Noticias » Servicios Cloud: Servicios Cloud » TODOS

Dell EMC Forum 2016

Informe especial sobre Dell EMC Forum 2016

Por Redacción
Actualizado el 18 de noviembre, 2016 - 11.19hs.

Incredible changes have taken place that have changed entire industries – Spotify, Uber etc… These changes are being driven by what we call Digital Transformation, where technology is at the core of every business, in every industry, globally. Successful organizations are using technology to undergo digital transformation right now, looking at new and better ways to interact with and serve customers, creating a more frictionless and seamless customer experience. So, today every company should be on a journey to transform their business and create new digital operating models.

In order to help organizations successfully navigate these transitions and achieve their digital transformation goals, we are positioned to help drive a holistic approach encompassing three key areas: IT, Workforce and Security.

1) IT transformation results in a Future Ready Data Centre. That is where IT organizations create a modern infrastructure to enable digital transformation, 

2) Workforce transformation is how IT creates a truly digital work environment for employees, and 

3) Security transformation is about creating a new security strategy for IT, the workforce, and the entire organization. 

IT Transformation

Now how does all this impact your IT strategy?  What do you need in terms of infrastructure to make certain you are well positioned for the future?  How does IT itself need to transform?

15 years: If you take a look back at the last 15 years, technology was really the realm of IT and very much focused on storing and reporting transactional data.

In the next 15 years technology is going to be inherent in every part of the business. Businesses are going to engage with customers through innovative applications on mobile devices. The applications are going to be built for the cloud. And we’re not just going to connect phones, and PCs, and tablets to the Internet, we’re going to connect everything. 

Trillions spent on traditional IT: Last year, 2015, about $2.7 Trillion was spent on traditional infrastructure today. And these traditional applications are not going away any time soon.

Focus on optimizing traditional applications: As IT budgets are not growing, over the next several years, businesses must get serious about optimizing traditional applications and infrastructure -running enterprise automation applications more efficiently… By taking cost out of traditional IT, new digital initiatives may be funded more easily.

Invest in cloud-native applications: Every IT leader today tells us they want to be more strategic and relevant to the business. If they can free up budgets, they can more effectively assist the business in digitally transforming for the future and building a host of cloud-native applications. In order to successfully navigate this transition, our customers are telling us that strategic partnerships matter more now than ever before.

Two distinct architectural paradigms. The infrastructure to support traditional and cloud native applications are two distinct architectural paradigms. Traditional applications need infrastructure resiliency to provide availability for the application. This design is somewhat ridged with lengthy deployment plans and a 5-year services life.  New applications may be accommodated by free capacity if available. 

Cloud native applications are application resilient and often distributed using scalable infrastructure. They are built on a set of micro-services that scale out horizontally rather than vertically. The main benefit of this IT architecture is one of increased agility and continuous change and expansion. 

Businesses will have a variety of workloads.  Business value is driven by our customers workloads with varying needs for capacity and performance. Simply broken down, customers have systems of record in the traditional application space and are investing in systems of engagement, most often in the cloud native space.

2. Turn around and look at the print - It is now a hybrid cloud world. The data on the benefits of a hybrid cloud strategy are overwhelmingly clear. Most organizations that undergo an IT transformation—and move to a hybrid cloud model—drive down costs by 24%. That’s the money that’s going to fund the new digital initiatives—the ones that will significantly affect business. What we also find because of this, is that people who aggressively move to a hybrid cloud are 3 times further along in achieving their digital business goals. 

Part 2– the Dell EMC approach 

1. At Dell EMC we believe that the path to a hybrid cloud strategy is straight forward.  

The first no-regrets move is to modernize the data center. We are convinced that tenets like scale-out, flash, software-defined, and cloud-enabled are fundamental to a modern data center. 

Once the modern data center and its infrastructure has been built, the next step is to automate. We want to make everything frictionless and self-service—this allows you to scale the operation without adding people, and therefore costs. 

And finally IT will transform the way they operate. Fundamental question must be addressed. What services will continue to be provided in-house or what will be serviced through a 3rd-party provider? This will require a change in processes and in the skills of their people. 

So, modernize, automate, transform—these are the three steps to building a hybrid cloud, and therefore affecting an IT transformation. 

Modern Architectures - Flash, Cloud, Scale and Software Defined: For the modern data center, we believe that the best approach is to leverage converged infrastructure platforms. Customers want simple, easy to deploy infrastructure platforms, on which they can the core business applications and provide a platform for deploying next-generation applications. Converged infrastructure allows for both. 

The Modern data center requires cord modern architectures – the fundamental pillars of the modern datacenter… Flash, Cloud, Scale and Software Defined.

Flash has dramatically changed the way we manage and deploy storage, performance is now a given along with consistent and predictable performance.  

As business and capacity requirements grow, scale out architectural designs allow customers to deliver a modular approach to scaling infrastructure. IT can efficiently manage massive capacities with very few resources. 

The new software defined model allows you to automate the configuration and deployment of IT services, delivering greater business agility and a more flexible, programmable approach to managing data services.

Finally, we believe that cloud enabled infrastructure is a fundamental architectural design. Infrastructure services should be delivered via policy driven methodologies. IT should have the ability to manage information and applications - both on and off-prem. 

Our industry leading server platforms are designed to provide the flexibility you need to tackle any workload… the modular designs let you tailor your compute platform to your needs…

Creating a future ready ecosystem requires a diverse portfolio of hardware and software options to deliver all of the needs of the applications our customers have deployed… that extends beyond storage..

Beyond our comprehensive storage portfolio, we have a robust set of offerings in the converged and hyper-converged infrastructure portfolio. We are focused on helping our customers move from building their own infrastructure to buying converged infrastructures that are manufactured to provide maximum time to value at the best TCO’s in the industry.

We see customers wanting to expand their private cloud to enable seamless shifting of elements to the public cloud.  With the acquisition of Virtustream, Dell EMC now offers a complete set of public cloud services.  Whether it is running mission critical apps in the public cloud or moving cold data off on premise recourses, we are here to help.  

And of course we offer choice. Not only do Dell Technologies deliver Virtustream and VMware vCloud Air, we also work closely with our strategic partners and fully support cloud integration from on-prem solutions to Microsoft Assure, Google and AWS.

So here is your blue-print for IT transformation and continued success.  Maintain and optimize traditional infrastructure while augmenting and investing in new cloud-native scale-out, software defined systems.  And then have a plan for your hybrid cloud strategy and when to move apps and data on or off prem.

Security Transformation

Security transformation is about creating a new kind of security strategy for IT, the workforce, and the entire organization. 

Part 1 

1. Context setting – Today’s hyper-connected world creates more opportunities, and more risk, than ever before. Think of it as security that knows no borders and is equally strong everywhere.

An example of a fundamental change is that today our employees need access to data anytime, anywhere. 

Traditional security approaches have not kept pace with the modern enterprise. They secure the enterprise in silos and don’t demand that security drives business value to the organization. Progressive business and security leaders who are transforming their organizations align their security strategy with the needs of the business. They are evolving boardroom conversations about IT risk to align security with business outcomes. 

2. So let’s turn around and look at what is written on the wall: 

a. So we think the real change we’ll see is that security is going to become business-driven. Solid and reliable data is going to be key to solving the security problem. Organizations that employ an intelligent, business-driven security strategy can detect threats 53 days earlier. 

b. They further drive down their costs about 40%. 

c. And 35% of organizations actually believe employing this new kind of security strategy can open up new capabilities. That is the exact opposite of what we’ve heard in the past, where some people felt that security was a drag or a productivity inhibitor.  

Why transform security?

What does a digital business look like? A digital business has for example technology that accelerates product development (55%), has security built into all devices (54%) and a track record in agile innovation (48%)

How are they doing it? Over half of businesses are using digital technologies to accelerate product/service development (51%)

92% see digital business initiatives as critical to success

44% higher growth among organizations adopting mobile apps

47% believe their industry will be unrecognizable in 3 years

Why transform security?

Because the highly connected, data fueled digital economy creates increased exposure to risk

1 million cyber attacks are released every day, and so we must safeguard our technology to keep our personal and business information secure from those who may want to do us harm. 

Why transform security?

Digital business prioritizes things that create more exposure to risk.  At the same time, despite vast increases in spending on security, the breaches keep happening. 

Therefore it makes sense that forward-looking leaders will pose the question to their organizations, “How much risk are we willing to accept in order to reach our business objectives?” 

How can we get more strategic with risk? More proactive vs. reactive?

How can we achieve more predictable outcomes?

Why transform security?

Digital business prioritizes technology that accelerates product development, has security built into all devices and a track record in agile innovation. Security can help your organization gain competitive advantage:

The organizations that view security as integral to reaching business objectives, 

those that manage multiple levels of risk strategically, 

and those that leverage intelligence-driven solutions, will gain competitive advantage over organizations that continue to play catch-up.

Business driven: Keep eyes on the business and widen the focus. Transformative security shifts from a narrow focus on technology and solutions to a broader business focus and builds the business case for security as a critical and integral component of business strategy. 

Intelligence driven Better intelligence fuels better decisions. Transformative security prioritizes an intelligence-driven approach powered by analytics, visibility and intelligence sharing across the entire organization. When you are better informed, you can make better decisions, resulting in better outcomes.

Risk driven: Your roadmap of risk is strategic. Transformative security prioritizes a risk-driven approach tailored to your organization, your risk tolerance, and strategic goals. You can build a security architecture that includes the appropriate people, processes, technology and intelligence designed specifically to protect the unique attributes, and enable the objectives, of the business.

Comentarios: Lo más reciente de 0 comentario(s) valora enormemente tu aporte en especial si compartes tus opiniones, puntos de vista y críticas con los demás miembros de nuestra comunidad.
Agrega un comentario
Por favor identifícate aquí para agregar tus comentarios.
Si aún no eres usuario registrado de, puedes registrarte aquí gratis.


Lo más leído »


Más Secciones »

Hola Invitado