-driven, security- and compliance-optimized, and future-proofed IAM solution

Ensuring the right

access at the right time

Challenge

A prominent nonprofit organization for community-based care in Miami and the Florida Keys wanted to streamline access to enterprise information for its mobile and remote workers while ensuring the right level of access to the right person. The organization needed to protect extremely confidential data, including birth documents, Social Security numbers and personal health information (PHI).

Solutions

The organization deployed a Dell SonicWALL E-Class Network Security Appliance (NSA) solution at its headquarters, as well as three NSA appliances at remote site locations and 16 SonicPoint-N wireless access points. To provide dedicated secure remote access, the agency deployed a SonicWALL Aventail E-Class Secure Remote Access (SRA) appliance.

Results

• Gained a secure platform that lets users connect using their own devices while enabling the organization to offer new solutions

• Simplified management for the organization’s administrators

"Identity intelligence capabilities offer...

the 360-degree visibility and complete

control that results from the

(13)

XIII Mobile workforce management solutions | 2013 Dell. All rights reserved..

Dell end-to-end mobile

workforce management

Organizations need ways to efficiently manage a wide range of devices so employees can choose the device that works best for them and optimize the infrastructure for a dynamic, seamless end-user experience. At the same time, IT groups must be able to protect data from the edge to the data center, and develop and deliver apps for improved end-user productivity and the bottom line.

Dell offers an extensive portfolio of mobile workforce solutions that can help organizations meet these and other challenges in supporting a mobile workforce. Built for flexibility and scalability, Dell mobile workforce solutions allow organizations to effectively and efficiently empower the mobile workforce while preparing for future change and growth. Designed to streamline IT provisioning tasks and support business needs, Dell solutions can also help organizations simplify administration even as IT environments expand and BYOD numbers grow.

Dell works with organizations to determine the right solution based on needs, current infrastructure, risk tolerance and overall business strategy.

For more information about Dell software solutions, contact your Dell sales representative or visit: www.software.dell.com.

(14)

References

Related documents

Companies need to segment end users by mobility needs; evaluate the types of applications, mobile services and devices to deliver, manage and secure; ensure

Magmito platform integration for branded mobile content creation One stop shop for any mobile sales or marketing campaign. Magmito wizard development for

researchers also address that working relationships have positive impact on project performance in terms of project time cost and quality. This research conceptualizes

Planning for the 1999 Iowa Oral Health Survey began in the spring of 1999 and included personnel from the Dental Health Bureau of the Iowa Department of Public Health,

More efficient beam and energy utilization: all protons are used, reducing unwanted neutron dose and accelerator activation.. No beam energy is wasted

field technicians to access the workforce task management system at any time and from anywhere using mobile applications on their portable devices.. Simultaneously the management

Usi ng the Moz OpenSi te Expl orer tool , fol l owi ng three backl i nks are i denti fi ed for the websi te Udaci ty.com based on the domai n authori ty and whi ch wi l l add val

MOBILE ACCESS Accessible via browsers running on mobile devices Limited access to business applications browsers. running on mobile devices Accessible via browsers running on