dell.com/powersolutions fast...

88
2012 Issue 02 Your guide to maximizing IT efficiency dell.com/powersolutions Fast forward US$18.95 CAN$19.95 Five best practices help CIOs create a user-centric computing strategy that embraces the brisk rate of technological—and cultural—change Explore cloud-based delivery: Enhancing productivity with desktop as a service Capitalize on converging trends: Accelerating desktop virtualization gains Employ a smart strategy: Securing remote access for consumer devices with SonicWALL Plus: Special section on data management, including data’s journey to the cloud

Upload: vannhu

Post on 13-Mar-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

2012 Issue 02

Your guide to maximizing IT efficiency dell.com/powersolutions

Fast forward

US$

18.9

5

Ca

n$

19.9

5

Five best practices help CIOs create a user-centric computing strategy that embraces the brisk rate of technological—and cultural—change

Explore cloud-based delivery: Enhancing productivity with desktop as a service Capitalize on converging trends: Accelerating desktop virtualization gains Employ a smart strategy: Securing remote access for consumer devices with SonicWALL Plus: Special section on data management, including data’s journey to the cloud

Page 2: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Give everyone in your company secure access to the data and applications they need, on the device of their choice. Learn more about Dell mobility solutions powered by Intel® at Dell.com/Effi cientIT.

Anywhere,

anytime,

on any device.

Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

Do more with Dell mobility solutions

Page 3: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

2012 Issue 02

Requisition

Provision

Manage

Retire

Businessgroups

Authorizedusers

Authentication and role-based authorization

A B C

End users

A

ABC

ResourcereservationsService

blueprints

Cost profile Cost profile

Approved

A A

Shared infrastructure

Public

Physical

Virtual

A

A

A B

B

C

B

B C

8 Spate of Dell acquisitions solidifies solutions-driven strategy

Physical environment Consolidation Virtualization Cloud computing

Application

OS

Hardware

OS OSOS

Virtualization

Hardware

Application Application Application VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

Maximize e�ciency Increase agilityOptimize resiliency

50 IT innovation is the catalyst for hybrid cloud environments

68 Mazda paves the way to business innovation with tiered storage

76 Capitalize on Ethernet advances to avoid performance/security trade-offs

80 Racked, stacked, and wired infrastructure for easy private clouds

Fast forwardBy Jeanne Feldkamp, Christian Childs, Jennifer Erickson, and David Schweighofer

Five best practices help CIOs create a user-centric

computing strategy that embraces the brisk rate of

technological and cultural change in an agile, secure

framework—with the right personal touch to inspire

productivity gains and business innovation.

Cover story10

dell.com/powersolutions | 2012 Issue 02 1

18 Enhancing productivity

with desktop as a service

By Reed Martin

Global workforces are driving the demand

for anywhere, anytime, any-device

computing. Dell now offers two feature-

rich, cloud-based delivery models to

enhance productivity, streamline resource

management, and advance innovative

support capabilities.

22 Accelerating desktop

virtualization gains

By Rafael Colorado and Reed Martin

Converging trends toward consumerization,

thin-client deployment, enhanced security

requirements, and wide adoption of cloud-

based services are driving increased interest

in desktop virtualization.

Recent

citings

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 4: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

2 2012 Issue 02 | dell.com/powersolutions

42 Streamlining PC life-cycle management

By Jack Todd and Natasha Bohorquez

Rigorous management of the PC life cycle is essential

for diverse, distributed workforces. Dell offers a

comprehensive mix of configuration, installation,

ongoing support, and IT asset disposition services for

efficiently managing end-user systems.

46 Jones Walker: Setting a precedent for virtualization

To keep up with rapid growth, streamline desktop

management, and strengthen disaster recovery, Jones

Walker turned to server and desktop virtualization—

a cost-effective approach enabling the law firm to

respond quickly and flexibly to client needs.

48 Zuken: Expediting client deployments

and IT efficiency gains

Managing client devices and software licenses was

consuming valuable time for the IT team at Zuken.

Deploying Dell KACE Systems Management

Appliances enhanced employee productivity and

freed the IT staff to focus on strategic initiatives.

27 Assessing a desktop virtualization strategy

By Reed Martin

Before transitioning to a virtual desktop environment, IT

decision makers often consider its many challenges and

benefits. The Dell Desktop Virtualization Solutions Group

offers a decision tree for matching an organization’s

needs to a delivery model.

34 Automated, appliance-based deployment

helps simplify endpoint migration

By John Karabaic

To migrate large numbers of endpoints, organizations

are exploring an automated, integrated approach

to systems provisioning. Dell KACE™ deployment

appliances, along with key best practices, facilitate

an efficient, cost-effective migration.

38 Simple, flexible endpoint security

through data encryption

By Jeremy Bolen and Sarah Williams

With employee mobility and IT consumerization on

the rise, organizations require robust data protection.

Dell™ Data Protection | Encryption offers comprehensive

endpoint security that helps simplify management while

maintaining a rich user experience.

Lead with end-user computing

Features

By Patrick Sweeney

Organizations adopting bring-your-

own-device (BYOD) policies to harness

the power and utility of personal mobile

devices in the workplace can employ

SonicWALL solutions to help ensure secure

access for consumer devices.

Securing remote access for consumer mobile devices

30 End-user computing

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 5: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 3

DepartmentsEditor’s comments

6 Ultrabook, ultrafast

By Tom Kolnowski

8 Recent citings

Raft of Dell acquisitions expands business goals,

solution offerings

Special section: Data management

55 Advancing the value of private clouds

with virtualized, consolidated storage

By Stanley L. Stevens, Justin Braun, Marty J. Glaser, and Nicholas Sweere

60 Boosting database availability through

intelligent virtualized storage

By Maggie Smith, Mike Matthews, and Nicholas Sweere

64 Integrating object-based storage using

a global namespace

By Renny Shen and Muffadal Quettawala

68 Mazda North American Operations:

Accelerating performance through virtualized,

tiered storage

By Lisa Onstot and Tad Walsh

By launching the latest members of the

12th-generation Dell PowerEdge™ server

family, Dell extends the benefits of advanced

innovations to organizations of all sizes—

from small and medium businesses to

large enterprises.

Extending the benefits of server innovation

70 Intelligent server infrastructure

By Timothy Sherbak

IT innovation is guiding many organizations on a strategic

trek toward hybrid environments that integrate both

private and public cloud-based services. This evolution

is prompting careful evaluation and planning for storage

and data management.

Data’s journey to the cloud

50 Data management

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 6: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

4 2012 Issue 02 | dell.com/powersolutions

Dell Power Solutions—your guide to maximizing IT efficiency—

offers the latest in expert advice, solutions, and technology for the

enterprise. We have partnered with Zinio to bring you the same

content digitally. Zinio is an award-winning technology platform

that lets you acquire, read, and share digital editions of magazines.

Plus, it adds exclusive digital features—including video, audio, and

live links on desktops, laptops, smartphones, tablets, and other

mobile devices.

With the Zinio edition, the publication enables anytime, anywhere

interaction from any device supporting the Zinio reader app.

For instant access to your complimentary subscription, visit

zinio.com/powersolutions.

Going mobile? Scan this QR (quick

response) code using a smartphone or

tablet computer equipped with a camera

and QR reader app for instant access to

Dell Power Solutions on Zinio. To install a

QR reader app, visit scan.mobi or search

for QR reader in the mobile app store or

marketplace appropriate for your device.

Dell Power Solutions Magazine and special edition articles are also

available online at dell.com/powersolutions. Check our Web site

for early-release articles, how-to’s, case studies, best practices,

and expert tips you won’t find anywhere else.

Point of view

74 Remote- and branch-office

networking trends

By Bob Laliberte

Networking

76 Optimizing network bandwidth

for secure cloud environments

By Brian Johnson and Rahul Deshmukh

Cloud computing

80 Rapid virtualization deployment

for private clouds

By Marc Stitt and Deepak Kanwar

Index to featured Dell customers

BitCloud ...................................................................... 53

Brodart Company .......................................................81

Expedient Communications ....................................78

HealthDataInsights Inc. ............................................ 63

Jones, Walker, Waechter, Poitevent,

Carrère & Denègre L.L.P. .......................................... 46

Mazda North American Operations ..................... 68

PING ............................................................................. 57

Zuken ............................................................................ 48

Index to advertisers

American Power Conversion Corporation ......... 59

Brocade ........................................................................ 37

Dell Inc. .............................................................. C2, 5, 7

F5 Networks, Inc. ...................................................... C3

Intel Corporation ....................................................... 26

Oracle Corporation ................................................ C4

SonicWALL, Inc. ......................................................... 21

Product showcase

Dell PowerVault™ TL tape library:

Versatile, expandable, and affordable

data protection .......................................................... 54

Get your complimentary digital subscription Power Solutions on Zinio!

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 7: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Join the Dell Storage User Group community! Real-world solutions for real-world users

Visit our Dell Storage User Group website for a schedule of upcoming meetings, registration links, and details about giveaways, contests, food, and more! Please visit us at dellstorage.com/usergroups, or simply scan the QR code below from your smartphone for instant access to the site.

Are you interested in engaging with other Dell storage users, sharing insights into best practices, and hearing the latest innovations that Dell has brought to its storage family? Then we invite you to join the Dell Storage User Group community!

AD_0067_PLE_Storage_Dell_UserGroup_ad.indd 1 4/24/2012 12:04:34 PM

Page 8: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

6 2012 Issue 02 | dell.com/powersolutions

Editor’s comments

Editorial staffEditor-in-chief and publisher Tom KolnowskiManaging editor Debra McDonaldFeatures editor Kathryn WhiteSenior editors Dawn Davidson, James Hurd, Catherine Luo, and Terrence O’DonnellArt director and cover designer David ChanDesigner and illustrator Cynthia WebbCirculation and logistics Sharon Mendoza

Staff writers Romy Bauer, Jeanne Feldkamp, Greg Thomas, and Chris Young

Contributing writers Natasha Bohorquez, Jeremy Bolen, Justin Braun, Christian Childs, Rafael Colorado, Rahul Deshmukh, Jennifer Erickson, Marty J. Glaser, Brian Johnson, Deepak Kanwar, John Karabaic, Bob Laliberte, Reed Martin, Mike Matthews, Lisa Onstot, Muffadal Quettawala, David Schweighofer, Renny Shen, Timothy Sherbak, Maggie Smith, Stanley L. Stevens, Marc Stitt, Patrick Sweeney, Nicholas Sweere, Jack Todd, Tad Walsh, and Sarah Williams

Contributing photographers Tony Bolding, Lee Kirgan, Bryan Kuntz, and Adran Matte

Advertising and sponsorship salesSales director Kyle Walkenhorst (626-396-9400)Sales manager/Western U.S. and South/Central America

sales Shaun Mehr (949-923-1660)Eastern U.S. and Canada sales Steve Branda (201-483-7871)EMEA and APJ sales Mark Makinney (805-709-4745) Advertising sales assistant Cindy Elhaj (626-396-9400)Ad coordinator Catherine Luo

Reader servicesSubscriptions are complimentary to qualified readers who complete the online subscription form. To subscribe to the regular quarterly edition of Dell Power Solutions Magazine, visit the Subscription Center at dell.com/powersolutions. Once there, you can sign up for a new subscription, change your mailing address for a current subscription, or unsubscribe. Going mobile? Visit the digital edition online at zinio.com/powersolutions. For other subscription services, please e-mail our Reader Services team via [email protected].

About Dell Dell Inc., headquartered in Round Rock, Texas, near Austin, listens to its customers and delivers innovative technology and services they trust and value. Uniquely enabled by its direct business model, Dell is a leading global systems and services company and No. 44 on the Fortune 500 list. For more information, visit our Web site at dell.com.

Dell cannot be responsible for errors in typography or photography. Dell, the Dell logo, Dell KACE, Dell OpenManage, Alienware, AppAssure, Aventail, Aventail End Point Control, Clean VPN, Clean Wireless, Compellent, Data Instant Replay, Data Progression, Dynamic Capacity, EPC, EqualLogic, ExpressCharge, Fluid Data, Inspiron, Latitude, Mobile Connect, OptiPlex, PowerConnect, PowerEdge, PowerVault, Precision, Remote Instant Replay, Replay Manager, SonicWALL, Storage Center, Tri-Metal, and XPS are trademarks of Dell Inc. Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others.

Dell Power Solutions is published quarterly by Dell Inc., Dell Power Solutions, One Dell Way, Mail Stop RR3-68, Round Rock, TX 78682, U.S.A. No part of this publication may be reprinted or otherwise reproduced without permission from the editor-in-chief. Dell does not provide any warranty as to the accuracy of any information provided through Dell Power Solutions. Opinions expressed in this magazine may not be those of Dell. The information in this publication is subject to change without notice. Any reliance by the end user on the information contained herein is at the end user’s risk. Dell will not be liable for information in any way, including but not limited to its accuracy or completeness. Dell does not accept responsibility for the advertising content of the magazine or for any claims, actions, or losses arising therefrom. Goods, services, and/or advertisements within this publication other than those of Dell are not endorsed by or in any way connected with Dell Inc.

Copyright © 2012 Dell Inc. All rights reserved.

Printed in the U.S.A.

Cover illustration by David Chan

2012 Issue 2

It was a freeze-frame moment. Our cover illustration for this issue was designed to

evoke the sense of conducting business-centric computing at speed—in fact, very

high speed. As we progressed through the cover concept stage with art director

David Chan, his renderings of a railway passenger at work with the Dell™ XPS™ 13

Ultrabook laptop reminded me of past journeys through a blurred French countryside

aboard the TGV (Train à Grande Vitesse), the country’s high-speed rail service. Sleek,

aerodynamic speed demons—a test version of the TGV has laid claim to the record for

the fastest wheeled train at 357.2 mph.

Conducted in less exotic venues, my recent experiences traveling through an array of

Austin coffee shops, eateries, and office spaces toting Dell’s first Ultrabook nevertheless

revealed some unexpected brushes with sheer speed. Constructed of machined

aluminum and carbon fiber, the XPS checks in as expected: ultraportable, ultrathin,

and lightweight—striking a nice balance between traditional notebooks and tablet form

factors, measuring a mere 6–18 mm thin and weighing less than three pounds.

This particular XPS 13, equipped with an Intel® Core™ i7 processor running at

1.7 GHz, 4 GB of RAM, and a 256 GB solid-state drive, felt purpose-built for speed as

my seat-of-the-pants usage tests quickly demonstrated. With a 64-bit version of

Windows® 7 installed, the XPS awakened from sleep nearly instantly, in something

less than a second (essentially, less time than it took to fully raise the lid). Lightweight

browsers and heavyweight image-editing apps came to life at breakneck speed, with

the Microsoft® Internet Explorer® 9 browser loading to a fully rendered home page in

less than 2 seconds, and Adobe® Photoshop® CS5.1 software launching in less than

5 seconds. When it was time to close the clamshell, the XPS went to sleep instantly.

And a cold boot of Windows 7 took less than 15 seconds to a ready desktop.

Beyond its build quality and speed, for the always-mobile worker there’s more

to like about the XPS 13, including availability of Dell ProSupport services, a bright,

edge-to-edge Corning Gorilla Glass 13.3-inch screen, a glass touchpad with gesture

support, and a compact power adapter. For my next trip aboard the TGV, I plan to

tuck an XPS into my bag.

Ultrabook, ultrafast

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 9: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

The Dell Women’s Entrepreneur Network

The women of Dell Women’s Entrepreneur Network know the importance of networking, in both the

technological and the social sense of the word. They understand that for your business to grow, you need

reliable contacts, but you also need a trusted technology partner and advisor.

Dell addresses both of these needs by enabling female entrepreneurs to innovate while connecting them with

like-minded women who can help them expand their business. It is this winning combination of technology

and intrapersonal support that makes Dell Women’s Entrepreneur Network members some of the most

successful businesswomen in the world today.

4 4 Join our growing LinkedIn community and learn more at dell.com/women.

Sue Chen, founder and CEO of Nova Medical Products and member of the Dell Women’s Entrepreneur Network

The key to a strong businessis a strong network.

Page 10: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

8 2012 Issue 02 | dell.com/powersolutions

Recent citings

Recent

citings

Raft of Dell acquisitions expands business goals, solution offerings

In the first part of 2012, Dell has taken another

giant step forward with an acquisition

strategy aimed to fortify the company’s

position as an end-to-end solutions provider.

Dell is concentrating on growth in four key

business areas: end-user computing, enterprise

solutions, software, and services.

At the Dell Annual Industry Analyst

Conference 2012 last April in Austin, Texas,

Chairman and CEO Michael Dell discussed the

transformation. “During the past five years, we’ve

become a different company. The services and

solutions within Dell have doubled and now

account for 30 percent of our revenue. We

have focused on being an end-to-end solutions

provider for our customers.

“We’re moving from product conversations

with our customers to solutions conversations.

You’ll hear us talk more about the connected

client devices. Then you have the cloud

infrastructure of servers, storage, and networking.

We want to help our customers figure out how

to tap into their data and leverage it. You’ll also

see us focusing on security. You then wrap our

services offering around all of this.”

Recent acquisition activity with AppAssure,

SonicWALL, Wyse Technology, Make Technologies,

and Clerity Solutions has significantly advanced

Dell’s goal of delivering a comprehensive suite of

integrated solutions.

AppAssure

Over the last three years, Dell has expanded

its storage portfolio with a broad range of

products and solutions. Now, advanced backup

capabilities from AppAssure enhance storage

offerings by providing robust protection

for applications and data. This unified

approach to backup, archive, and replication

is designed to support complex virtualized,

physical, and cloud environments.

“AppAssure’s unique architecture

delivers innovative, cloud-enabled backup

and replication solutions designed to meet

the challenges of protecting the explosive

growth of data in both virtual and physical

environments,” said Brad Anderson, president,

Enterprise Solutions Group at Dell. “At a

practical level, AppAssure enables Dell

customers to seamlessly move and replicate

data across our existing platforms—from a Dell™

EqualLogic™ array in a remote office to a Dell

Compellent™ array at a data recovery site.”

SonicWALL

Delivering a wealth of security solutions,

SonicWALL’s portfolio includes firewalls,

secure remote access, e-mail security, backup

and recovery, and policy management and

reporting. SonicWALL® Next-Generation

Firewalls and Unified Threat Management

(UTM) Firewalls complement and broaden

Dell’s enterprise offerings. The acquisition of

SonicWALL expands Dell’s rapidly growing

security software and services portfolio,

which includes cloud security solutions, data

encryption solutions, and vulnerability and

patch management.

“We are building a strategic software

portfolio to address the needs of our customers

with key assets in the fast-growing and highly

profitable IT security solutions business. Our

customers see security as a key IT concern for

the foreseeable future. SonicWALL gives Dell

access to unique intellectual property resources

and technology,” said John Swainson, president,

Dell Software Group.

Wyse Technology

The potential acquisition of Wyse Technology,

a leader in client cloud computing solutions, is

intended to bolster Dell’s end-user computing

business. In certain environments, a virtual

desktop approach allows enterprises to

heighten efficiency and security for managing

user and endpoint devices. The addition of

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 11: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 9

Recent citings

Wyse Technology is expected to expand

Dell’s desktop virtualization capabilities

and provide fresh solutions and services

opportunities for a comprehensive range

of enterprise offerings.

“Desktop virtualization can help

organizations streamline IT management,

improve productivity and security, and

increase cost-efficiency for discrete workloads

or usage scenarios,” noted Jeff Clarke,

president, End User Computing Solutions

at Dell. “The Wyse Technology desktop

virtualization capability complements Dell’s

strongest-ever device and computing

solutions portfolio, and strengthens our

position in offering customers among the

broadest set of computing choices from the

edge to the core to the cloud.”

Make Technologies

and Clerity Solutions

By delivering IT modernization solutions

and services, both Make Technologies and

Clerity Solutions help organizations

transition from inefficient legacy

platforms, such as those based on the

UNIX® OS, to distributed x86-based

systems. The potential acquisition of

Make Technologies is intended to help

reduce the cost, risk, and time required

to re-engineer applications. In addition,

Clerity Solutions enables Dell Services to

help organizations minimize the cost of

transitioning business-critical applications

and data from legacy computing systems

onto advanced architectures, including

the cloud.

The addition of Make Technologies,

combined with Clerity Solutions, is

expected to position Dell as a high-quality

provider for modernizing applications.

Together, the intellectual property, talent,

and capabilities from Make Technologies

Learn more

AppAssure:

dell.com/appassure

SonicWALL:

dell.com/sonicwall

Wyse Technology:

dell.com/wyse

Clerity Solutions:

dell.com/clerity

Make Technologies:

dell.com/make

Dell acquisitions:

dell.com/acquisitions

Transformational journey

Join Michael Dell as he shares his company’s progress in its transformation to an end-to-end solutions provider for enterprises.

qrs.ly/ss1ttxt

“ During the past five years, we’ve become a different company. The services and solutions within Dell have doubled and now account for 30 percent of our revenue. We have focused on being an end-to-end solutions provider for our customers.”— Michael Dell

Chairman and CEO, Dell

April 2012

and Clerity Solutions significantly augment

the applications expertise offered by

Dell Services.

“The addition of Make Technologies

and Clerity Solutions to Dell Services

positions us to lead in the fast-growing

applications modernization space,” said

Steve Schuckenbrock, president, Dell

Services. “We have the capabilities to help

customers with all their modernization

needs—from re-hosting and re-platforming

to code re-engineering. These offerings

enable Dell to support the thousands of

commercial and public sector customers

looking to migrate business-critical

applications to open, standards-based

architectures, including the cloud.”

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 12: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

10 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingCoverstory

Fast forward

Five best practices help CIOs create a user-centric computing

strategy that embraces the brisk rate of technological and cultural

change in an agile, secure framework—with the right personal touch

to inspire productivity gains and business innovation.

By Jeanne Feldkamp, Christian Childs, Jennifer Erickson, and David Schweighofer

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 13: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 11

There’s no time like the present.

Consumerization of IT and

new computing paradigms

are leading to a fundamental

shift in workplace dynamics, transforming

what it means to conduct business as

usual. As IT decision makers plan the

inevitable transition, they have a golden

opportunity to add strategic value by

creating a flexible framework for ongoing

growth and development.

Mobile computing, smartphones,

tablets, and social media have already

created a culture of constant connectivity.

The boundaries between workspace and

personal space are blurring as employees

increasingly work from home or on the

road. Organizations in virtually every

sector—from technology to education to

health care—are evolving as people work,

interact, collaborate, study, and learn in

diverse new ways.

These advances in mobility and

client computing technology bring both

opportunities and risks. On one hand,

allowing employees to use their own

computing devices and work from anywhere

helps foster productivity and collaboration.

It can also be a plus for talent acquisition,

satisfaction, and retention. Engaging with

customers and constituents using their

preferred devices heightens communication

and builds strong loyalty. In addition,

embracing mobile technologies expands

the possibilities to deliver and receive critical

information in challenging settings such as

emergency rooms or field locations.

On the other hand, security concerns

are real. Many authorized users may try

to access enterprise applications and

data using personal devices or unsecured

networks, which can put enterprise data at

risk. But organizations that take a hard-

line approach and ban personal devices

may find that the policy backfires when

end users simply ignore IT rules—creating

significant security vulnerabilities.

In addition, managing diverse devices,

applications, platforms, and operating

systems may strain the resources and

budgets of IT departments. The complexity

introduced by a wide array of devices

and configurations often leads IT staff to

manage systems manually. However, that

strategy may generate a dramatic rise in

help-desk requests and a corresponding

decline in IT department productivity.

Organizations may also incur elevated

telecom costs if end users place phone

calls, conduct video conferences, or send

data from their devices.

The simple reality is that IT

consumerization is here to stay. To avoid

questionable end-user workarounds, CIOs

need to balance end-user access and

productivity with IT control. They need

to help ensure adequate organizational

security. And they need to incorporate a

strategy for managing costs effectively.

To achieve these goals, CIOs need a

long-term, user-centric strategy that

encompasses not just end-user computing

technologies, but also the people and

processes surrounding them.

Implementing five best practices

for end-user computing

Based on input from thousands of

customers and its firsthand internal

experiences, Dell has developed five

best practices to help enterprises create

their own end-user computing strategy.

Organizations can leverage these best

practices to deploy a highly flexible

end-user computing plan over three to

five years in a way that is designed

to ensure robust security and access,

heighten productivity gains, and optimize

IT efficiency. (See the sidebar, “How best

practices can pay off.”)

How best practices can pay offBy applying its end-user computing

best practices internally, Dell has

achieved dramatic results such as

the following:

• 60 percent reduction in

applications under management

• 100,000+ desktops and PCs

standardized on Windows 7

• 25 percent reduction in IT

support costs

• 50 percent reduction in time

required to complete software

imaging

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 14: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

12 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingCoverstory

1. Deploy endpoint devices suited

to individual use cases

The cornerstone of any end-user computing

strategy is to match the right tools with the right

workers. A good first step involves identifying

and understanding individual roles—spanning

executive to entry-level positions, including

contract and part-time employees. By studying

worker responsibilities and methods of

utilizing information, IT decision makers can

determine which technologies and tools best

serve individual needs and assess the level of

access end users require to perform their jobs

effectively. Use cases typically fall into one of the

following five worker roles:

• Deskbound employees typically do basic

computing and have limited mobility needs.

The computing tools they use should be low

cost, durable, and easy to deploy—thin clients,

for example.

• Mid-level professionals have more sophisticated

computing needs and greater mobility than

deskbound employees. Still, low-cost, durable

devices suffice for this group.

• Sophisticated workers such as engineers

and IT staff have advanced and specialized

computing needs. Their requirements make the

availability of specific hardware and software

configurations important drivers of purchase

decisions for this group—along with cost,

durability, and ease of deployment.

• Mid- to senior-level managers use high-

performance, lightweight mobile devices

to stay connected anywhere, anytime.

Style matters to this group. The devices

they use reflect on the company they

represent and are expected to present a

positive image. (See the sidebar, “Ultralight,

ultrapowerful, ultracool.”)

• Niche groups primarily within academic

environments—including teachers, students,

and administrators—need durable, quiet

systems that can be shared with others,

boot up quickly, and include comprehensive

hardware and software support.

Once IT leaders understand their end-

user base, they can determine the mobility

requirements for each worker role. Not every

employee needs the same types of devices—

for example, someone in accounts payable

may need data access and a desktop, while

a field sales engineer may need a tablet

and a smartphone instead. The goal is to

meet the needs of each type of end user in

a cost-effective manner.

Dell offers organizations a range of

alternatives through a comprehensive portfolio

of endpoint devices that are designed to be

open, capable, and affordable. By working with

enterprises to leverage existing assets, Dell

helps organizations avoid vendor lock-in to

proprietary solution stacks.

Ultralight, ultrapowerful, ultracoolThe Dell XPS™ 13 Ultrabook ultraportable laptop is powered

by second-generation Intel® Core™ processors to deliver

uncompromising performance and agility for highly mobile

end users such as executives, sales

professionals, and consultants.

The XPS 13 features a bright,

resilient, 13.3-inch display in a

sleek, durable carbon fiber and

aluminum casing.

At just 6–18 mm

thick and less than

three pounds, the XPS 13 offers the functionality of a full-size,

fully featured laptop. Innovative Intel® Rapid Start Technology™

quickly resumes the XPS 13 from sleep mode, and Intel® Smart

Connect Technology offers a smartphone-like, always-on

experience. Plus, the XPS 13 can be supported by Dell ProSupport

and Dell Configuration and Deployment Services offerings.

Dell XPS 13 Ultrabook: Stylish performer in a remarkably thin and light form factor

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 15: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 13

Lead with end-user computingCoverstory

Dell™ Latitude™ laptops powered by third-

generation Intel® Core™ processors with Intel®

vPro™ technology enable employees to stay

productive wherever they happen to be. The vPro

technology allows IT administrators to manage

these laptops even if the OS is inoperable or

the laptop is powered off. (See the sidebar, “The

anywhere workplace.”) Organizations can acquire

end-user computing solutions through a single

Dell point of contact, leveraging specific use cases

and vertical solutions to expedite deployment and

accelerate migration to advanced operating

systems and applications—helping reduce

downtime and complexity in the enterprise.

2. Secure enterprise data from the data center

to the endpoint

Whether they are motivated by monetary gain

or strategic intent, as in the case of espionage or

activism, security threats continue to morph with

the evolving technology landscape. However,

if measures to protect enterprise assets cause

worker productivity to suffer, the negative effects

can transfer all the way down to the bottom line.

A strong end-user computing strategy should

balance the need for productivity and security,

taking an organization’s risk objectives, cost

restraints, and overall end-user requirements into

account. Security measures should be proactive

and strategic to help reduce risk and protect data

from unauthorized access—from the endpoint

device to the data center.

Because mobile devices exist largely outside

the enterprise firewall, they can create additional

challenges for protecting enterprise application data.

Secure end-user computing requires IT departments

to consider data security, network security, and

access problems as well as device security. Several

best practices help ensure end-to-end security:

• Examine security risk points: These risk points

may be devices, networks, the data center, or

cloud computing environments.

• Consider client virtualization: Deploying

desktop virtualization can benefit groups of

remote end users to help improve network

access security and separate the enterprise

system image from personal use.

• Monitor security status: Implement an

approach that provides security monitoring

and remediation.

• Implement multilayered Web security: This

consideration helps protect the enterprise’s

networks from phishing, spam, and malware.

• Customize the security approach by end-user

type and device type: Organizations that run

Microsoft® Windows® platforms should update

mobile and client technologies to Windows 7

to avoid end-of-life support issues for Windows

XP and simplify OS management. Moreover,

administrators can enhance security measures

in conjunction with Microsoft Windows Server®

2008 R2, taking advantage of security features

such as the Windows 7 AppLocker™ feature,

Dell Latitude E-Family laptops: Designed for long-term reliability and durability in a broad range of working environments

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 16: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

14 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingCoverstory

for example. AppLocker enables IT

organizations to specify which users or

groups can run particular applications

based on unique file IDs.

In addition, potential measures to consider

for endpoint device protection include

the following:

• Programmatic separation of personal

and enterprise data on endpoints:

Consider implementing containers to

protect e-mail and access to business

applications on mobile devices.

• Antivirus and antimalware software

that is up-to-date: Maintaining patch

compliance and software updates can go

a long way toward protecting endpoint

devices and corporate networks.

• Advanced encryption technologies:

Features such as contactless smart

cards and fingerprint readers help

reinforce security measures. And hard

drives are not the only components that

should be encrypted; removable media

devices and backup devices should be

encrypted as well.

• Physical security: Ensure organization-

owned devices are built with the

durability to withstand drops, bumps,

falls, food spills, and the hazards of

remote environments.

• Authentication: When a device is lost

or stolen, its password is one of the

last lines of defense against a security

breach. Organizational policy should

stipulate that endpoint devices are

protected by strong passwords.

Dell offers several security services

to help enterprises protect their data.

Dell SecureWorks provides 24/7 security

monitoring and risk mediation as well as

managed services and consulting to help

organizations address security threats in

heterogeneous environments. In addition,

Dell Data Protection | Encryption (DDP | E)

helps organizations comply with security

regulations and ensure that business-critical

data stays secure by utilizing software

encryption for hard drives and removable

storage devices for client systems. Available as

a nondisruptive endpoint encryption solution,

DDP | E enables IT organizations to deploy

encryption enterprise-wide while enforcing

policies and auditing encryption state.

3. Optimize deployment and management

of endpoint devices

Deployment and management of IT assets

often consume a significant portion of the

IT budget. By simplifying management

of endpoint devices, organizations can

maximize efficiency of an end-user

computing strategy and free up resources

that can be reinvested in innovation.

The process begins with a thorough

infrastructure assessment. As the use of

personal devices in the workplace increases,

the risk of noncompliance and fines grows.

Sophisticated, automated asset management

technology helps accurately assess and report

on IT inventory and license agreements.

A comprehensive asset inventory should

include a tally not only of hardware and

devices, but also of software applications

and license agreements. From the

inventory, IT departments can determine

whether any systems or hardware can

be repurposed, and help ensure that the

organization is in compliance with software

license agreements. An inventory also helps

administrators ascertain whether hardware

is within warranty or approaching the end

of its life cycle, and reveal whether any

hardware is missing from the organization.

With a complete picture of the assets

available to the organization, IT decision

makers can map the appropriate devices

to end-user groups. Dell KACE™ appliances

can assist in this process. Designed to

provide OS-neutral solutions for Apple,

Linux®, and Microsoft Windows operating

systems, Dell KACE appliances enable

enterprise IT departments to discover

assets and seamlessly and centrally manage

Dell OptiPlex™ desktops: Designed to deliver adaptable, intuitive design features that fit specific working styles

endpoints, devices, and servers through

a single, easy-to-use console. In addition,

Dell KACE management appliances

integrate with Intel® vPro™ technology to

enable remote management and recovery

capabilities for Dell laptops even if the OS

is inoperable or the laptop is powered off.

This remote management capability offers

administrators a powerful tool for managing

software distribution, patching, and security

vulnerability remediation while helping

reduce laptop management costs.

With a clear picture of the organization’s

IT assets, administrators can optimize device

deployment and life-cycle management.

Between IT resource time and employee

downtime, deployments can grow

quite costly for each PC. In fact, many

organizations postpone performing a

technology refresh because of resource

constraints. But this approach has potential

costs too; outdated technology and

software can expose the enterprise to

increased risk from security threats.

Automated life-cycle management for

client systems can generate significant cost

savings, which helps enhance security by

removing barriers to updating platforms and

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 17: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 15

software. Automation also helps reduce

the costs of mobile device management

processes. It accelerates user provisioning

and migrations, centralizes mobile device

tracking, helps reduce help-desk costs,

supports customizable user roles that can

be configured to meet specific business

requirements, and enables multiple

connectivity platforms. These connectivity

platforms include mobile broadband, Wi-Fi®,

wireless wide area network (WWAN), and

cloud computing technologies. Each end

user and administrator can be assigned the

permissions they need to execute their job

responsibilities, and all endpoints can be

managed through a single, centralized system.

To manage the entire pool of endpoint

devices without disrupting end-user

productivity, IT departments should establish

a single command center that can be

accessed from any computer. Administrators

should have the ability to remotely manage

the life cycles of all client systems—including

provisioning, configuring, deploying,

managing, updating, and tracking all

endpoints in the organization.

Dell Mobility Solutions helps organizations

capitalize on the opportunities afforded by

mobile technologies while addressing a

comprehensive range of IT challenges. The

Dell Mobility Solutions portfolio includes

the following services:

• Dell Mobile Device Management tracks

and manages the myriad mobile devices

employees bring to work, regardless of

device type or platform.

• Dell Mobile Application Development

offers cost-effective mobile application

development, management, migration

and re-engineering, and testing services.

• Dell Telecom Expense Management

supports cost-effective carrier

management for mobile device

plans through a central repository for

enhanced operational efficiency.

• Secure mobile e-mail, calendaring,

and contact management enables

optimized, policy-based control of

personal and business information.

4. Virtualize the environment based on

analysis of end-user roles

Desktop virtualization infrastructure can

play an important role in a comprehensive

end-user computing strategy. This

framework helps IT departments achieve

cost savings by reducing manual

maintenance of individual PCs. At the

same time, it enhances security through

centralized data storage in the data

center rather than on individual machines.

Desktop virtualization gives IT departments

the tools to manage a digital identity for

each user, limit end-user access according

to organizational policies, and support

flexible access to productivity resources

while helping to reduce exposure to

outside threats.

A virtualized desktop environment also

speeds client deployment and management,

and helps simplify compliance and policy

management. In addition, deploying

desktop virtualization helps IT departments

protect proprietary data without limiting

workforce access, enhance application

performance, and automate backups of

critical enterprise data.

One caveat, however, is that not every

group of end users will benefit from a

desktop virtualization approach. Rather

than introduce the technology enterprise-

wide, CIOs should carefully consider

the usage information gathered prior

to developing the end-user computing

strategy to determine which user types

are well suited for desktop virtualization.

Dell provides a variety of approaches to

desktop virtualization that are designed

to balance IT control and end-user

access while minimizing complexity.

Organizations can leverage purpose-

built hardware, software, services,

and reference architectures through

integrated solution stacks. These solutions

are designed for fast deployment to help

enterprises adapt quickly to the changing

dynamics of a virtual workplace.

5. Develop a strong mobile strategy

A strong end-user computing strategy

embraces the reality that employees

are going to use personal devices in the

enterprise environment. This certainty

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 18: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

16 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingCoverstory

The anywhere workplaceEveryone loves a good-looking laptop that’s built to last. Of course,

polished design is also about fast, flexible performance and secure,

unfettered connectivity—be it from the home office or the road.

And for IT decision makers, it is about the way PCs fit into the overall

infrastructure to heighten process efficiency and simplify management.

The latest Dell Latitude E-Family laptops and Dell OptiPlex

desktop computers with Intel® vPro™ technology cater to end

users and IT organizations alike, with world-class security and

manageability. In addition, their green design principles respect

the planet. For example, next-generation Dell systems are designed

with ENERGY STAR 5.2 efficient power supplies, recycled content in

products and packaging, and voluntary avoidance of substances of

concern and environmentally sensitive materials.

Latitude laptops are built for durability. Their Dell Tri-Metal™ casing,

brushed aluminum finish, reinforced magnesium alloy–wrapped

corners and frame, and strong steel hinges avoid damage from minor

mishaps. A range of specialty models give enterprises options for

integrating multiple computing styles into a single IT infrastructure.

OptiPlex 9010 desktops: Tremendous versatility with wireless connectivity for enhanced collaboration, plus a sleek OptiPlex 9010 All-in-One form factor

calls upon CIOs to develop global policies for personally owned

and corporate devices, establish management and security

practices for the employee-owned devices, and develop a long-

term strategy for managing applications across all device types.

Successful bring-your-own-device (BYOD) policies focus

on data and access security rather than security of the

end-user devices themselves. Security measures can be

implemented from the desktop level through the data center.

Platforms should have the flexibility to support Apple Mac OS X,

Windows, Linux, and Google Android operating systems,

and have the scalability to easily add and support personally

owned devices as they are introduced. In addition, because

BYOD may not be appropriate for every organization, Dell

recommends using controlled pilot programs for the phased

adoption of personally owned devices.

Optimizing productivity and collaboration

without sacrificing security

By embracing mobility and advanced end-user computing

technology, enterprises can heighten productivity, collaboration,

and innovation in an agile, secure workplace. By leveraging the

five field-tested best practices described in this article, CIOs

On the outside, Dell OptiPlex desktops offer a common visual

design that seamlessly integrates into office environments across

multiple models and generations. The OptiPlex family also features

a form factor option that maximizes valuable desk space, such as

the new OptiPlex 9010 All-in-One. And highly accelerated life-

cycle testing for OptiPlex desktops simulates real-world usage to

help ensure lasting durability.

Smart and productive

Dell commercial systems are packed with performance, versatility,

and collaboration features that help end users be more productive

than ever—no matter where they are working, when they are working,

or with whom they are collaborating. Dell Latitude laptops can be

configured with the third-generation Intel® Core™ i5 or Core™ i7

vPro™ processors and feature high-bandwidth memory and Intel HD

Graphics or NVIDIA graphics cards for agile performance.

Workers can stay productive with long-lasting battery life, a

three-year warranty battery option, battery slice option, and the

Dell ExpressCharge™ feature. Latitude laptops also feature adaptive

charge profiles to help maximize battery life. Varied connectivity

options enable employees to collaborate with colleagues and

clients and share data securely. In addition, Dell Latitude laptops

integrate intuitive design features, E-Family–wide intercompatible

docking stations, and backlit keyboards that give end users the

adaptability to fit their personal work styles.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 19: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

can proactively define and implement a user-centric computing

strategy designed to advance their strategic business and

organizational agenda for the Virtual Era.

dell.com/powersolutions | 2012 Issue 02 17

Dell OptiPlex desktops deliver agile performance to match end-

user productivity requirements. The Dell OptiPlex 9010 is a powerful

desktop computer designed for demanding business use, offering

up to 2 TB storage, high-bandwidth Double Data Rate 3 (DDR3)

memory, and graphics card options to enable exceptional graphic

performance for creative multimedia projects.

The flexible Dell OptiPlex 9010 All-in-One is packaged in an

elegant, compact form factor designed to enhance productivity,

collaboration, and management. OptiPlex desktops also help

workers maximize productivity, collaboration, and innovation with

their 23-inch display, optional Webcam, and support for Video

Electronics Standards Association (VESA®) mounting.

Efficient management and security controls

Dell client systems are built to enable confident security and cost-

efficient manageability, and comprehensive service and support

features elevate efficient IT control and management. In addition,

Intel vPro technology offers efficient out-of-band management

and embedded security to help effectively manage threats, control

access, and protect data. IT departments can also help safeguard

data and meet compliance regulations with Trusted Platform

Module (TPM), Dell Data Protection | Encryption, encrypted hard

drive options, and contactless smart card and fingerprint reader

login access options. These security features make this generation

of Latitude laptops tremendously secure.

Long life cycles and managed transitions for Dell products enable

long-term stability that helps save time and conserve IT budgets. Dell

Latitude E-Family laptops are backed by a wide range of customizable,

globally focused services and support. Custom Factory Integration

includes custom configuration, consolidation, and integration that

allow IT organizations to deploy systems directly out of the box. And

Dell Asset Resale and Recycling services helps organizations protect

sensitive data and recycle components responsibly.*

Latitude E6430 laptop: Wide-ranging mobility with LTE mobile broadband through Verizon and significantly enhanced battery life with select battery options

Latitude E6330 laptop: Rich, comprehensive features including an optical drive in an extremely compact form factor

Latitude E6230 laptop: Smallest E-Family form factor that slips into a business-class docking station

Latitude E6430s laptop: Innovative integration of a 14-inch display in a 13-inch form factor

* For information on Dell Services support for end-user computing, see “Streamlining PC life-cycle management,” by Jack Todd and Natasha Bohorquez, in Dell Power Solutions, 2012 Issue 2, qrs.ly/pn1tui1.

Learn more

Dell Latitude laptops:

dell.com/latitude

Dell OptiPlex desktops:

dell.com/optiplex

Authors

Jeanne Feldkamp is a business and technology writer based

in San Francisco.

Christian Childs is manager of the End User Solutions Marketing

for Commercial Business team at Dell.

Jennifer Erickson is director of the End User Computing Marketing

for Large Enterprise Business team in North America at Dell.

David Schweighofer is the global outbound messaging manager for

Dell Latitude laptops and Dell OptiPlex desktop computers on the

Product Group Marketing team.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 20: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Lead with end-user computingFeaturesection

18 2012 Issue 02 | dell.com/powersolutions Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Traditionally, specialized service

providers such as hospitals,

power plants, and call centers

have needed to operate

24 hours a day. However, today it seems

many organizations have employees and

contractors that require access to work

and business data around the clock. To

meet the needs of increasingly diverse

global workforces, branch offices,

remote and mobile workers, seasonal

workers, and contractors, IT departments

today seek innovative approaches to

streamline resource management and

improve uptime access.

The attendant proliferation of

Ultrabooks, tablets, and smart devices,

meanwhile, is increasing the need to

enhance security around the anytime,

anywhere resources that workers

increasingly expect. These converging

trends are leading IT executives to seriously

consider desktop virtualization1 and

explore possibilities such as cloud-based

desktop-as-a-service (DaaS) solutions.

While some CIOs and IT decision

makers may have considered DaaS

to be risky just a few years ago, many

enterprises are growing increasingly

comfortable with cloud-based DaaS

providers. Other IT organizations are

considering DaaS deployments after

successful proof-of-concept tests

enhanced user productivity and data

security. For IT managers, DaaS can

minimize downtime, streamline IT

resource management, and shift future

depreciating capital expenses for

hardware and software to a predictable

service-based operating expense.

Demand for DaaS is growing in a

variety of segments, and not only among

startups hoping to avoid IT infrastructure

costs or enterprises that would like to get

out of IT management and infrastructure

maintenance altogether. Educational

institutions, health care organizations,

and others are also contributing to the

growth in hosted desktop virtualization

environments. As a result of this demand,

several vendors have launched desktop

virtualization services. Dell, in partnership

with Desktone, offers a cost-effective

cloud-based solution that avoids the

traditional complexity of deploying and

managing virtual desktops and enables

scalability and rapid provisioning to

accelerate deployment.

Global workforces are driving the demand for anywhere, anytime, any-device

computing. Dell now offers two feature-rich, cloud-based delivery models

to enhance productivity, streamline resource management, and advance

innovative support capabilities.

By Reed Martin

Enhancing productivity with desktop as a service

1 For more information on desktop virtualization, see “Accelerating desktop virtualization gains,” by Rafael Colorado and Reed Martin, in Dell Power Solutions, 2012 Issue 2, qrs.ly/4v1q9ep.

Page 21: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Lead with end-user computingFeaturesection

dell.com/powersolutions | 2012 Issue 02 19Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

As DaaS has evolved, it has become a compelling

option for many IT decision makers, who no longer

view the shift from local server-endpoint computing

to cloud-hosted DaaS as risky or limited. Cloud-based

DaaS provides organizations of all sizes the capability

to meet diverse end-user needs with a security-

conscious, flexible approach. Dell is leveraging its

investment in this arena with expertise across its range

of hardware, software, networking, and services to

create Simplified and Enterprise DaaS environments.

Dell also provides best-practices guidelines to help

decision makers choose hosted environments

that are well suited to specific requirements for IT

management and end-user productivity.2

In addition, Dell End User Computing Services helps

executives and IT decision makers maximize their DaaS

deployments to evolve their business and achieve goals

and objectives. When developing its End User Computing

Services, Dell utilized its own internal IT experiences,

significant proof-of-concept testing at Dell global solution

centers, and real-world experience in supporting a

wide range of DaaS implementations for organizations.

Dell provides consulting to assess the strengths and

weaknesses of their hardware, applications, systems, and

processes to determine what organizations need to meet

their end-user computing goals. The Dell approach to

integrated consulting enables organizations to deploy

powerful end-user computing capabilities quickly, to help

reduce complexity, and to minimize the risk of downtime.

Shifting capital expenses to operating expenses

One of the benefits of DaaS is the opportunity to

shift capital expenses to operating budgets. Many

enterprises hope to avoid procuring additional servers

and storage to expand their operations or to add

capacity to support end-user fluctuations in seasonal

workers, remote workers, or regional contractors.

Other organizations need to enhance capabilities

such as high availability, streamlined OS maintenance,

or endpoint management, while others would like to

improve data security without having to rip and replace

existing server, storage, and networking hardware.

Only rarely can organizations reclaim significant

space in their data centers by migrating computing

resources off-site. However, DaaS can minimize

capital expenses by limiting the need to invest in data

center upgrades and the additional power and cooling

systems that may be necessary for some components.

Inherently, the advanced cloud computing infrastructure

and maintenance needed to support DaaS are leased to

organizations on a utility consumption model.

DaaS implementations also help fundamentally

improve the economics of business startups.

For example, the significant capital outlay for an

IT infrastructure can be an obstacle for many

entrepreneurs. However, founders and developers

can now launch their operations with minimal capital

risk by utilizing subscription-based delivery of their

computing needs at significantly reduced cost, instead

Figure 1. DVS Simplified and Enterprise variants for flexible, hosted DaaS delivery

On

pre

mis

esD

eskt

op

as

a se

rvic

e

DVS Simplified appliance

Customer managed

DVS Simplified

DVS Enterpriseintegrated solution stack

SimplifiedSimple IT infrastructure

EnterpriseAdvanced IT infrastructure

• Cost-e�ective delivery• Fast implementation• Straightforward functionality• Plug-and-play capability• Easy management

• Enhanced scalability and performance• Customizable and extensible infrastructure• Comprehensive imaging and systems management capabilities

Dell managed

DVS Enterprise

2 For more information on opting for a virtual DaaS solution to meet organizational needs, see “Assessing a desktop virtualization strategy,” by Reed Martin, in Dell Power Solutions, 2012 Issue 2, qrs.ly/lz1r7ze.

Page 22: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Lead with end-user computingFeaturesection

20 2012 Issue 02 | dell.com/powersolutions Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

of procuring depreciating hardware and hiring the

IT staff to manage it. As a result, DaaS is expected

to contribute to the ongoing democratization of IT:

an entrepreneur with vision and access to funding

can obtain computing capabilities that once

required significant startup capital or the support

of venture capital investment. In turn, lowering the

barrier to entry helps spur innovators—enabling

them to develop and release new technologies

with fewer obstacles.

Easing the transition to cloud-based

desktop virtualization

Dell helps simplify the transition to DaaS by

creating a path for organizations to migrate their

data streams to its cloud-based services. By

applying its Desktop Virtualization Solutions (DVS)

Group portfolio and End User Computing Services

approach to Simplified and Enterprise DaaS

delivery, Dell enables organizations to subscribe to

a range of flexible, highly scalable options that fit

their individual business needs (see Figure 1).

Organizations that prefer to manage their

own virtual desktops can control the OS, their

applications, and all patching and upgrades through

a self-service portal using Dell Simplified DaaS.

IT administrators can simply enter their business

information, create a golden image, assign their

virtual machines, and be up and running.

A K–12 school district provides an excellent

use case for implementing the Simplified

approach to DaaS. The school district may prefer

to avoid managing servers but still maintain

control over its operating systems and software.

The Simplified DaaS model allows administrators

to control their desktop images without having to

rely on an additional layer of management to

interact with the servers in the data center.

Dell Enterprise DaaS delivery—a comprehensive

Dell-managed offering—is available as a

reference architecture that can be used for

large-volume custom deployments. For the

Enterprise DaaS variant, Dell manages the OS,

applications, patching, and all upgrades in a

single golden image, allowing IT professionals

to focus resources on other strategic initiatives.

Dell End User Computing Services creates the

blueprint and benchmarks the organization’s

existing requirements to profile their end-user

base, applications, application update schedule,

and customer databases to design an optimized

solution that meets their requirements. This

effort includes using Dell ProConsult services to

profile the end users and create a smooth path

for data migration from the data center to the

virtual environment. Further, virtual machines

and memory capacity can be added with only

a one-time cost in both the Simplified and

Enterprise DaaS variants.

Both DaaS variants help organizations support

mobile device initiatives in which employees can

bring their own tablets and laptops to work. The

Simplified and Enterprise DaaS options streamline

new OS deployments across multiple endpoint

devices and help reduce the overall cost of

desktop management. These DaaS options also

enhance security because the organization’s

data never resides on the endpoint device but

is instead stored in the data center. In addition,

both DaaS variants allow organizations to stand

up virtualized desktops for seasonal workers and

contractors using the workers’ own PCs and

without having to issue any new devices.

Boosting end-user productivity cost-effectively

Dell is able to leverage its industry experience

and expertise in servers, thin-client hardware,

software, data centers, networking, and services

to deliver an end-to-end approach to DaaS. Its

Simplified and Enterprise variants can meet the

needs of end users in diverse workforces and help

the IT departments supporting them by offering

cloud-hosted environments that help improve

productivity, enhance security, and streamline

management of IT resources.

Implementing DaaS not only enhances end-

user productivity, it enables IT administrators to

minimize downtime, maximize IT effectiveness,

and control costs in today’s challenging economic

climate. Dell continues to draw on its firsthand

experience and well-designed blueprinting program

to help IT executives transition to a secure, hosted

infrastructure. As confidence in cloud-based services

continues to grow, flexible Dell DaaS environments

are expected to be a compelling option to serve a

range of organizational needs.

Author

Reed Martin is a technology

marketing senior advisor in the

Desktop Virtualization Solutions

Group at Dell.

Learn more

Desktop virtualization solutions:

dell.com/virtualdesktops

Page 23: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

NETWORK SECURITY

SECURE REMOTE ACCESS

WEB AND E-MAILSECURITY

POLICY AND MANAGEMENT

BACKUP ANDRECOVERY

DYNAMIC SECURITY FOR THE GLOBAL NETWORK

[ TOUGH QUESTION #21]

WHO HAS THE HIGHEST OVERALL PROTECTION NEXT-GEN FIREWALL RECOMMENDED BY NSS LABS?

According to the highly respected NSS Labs, “For high-end multi-gigabit environments looking to upgrade defenses from their current firewall to a next-generation firewall, the advanced architecture of the SonicWALL® SuperMassive™ E10800 running SonicOS 6.0 provides an extremely high level of protection and performance. Those that consider the SonicWALL brand to be associated only with SMB UTM products will need to reevaluate their opinion.” We couldn’t agree more.

Get SuperMassive performance from your Next-Gen Firewall. Visit sonicwall.com/nss to learn why NSS Labs rated us so highly.

SONICWALL

ENTERPRISE.SECURES THE

2012 Next-Generation Firewall Security Value Map™ provided by NSS Labs—a third party, global leader in independent security product testing and certification (nsslabs.com).©2012 SonicWALL, Inc. SonicWALL and the SonicWALL logo are registered trademarks of SonicWALL, Inc.

Page 24: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

22 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Organizations today encompass

a diverse range of end users,

from mobile and remote

employees using laptops and

smart devices to task workers performing

routine, relatively predictable processes.

Implementing a single approach to desktop

virtualization may be an unrealistic goal for

meeting the different requirements of these

end users. Now, IT organizations have the

opportunity to deliver the right desktops

and applications for each end user, while

addressing IT priorities such as cost,

security, and ease of management.

As the technology matures, some

organizations have maintained a wait-and-

see approach because of perceptions that

the technology is complex and lingering

concerns about data security, deployment

performance, cost, and complexity. At

the same time, many IT decision makers

are accelerating adoption of desktop

virtualization as the technology reaches

an inflection point based on migration

of consumer devices into enterprise

environments, increased deployment of

thin clients, server virtualization, and

cloud computing.

To facilitate the decision making with

deployments that were more predictable

than was previously possible, a powerful

portfolio of desktop virtualization offerings is

available from the Dell Desktop Virtualization

Solutions (DVS) Group. These offerings are

available in two primary variants—Simplified

and Enterprise. They target infrastructures

of varying scope, from the fast-and-easy,

deploy-and-manage characteristics of the

DVS Simplified solution to the increasingly

robust and demanding environments well

served by the DVS Enterprise solution.

Accelerating desktop virtualization gains

Converging trends toward consumerization, thin-client

deployment, enhanced security requirements, and wide

adoption of cloud-based services are driving increased

interest in desktop virtualization.

By Rafael Colorado and Reed Martin

Page 25: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 23

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

In addition, the Simplified and Enterprise

models offer on-premises as well as hosted

delivery to meet specific organizational

requirements. Dell provides preconfigured,

end-to-end infrastructure by leveraging its

expertise in servers, storage, networking,

clients, software, and services. And for

organizations that prefer to outsource

their entire desktop virtualization operation,

DVS offers a virtual desktop-as-a-service (DaaS)

platform founded on the Dell-provided

powerful data center network and Dell

investments in the cloud.

Centralizing device deployment

and management

After achieving widespread success in server

deployments, IT organizations are now

expanding virtualization to the end-user

computing environment. Desktop virtualization

enhances anywhere, anytime access to

resources for executives, employees, and

contract workers as well as students, health

care professionals, and other segments.

Given the growing influence of consumers,

IT organizations must balance end-user

needs with their own control and efficiency

requirements as they manage a range of client

desktops, laptops, and handheld devices.

A virtual desktop infrastructure (VDI) is

one of many desktop virtualization options.

It enables enterprises to cost-effectively

centralize desktop and mobile device

deployment and management. VDI is a form

of desktop virtualization in which the desktop

OS is hosted within a virtual machine running

on a server in a data center. A VDI strategy

helps improve security and regulatory

compliance, increase IT flexibility and business

agility, and strengthen business continuity

and disaster recovery.

Adoption drivers for desktop virtualization

can be categorized into four groups (see

Figure 1). The Dell DVS Group—composed of

virtualization experts who can perform in-depth

assessments of desktop environments—offers

an approach that is aligned with these

emerging demands. Successful deployments

start with evaluating desktop usage in the

organization and identifying target end

users who may benefit immediately from

desktop virtualization.

Understanding adoption indicators

for desktop virtualization

Although the concept is not new, the following

four converging indicators have quickened the

pace of VDI adoption: progression of desktop

virtualization technology, consumerization,

acceleration of thin-client deployment, and

wide adoption of server virtualization and cloud

services. According to IDC, the total number

of virtual desktop seats shipped is estimated

to grow from 11 million in 2010 to 37 million

by 2014, which represents 7 percent of all

enterprise-installed PCs1—meaning traditional PCs

should continue to make up the majority of the

enterprise client world for a long time. Although

these growth projections are a good indicator

of intensifying desktop virtualization penetration,

a series of industry developments points to the

2012 time frame as a possible inflection point

for VDI adoption.

ObjectivesVirtualized desktop benefits during a 12-month period*

Enhanced end-user productivity

• Enable the mobile workforce• Accelerate availability of applications

and performance• Enhance service-desk support

23.4 percent reduction in desktop downtime

Improved security

• Help ensure regulatory compliance• Control access to data flow• Provide virus protection• Help secure data records

76.7 percent reduction in average time to recover from data loss

Efficient data center management

• Enable OS migration, patching, and deployment• Help reduce downtime• Offer easy data backup

20.0 percent reduction in time for routine maintenance

Augmented cost control

• Extend desktop refresh cycles• Provide desktop support cost• Offer desktop scalability

11.7 percent reduction in desktop support spending

* Source: “Analyst insight: Measuring the returns from a desktop virtualization program,” Aberdeen Group, Inc., September 2011.

Figure 1. Desktop virtualization adoption drivers and associated benefits compared to nonvirtualized desktops

1 “Market analysis perspective: Worldwide enterprise virtualization software – client virtualization,” by IDC, Doc #227494, March 2011.

Consumerization in the enterprise

As consumer devices flood into the workplace, organizations require flexible IT environments designed to enhance end-user productivity. This video explores how IT decision makers can design and implement VDI deployments tailored to meet specific end-user needs.

qrs.ly/mq1tjdk

Page 26: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

24 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Indicator 1: Progression of desktop

virtualization technology

A prominent indicator of accelerated VDI

adoption is the degree to which new

technologies attract innovation and capital.

This metric is increasingly valid during

periods in which the economy is stressed

and investors are less risk-tolerant than in

better economic times.

Pillars of expertise can be used to

classify and filter these investments. The

following pillars are defined as key factors

IT managers need to consider when

deploying desktop virtualization. Pillars

of expertise define industry sectors

with high influence on the growth of

VDI because of their emphasis on areas

critical to the end-user experience,

cost, or efficiency:

• Delivery systems: Innovation that

facilitates the hosting and delivery of

virtual desktops, applications, and data

including DaaS and appliances

• Brokering and session management:

Efficient management and allocation

of virtual machines

• User experience: Policy and

personalization management

• System monitoring: End-user and

infrastructure performance management

• Endpoint devices: Terminals used as part

of desktop virtualization approaches

• VDI management and storage

optimization: Image and storage

efficiency management

• Security features: Enhanced protection

of confidential data in the data center, on

the network, and at endpoints

• Data center infrastructure: On-premises

data center hardware including servers,

storage, and networking

• Services: Expertise brought to the

organization to facilitate sizing,

configuration, deployment, and

management of the environment

Several organizations that were

founded or aligned through acquisitions

toward desktop virtualization during a

10-year span are shown in Figure 2. After

an early cycle of innovation, acceleration

of investment toward the end of the same

10-year span was evident, which supports

the increased total available market that

typically precedes acceleration in the rate

of adopting new technologies.

Indicator 2: Consumerization

As consumerization transforms large

sectors of the workforce, the proliferation

of advanced smartphones, tablets, and

other mobile devices is motivating IT

departments to redefine policies that

support employee-owned technology

in the workplace. Desktop virtualization

is expected to both drive and derive

benefits from this trend. It enables

a secure separation of personal and

organizational workloads while allowing

the coexistence of personal and work

environments on the devices end users

prefer (see Figure 3).

To balance the sometimes

conflicting goals of end users with the

important security, management, and

resource constraints of organizations,

IT departments are opting to deploy

desktop virtualization to enable the

productivity benefits of consumerization.2

These virtualization approaches require

deployments that include hardware,

software, and services with predictable

cost and performance to help achieve

successful deployment.

Indicator 3: Acceleration of

thin-client deployment

The growth of thin-client devices can

arguably be correlated with the growth of

interest in hosted desktop virtualization

models such as VDI. Thin clients are

not the only device option for hosted

desktops; PCs can be used in many

virtual desktop deployments. However, as

organizations realize the benefits of thin

clients—including device management,

power consumption, and cost—thin

and zero clients are being increasingly

Figure 2. Organizations investing in desktop virtualization between 2000 and 2010

2000 2010

Wyse Technologyacquires NetierTechnologies

AppSensefounded

Microsoft launchesTerminal Services

MokaFivefounded

VMware launchesVDI suite

2005Virtual Bridgesfounded

2005

Citrix Systemslaunches Citrix

XenDesktop® software

Desktonefounded

Kavizafounded

AtlantisComputing

founded

Xangatifounded

vComputefounded

UnideskCorporation

founded

Red Hatacquires

Qumranet

LiquidwareLabs founded

Delivery system

Brokering and session management

End-user experience management

VDI management and storage optimization

Endpoint device

Monitoring

Dell launchesthin clients

Citrix SystemsacquiresKaviza

Citrix Systemsacquires

RingCube

VMwareacquires

RTO Software

Dell launchesdesktop as a

service

2“Consumerization of IT: An IDC survey,” by IDC, Doc #227925, April 2011.

Page 27: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 25

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

used in virtual desktop deployments

or replacing repurposed PCs as they

approach the upgrade cycle. This

association highlights the correlation

between heightened adoption of

thin-client technology and hosted

desktop solutions. Dell offers a range of

thin-client devices as part of its end-to-

end desktop virtualization portfolio.

Indicator 4: Wide adoption of server

virtualization and cloud services

IT departments tend to be increasingly

tolerant of consumer cloud services from

organizations such as Amazon, Google, and

Microsoft. According to IDC, 93.6 percent

of respondents surveyed are “proactively

moving forward or still evaluating the

idea” of adopting cloud services in their

organizations, while only 6.4 percent of the

respondents reported they “have no plan to

utilize cloud in any fashion.”3

Accelerated adoption of desktop

virtualization and the openness of IT

departments to allowing access to

applications through cloud services

are creating a fertile environment that

stimulates further interest in virtual

desktop technologies.

Scaling desktop virtualization

for specific needs

Dell has considerable experience and

expertise developing desktop virtualization

solutions by investing resources ahead

of the industry adoption curve. The result is

a well-implemented, mature portfolio that

leverages this expertise and investment

in data center hardware, software,

endpoints, and services. Dell helps reduce

complexity and improve predictability of

each deployment by creating end-to-end

solutions that scale according to the

needs and expansion goals of each

organization and help maximize productivity

for IT departments and end users.

No single desktop virtualization

approach can serve the needs of all

organizations in the same way. Based

on global quantitative research and

use-case expertise acquired during

customer engagements, the Dell DVS

Group identified common patterns in two

segments. Dell targets organizations having

simple IT needs with the Simplified line of

solutions and presents organizations with

large enterprise data centers and diverse

IT requirements with the Enterprise line of

solutions (see Figure 4).

The Simplified line of solutions

includes plug-and-play appliances

that are easy to install and operate for

organizations preferring to manage their

own desktops. The Enterprise line of

solutions is designed to scale to more

than 5,000 users, with enhanced levels of

redundancy, availability, management, and

mobility. On-premises Enterprise solutions

60

50

40

30

20

10

0

Pe

rce

nt

of

resp

on

de

nts

Not supported

Source: “Consumerization of IT: An IDC survey,” by IDC, Doc #227925, April 2011.

Not supportedtoday, butevaluating

Plan tosupport inthe future

Alreadysupported

Employee-owned, Microsoft® Windows® OS–based laptops

Apple laptops

Apple iOS devices

Google Android–based devices

BlackBerry devices

Windows Mobile OS–based devices

n = 490

Figure 3. Adoption of end-user devices and supporting technology

Figure 4. Dell desktop virtualization delivery systems

SimplifiedSimple IT infrastructure

Dell cloudinfrastructure

On

pre

mis

es

De

skto

p a

s a

serv

ice

Customer infrastructure

Dell hostedCustomer managed

Dell hostedDell managed

DVS Simplified appliance

DVS Enterprise 6010

Optional Dell-managed services

EnterpriseAdvanced IT infrastructure

3 “Consumerization of IT: An IDC survey,” by IDC, Doc #227925, April 2011.

Page 28: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Lead with end-user computingFeaturesection

include a preconfigured and pretested

infrastructure comprising the entire

virtualization stack: server, networking,

and storage using either industry-leading

VMware® or Citrix® software along with

Dell Services to design, implement,

and support the overall infrastructure.

Additionally, DVS leverages Dell

investments in data centers worldwide

to offer compelling DaaS approaches for

both the Simplified and Enterprise delivery

models for organizations that prefer to

outsource hosting of their virtualized

desktops to Dell data centers.

Delivering end-to-end desktop

virtualization

Converging indicators reveal the uptake

in demand for desktop virtualization. This

demand is being fueled by innovations in

virtualization technology and adoption

of adjacent technologies that are helping

improve end-user and IT productivity.

Many organizations are looking for end-

to-end approaches that help reduce

deployment complexity and enable

predictable outcomes through a diverse

portfolio with the flexibility to meet

specific requirements.

In anticipation of this shift in

demand, and leveraging its expertise

in hardware, software, and services,

Dell created an organization dedicated

to streamlining desktop virtualization

deployments by delivering a portfolio

of end-to-end solutions. This Dell™

desktop virtualization portfolio—available

in Simplified and Enterprise segments—

effectively addresses the diversity

of organizations.

Learn more

Desktop virtualization solutions:

dell.com/virtualdesktops

Authors

Rafael Colorado is director of marketing for

the Desktop Virtualization Solutions Group at

Dell. The group is responsible for creating and

communicating desktop virtualization strategies.

Reed Martin is a technology marketing senior

advisor in the Desktop Virtualization Solutions

Group at Dell.

Ethernet. Unbound.

© 2012 Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks or registered trademarks of the Intel Corporation or its subsidiaries in the United States and other countries.

Intel® Ethernet Network Daughter Card

I350-T4

Intel® Ethernet Network Daughter Card

10G X520 KR

Intel® Ethernet Network Daughter Card X540-T2 and I350-T2

To learn more, read the article on page 76 and visit www.IntelEthernet-DellPS.com

Introducing the new Intel® Ethernet LAN on Motherboard options for the Dell™ PowerEdge™ Select Network Adapter family. Smartest choice for virtualization performance or simplest route to a fully flexible unified network? Actually, both.

Page 29: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. dell.com/powersolutions | 2012 Issue 02 27

Many IT organizations have

learned a lot about desktop

virtualization during the first

half of 2012,1 but the process

of designing, purchasing, and deploying an

effective desktop virtualization environment

can still seem complex and challenging

to IT decision makers. Organizations

looking to acquire the benefits of desktop

virtualization—enhanced data security,

centralized management, and increased

user flexibility among other benefits—can

become frustrated because the optimal

transition path is often elusive. The Dell

Desktop Virtualization Solutions (DVS)

Group provides a supportive, advisor role to

help organizations clarify which approach

to desktop virtualization is well suited for

their specific deployment requirements.

The number of desktop virtualization

options available to organizations today

often creates uncertainty about the

technology’s ability to meet the needs of

each organization within existing budget

constraints. To help reduce this confusion,

the Dell DVS Group has created a decision

tree to guide IT decision makers toward

optimal desktop virtualization deployments

through either on-premises or cloud-based

delivery (see Figure 1). The DVS portfolio

decision tree also helps organizations

eliminate several misperceptions about the

drivers that should inform their decisions.

Finally, it enables IT organizations to

determine which variant can meet their

service-level needs while addressing their

questions about running proof-of-concept

tests and later, comprehensive deployments.

Setting the right course

The Dell DVS portfolio decision tree guides

IT administrators through the evaluation

process and helps them determine how

to align a desktop virtualization test and

deployment with their required level of

Before transitioning to a virtual desktop environment, IT

decision makers often consider its many challenges and

benefits. The Dell Desktop Virtualization Solutions Group

offers a decision tree for matching an organization’s needs

to a delivery model.

By Reed Martin

Assessing a desktop virtualization strategy

1 For more information on desktop virtualization adoption, see “Accelerating desktop virtualization gains,” by Rafael Colorado and Reed Martin, in Dell Power Solutions, 2012 Issue 2, qrs.ly/4v1q9ep.

Lead with end-user computing Featuresection

Page 30: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

28 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

IT management. The DVS Group has

developed two clear paths to adoption—

Simplified and Enterprise. These delivery

models can be deployed on premises

or hosted on the Dell™ cloud platform,

depending on end-user needs, specific use

cases, and organizational goals.

The first step for an organization is to

decide whether the needs of its IT staff

and the computing needs of its end-

user base fit the Simplified or Enterprise

category. The second step is to then

decide whether an on-premises or cloud-

hosted delivery model is well suited to

those parameters. The relative skill level

of an existing IT staff and its ability to

integrate desktop virtualization into the

existing network is a key determinant in

whether an organization is well aligned

with the Simplified or Enterprise path.

An organization with a generalist IT staff,

or one that hopes to accelerate time

to deployment, is more likely to be in

the Simplified category. Conversely, an

organization with a highly skilled IT staff

that can focus on integrating desktop

virtualization may be well aligned with the

Enterprise variant.

The Simplified option can reduce

the initial time required for installation

and getting the virtualized environment

up and running. This variant is also

particularly suitable for organizations that

do not require advanced features such as

image management, graphics processing

virtualization, application virtualization,

or application streaming. The Simplified

variant can be adopted by organizations

that are comfortable with basic failover

capability rather than high availability, as

well as those that do not require dynamic

motion of virtual machines. Organizations

can also utilize the Simplified variant when

planning to use mainly nonpersistent

virtual desktops. And it can be used by

organizations that do not anticipate

an upgrade to a comprehensive virtual

desktop infrastructure (VDI) experience,

such as the Citrix® XenDesktop® or

VMware® View™ desktop virtualization

environment, or when IT budgets are

significantly constrained.

Despite a common misperception

that either low seat counts or use cases

with low I/Os per second (IOPS) are the

primary drivers for the Simplified delivery

option, this variant offers a suitable desktop

virtualization option for organizations

requiring simple deployment and

management. The Simplified option can be

well suited for IT organizations hoping to

deploy a plug-and-play Simplified appliance

in an environment that does not require

networking, storage area network arrays,

separate management and host servers, and

multiple management consoles. Examples

of successful use cases for the Simplified

delivery model include call centers,

Figure 1. The Dell DVS portfolio decision tree for mapping a course to desktop virtualization

Analysis ofworkload demands

Yes

A few simpleapplications and asingle virtualization

technology

Yes

Limitedcustomization and

accelerateddeployment

Yes

Onpremises

Yes

Capitalexpense

Yes

Appliance

No

No

No

No

No

Simplified

Yes

Yes

Yes

Capitalexpense

Yes

Integratedsolution stack

No

No

No

No

Desktop asa service

Enterprise

Limitedcustomization

Hostedapplication

Cu

sto

m

Yes

Others

Onpremises

Extensivecustomization

required

Complex setof applications

Desktop asa service

Limited ITresources and noVDI experience

On premises

Dell cloud

Page 31: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 29

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

university libraries, small laboratories,

branch offices of large enterprises, help

desks, select government agencies, or order

processing environments.

The Enterprise delivery model is

recommended for organizations seeking

to handle a wide range of compute

tasks, or those organizations running

workload-intensive applications, requiring

high availability, and considering large-

scale deployments of more than 1,000

end users. However, small organizations

with compute-intensive needs may also

benefit from the Enterprise variant given

its capabilities.

Once IT organizations have determined

their specific desktop virtualization

requirements, the next step is to establish

a delivery method that helps them meet

those computing needs. The Simplified

and Enterprise options can utilize

hardware residing in an organization’s

data center or deliver virtual desktops

through a Dell cloud–based, desktop-as-

a-service (DaaS) arrangement.2

The appropriateness of delivery

options may be governed by regulatory

requirements with strict parameters for

sensitive data storage. As a result, IT

decision makers at hospitals, medical

offices, and financial services institutions

need to house delivery in their own

data centers to comply with regulations

mandating the protection of medical and

financial records. Organizations not facing

such constraints may opt for DaaS delivery

from the Dell cloud platform.

Evaluating workloads and benefits

Some key decisions represented in the

decision tree are driven by the workloads

in an organization. The Simplified path

can be suitable for organizations that

require only a handful of applications

with relatively low application demands

to run on kiosks or in a call center

environment. Similarly, the branch office

of a large enterprise seeking fast-and-

easy deployment can also use the Dell

on-premises Simplified appliance to get the

office’s desktop computing infrastructure

up and running quickly and efficiently.

Organizations that require a high level

of persistence, storage optimization,

personalization, and the ability to

maintain user preferences can opt

for the Enterprise variant. It allows for

including third-party technologies

such as acceleration cards to enhance

video streaming capabilities. It is also

appropriate for integrating legacy

equipment such as storage arrays and

specific top-of-rack networking. The

Enterprise model is well suited for

complex workloads that may require

additional processor, memory, and

storage resources.

Whichever model IT organizations

adopt, many have the opportunity to

forgo IT management, including server

deployment, IT help-desk staffing, and

endpoint repair. In these cases, Dell-

hosted DaaS offerings and thin-client

devices enable enterprises to access virtual

desktops from the Dell cloud platform

and redirect IT workers toward strategic

projects. DaaS also enables organizations

to shift computing costs from capital

expenses to predictable operating

expenditures, thereby avoiding costly

investments in server infrastructure. Dell

cloud-based DaaS also enables more rapid

deployment than in a typical hardware

procurement cycle.

The on-premises Simplified option

provides an appliance designed for

rapid deployment in a network within

organizations staffed by IT generalists

and running basic applications with

low IOPS demands. The on-premises

Enterprise option offers sophisticated

delivery for organizations that staff IT

specialists. This option is geared for

deployment in environments that require

advanced management feature sets and

an increased level of high availability,

persistence, and redundancy. As a Dell

cloud–based service, the Simplified DaaS

option offers organizations a high degree

of control over their environments. And

the Enterprise DaaS option provides a Dell

cloud–hosted, comprehensively managed

service that enables IT organizations to

focus on strategic projects rather than

desktop management.

Streamlining the path

to desktop virtualization

Organizations considering a move

to desktop virtualization often have

questions and concerns about which

approach is the right one to take. After

an organization has defined itself based

on its IT sophistication and workloads,

the appropriate path comes into focus.

For enterprises that are interested in

adopting virtual desktops to address

specific computing, mobility, security, and

flexibility needs, Dell offers approaches

to fit a broad range of use cases. The

DVS portfolio decision tree helps them

evaluate which virtualized desktop

environment can meet their desktop

virtualization needs.

Learn more

Desktop virtualization:

dell.com/desktopvirtualization

Author

Reed Martin is a technology marketing senior

advisor in the Desktop Virtualization Solutions

Group at Dell.

2 For more information on DaaS delivery offered by Dell, see “Enhancing productivity with desktop as a service,” by Reed Martin, in Dell Power Solutions, 2012 Issue 2, qrs.ly/pw1r7zf.

Page 32: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

30 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

With the increasing acceptance

of smartphones and tablets as

de facto network endpoints in

the workplace, IT departments

are embracing bring-your-own-device (BYOD)

policies to control the use of personal consumer

devices to access corporate network resources.

Running on platforms such as Google Android

and Apple iOS, today’s consumer mobile devices

are powerful, sophisticated systems capable of

launching business-critical applications. As a result

of this consumerization of IT, BYOD policies are

rapidly becoming a critical component of the

business infrastructure. A BYOD approach offers

benefits such as increased business mobility,

enhanced user satisfaction, and low up-front

technology expenditures. Some organizations

go so far as to allocate budget to supplement

employee purchases of consumer devices that

are vital to conducting business.

Organizations are adopting bring-your-own-device (BYOD)

policies to harness the power and utility of personal mobile devices

in the workplace. Smart strategies help ensure secure network

access from both inside and outside the network perimeter.

By Patrick Sweeney

Securing remote access for consumer mobile devices

Page 33: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 31

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

However, BYOD also shifts control over

network endpoints away from IT. Subsequently,

organizations must determine suitable tools and

strategic best practices to address the challenges

introduced by mobile devices accessing network

resources from inside and outside the perimeter.

Security, productivity,

and performance challenges

When implementing a BYOD policy, IT

departments must consider how mobile

devices affect network and data security. For

example, employees sometimes jailbreak their

smartphones so that they can add unauthorized

software—which may originate from suspect

or fraudulent sites. Adding applications from

unknown sites opens devices to numerous

exploits, including root password theft, malware,

spyware, and botnet distribution systems.

Increased popularity has made smartphones

and tablets a lucrative target for these kinds of

criminal attacks. In addition, the same types of

threats that plague traditional computer systems

affect consumer mobile devices, disseminated in

e-mail, social media sites, games, screen savers,

instant messages, and presentation decks.

Consumer mobile devices are also subject

to man-in-the-middle attacks unless they use

encrypted access and authentication over a

virtual private network (VPN).

Compounding the issue, today’s consumer

mobile devices often operate in two worlds:

either connecting to the internal network over

wireless or bypassing the network using mobile

cellular connections. Mobile device users might

download malware from the Web over 3G or 4G

cellular networks and then disseminate it over

the corporate wireless network. Any consumer

mobile device that can bypass countermeasures

by alternating between access methods is

effectively insecure.

Because mobile devices are perceived as

a more intimate communications channel

than desktops, users often take a relaxed

approach to security and are more likely to

fall for scams and malware masquerading as

personal communications. In fact, consumer

mobile devices can magnify malware distribution

through spam, phishing, pharming, and

pretexting. For example, users viewing small

screens on smartphones and tablets cannot

detect cues that a Web site is a false front as

easily as they could when viewing the site on

a full-size screen. Once in, malware can then

propagate undetected across the network

through other mobile devices.

Data leakage is another serious challenge for

BYOD environments. Whether unintentionally,

maliciously, or driven by profit, employees are

leaking a growing amount of data over their

consumer mobile devices. For example, an

employee might retain sensitive or proprietary

data while connected to the corporate wireless

network and then leak it over the unsecured

cellular network to the Web. Also, smartphone

content can be especially vulnerable to loss

or theft, because network access codes,

usernames, and passwords are often unsecured

or set for automatic logon.

What’s more, the abundance of apps

available on today’s consumer mobile devices

Strengthening end-to-end security options Organizations of all sizes face intensifying IT security challenges, from the

exponential growth of data and rapid adoption of cloud-based services to

the extensive use of consumer devices in the enterprise environment. To

offer organizations a comprehensive range of enterprise security options,

Dell has acquired SonicWALL, a leader in advanced network security and

data protection. The tightly integrated hardware, software, and services

from SonicWALL complement the rapidly growing Dell security solutions

portfolio, which includes Dell SecureWorks security services, cloud

security and data encryption solutions, and Dell KACE™ vulnerability and

patch management.

SonicWALL security solutions include firewalls; secure remote access;

e-mail security; backup and recovery; and policy, management, and

reporting. These offerings are designed to integrate advanced networking

and remote access technologies to verify and defend the security of

traditional and wireless networks, users, and applications—and their

endpoint devices—while scanning the data stream across platforms

and perimeters.

Page 34: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

32 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

creates challenges for workforce productivity

and network performance. Inside the office,

mobile device apps can be either critical

business solutions or personal time-wasters

that consume bandwidth. The sheer volume

of interactive Web 2.0 and streaming media

traffic over mobile devices can affect corporate

wireless network throughput. Compounding the

problem, some applications, such as streaming

video, constantly evolve to avoid network traffic

control. In addition, like any Web-facing endpoint

devices running applications over the network,

even smartphones can open potential channels

for forced denial-of-service attacks.

Most applications that users will download

come from white-list distribution systems—

the Apple iTunes Store, for instance. While

white-listing does add a layer of scrutiny, due

diligence is not foolproof and does not apply to

jailbroken devices.

Integrated approaches for securing

network connections

Fortunately, IT departments have multiple tools

at their disposal to secure access by consumer

mobile devices connecting from both outside

and inside the network perimeter (see the sidebar,

“Strengthening end-to-end security options”).

At a minimum, to secure access from external

connections IT departments should establish a

Secure Sockets Layer (SSL) VPN reverse-proxy

portal or an SSL VPN tunnel with endpoint control.

SSL VPN reverse-proxy portals authenticate and

encrypt Web-based access to network resources

from employees using standard Web browsers

on their consumer mobile devices. This approach

can minimize deployment overhead by delivering

access agnostically to mobile device platforms.

More realistically, though, employees typically

require greater network access than that provided

through an SSL VPN Web portal. To easily add

in-office network-level access for mobile devices

connecting from outside the perimeter, IT

departments can deploy agent-based encrypted

SSL VPN tunnels, which enable secure access

without additional infrastructure costs. IT

departments can deploy endpoint control to

determine the presence of security applications,

and either allow, quarantine, or deny access

based on security policy and user identity.

To effectively achieve network security, IT

departments should add strong authentication

for smartphones and tablets. Both the SSL

VPN reverse-proxy and SSL VPN tunnel should

integrate seamlessly with standard authentication

methods such as two-factor authentication or

one-time passwords.

An organization can heighten security and

employee access to the network by leveraging

authorized VPN clients. Smartphone and tablet

operating systems such as Android and iOS

support VPN clients from a select group of security

vendors. These clients provide low-level access to

the OS. If a VPN client is not validated by the OS

developer, the vendor must piggyback its client

onto a third-party authorized client, creating a

cobbled-together solution. In addition, by working

with a single vendor that provides authorized VPN

clients for an organization’s remote device types,

IT departments are enabled to easily deploy and

maintain gateway remote access.

Furthermore, VPN traffic should be scanned

through a next-generation firewall, such as

the SonicWALL® Network Security Appliance

(NSA) Series. For example, by integrating an

SSL VPN provided by the SonicWALL Aventail®

Secure Remote Access appliance with the NSA

firewall, organizations can establish a SonicWALL

Clean VPN™ solution that helps deliver the

dual protection necessary to secure both VPN

access and traffic (see Figure 1). Clean VPN is

designed to decrypt and then scan traffic for

malware passing through smartphones and

tablets. Deploying gateway security features

on next-generation firewalls, such as antivirus,

antispyware, and intrusion prevention, helps

decontaminate inbound threats before they can

enter the network.

For secure access from consumer mobile

devices connecting over wireless inside the

perimeter, IT departments can integrate their

wireless networks with SonicWALL Next-Generation

Firewalls to create a SonicWALL Clean Wireless™

network. An integrated next-generation firewall

can provide multiple security features that

address concerns over the use of mobile devices

Connecting the mobile workforce, securely

Mobile employees expect to access information and applications from more remote devices and platforms than ever before. Learn how the SonicWALL Secure Remote Access family of products helps secure connectivity for today’s on-the-go workforce.

qrs.ly/oy1tjdo

Page 35: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 33

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

inside the perimeter. For example, application

intelligence enables IT departments to enforce

control over mobile device applications and

bandwidth allocation. Data leakage protection

is designed to scan inbound and outbound

traffic, block or allow file transmission based on

watermarked content or regular expressions,

and forward noncompliant information to IT,

human resources, or management for further

remediation. Content filtering provides a means

for organizations to enforce their browsing

policies, helping mobile users comply with

regulatory and legal mandates and ensure

a nonhostile network environment. And

antimalware scanning of outbound traffic at the

gateway is designed to identify and block botnet

attacks launched from mobile devices connected

from inside the perimeter.

Deep protection for anywhere,

anytime access

Personal smartphone and tablet use in

enterprise environments has reached a

tipping point. More than ever, end users are

demanding access to network resources from

their consumer mobile devices. Although a

BYOD policy offers potential business benefits,

access to network resources from these devices

comes with inherent risks, including intensified

exposure to malware, scams, bypassed security,

and data loss, as well as decreased network

productivity and bandwidth.

Organizations can address many of these

network access challenges by incorporating

SonicWALL network security and secure remote

access products in their BYOD environments.

SonicWALL Secure Remote Access products

offer SSL VPN reverse-proxy portal and SSL VPN

tunnel options for consumer mobile device

access. Organizations can integrate these

products with SonicWALL Next-Generation

Firewall security to obtain Clean VPN, Clean

Wireless over 802.11 a/b/g/n wireless networks,

and application intelligence and control.

Moreover, SonicWALL Mobile Connect™ client

apps are authorized for both Android and

iOS devices, and the SonicWALL Aventail End

Point Control™ (EPC™) feature helps block or

quarantine access if an iOS device is jailbroken

or an Android device is rooted. These integrated

approaches help organizations reap the rewards

of BYOD while keeping the network secure.

Author

Patrick Sweeney is vice president of the product

management team at SonicWALL, where he

oversees its network security, content security,

business continuity, and policy and management

product lines.

Learn more

SonicWALL secure mobility:

qrs.ly/oa1tjdp

Resources for SSL VPN Secure Remote Access:

qrs.ly/2i1tjds

SonicWALL SSL VPN Secure Remote Access platforms:

qrs.ly/sv1tjdu

Figure 1. Integration of an SSL VPN with a next-generation firewall helps clean up traffic before it enters the corporate network

SonicWALL AventailSecure Remote Access appliance

Provides identification and access control

SonicWALL E-Class NSANext-Generation Firewall

Provides deep packet inspection scanning

Protected clean tra�c

Directories

Lightweight DirectoryAccess Protocol (LDAP)

LDAP

Microsoft® Active Directory®

directory service

Remote AuthenticationDial-In User Service (RADIUS)

Applications

Web applications

Client and server applications

File shares

Databases

Voice over IP (VoIP)

Virtual desktopinfrastructure (VDI)

Corporate network

Page 36: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

34 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Investing in up-to-date hardware and

software helps enterprises achieve

significant performance, efficiency,

and productivity gains. Perhaps an

organization is ready to refresh its client

systems with the latest Dell™ Latitude™

laptops. Or maybe it is preparing for an

upgrade to a new OS. Whether hardware

refresh or software upgrade, administrators

must conduct the migration as smoothly

as possible to avoid end-user downtime

from multiple file backups, file transfers,

and reconfigurations.

Whether they involve 10, 1,000, or

10,000 endpoints, migration projects

present many challenges. How can IT

managers easily migrate data, and only the

necessary data, while importing end-user

settings to minimize organizational impact?

One common challenge is a lack

of visibility into the organization’s

infrastructure, to determine whether a

particular system needs to be migrated.

Additionally, end-user requirements,

habits, practices, and system types need

to be considered. To do so requires

comprehensive data collection on the state

and utilization of supported assets.

Many administrators rely on manual

methods, executing migration tasks on

computers one by one. This costly and

time-consuming process may lead to

deployment errors and slow follow-ups that

impair end-user productivity.

Automating the migration process

Traditional OS deployment software

typically takes an all-or-nothing approach.

One scenario involves migrating everything,

Automated, appliance-based deployment helps simplify endpoint migration

To migrate large numbers of endpoints, organizations

are exploring an automated, integrated approach to

systems provisioning. Dell KACE™ deployment appliances,

along with key best practices, facilitate an efficient,

cost-effective migration.

By John Karabaic

Page 37: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 35

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

which consumes bandwidth and time and

greatly reduces the number of systems

that administrators can migrate in a day.

Alternately, administrators may manually

provision systems with point imaging

products or internally developed scripts.

These options often consume IT time

and effort without ensuring that all user

settings and business data have been

successfully transferred.

An efficient, effective migration

alternative is to leverage an automated

systems deployment appliance. Automation

allows administrators to quickly and easily

package, deploy, and configure large

numbers of endpoints in a consistent

manner, helping ensure reliable and cost-

effective implementations. One approach

is the Dell KACE K2000 Deployment

Appliance, which enables administrators to

centrally capture and deploy user-specific

settings, files, and applications (see Figure 1).

Moreover, the appliance is designed to

enforce compliance by excluding files by

type and location, and it also offers a single-

step offline migration. Migration templates

let administrators specify what data will

be transferred. As a result, the information

that end users and their organizations need

to retain from the previous system will be

available when computers or operating

systems are booted for the first time.

Employing best practices for planning

and deployment

Together with an automated systems

deployment approach to streamline the

process, several best practices help ensure

a successful migration project.

Conduct an inventory of end-user assets

It is important to have an accurate starting

point from which to plan a migration

strategy. Identifying the assets that end

users have in play—including hardware,

applications, and operating systems—is

critical at the outset. Moreover, organizations

should verify that inventory data is obtained

in real time so that it is accurate when

needed for making decisions that can

directly affect the outcome of the migration

project. The inventory data also must be

sufficiently detailed to provide the hardware

and software information necessary to

plan the migration.

Develop a remote user and site plan

Organizations should know where all

computers, remote users, and remote

offices are located both physically and on

the network topography. Dell KACE K2000

Remote Site Appliances are designed to

seamlessly extend the Dell KACE K2000

Deployment Appliance to remote networks

of computers. The virtual Remote Site

Appliance caches local copies of images,

scripted installations, and tasks on a local

network. These resources are synchronized

from the Dell KACE K2000 Deployment

Appliance using a minimum change-set

architecture, helping reduce the network

bandwidth used. Dell Factory Services can

also assist by drop-shipping computers

prepped with Dell KACE K2000 deployments

directly to individual remote users.

Develop a migration policy

Once administrators have obtained an

inventory of the software, settings, and

file types in the organization, developing

a migration policy is key. Policy-based

migration not only helps improve

standardization and compliance, but also

helps simplify migration by avoiding the

transfer of unsupported files and software

while maintaining individual user data

and settings. These policies enable IT

managers to reduce the amount of

network bandwidth and time consumed

during the migration process.

Figure 1. The user state migration feature of Dell KACE K2000 enables seamless deployment of user-specific files and settings, along with the OS and applications

Page 38: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

36 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Decide between online and offline migration

Online migrations are performed prior to

deploying the new OS, with the current OS up

and running—for example, Windows® 7 for a

migration to Windows 8. Offline migrations

are performed when the computer is booted

from another medium, such as the network

or a USB drive.

Online migrations allow administrators to

inspect the migration for errors and provide an

effective way to test migration templates used for

migration policies. Offline migrations are efficient

for performing the capture-deploy-migrate

process in one step.

Decide between automated

or user-initiated migration

Will system administrators or end users be

initiating the migration? If the former, migration

time frames should minimize the impact on

end users and the organization, for example,

late evenings or weekends. IT should also avoid

migrating all users at once, to allow sufficient

time to debug problems and train end users

between sets of deployments. If end users are

initiating the migration, IT should establish a

centralized interface for requesting software

packages and services.

Establish a training plan

Following a successful migration or upgrade,

end users may still find unfamiliar, new interfaces

and features challenging. It is important to have

a training plan in place. IT organizations must be

prepared to help end users with questions and

to troubleshoot problems, whether providing

instructions through e-mail, assistance in person,

or remote support over the phone.

Streamlining migration through

appliance-based deployment

Migration projects are a fact of life for IT

organizations. Leveraging automated deployment

methods enables system administrators to

save time, avoid deployment errors, and

expedite end-user follow-ups to help ensure

a successful rollout.

Appliance-based systems management

approaches, such as the Dell KACE K2000

Deployment Appliance, are designed to eliminate

time-consuming manual tasks, regardless of the

size of the organization. This comprehensive

approach also advances compliance, system

readiness, and configuration planning while

accelerating deployment—freeing IT staff to

focus on innovative projects that further an

organization’s mission.

Learn more

Dell KACE Systems Management

Appliances:

dell.com/kace

Dell KACE K2000 Deployment

Appliance:

qrs.ly/ie1tjde

Author

John Karabaic is a senior

product manager for Dell KACE,

a leading provider of systems

management appliances.

Dive deeper

Organizations are looking for ways to reduce high client provisioning costs through automation and process improvements. This white paper examines how Dell KACE appliances can be used to implement best practices that streamline the PC provisioning process through automated systems deployment.

qrs.ly/cd1tjdd

Comprehensive systems provisioningThe Dell KACE K2000 Deployment Appliance is an all-in-one device that facilitates systems

deployment tasks for organizations of all sizes, including inventory assessment, OS and application

provisioning, migration, and recovery.

• Easytouse:Deploy in as little as one day and train to use in hours through the Web

• Comprehensive:Automates pre- and post-deployment configuration tasks

• Cost-effective:Has no hardware or software prerequisites or incremental professional

service fees

Page 40: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

38 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Today’s enterprise employees use,

share, and store information in

novel ways. Increasing numbers

expect to work remotely and

communicate and collaborate through

multiple computing and storage devices. They

store data on a variety of internal and external

drives, and they often use USB drives to share

and move this data between devices or to

take work home. Enterprises are embracing

these changes. By allowing employees to

work anytime, anywhere, on virtually any

device, organizations can boost productivity

and increase employee satisfaction.

While IT departments want to maximize

end-user productivity, they also want

to maintain control of and protect their

data. They need to secure customer data,

intellectual property, competitive data, and

other sensitive information that now flows

among many devices and external storage.

Security tools must provide the control,

protection, and streamlined management

that IT requires without compromising the

performance and flexibility that employees

expect—no matter where, how, or on what

device they are working.

Although fortifying the walls around

the network remains critical for blocking

intrusions, viruses, and spam, organizations

With employee mobility and IT consumerization on the rise, organizations require robust

data protection. Dell™ Data Protection | Encryption offers comprehensive endpoint security

that helps simplify management while maintaining a rich user experience.

By Jeremy Bolen and Sarah Williams

Simple, flexible endpoint security through data encryption

Page 41: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 39

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

also need to protect enterprise data

from loss or theft—especially data that is

accessed, shared, and stored on endpoints

beyond enterprise firewalls. However,

implementing multiple point solutions

to cover the variety of endpoint devices

and operating systems used can still leave

security gaps while adding significant IT

costs and complexity.

To address these security concerns,

Dell offers a comprehensive portfolio that

includes security solutions, consulting, and

operational services to help protect the IT

infrastructure. In particular, the Dell Data

Protection | Encryption (DDP | E) solution

is well suited for providing boundaryless

security and management for endpoints.

When done well, encryption can offer

a simple, fast, comprehensive, and flexible

method of protecting enterprise information.

Ideally, every laptop, desktop, and external

media device with intellectual property or

sensitive information should be encrypted.

Encryption helps protect sensitive data

wherever employees work and enables them

to use a variety of computing devices and a

full range of external storage types.

One of the top drivers for encryption

of endpoint devices is compliance with

international, federal, and local laws that

require organizations to protect personally

identifiable information. Should a device get

lost or stolen and an organization can prove

that the data was encrypted, many laws offer

safe harbor so that the expense of reporting

and lost reputation may be avoided.

By adopting DDP | E, IT groups can easily

deploy, enforce, and audit data encryption

across the entire organization. DDP | E helps

secure critical business data across multiple

types of endpoint computers, operating

systems, and storage devices while delivering

a nondisruptive experience for users.

Comprehensive data protection

for endpoint devices

DDP | E offers a full set of data protection

capabilities that give organizations the

flexibility to select and apply the right

capabilities—and the right level of data

security—for multiple types of end users.

Enterprise Edition: Centralized

remote management

DDP | E Enterprise Edition includes both

software- and hardware-based encryption

for endpoint devices. Software-based

Data-Centric Encryption capabilities

enable IT groups to easily set and enforce

encryption policies across system drives,

ports, and external media, delivering

Federal Information Processing Standards

(FIPS)–level data protection. With support

for a variety of Dell and non-Dell systems

and multiple operating systems, Data-

Centric Encryption can be deployed across

heterogeneous endpoint environments.

Hardware-based Full Volume Encryption

provides an even higher level of data

protection. It is designed to protect data on

any internal drives used by the system as well

as external media, including flash drives or

external hard drives. In effect, hardware-based

Full Volume Encryption enables any system’s

drive to become a self-encrypting drive. For

internal system drives, the result is FIPS 140-2

Level 3 military-grade security—the highest

level of FIPS certification commercially

available for a disk encryption solution.

To achieve this level of protection

without affecting system performance,

Full Volume Encryption capitalizes on the

Dell Hardware Encryption Accelerator—

available as an option with select models

of Dell Latitude™ laptops, Dell OptiPlex™

desktops, and Dell Precision™ workstations.

The Hardware Encryption Accelerator

offloads encryption activities from the

processor, enabling data to be encrypted

on the drive without disrupting the end-

user experience.

To simplify management of encryption

capabilities, DDP | E Enterprise Edition provides

the centralized DDP | E Management Console

(see Figure 1). Administrators can manage

encryption of the heterogeneous enterprise

end-user computing environment from a

single location.

Figure 1. The Dell Data Protection | Encryption Management Console enables administrators to centrally monitor, protect, and manage endpoint devices wherever they are.

Page 42: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

40 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Personal Edition: Local management

DDP | E Personal Edition is designed to help

branch offices and small-to-midsize organizations

secure data. It combines the same software-

and hardware-based encryption capabilities of

Enterprise Edition with local management to

facilitate easy deployment and control.

External Media Edition: Media encryption

DDP | E External Media Edition—which is

included with Enterprise Edition and Personal

Edition and also available as a stand-alone

product—enables organizations to secure data

stored on a range of external media devices, from

hard drives and memory cards to thumb drives

and CDs. Administrators can block or restrict

access to ports without affecting the operation of

input devices such as keyboards and mice, and

they can define and enforce encryption policies

for an external media device connecting to an

end-user system. For example, IT can enforce a

policy that all data written on a USB flash drive

must be encrypted and can be opened only on

a company-owned system. This type of policy

allows employees to continue being productive

and utilizing the full capability of their systems,

but in a protected and IT-compliant way. Because

it can work with existing security products and

encrypted drives, External Media Edition enables

organizations to easily extend data protection and

address an increasingly prevalent security gap.

These capabilities can be particularly useful

in virtual desktop environments. While these

environments help safeguard data by storing

information in the data center, External Media

Edition protects data that is transferred from a

client system to external media. With External

Media Edition, IT groups can help increase end-

user productivity through secure data sharing.

BitLocker Manager: Management tool

DDP | E BitLocker Manager provides a full range of

capabilities for managing Microsoft® BitLocker®

drive encryption—all from the same console

used to manage other DDP | E offerings. Many

organizations have adopted BitLocker, available

with Windows® 7 Ultimate and Enterprise operating

systems, as an efficient and auditable way to

implement software-based drive encryption. Those

cost savings can be quickly erased, however, if

administrators must manage these encryption

processes manually—a time-consuming endeavor

that may not provide the required level of

management, enforcement, and audit capabilities.

With BitLocker Manager, administrators can

manage encryption keys, enforce policies, and

access auditing and reporting tools through

the centralized DDP | E Management Console.

BitLocker Manager enables organizations to

maximize the value of BitLocker protection

while helping to integrate BitLocker as part of an

organization’s broad data protection profile and

to keep management costs under control.

Fast deployment, centralized management

DDP | E is designed for simple and rapid

deployment across enterprise end-user systems.

Some full-disk encryption products require

disk checking and correcting tools and utilities

to ensure system integrity and defragmenting

drives before encrypting. With the Data-Centric

approach of DDP | E, administrators can simply

deploy an agent with very little, if any, preparatory

work on the systems. In addition, policy

templates available through the management

console enable rapid deployment of policies,

so that organizations can quickly establish a

data protection profile that helps them meet

compliance reporting requirements.

Because DDP | E supports existing processes

for authentication, patching, disk recovery, and

forensics, administrators can also avoid the

time needed to implement new processes for

authentication and management.

Although point solutions can require multiple

management consoles, DDP | E offers a

single management console. Administrators

can manage a full range of capabilities—including

Data-Centric Encryption, External Media Encryption,

Full Volume Encryption, and BitLocker Manager

capabilities—across a broad spectrum of systems

and security levels, all from one location. Using

DDP | E Management Console, administrators can

manage endpoint devices wherever they are—

whether accessing the existing infrastructure from

within the internal network, across the demilitarized

Protecting data, wherever it resides

Learn how Dell Data Protection | Encryption helps organizations overcome the real-world security challenges of a workforce that is using, sharing, and storing data in novel ways.

qrs.ly/yp1tje8

Page 43: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 41

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

zone (DMZ), through a protected remote network,

or outside the firewall (see Figure 2).

Support for a heterogeneous environment

DDP | E helps secure a range of Dell and non-

Dell endpoint devices and a growing number of

operating systems. It also supports a full range

of external drive types, from USB thumb drives

and external hard drives to optical media. With

such wide-ranging protection, DDP | E enables

organizations to accommodate the increasing

variety of systems and devices that employees are

using for work without increasing management

costs or complexity.

Streamlined auditing and reporting

DDP | E facilitates auditing and compliance

reporting—which is critical for demonstrating

that data was protected in the event of a

security breach or loss of a device. One-touch

compliance policy templates help streamline

the implementation of policies for compliance.

Auditing capabilities allow administrators to easily

check the encryption state of particular devices

and data through DDP | E Management Console.

DDP | E also enables administrators to easily

generate reports from the central console,

showing proof that a lost or stolen device

was encrypted. With that proof, organizations

may have safe harbor from disclosure rules

as specified in business regulations such as

Payment Card Industry Data Security Standard

(PCI DSS), government regulations such as the

Health Insurance Portability and Accountability

Act (HIPAA), and any number of local, national

and international laws and mandates.

Transparency for end users

DDP | E is designed to deliver high levels of

data security without reducing end-user system

performance or disrupting work. The optional

Dell Hardware Encryption Accelerator helps

eliminate the performance costs of encrypting

every sector on a drive.

DDP | E External Media Edition also helps

deliver transparency, avoiding time-consuming

formatting of removable drives and requiring only

a single login for external drives. Because External

Media Edition encrypts only the sensitive data on

external devices without changing the operation

of the devices, end users can store personal

information alongside sensitive data.

Data security for a changing

end-user environment

As more enterprises enable employees to work

remotely using a variety of endpoint devices,

IT groups need to provide data protection and

compliance across all devices accessing the

organization’s network—whether company- or

employee-owned. As part of the portfolio of Dell

security solutions, DDP | E offers a comprehensive

collection of data encryption capabilities for a full

range of endpoint devices and external media while

providing the flexibility for organizations to select the

right solution for user and enterprise needs.

Learn more

Dell Data Protection | Encryption:

dell.com/encryption

Authors

Jeremy Bolen is in the Dell End

User Computing Group and focuses

on software and solutions.

Sarah Williams is director of

software product marketing in

the End User Computing Group

at Dell, focusing on security for

end-user computing.

Internal network

Centraladministrator

console

Existing infrastructure

Dell DataProtection | EncryptionManagement Console

Protected endpoint devicesFi

rew

all

DMZ

Fire

wal

l

Remote network

Protected endpoint devices

Protected endpoint devices

InternetPolicy proxy

Figure 2. Dell Data Protection | Encryption helps enforce security policies inside and outside an organization’s network

Page 44: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

42 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

End users expect the devices they use

in the workplace to provide secure,

efficient, on-demand access to

organizational resources. IT teams,

in turn, need to support end users with well-

managed, secure, up-to-date PCs. Members

of today’s increasingly distributed and mobile

workforce want to use the desktops, laptops,

smartphones, and other personal devices

that they prefer to help them succeed at their

jobs. Managing and maintaining this range of

devices in the workplace requires providing

comprehensive services for managing the life

cycles of these varied end-user systems.

A support life cycle for end-user systems

includes configuration, installation, upgrades and

management, comprehensive ongoing support

services, and resale or recycling services at end

of life (see Figure 1). While providing

end-to-end, life-cycle support helps ensure

the consistency, security, and effectiveness of

end-user systems, it can be challenging

for budget-constrained IT organizations and

time-consuming for busy IT professionals.

Rigorous management of the PC life cycle is essential for diverse,

distributed workforces. Dell offers a comprehensive mix of

configuration, installation, ongoing support, and IT asset disposition

services for efficiently managing end-user systems.

By Jack Todd and Natasha Bohorquez

Streamlining PC life-cycle management

Time-saving services

Dell ProSupport helps organizations enhance productivity cost-effectively while avoiding potential IT difficulties later on. Download this technical report offering a study of real-world organizations that benefit from ongoing support services provided by Dell ProSupport.

qrs.ly/fn1tuid

Page 45: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 43

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Dell Services offers a comprehensive

portfolio to help IT organizations manage

the life cycle of PCs and mobile devices.

By helping to simplify and streamline

client system management, Dell Services

enables IT organizations to boost end-

user productivity, maintain a secure

environment, and free valuable IT resources

for strategic pursuits.

Configuring systems in the factory

Valuable IT resources can be consumed

when configuring and installing PCs for

employees and end users. For many

IT organizations, receiving a PC from

the factory and integrating it into an

organizational environment can be a

time-consuming undertaking. Ensuring

efficient, successful configuration and

installation of PCs requires comprehensive

planning and preparation.

Many organizations rely on their own

IT resources to manually configure client

systems, or they outsource configuration.

These methods can be inefficient, take IT

professionals away from other important

projects, and introduce human error.

In addition, space must be available to

stage systems in a central location, and a

massive rollout requires comprehensive

logistical planning.

Configuration involves tasks that

prepare systems for deployment in an

organization’s end-user environment. Dell

Configuration Services helps organizations

create and maintain a master image for

laptop and desktop computers to set

up the software for end users. Master

images often include operating systems

and productivity applications, software

for a virtual private network or access to

a network, and security software for virus

and malware protection. These master

images are loaded onto the laptops

and desktops at the time of the system

build, removing the need for secondary

configuration touches that can increase

cost and time.

Other configuration tasks can include

customizing BIOS settings, installing

additional hardware and applications such

as video cards or custom software, and

applying asset tags for identifying, tracking,

and reporting information on the client

systems. The PCs are then delivered and

ready to be installed, integrated, and put to

immediate use.

To help ensure a consistent, secure,

reliable, and streamlined deployment, Dell

Configuration Services provides factory-

based configuration of Dell™ laptops and

desktops. Configuration takes place at

the Dell factory in a defined, automated

manufacturing process. Automated

configuration enables an IT professional

to rapidly install and integrate configured

laptops and desktops as well as server and

storage systems. The PCs are delivered

ready for deployment, without requiring

any additional on-site configuration

prior to installation.

To facilitate factory-based configuration,

Dell Configuration Services offers

comprehensive image management

services. Both self-service management

and custom image design help

organizations create and manage

consistent, up-to-date master images.

Dell ImageDirect provides secure

cloud-based access to online image

management that enables IT organizations

to create, upload, test, and manage

corporate images. ImageDirect helps

ensure images are consistent and

up-to-date with appropriate upgrades

and security patches. This state-of-the-art

imaging technology is designed to ensure

images are validated across multiple

platforms including Dell Precision™, Dell

OptiPlex™, and Dell Latitude™ computers.

IT administrators can use the portal

to remove unwanted applications—for

example, games provided with an OS—

and disable specific modifications such

Figure 1. Dell-provided comprehensive management life cycle for client systems

Configure PCs

Install PCs

Support PCsand IT

organizations

Resell orrecycle assets

Page 46: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

44 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

as preventing end users from installing

unauthorized applications or changing

particular settings. Administrators can

also preload the OS and settings to help

ensure security.

For organizations that require assistance

creating images from scratch, or working

with complex images, Dell also offers

X-Image imaging solutions for on-site

image build and maintenance. In addition,

Image Consulting services provide highly

trained Dell imaging experts who work with

an organization to design and build images

from scratch and integrate them with PCs

before they are shipped.

After creation and validation, images

can be loaded onto PCs in the factory

using Factory Image Load. In addition to

loading images, Dell Services can also apply

both external and BIOS-level asset tags to

facilitate automated tracking and reporting.

And because permanent identification

can be a deterrent to theft, PCs can also

be custom branded using a laser to etch

identifying information or full-color custom

skins directly onto the device.

Installing systems on-site

After configuration at the Dell factory,

PCs are ready for delivery to the intended

location and installation. Dell Laptop and

Desktop Installation Services provides a

range of offerings to help organizations

save time and money.

Dell on-site technicians can provide

basic install and setup for laptops and

desktops, including connecting them

to peripheral devices. If the PCs to be

installed are replacing existing systems, the

technician can migrate end-user data to the

new PCs that are replacing them.

Other on-site services can include

installing a wireless router or loading images

and applying asset tags for tracking and

reporting, if these configuration services

were not already executed in the factory.

These services also include de-installation of

a previous PC and removal of all packaging

waste from the end-user location. Dell

Laptop and Desktop Installation Services

helps streamline client system installation,

minimize downtime and disruption, and

enhance overall end-user productivity.

Supporting end-user systems

Providing support for end-user systems—

from laptops and desktops to tablets and

mobile devices—through their life cycles

has grown increasingly complex. Changes

in the IT landscape such as mobile

workforces and consumerization make

these services key to maintaining end-user

productivity. The Dell suite of hardware

and software support, protection, and

advisory services (see Figure 2) allows

organizations to tailor support to

their needs and make the most of

limited budgets.

Dell ProSupport provides a single

source for premium hardware, software,

and end-user solution support with

fast and efficient issue resolution. A

single point of accountability and access

to highly trained Dell experts around

the world enable IT organizations to

help ensure end-to-end support for their

internal user base. Dell ProSupport also

includes third-party collaboration to

resolve issues for commonly deployed,

critical software applications—such as the

Microsoft® Office productivity suite—on

PCs and mobile devices.

Dell ProSupport also covers multivendor

hardware, enabling organizations to help

simplify the management of support

contracts and leverage consistent

processes throughout the environment.

Support is made easy with a single phone

number to call for access to Dell expertise

across all systems and a single support

contract to manage.

The easy-to-use Dell TechDirect

portal—previously, Dell Online Self

Dispatch—empowers IT administrators

to manage their support, parts, and labor

needs. This global portal enables IT

technicians to log and track service

calls, order and dispatch parts

internationally, and access advanced

technical training and certification.

Employees rely on their PCs, tablets,

and mobile devices as well as the data

stored on them to be productive. As

workforces become more mobile,

organizations find themselves increasingly

at risk of PC damage and data loss.

Figure 2. Dell Support Services to help simplify the management of end-user systems

Hardware supportBasic service

Dell ProSupport with multivendor support capabilities

On-site services

Software supportDell ProSupport

Software subscription o�ers and support

Protection servicesAccidental Damage Service

Extended Battery Service

Keep Your Hard Drive

Hard Drive Data Recovery

Advisory servicesDell IT Advisory Services

Remote Advisory Services

Proactive Maintenance

Page 47: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 45

Lead with end-user computingFeaturesection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

To help alleviate end-user downtime

and associated escalations, Dell offers

protection services to help mitigate that risk.

Dell Accidental Damage Service can restore

damaged systems with minimal cost and

downtime. Laptops can be repaired or replaced

if they are accidentally damaged from drops,

liquid spills, or power surges. Additionally, the

Dell Hard Drive Data Recovery service can

recover sensitive data from failed hard drives,

helping save time and frustration.

End users enjoy the mobility of their

laptops, and that mobility depends on a reliable

battery. Dell Extended Battery Service allows

organizations to plan for replacement battery

needs in advance, to help ensure uptime and

manage PC life cycles cost-effectively.

An organization’s data is critical and

sometimes requires specific data destruction

processes based on regulatory requirements

or customer commitments. Typically, vendors

require a failed drive to be returned in exchange

for a replacement, but with the Dell Keep Your

Hard Drive service, organizations can retain

failed hard drives and dispose of them according

to their internal processes.

IT organizations face new challenges in

effectively supporting a wide array of end-user

platforms because employees are increasingly

demanding to use their own personal devices in

the workplace. Dell ProSupport helps ease those

challenges by extending business-class support

to Dell consumer devices. End users who procure

a Dell XPS™ or Dell Alienware™ system, and the

IT administrators who support them, can benefit

from the expertise, global availability, and scale

of Dell ProSupport. These systems can also be

protected with Accidental Damage Service to

minimize downtime and maximize productivity.

Decommissioning systems safely

and securely

Often, a PC upgrade for an end user means

a replacement for an existing system. IT

administrators have several considerations

when decommissioning an asset including its

environmentally responsible physical disposal,

protection of sensitive data on the hard drive

to help prevent identity theft and intellectual

property loss, regulatory compliance, and asset

resale options. Dell Asset Resale and Recycling

services are designed specifically to facilitate safe,

secure disposal of systems including those from

vendors other than Dell.

Asset Resale and Recycling services

begin with asset removal, which includes

auditing, packing, and planning as well as data

destruction and pick up and sorting of systems.

For many organizations, a key part of the

decommissioning process includes destroying

data stored on hard drives before the systems

leave their site. The Dell Data Destruction Policy

specifies a three-pass wipe1 of all sectors of the

hard drive. After this process is complete, the

drives are then tested to ensure that all data was

deleted. If the data wipe was not successful,

the drive is destroyed. Data can be destroyed at

either an on-site or off-site location, depending

on organizational requirements. Dell also offers

options for equipment resale, if the asset has

residual value, or equipment recycling, donation,

or lease return.

Managing the end-user system life cycle

Today’s IT organizations are tasked with

supporting diverse, distributed workforces

using a broad range of systems and devices.

Configuring, installing, deploying, managing,

and supporting laptops, desktops, tablets, and

mobile devices can tax IT resources and divert

them from key strategic initiatives.

Dell Services offers a comprehensive

array of services for the life cycle of end-user

systems from configuration and deployment

to ongoing support to asset decommission. In

providing these support services, Dell Services

functions as an extension to IT teams in

organizations that are looking to support end-

user productivity and enhance the efficiency

and effectiveness of IT operations.

Learn more

Dell Configuration and

Deployment Services:

dell.com/services/deployment

Dell ProSupport:

dell.com/prosupport

Dell Services:

dell.com/services

Authors

Jack Todd is the product

marketing and messaging

manager for Dell Deployment

Services at Dell.

Natasha Bohorquez is the

marketing manager for Dell

Global Support and Deployment

Services at Dell.

1 No data removal process leaves a hard drive or computer as free from residual data as a new product. Dell makes no recommendations regarding the security needs or representations regarding the effectiveness of one method of data removal over another for an organization procuring data removal services. The organization has the responsibility to protect any confidential or sensitive information contained on its hard drives recovered by Dell.

Page 48: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

46 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computing | Customer perspectiveFeaturesection

One of the largest law firms in the Gulf South, Jones Walker

extended its presence to five states and the District of Columbia

after a recent merger. Now Jones Walker has 12 office locations

supporting 300 attorneys and 324 staff members, as well as

a lights-out co-location facility in Ohio. The firm’s 40 percent growth over

the past decade requires the capacity to respond to a wide variety of scenarios

and end-user needs. “I came from a banking operation where we’d roll out one

standard image that met everyone’s needs,” says CIO Ruark Chick. “That just

doesn’t work here.”

Jones Walker relies on a virtualized infrastructure to meet growing demands

on IT resources. “Virtualization makes it very easy and fast to roll out changes,”

says Chick. “In the event of a natural disaster, we have to make sure that our e-mail

still works and our clients’ documents are still available.”

Virtualizing for hardware and power efficiency

The firm’s foray into virtualization began with the recommendation for a Dell™

server. “The equipment was wonderful, very reliable, and the cost was better. So

we made the decision to transition to Dell servers, and that’s when we started to

virtualize,” says Chick.

Jones Walker uses Dell PowerEdge™ R710 servers with Intel® Xeon® processor

5600 series at its main data center, a secondary site, and the lights-out facility.

Its servers, including some running Microsoft® Exchange Server and Microsoft

SQL Server® 2008 databases, are now more than 90 percent virtualized.

“Virtualization has helped us meet our internal

needs,” says Chick, who points to reductions in

the number of physical servers and in power and

cooling costs. “It helps us serve our clients better

by providing them with reliable and state-of-the-art

IT services.”

Distributing desktop management

The IT team wanted to efficiently deploy and maintain

desktop systems for nonmobile support staff, as well

as to migrate from the Microsoft Windows® XP OS

to the Windows 7 OS. Jones Walker engaged Dell

Consulting Services to help.

“We feel like the Dell consultants are part of our

team,” says Chick. “We choose to supplement our

staff with Dell Services when we have requirements

for a project that go beyond our core skill sets.” The

Dell consultants recommended desktop virtualization:

it would enhance control over remote systems,

allow a cost-effective rip-and-replace model for

systems needing repairs, and smooth the transition

to Windows 7. In addition, because virtual desktop

images and data are not stored locally on client

To keep up with rapid growth, streamline desktop

management, and strengthen disaster recovery,

Jones Walker turned to server and desktop

virtualization—a cost-effective approach enabling

the law firm to respond quickly and flexibly to

client needs.

Jones Walker

Setting a precedent for virtualization

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 49: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 47

Lead with end-user computing | Customer perspectiveFeaturesection

Expansion in the firm’s Lafayette,

Louisiana, office provided a good

opportunity to deploy desktop

virtualization using Dell OptiPlex™ FX160

thin clients with Intel Atom™ processors.

These client computers have no spinning

hard drives, just a small solid-state drive

running Windows XP Embedded. Dell

PowerEdge R710 servers run VMware®

View™ desktop virtualization software,

and Dell PowerVault™ MD3000i storage

area network (SAN) arrays host the virtual

desktop data. The firm is deploying the

setup to support staff at its remaining

offices. Its attorneys, who are highly

mobile, will not yet transition to the

virtual desktops but instead use Dell

Latitude™ E4300 laptops with Intel

Core™2 Duo processors.

Achieving a cost-effective IT

infrastructure

Project results have been impressive.

Chick expects reduced transition time

to Windows 7. “Desktop deployments

have been simplified since we control the

complete system image in our main data

center,” says Chick. “Our time to update

machines, the company could store data

in the data center, which helps to improve

security and minimize the risk of data loss.

Examining the evidenceServer and desktop virtualization has helped law firm Jones Walker reduce downtime while enabling cost savings through

hardware efficiency. Based on the flexibility it has offered, Jones Walker expects increases both in desktop uptime and in

the firm’s ability to satisfy client requirements on the fly.

90%Realizing the simplified management, quick disaster recovery, and power savings enabled by virtualization, Jones Walker has virtualized more than 90 percent of its Dell servers.

3 yearsJones Walker anticipates a three-year payback for desktop virtualization, scaling servers by simply adding processors and memory and minimizing reliance on costly support contractors.

80%Jones Walker expects an 80 percent or greater decrease in the time required to deploy new images to employees’ virtual desktops, accelerating OS migrations.

each PC will decrease by at least 80 percent,

since all we have to do is reboot to a new

virtual desktop image, which takes a couple

of minutes, versus taking 10 to 15 minutes

per machine to image them individually.”

Also, the firm anticipates increased uptime

as a result of removing the OS and data from

the end user’s desktop.

Chick expects a three-year payback

for the desktop virtualization project. When

the virtual desktops have been in place for

three years, he can keep them in service

just by adding processors and memory to

the servers. “We will avoid having to bring

in additional contract staff for desktop

support,” says Chick, enabling him to

further cut costs.

To help ensure a seamless migration

to Microsoft Exchange 2010, Jones Walker

is using Dell Consulting Services. “Dell

Services also helped us in three of our

mergers,” says Chick. “We’re very satisfied

with the way Dell has managed these

engagements. The support we get through

Dell customer service and Dell ProSupport

takes the place of one-half a full-time

employee. Dell offers solutions that really

empower us.”

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 50: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

48 2012 Issue 02 | dell.com/powersolutions

Lead with end-user computing | Customer perspectiveFeaturesection

Performing proof-of-concept testing

The challenge for Zuken was to deploy and

manage essential systems more effectively

than it had done previously, without

expanding its IT team. Januschke first heard

about Dell KACE solutions at a lunch-and-

learn session conducted by IT sure, a Dell

partner and long-term IT provider. “We saw

that Dell KACE would reduce the burden

of day-to-day IT administration, freeing

IT staff and allowing them to focus on

important tasks that they didn’t have time

to complete before,” says Januschke. The

IT sure organization worked with Zuken

to conduct proof-of-concept testing

with two solutions—the Dell KACE K1000

Management Appliance and the Dell KACE

K2000 Deployment Appliance.

During proof-of-concept testing, the

two organizations also worked together to

run an inventory of the entire client base.

“With the Dell partner supporting us, we

checked the application and license status

of all our client devices and ensured that

every instance was correctly represented in

the Dell KACE solution,” says Januschke.

Collaborating for a smooth transition

Zuken and IT sure worked together to

administer a phased deployment. “It was

good to have IT sure’s support during

the rollout because our resources would

have been stretched had we done it

Managing client devices and software licenses was consuming valuable time for the IT team

at Zuken. Deploying Dell KACE™ Systems Management Appliances enhanced employee

productivity and freed the IT staff to focus on strategic initiatives.

Zuken

Expediting client deployments and IT efficiency gains

Zuken, a software development company with its headquarters in Japan, helps

many worldwide organizations strengthen their electrical and electronic

engineering processes from development to production. A workforce with diverse

skills enables the firm to serve organizations in many industries—from aerospace

to consumer electronics—employing approaches that use electronic design automation and

computer-aided engineering.

Zuken has offices across Europe and data centers in Germany and the United States.

The IT teams in Munich and Ulm support 300 client devices and 75 servers for the groups

in Europe and the United States. Thomas Januschke, head of IT at Zuken, saw that client

management was growing increasingly difficult, especially because licenses, updates, and

patches were complex to monitor.

“Managing the estate was time-consuming, with lots of manual processes and a lack of

visibility,” says Januschke. “We needed a centralized management platform to simplify core

tasks and improve end-user experience.”

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 51: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 49

Lead with end-user computing | Customer perspectiveFeaturesection

alone,” says Januschke. The Dell partner

also provided training for the IT team that

allowed the solution to be implemented

quickly. The IT team was using it soon

after it was deployed.

“The collaboration among Zuken, Dell,

and IT sure was excellent—great knowledge

transfer, quick reaction times, and strong

communication,” says Januschke. “The

project confirmed our commitment to Dell

solutions and services.”

As part of a one-week pilot program,

the software development department,

which has the most complex IT needs,

was migrated onto the Dell KACE K1000

Management Appliance. The pilot project

gave the IT team the confidence to proceed

with deployment to other divisions.

The IT team used the Dell KACE

project as an opportunity to review

licensing for every application. “We now

have good visibility of our licenses thanks

to Dell KACE K1000—and peace of mind

that we have the right status for all our

software,” says Januschke.

In the past, the team found it difficult

to track license purchases across the

company. Now, it has an ongoing inventory

that provides insight into the licensing status

of each application at each site. “We can

also see how many versions of software,

such as WinZip, the staff are using. Without

Dell KACE, this was virtually impossible,”

says Januschke. In addition, the team

uses the Dell KACE K1000 Management

Appliance to perform the following tasks:

• Monitor assets

• Distribute software

• Manage patches

• Control power settings

• Run security audits

• Set policies and configurations

“We can even set the Dell KACE

K1000 Management Appliance to run

overnight backups for automated desktop

maintenance, raising the stability and

performance of our client estate with very

little manual input,” Januschke says.

In the past, if a desktop failed in a

branch office the authorized user had to

send the machine to Munich and wait

for it to be returned after repairs. “With

Dell KACE, we can reinstall the operating

system for a client device remotely; this

saves around a week, so we no longer

get negative feedback from our users,”

says Januschke.

A simple means of upgrading and

replacing machines is essential for Zuken

because the organization has so many

devices to look after. Now, the team can

reduce the time required to provide new

hires with the resources they need or meet

the changing requirements of existing staff.

“With Dell KACE K2000, we can

successfully set up devices at any of our

global sites,” says Januschke. “Using its

remote management capabilities, we can

run a range of tasks that give end users

high-performance solutions fast, helping

them to do their jobs without worrying

about IT.” The team uses the Dell KACE

K2000 Deployment Appliance for the

following operations:

• Computer inventory scanning

and assessment

• Network OS installation

• End-user state migration

• System repairs and recovery

• Disk imaging

Enhancing IT team productivity

Since the Dell KACE deployment, Januschke

and his colleagues have returned to

several projects that they had been unable

to complete previously. The team can

now focus on network security and has

engaged in a Microsoft® SharePoint® Server

collaboration software rollout. “Dell KACE

appliances are easy to use,” says Januschke.

“They’ve transformed the way we work.

I couldn’t imagine life without them now.

They require almost zero maintenance

and have a Web-based user interface that’s

intuitive. With Dell KACE, we’re around

50 percent more productive.”

Streamlining systems managementZuken implemented

Dell KACE appliances

to help improve client

device deployment and

management, enhancing

the organization’s

control over devices,

asset management,

licensing practices, and

help-desk services.

300Zuken supports 300 client devices, as well as 75 servers, across its Munich and Ulm data centers—representing a time-consuming management challenge for its IT staff.

50%Dell KACE appliances enabled Zuken to transform operations; the intuitive, Web-based interface helped increase productivity for the organization by around 50 percent.

1 weekBy remotely reinstalling an OS for a failed device in a branch office, the Dell KACE K1000 Management Appliance helps the organization avoid approximately one week of downtime.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 52: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

50 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Virtualization of the IT infrastructure has

been a key driver of storage innovation.

The classic storage-as-a-subsystem

paradigm has yielded to standardized

networking approaches and a virtualized storage

architecture, paving the way for the emergence

of a private cloud computing environment. At

the same time, savvy line-of-business leaders and

end users are finding that in some cases they can

obtain cost-effective and highly agile services from

public cloud computing providers.

Together, these forces are inevitably

moving the IT landscape toward hybrid cloud

computing deployments. Many IT departments

may eventually manage a hybrid of internally

delivered IT services alongside and integrated

with third-party delivery of public, cloud-based

services. This approach can meet the service-level

needs of demanding organizational units, while

enabling IT departments to broker optimal total

cost of ownership (TCO) and to help ensure proper

governance for the entire organization.

As IT environments evolve to hybrid cloud

computing, strategic IT oversight and best-

practices life-cycle data management are

key imperatives to help ensure governance,

service levels, and security. Over time, storage

infrastructure is expected to seamlessly integrate

the hybrid computing paradigm in support of

further increases in efficiency, resiliency, and agility.

IT innovation is guiding many organizations on a strategic trek

toward hybrid environments that integrate both private and public

cloud-based services. This evolution is prompting careful evaluation

and planning for storage and data management.

By Timothy Sherbak

Data’s journey to the cloud

Page 53: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 51

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Evolution of private clouds

Organizations evolve from physical

infrastructure to private cloud computing

through a series of stages (see Figure 1).

Initially, IT managers focus on reducing

physical server sprawl by creating

virtualized server pools standardized

on a converged network. A primary

objective is to consolidate infrastructure

to increase efficiency by reducing capital

costs for equipment. As IT organizations

increasingly embrace virtualization, they

look to extend the infrastructure to support

mission-critical applications, inducing strict

resiliency requirements for consistent

performance, availability, data protection,

and business continuity.1

The emergence of the virtualized

environment as the primary data center

infrastructure is now placing heightened

demand on reducing operating costs

through simplifying procedures and

automating workflows. As organizations

progress to cloud-based systems, a

primary focus is to increase organizational

responsiveness and agility, driving

projects to comprehensively integrate and

automate process life cycles and adopt

self-service provisioning.

Whereas a shared storage architecture

is a baseline requirement for a private

cloud, specific storage attributes define

how effectively the storage infrastructure

can meet requirements for efficiency,

resiliency, and agility. These storage

considerations also determine how

prepared organizations are for making the

move to private cloud computing.

To maintain high service levels cost-

effectively, organizations should aim for a

highly dynamic storage architecture that

is optimized for virtualized environments.

A cloud computing environment is

well served by a storage infrastructure

that enhances efficiency and agility

of the cloud computing environment.

In particular, virtualized storage is well suited

to a private cloud, enabling IT groups to

create a dynamic, on-demand environment

that can quickly accommodate changing

organizational needs.

Emergence of dynamic storage

Advanced storage virtualization abstracts

storage resources to create a dynamic,

virtual pool of shared storage resources.

This approach is designed to present

network storage to servers simply as disk

capacity, creating any size virtual volume

without allocating physical drives to specific

servers. Integrated management tools

for simple storage deployment, storage

provisioning, and data protection are

key features for a storage strategy when

building a private cloud environment.

Administrators may reduce the number

of disk drives and the cost for disk drives by

optimizing utilization in several ways. First,

storage architectures with thin provisioning

enable administrators to create a virtual

volume for each virtual server without pre-

allocating the physical storage capacity up

front. Second, automated tiered storage

allows administrators to automatically

move data between storage tiers and RAID

levels specified by policy-based rules.

Other storage efficiency measures such

as snapshots, thin clones, and replication

are also essential to minimize storage

space requirements.

Storage for cloud-based services delivery

must be highly scalable to keep up with the

rapid growth in data volume and variety.

Data volumes are continuing to expand and

include escalating amounts of unstructured

data, such as Web content, along with

traditional structured information. The rise of

big data analysis leads to an increase in the

usefulness and retention lifetime of data as

well. Regulatory and legal rules that require

data to remain available for e-discovery also

heighten the need for long-term storage.

Two dimensions of scalability are needed

for cloud computing models. Capacity can

be scaled up by adding disk drives to an array

controller, and infrastructure can be scaled

out by adding nodes to a pooled or peer-

scaling array in which performance scales

with capacity. In addition, organizations can

integrate advanced generations of hardware

technologies without making significant

upgrades—thereby preserving and extending

software license investments to next-

generation platforms.

A converged infrastructure with a common

pool of IT assets from computing and

networking to storage and management tools

enables IT organizations to rapidly provision

server and virtual machine (VM) resources

without requiring manual intervention. For

example, prepackaged offerings such as

Dell™ vStart now integrate software, servers,

networking, and storage to accelerate

adoption of private cloud infrastructure.

Figure 1. Evolving stages of the IT landscape toward cloud computing

Physical environment Consolidation Virtualization Cloud computing

Application

OS

Hardware

OS OSOS

Virtualization

Hardware

Application Application Application VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

VM VMVM

Maximize e�ciency Increase agilityOptimize resiliency

1 For information on how one organization is supporting mission-critical databases with a virtual infrastructure, see “Accelerating performance through virtualized, tiered storage,” in Dell Power Solutions, 2012 Issue 2, qrs.ly/ps1tuhm.

Page 54: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

52 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Advent of public clouds

Organizations and their individual business

units are finding that they can obtain IT

services directly from third-party public

cloud computing providers on a utility basis.

Using a select number of public cloud

services provides an easy and cost-effective

way for many organizations to begin taking

advantage of cloud computing. Public

cloud computing services include the

following delivery models:

• Software as a service (SaaS): This

class of cloud-based services delivers

enterprise applications. Salesforce

customer relationship management

(CRM) software offers a familiar example

to many business users. A wide range of

other applications includes Dell Email

Management Services (EMS) and Dell

Unified Clinical Archive.

• Infrastructure as a service (IaaS): Offering

an on-demand approach to IT resources,

this service delivery model enables an

organization to outsource flexible access to

the equipment used to support operations,

including storage, servers, and networking

components. For example, Dell offers

a multitenant computing infrastructure

in its Dell Cloud with VMware vCloud®

Datacenter Service offering.

• Platform as a service (PaaS): This

category of cloud services delivers a

software development and hosting

environment that provides a computing

platform and tools stack for creating,

deploying, and testing Web applications

over the Internet—for example, the Dell-

hosted Windows Azure™ platform.

• Storage as a service: In this scenario, an

organization or individual leases storage

capacity from a provider, primarily as a

low-cost storage repository for backups,

archives, or relatively inactive data. For

example, Dell provides cloud-based

data protection in its Dell AppAssure™

Backup, Replication, and Recovery

Online offering.

The instant agility provided by third-party

cloud-based services offers a compelling

business proposition, but it also raises

significant concerns. Many IT managers are

aware of the security and regulatory issues

of putting sensitive data onto multitenant,

public cloud storage. Piecemeal cloud

services acquired by individual business

units or line-of-business executives may not

meet security and compliance requirements.

Centralized management of cloud services

by IT is necessary to negotiate agreements,

keep TCO down, and help ensure service-

level agreements (SLAs) are met.

Architecturally, many vendor-provided

cloud environments are proprietary

implementations tailored specifically for their

intended use. IT managers need to carefully

consider the maturity of the infrastructure,

particularly as it pertains to data protection,

performance, and availability. They also

require an understanding of implementation

details that the vendor may be otherwise

unaccustomed to revealing.

Because public cloud services

aggregate resources to support a growing

number of organizations, the scale of the

infrastructure—particularly as it relates to

storage—should efficiently accommodate

this growth. Like private clouds, public

clouds gain efficiency through technology

advances including deduplication and

compression to sustain cost-efficient

Nascent capabilities for cloud-enabled storageA highly efficient storage infrastructure that integrates cloud-based services offers a

formidable strategy for evolving enterprise data centers to a hybrid cloud environment.

Cloud-enabled storage architectures are expected to evolve to integrated cloud-based

services including automated tiering; compressed, deduplicated data transfers;

backup and recovery; disaster recovery; archiving; and active remote data copies:

• Automatedtiering: Cloud-based storage is expected to become just another

tier of storage that is comprehensively integrated and automatically extends

automated tiering functions of the on-premises storage.

• Compressed,deduplicateddatatransfers:Content-aware algorithms

compress data to efficiently transfer and store data in the cloud.

• Backupandrecovery:Data can be protected and quickly recovered from

cloud-based resources through standard, well-integrated backup services.

• Disasterrecovery:Replication services enable even very small organizations to

implement a strong business continuity plan with additional disaster recovery

capacity on demand.

• Archiving: Implementation of automatic cloud archiving can migrate rarely

accessed data to low-speed, cost-effective storage.

• Activeremotedatacopies: Cloud-based data copies can become active data

for cloud bursting, application failover, or remote processing.

All together, these capabilities help organizations harness the power of data

storage in the cloud and implement a flexible, hybrid-based infrastructure for

delivering applications and services.

Page 55: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 53

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

storage operations. As these resources are

externally defined, IT managers need to be

diligent in ensuring that their service provider can

sustain cost-effective delivery without sacrificing

enterprise-class reliability.

Of course, endorsing a self-service public

cloud platform is not a green light for IT

organizations to relax their data management

measures or SLAs. Cloud architectures tend to

serve many authorized users simultaneously on

the same underlying physical resources. This

concentration of end users can deliver high

utilization and favorable return on investment

for the hardware. However, organizations

contracting with third-party services have far

less control over the architecture of the

underlying infrastructure than they do over

a private cloud platform.

To remain in control of where and how

enterprise data is stored, IT organizations may

require increased deployments of private cloud

data storage services. These services can be

used in conjunction with carefully brokered

public storage services when and where they add

value—for example, replication to a third-party

site for enhanced disaster recovery. Significant

investments in IT infrastructure should be

made only into open and flexible assets from

committed, viable vendors that have achieved

results from innovation and demonstrated the

ability to deliver on their vision.

Expansion to hybrid clouds

Naturally, many organizations need to avoid

the cost of a single, comprehensive data center

overhaul. Instead, they are exploring ways to

gradually implement key projects that are well

suited for leveraging early cloud computing

adoption efforts. Authorized users familiar with the

agility of cloud-based services are likely to demand

this type of service, regardless of whether they use

an external or internal cloud services provider. As

a result, IT organizations are being called upon to

effectively evolve internal IT services delivery to be

more cloud-like than traditional IT services delivery.

Building private cloud resources can be a

natural step for organizations on their journey to

the cloud. Private cloud computing is particularly

appropriate for organizations that are already

heavily vested in virtualization and have security

and governance requirements—or must address

other circumstances in which comprehensively

leveraging a public cloud platform is not advised.

Advocates of public cloud computing may

argue that private clouds do not offer a true utility

model of costs to the organization. However,

private cloud computing can offer the same or

increased agility with elastic, self-service resources

that enhance security and governance because

data remains on the premises. They also help to

improve cost accounting for IT services across

lines of business and to assess the contribution of

IT investments to growing revenue.

As organizations transition their internal

IT infrastructure to a cloud-based services

orientation and step up the adoption of public

cloud services, the resulting IT architecture is

evolving into a hybrid of the two. (See the sidebar,

“Nascent capabilities for cloud-enabled storage.”)

In a hybrid cloud environment, IT organizations

can run some services directly while brokering

subscriptions to others, retaining the ability to

integrate third-party services on behalf of their

constituent authorized-user base. A hybrid cloud

approach is a strategic option that makes sense

for many organizations.

Management of cloud-based

storage and data

Organizations endeavoring to compete effectively

require an IT infrastructure that scales quickly to

meet dynamic business demands, maximizes

performance and utilization of IT resources,

and enhances end-user productivity. Many

organizations are advancing their virtualization

environments to the next step along the

evolutionary path to cloud computing.

Dell has developed a growing portfolio of

efficient cloud computing offerings to help

organizations implement fast, flexible delivery of

cloud-based applications and services, no matter

where they are on their journey. Organizations can

benefit from Dell expertise and end-to-end cloud-

based offerings that encompass storage, servers,

networking, and professional services as well as

Dell-provided cloud-based services delivery.

Learn more

Dell storage:

dellstorage.com

Dell cloud computing:

dell.com/cloud

Author

Timothy Sherbak is director of

storage solutions marketing in the

Dell Enterprise Solutions Group.

Scalable cloud-based IT

BitCloud, an Internet services provider in Australia, deployed Dell servers and storage in a flexible IT infrastructure to support a growing end-user base. Download this case study to learn how the company’s highly scalable storage infrastructure helped reduce IT maintenance time by 33 percent.

qrs.ly/4e1tuen

Page 56: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Dell PowerVault TLtape library

Organizations have more data to manage, protect,

and preserve for longer periods of time than ever

before. The Dell™ PowerVault™ TL tape library offers

affordable, easy-to-use backup and archiving to

safeguard data for business continuity, competitive

advantage, and regulatory compliance. This expandable,

energy-efficient platform allows organizations of all

sizes to manage explosive data growth. Automating

data backup and archiving processes with the versatile

PowerVault TL tape library helps reduce the need for

manual intervention and the risk of human error.

Versatile, expandable, and affordable data protection

Product showcase

Robust data protectionTape can be transported and stored in a vault. Encryption helps protect data and ensure data privacy. WORM tape media is designed to prevent accidental overwriting of stored data.

Big capacity, small spaceWith its compact form factor, the PowerVault TL tape library is designed to offer up to 72 TB of native storage capacity in four units of rack space.

High performance, compatibilityThe PowerVault TL tape library supports LTO-5 tape technology designed to natively back up 504 GB of data per hour. LTO technology features backward compatibility with prior-generation tape media—helping preserve media investments.

Exceptional dependability, efficiencyWith a typical shelf life of over 20 years, tape is well suited for long-term data archiving. Data archived on tape consumes no energy until accessed.

For more information, visit dell.to/PowerVault-tape-automation

Page 57: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. dell.com/powersolutions | 2012 Issue 02 55

In the virtual era, organizations are

transforming the role of IT in driving

success and creating business value. For

example, consolidation and virtualization

have helped to deliver great efficiencies

and to reduce costs. Now, organizations

look to extend these benefits by virtualizing

business-critical applications and deploying

private clouds—virtualized data center

environments designed to provide

application delivery as a service exclusively

to a single organization.

Although virtualization can deliver

tremendous business value, it presents

several challenges that can potentially

impede an IT organization’s ability to

migrate to a private cloud environment.

To avoid pitfalls and realize the potential of

private cloud computing, enterprises require

a tightly integrated storage foundation that is

designed to provide tremendous efficiency,

resiliency, and agility.

For example, rampant data growth is

accompanied by an increase in storage

requirements. IT organizations may

encounter virtual machine sprawl, which

can lead to overprovisioning and create

islands of storage that are costly to

manage and difficult to reallocate. On the

other hand, insufficient capacity affects

data availability.

Also, the complexity of virtualized

environments and unpredictable workload

demands can make it difficult for

organizations to meet storage performance

and availability requirements, manage

multiple layers and components, and

ensure data protection. In particular, legacy

storage platforms that are not specifically

designed for highly virtualized application

environments often cannot meet these

demands, leading to high costs and even

potentially negating the positive benefits of

server virtualization.

The Dell Compellent Storage Center™

storage area network (SAN) array is

well suited for supporting the agility,

performance, and availability requirements

Private clouds can deliver great efficiency, flexibility, and

data protection. Tight integration of Dell™ Compellent™

storage and Microsoft® applications enables organizations

to unlock the full potential of Microsoft Hyper-V®–based

cloud deployments.

By Stanley L. Stevens, Justin Braun, Marty J. Glaser, and Nicholas Sweere

Advancing the value of private clouds with virtualized, consolidated storage

Data management Specialsection

Page 58: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

56 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

of private clouds based on the Microsoft

Hyper-V virtualization platform. Its fully

virtualized design extends the efficiency

and flexibility benefits of virtualization to

storage and enables seamless scalability.

(For more information, see the sidebar,

“Driving innovation.”) The array’s automated,

intelligent Dell Fluid Data™ architecture

is designed to optimize performance,

enhance efficiency, and streamline

management. In addition, integration with

Hyper-V and other Microsoft applications

enhances efficiency and manageability.

Purpose-built, virtualized storage

Compellent storage is designed from

the ground up to support consolidated,

virtualized data center environments, such

as those built on the Hyper-V virtualization

platform. By integrating features such

as thin provisioning and storage tiering,

Compellent storage helps slash the total

cost of storage dramatically.

Modular, virtualized architecture

Compellent storage features a modular,

virtualized Fluid Data architecture that is

designed to provide seamless, enterprise-

class scalability—avoiding the need for forklift

upgrades. A range of drive types is supported,

including solid-state drive (SSD) and Serial

Attached SCSI (SAS). Front-end interconnects

include 8 Gbps Fibre Channel, 10 Gbps Fibre

Channel over Ethernet (FCoE), and 10 Gbps

Internet SCSI (iSCSI). Interconnects can easily

be upgraded by simply adding or replacing I/O

cards to the controller.

End-to-end virtualization of data path

components—including host and server ports,

controllers, and drives—facilitates technology

independence, enabling organizations to

seamlessly replace, upgrade, or add hardware

components without system disruption.

Additionally, a perpetual software licensing

model helps ensure that organizations can

protect their investment while responding to

changing business needs.

The Fluid Data architecture also

enables automated intelligence features

such as thin provisioning, storage tiering,

and continuous snapshots to optimize

efficiency, resiliency, and agility in

virtualized environments (see Figure 1).

Efficient space utilization

Thin provisioning, which is a virtualized

storage allocation model, helps organizations

manage space consumption and minimize

provisioning requirements in private cloud

deployments. Dell Compellent Dynamic

Capacity™ thin provisioning, a feature of

Compellent storage arrays, is designed

to meet the capacity demands of virtual

machines while minimizing physical capacity

requirements. With Dynamic Capacity, actual

physical space—including space for volumes,

snapshots, and replication data—is not pre-

allocated. Instead, administrators provision

virtual volumes of any size up front, without

affecting physical resources. Dynamic

Capacity allocates and consumes physical

disk space only when actual data is written to

the volume.

Dynamic Capacity enables organizations

to dramatically reduce physical disk capacity

requirements and enhance utilization rates

while still meeting the demands of private

clouds. Organizations can buy storage only

as needed instead of based on anticipated

requirements. Additionally, capacity can

be added in small increments as needed

and is designed to be deployed without

system disruption or downtime. And legacy

volumes can be imported and converted

to thin provisioning using included Thin

Import technology.

Intelligent, automated tiering

Ensuring performance and availability

can be challenging in highly virtualized,

consolidated cloud environments. To meet

service-level agreements, organizations

often overprocure costly tier 1 storage.

The Dell Compellent Data Progression™

feature of Compellent storage is a

sophisticated data movement engine

designed to help optimize storage

performance, ensure availability, and minimize

costs. Data Progression automatically places

heavily accessed data on high-performance

drives using performance-optimized RAID

levels and less frequently accessed data on

low-cost, high-capacity drives and/or low-

overhead RAID levels.

To optimize data placement, Data

Progression maintains ongoing awareness Figure 1. Fluid Data architecture enables efficient use of disk space across Compellent storage arrays

PerformanceRAID-1+0: Write

RAID-5, RAID-6: Read

Thin provisioning

Free space recovery

Automated tiered storage

Continuous snapshots

RAID-5 or 6

RAID-1+0 RAID-1+0

RAID-5 or 6

Block-level virtualization

11:4512:00

12:15

Block-level intelligence

Tier 1 storage

Tier 2 storage

Tier 3 storage

Page 59: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 57

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

of data usage characteristics—or metadata,

including creation date, last-access data,

and relative frequency of access—and

uses that intelligence to tier data. This

metadata is gathered continuously and

in real time at the block level, allowing

data to be automatically tiered at an

extremely granular level. In this way, Data

Progression supports highly targeted

data placement and avoids the need for

manual classification and movement.

By optimizing data placement, Data

Progression enables organizations to

minimize the amount of high-performance

storage required and maximize utilization

of less-expensive, lower-tier storage.

For example, in a private cloud

environment virtualized through Hyper-V,

the most active data, such as log files

for Microsoft SQL Server® database

software, could be automatically placed

on high-performance, tier 1 SSDs. Static,

minimally accessed data such as image

files, PDF files, and e-mail archives from

Microsoft Exchange messaging software

could be automatically placed on lower-

cost, higher-capacity storage. A gold

image—the image on which a virtual

machine is based—would typically have

the majority of its OS data placed on tier 3,

while new writes to the OS would still be

saved to tier 1. Specific data sets can also be

manually tiered to customize performance

and responsiveness.

With the intelligent Data Progression

feature, Compellent arrays help ensure that

private cloud data is automatically stored in the

right place at the right time for the right cost.

Enhanced data protection

To enable robust data protection and

rapid recoverability in private cloud

environments, Compellent storage arrays

offer Dell Compellent Data Instant Replay™

continuous data protection. Data Instant

Replay allows administrators to create

space-efficient snapshots called replays.

Once a base snapshot of a volume is

taken, only incremental changes in block

data need to be captured. This process

not only saves disk space, but also speeds

local recovery of lost or deleted files. Most

volumes can be recovered within minutes

for high availability, and a point-and-click

interface enables simple rollback to a

previously known state.

Dell Compellent Replay Manager

snapshot consistency software leverages

Data Instant Replay to provide point-

in-time, application-consistent replays

of Exchange, Hyper-V, or SQL Server

application data. Integration with the

Microsoft Volume Shadow Copy Service

(VSS) enables Replay Manager to capture

replays without system disruption and

impact on virtual servers.1

Integration for on-demand IT services

In addition to providing a fully virtualized,

highly scalable storage platform designed

for cloud environments, Compellent

storage is tightly integrated with Hyper-V

and other Microsoft applications. This

integration helps enhance efficiency,

support automation, dramatically simplify

manageability, and efficiently protect

applications in complex, virtualized private

cloud environments.

1 For more information about how Compellent storage uses replays to protect SQL Server databases, see “Boosting database availability through intelligent virtualized storage,” by Maggie Smith, Mike Matthews, and Nicholas Sweere, in Dell Power Solutions, 2012 Issue 2, qrs.ly/fh1q6f9.

Driving innovationOn the links, golf club manufacturer PING is synonymous with

innovation. The company constantly searches for new ways of

perfecting its approach to delivering custom-fit performance to

players. To stay on par with progress, the company’s IT department

needed to design a new infrastructure that would support business

operations—from design to delivery—in an environment that

embraced change. Facing a forklift upgrade of an old storage

area network (SAN) that had reached capacity and could not

adapt to the company’s changing business requirements, the IT

department sought a flexible, scalable solution.

The Dell Compellent Storage Center SAN with Dell Fluid

Data architecture proved to be the right fit for PING because

of its scalability, flexibility, true virtualization, and intelligent

software applications. For example, advanced thin provisioning

allows the IT team to accommodate unexpected growth

patterns from the design team.

Also, Compellent virtual storage complements the

company’s Microsoft Windows Server® 2008 Hyper-V virtual

servers, allowing PING to easily scale from a virtualized pool

of storage without disruption as the company grows. Multiple

requests are processed in parallel to help improve system

performance and utilization. Using Hyper-V virtualization and

Compellent storage, PING has consolidated multiple servers,

saving 25 percent of projected hardware costs and reducing

initial deployment and management costs by 60 percent.

For more information on how Compellent storage helps

PING support changing performance and capacity demands

driven by constant innovation, visit qrs.ly/oq1ts73.

Page 60: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

58 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Streamlined management

Compellent storage leverages the data center

management functionality of Microsoft System

Center Virtual Machine Manager 2012. The

storage communicates with System Center

Virtual Machine Manager through the Storage

Management Initiative–Specification (SMI-S)

protocol. This communication enables virtual

machine administrators to perform essential

storage administration tasks directly from the

System Center interface instead of the Compellent

interface. System Center Virtual Machine Manager

2012 helps organizations create a private cloud

by providing the interface to manage compute,

network, and storage resources, in turn facilitating

easy management and provisioning of those

resources to individual business units.

Using cmdlets—lightweight commands that

are used in the Microsoft Windows PowerShell™

scripting environment—with Hyper-V and

Compellent storage, organizations can further

streamline storage management and automate

the deployment of storage resources. The

Compellent Storage Center Command Set

for Windows PowerShell includes more than

60 Windows PowerShell cmdlets designed to

automate common storage management tasks.

For example, in Hyper-V–based private

cloud environments, Data Instant Replay can

be used to space-efficiently provision new

virtual machines. Administrators create a

single gold virtual machine image. They then

use Compellent Storage Center Windows

PowerShell cmdlets to rapidly provision new

virtual machines. Instead of creating full copies

for each virtual machine, the cmdlet uses a

replay of the gold image. Each virtual machine

created shares the same gold image. The only

storage consumed beyond that image is the

space required for the unique characteristics

of each virtual machine, resulting in efficient

space utilization.

Space-efficient application protection

Compellent Replay Manager snapshot

consistency software integrates with VSS to

help ensure the integrity of Hyper-V, Microsoft

Exchange, and Microsoft SQL Server data. VSS

coordinates the OS, application, and storage

so that Replay Manager can initiate snapshots

when I/O is quiesced. As a result, Replay Manager

provides time-consistent snapshots even if

Hyper-V, Exchange, or SQL Server is running

during the process.

Replay Manager also includes 43 Windows

PowerShell cmdlets that enable administrators to

automate recovery operations through scripting.

These cmdlets can be used to automate many

Replay Manager tasks, including, for example,

recovering a SQL database to be used as a

reporting database on the same server.

Intelligent automation for IT efficiency

As organizations transition to private cloud or

as-a-service application delivery models, achieving

the expected efficiency, agility, and resiliency is

a paramount concern. Compellent storage

is well suited for Hyper-V–based virtualization

and cloud deployments. Its highly automated,

intelligent Fluid Data architecture is designed to

deliver enhanced efficiency, resiliency, and agility.

A modular, virtualized design enables seamless

scaling, providing a solid storage foundation that

grows and adapts to IT demands.

To help organizations get a jump start on their

Hyper-V–based private cloud deployments, Dell

offers the Dell vStart implementation package. This

turnkey service includes everything needed to deploy

a private cloud, including hardware components,

servers, switches, storage, management tools,

installation services, and fine-tuning.2

Compellent advanced virtualized storage

is deeply integrated with Hyper-V, Windows

PowerShell, System Center Virtual Machine

Manager, and business-critical applications

including Exchange and SQL Server. This

integration helps simplify the deployment

and ongoing management of virtualized

infrastructures that are designed to maximize

efficiency, streamline management, and ensure

availability—enabling organizations to reap the

full benefits of private cloud deployments.

Learn more

Dell Compellent Storage Center:

dellstorage.com/compellent

Dell Compellent Storage Center

in a Hyper-V environment:

qrs.ly/sx1tje3

Authors

Stanley L. Stevens is a virtualization

solutions marketing manager in

the Dell Large Enterprise Storage

Marketing Group.

Justin Braun is a senior manager of

Microsoft and virtualization solutions

for Dell Compellent in the Dell

Enterprise Solutions Group.

Marty J. Glaser is a virtualization

product specialist at Dell

Compellent, focused on Microsoft

Hyper-V and Microsoft System

Center Virtual Machine Manager

virtualization technologies.

Nicholas Sweere is a product

marketing manager for Dell

Compellent storage, focused on

core applications and third-party

integrations.

2 For more information about using vStart for a private cloud deployment, see “Rapid virtualization deployment for private clouds,” by Marc Stitt and Deepak Kanwar, in Dell Power Solutions, 2012 Issue 2, qrs.ly/e91qw2h.

Virtualized, enterprise storage for the cloud

As IT organizations evolve toward private cloud environments, careful consideration of the storage infrastructure is paramount. Discover how Dell Compellent Storage Center enhances efficiency, resiliency, and agility in Microsoft virtualization and cloud deployments.

qrs.ly/ng1tuel

Page 61: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

©2012 Schneider Electric. All Rights Reserved. All trademarks are owned by Schneider Electric Industries SAS or its affiliated companies. • 132 Fairgrounds Road, West Kingston RI • 998-4498_GMA-US

Our step and repeat approach Now, grow your facility-level power and cooling capacity in 500 kW increments as you need it.

> Pretested, prewired, and UL-rated to reduce overall data center design and deployment time to weeks

> CapEx cost savings range from 10 to 20 percent, and OpEx savings range from 20 to 35 percent

> Rightsizing, or matching power and cooling to the exact IT loads, optimizes PUEs

> The pre-engineered modules can be deployed according to the data center’s specific redundancy needs

Business-wise, Future-driven.TM

Discover best practices!Learn more in “Containerized Power and Cooling Modules for Data Centers” (WP #163).Visit www.SEreply.com Key Code p113v or Call 888-289-2722 ext. 3157

Now, roll out power and cooling for your data center only when you need it.

Introducing scalable Schneider Electric data center facility modules

Modularity at the facility levelAfter pioneering modularity within the data center’s traditional IT space, Schneider ElectricTM now brings the modular approach to the facility domains of data center physical infrastructure. This design/build approach transfers the time intensive engineering and pretesting of facility-related data center components to the “factory,” in turn making large data center deployment fast and easy. It also allows right-sized deployment today, while enabling quick capacity changes tomorrow.

Fast, easy, cost-effective deploymentSchneider Electric facility modules, which include a power unit and two types of cooling (water chiller or air) units, complement IT containers to give companies the complete infrastructure support they need to add capacity to existing data centers or to turn available space (e.g., former warehouses or manufacturing plants) into highly available, energy-effi cient, world-class data centers in just weeks. This scalable approach speeds up deployment, lowers costs, and simplifi es the build process. Accordingly, data centers can move at the speed of business at all times — with the fl exibility to adapt to future business needs.

Schneider Electric data center facility modules represent the future of large data centers — delivered today!

Introducing scalable Schneider Electric

Today Tomorrow

Dell-Power-solutions_US_June1_p113v.indd 1 4/26/2012 9:58:21 AM

Page 62: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

60 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Microsoft SQL Server database

deployments play a crucial role

in enterprise operations. And

as they become repositories

for everything from sales transactions

to customer information, they continue to

grow. Mission-critical SQL Server applications

require maximum database uptime and

data availability. In the event of a failure, data

must be restored quickly and accurately.

To maintain the integrity and resiliency of

SQL Server applications, organizations can

capitalize on key features provided by Dell

Compellent Storage Center™ storage area

network (SAN) arrays and enhancements

in SQL Server 2012.

For example, Compellent automated

tiered storage enables highly active data,

such as SQL Server log files, to reside on

high-performance drives while moving

less active data to lower tiers. The Dell

Compellent Data Instant Replay™ feature

provides application-consistent snapshots

that help ensure accurate and complete

restore points in the event of data failure.

And AlwaysOn features in SQL Server

2012—availability groups and failover

cluster instances—enable administrators to

configure availability at both the database

and the instance level.

Considering the critical role

of database servers

Databases are among the most important

IT elements in many organizations. They

often form the foundation of the application

infrastructure, supporting business-critical

functions from decision support systems to

online transaction processing. Additionally,

the explosion of data in today’s enterprises

The rapid growth of data has made data availability a

critical part of IT strategy. Dell™ Compellent™ storage and

Microsoft® SQL Server® 2012 database software leverage

snapshots, tiering, and other capabilities to enhance

database resiliency.

By Maggie Smith, Mike Matthews, and Nicholas Sweere

Boosting database availability through intelligent virtualized storage

Page 63: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 61

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

is accelerating the growth of database footprints.

The Microsoft SQL Server database platform

and applications can be particularly important,

because they are frequently used to manage

core business functions ranging from sales and

marketing to order administration and financials.

To illustrate, although applications such as

Microsoft Exchange messaging software are

vital, IT administrators can take them down

for maintenance at off-hours during the day—

but doing so can still affect the organization.

However, if a financial institution using SQL Server

to run core financial modeling allowed that

database to become unavailable, the downtime

could result in significant loss of productivity,

revenue, and customer goodwill. Similarly, a

global company that depends on its Web site

for 24/7 online sales cannot afford to have the

underlying database offline.

For these reasons, organizations require

database resiliency to help ensure continuity of

business operations. Selecting the right storage

is essential for meeting these requirements—

organizations need available, responsive,

and flexible storage that can grow with their

databases. Dell Compellent storage supports

high-availability features introduced in SQL

Server 2012 and includes capabilities that enable

administrators to manage databases in a way that

helps ensure continuous uptime and resiliency.

(For more information on how Compellent

and Microsoft virtualization technologies work

together to boost IT efficiency, see the sidebar,

“Heightening business agility.”)

Examining database resiliency features

Microsoft SQL Server 2012 offers several

capabilities that enhance database availability

and data protection. It includes SQL Server

AlwaysOn, a high-availability and disaster-

recovery feature that helps improve application

failover time to increase the availability of

mission-critical applications.

AlwaysOn availability groups, introduced

in SQL Server 2012, help ensure availability of

application databases with an integrated set

of options, including automatic and manual

failover of a logical group of databases,

support for up to four secondary replicas, fast

application failover, and automatic page repair.

AlwaysOn failover cluster instances support

multisite clustering across subnets, which enables

failover of SQL Server instances across data

centers. This fast, predictable failover capability

facilitates quick application recovery.

In addition, SQL Server 2012 introduces key

features such as in-memory column store for

increased speed and fast response to queries.

Data quality services help ensure the integrity

of data and the accuracy of reports. And

enhanced data modeling capabilities address

the diverse requirements of business intelligence

users across an organization.

Extending data protection, availability,

and performance

IT organizations can leverage storage-based

resiliency features to enhance and extend

Microsoft SQL Server database resiliency—if

the storage selected meets at least three key

requirements. First, storage must be built to

avoid downtime through hardware redundancy

and on-the-fly administration. Second, storage-

based business continuity technologies such

as snapshots are essential for protecting

Heightening business agility Together with advanced storage virtualization technologies from Dell

Compellent, end-to-end server virtualization and management tools from

Microsoft help IT decision makers simplify data center management—enabling

organizations to adapt quickly and flexibly to changing business conditions.

Capitalizing on Compellent virtual storage for server consolidation allows

organizations to advance IT efficiency in several major ways:

• Maximize utilization of storage resources

• Minimize data center footprint

• Heighten power and cooling efficiency

• Optimize total cost of ownership

A virtual data center environment based on Microsoft and Compellent

technologies is designed to ensure continuous availability and improved

disaster recovery through instant local virtual machine recovery and simple

replication of virtual servers and storage.

Replays for application integrity

Dell Compellent Replay Manager integrates with Microsoft Volume Shadow Copy Service (VSS) to help ensure time-consistent replays of Microsoft Exchange, SQL Server, and Microsoft Hyper-V® volumes. In this video, discover how to use Replay Manager to schedule and manage replays for maintaining application integrity.

qrs.ly/831tje6

Page 64: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

62 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

mission-critical application data. Finally,

storage that includes next-generation data

efficiencies can automate data movement

and optimize for both performance and

capacity. Organizations can leverage the

capabilities of Dell Compellent storage

in these ways to extend the availability

of essential application data stored in

SQL Server databases.

Of course, the need for outage

recovery is avoided altogether if an

outage does not occur in the first

place. Hardware redundancy built into

Compellent storage allows a controller

or hard drive to fail without interrupting

data availability to end users. Compellent

storage also enables administrators to add

capacity and performance dynamically—

an organization can increase the size of

the storage volume, switch out hot-

swappable drives, or add new drives

without taking down the SQL Server

database. Controllers can be upgraded

to adapt to new demands while the SAN

stays up and running.

If a system failure occurs, organizations

can greatly mitigate the impact of

downtime on the customer experience

through automatic and transparent

recovery using Dell Compellent Replay

Manager™ software. Replay Manager works

with Compellent Data Instant Replay to

provide application-aware, time-consistent

snapshots, or replays, for Microsoft SQL

Server (see Figure 1).

The Dell Compellent Data Progression™

feature provides automated storage

tiering, which helps minimize latency for

mission-critical SQL Server applications

by automatically moving infrequently

used data from tier 1 to a lower storage

tier. This capability is especially useful in

data warehouse environments, which

typically contain large amounts of static

data. Administrators often partition data

to improve manageability, separating out

old data and designating it as read only.

To facilitate and help manage this often

complex process, administrators can use

Data Progression to establish policies

for aging data and automatically move

infrequently accessed data to lower-tier,

cost-effective storage, freeing the high-

performance tier 1 storage for active data.

Data Progression enables

improvements in application performance.

With the most important data on tier 1

drives, disk reads and writes are fast,

which in turn can speed up applications

or databases accessing data on those

drives. If lower-tier data comes back into

frequent use, Compellent storage returns

it to the top tier. (For more information on

how Compellent storage can boost the

performance of SQL Server databases, see

the sidebar, “Accelerating insights.”)

Recovering local and remote

databases

Together, Microsoft and Dell Compellent

technologies enable organizations

to quickly and efficiently safeguard

geographically dispersed Microsoft SQL

Server 2012 databases. These technologies

leverage replays to continuously protect

data from server failures, viruses, human

error, and other disruptive events.

Compellent Data Instant Replay is

designed to deliver continuous data

protection by taking multiple space-efficient

snapshots throughout the day. Once a

base snapshot is taken of data written

to a volume, only incremental changes

are captured in ongoing snapshots. This

technique helps save disk space and speed

local recovery. Administrators can take

thousands of snapshots in short intervals for

recovery to a previously known state. Real-

time intelligence and virtual pointers keep

associated snapshots in sync.

The ability to take thousands of

replays of SQL Server databases allows

organizations to efficiently back up

large amounts of data with minimal user

interruption and to recover data quickly.

Replays enable administrators to back

up even large SQL Server databases in

a matter of seconds. Those replays can

then be used to recover data to a server

just as quickly, using a simple point-and-

click interface or using Microsoft Windows

PowerShell™ scripts.

By leveraging integration with Microsoft

Volume Shadow Copy Service (VSS),

Compellent Replay Manager helps ensure

data remains consistent even if SQL Server

is running when the snapshot is captured.

SQL Server remains online during the

snapshot process, but I/O between

SQL Server and Compellent storage is

momentarily quiesced—or paused—to

enable point-in-time accuracy. Figure 1. Taking an application-aware, time-consistent snapshot using Dell Compellent Replay Manager

Page 65: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 63

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

VSS coordinates the function and

timing of the OS, application, and

storage, enabling Data Instant Replay to

take replays without error, disruption, or

downtime. After the replay is taken, the

SQL Server application resumes normal

operation without disrupting end-user

access to enterprise data.

The Dell Compellent Remote Instant

Replay™ feature leverages the same space-

efficient snapshot technology between

local and remote sites for cost-effective

disaster recovery and business continuity.

Following initial site synchronization,

only incremental changes in enterprise

data need to be replicated. Storage

administrators using Remote Instant Replay

can choose between Fibre Channel and

native IP connectivity for data transfer.

Maintaining the integrity and

resiliency of database applications

Dell Compellent storage works side by

side with the native AlwaysOn feature

of Microsoft SQL Server 2012 to offer

reliable, consistent protection of SQL

Server databases. IT decision makers

weighing the benefits of native backup

and storage-based snapshots can

implement both approaches in the

same environment. In some cases, data

protection strategies such as nightly

off-site backups of the full database

using native capabilities of SQL Server

2012 will meet organizational needs.

Other tier 1 applications and databases

may require more frequent backups.

Compellent storage can play an important

role in minimizing backup windows,

using replays to help reduce the intervals

between recovery points and recovery

time objective targets.

In the end, the high-availability,

data protection capabilities of

Compellent storage and SQL Server

share the ultimate goal of protecting

today’s deluge of business-critical

application data and helping IT

administrators to meet ever-increasing

service-level agreements.

Learn more

Dell Compellent storage:

dell.com/compellent

Dell Compellent Replay Manager:

qrs.ly/js1u63g

Microsoft SQL Server 2012:

microsoft.com/sqlserver

Authors

Maggie Smith is a senior marketing manager

at Dell. She is focused on storage solutions for

Microsoft applications and has over 30 years of

experience marketing technology products.

Mike Matthews is a product specialist for Dell

Compellent, focused on helping customers use

Microsoft SQL Server on Dell Compellent storage.

Nicholas Sweere is a product marketing manager

for Dell Compellent storage, focused on core

applications and third-party integrations.

Accelerating insightsAs expensive as healthcare is in the United States,

government and private insurance companies must

verify the integrity of claims after they have been paid in

order to recoup any overpayments. These organizations

turn to Las Vegas–based HealthDataInsights Inc. (HDI), a

technology-enabled healthcare services company that

specializes in the identification and recoupment of claim

overpayments to providers.

The company’s profitability depends largely on how fast

it can load its customers’ claims data—as much as 2 TB a

month—as well as how quickly it can analyze that data and

return results. The company optimized this process using

Dell PowerEdge™ R910 servers running Microsoft SQL Server

2008 but quickly identified its storage area network (SAN) as a

performance bottleneck.

After replacing its legacy SAN with the Dell Compellent

Storage Center SAN, HDI quickly saw improvements in

performance and disk utilization. For example, using Storage

Center to store and manage its SQL Server databases, HDI

obtained a 60 percent improvement in performance on data

loads and an 84 percent performance improvement on SQL

queries compared to the legacy SAN.

With its legacy SAN, HDI found the process of allocating

SAN space to be extremely time-consuming, and the drives

were poorly utilized. Because Compellent storage virtualizes

the underlying arrays, storage utilization was much more

efficient—HDI achieved a 60 percent reduction in the number

of disk drives required compared to the legacy system.

As well as enabling HDI to improve its data analysis

capabilities, Compellent storage helps HDI ensure high

availability through fully redundant hardware and advanced

failover features—continuously protecting critical claims data

against downtime and disaster. For more information, visit

qrs.ly/uo1u550.

Page 66: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

64 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

From e-mail and text messages

to multimedia files and medical

images, today’s burgeoning growth

of unstructured digital content is

driving many IT organizations to reconsider

their data storage needs. Beyond the

challenges of cost-effectively storing,

managing, searching, and preserving large

volumes of data, IT organizations must

grapple with understanding the context and

content of each unstructured data file—

which is key to determining where the file

will reside, whether it should be backed up,

and how long it should be maintained.

Object-based storage, though not

strictly designed for handling unstructured

data, introduces intelligence into the

storage environment so that large volumes

of unstructured data files, or objects, can

be managed smartly and accessed readily

when needed. In particular, the Dell DX

Object Storage Platform combines data and

storage management features, making it

simple to manage and enabling it to cost-

effectively scale to billions of objects.

Integrating the DX Object Storage

Platform into an existing environment

requires careful planning to fit it into the

overall data storage architecture. What types

of data will it store? When will data move

to it? How will end users and applications

connect to it? These considerations are

amplified when the existing environment

is underpinned by diverse communication

protocols. For example, the DX Object

Storage Platform employs an HTTP

representational state transfer (REST)

application programming interface (API) to

communicate with client systems, whereas

traditional file storage environments rely on

the Common Internet File System (CIFS) or

Network File System (NFS) protocols.

F5 ARX file virtualization devices help

organizations seamlessly integrate the

DX Object Storage Platform into existing file

storage environments. It provides a global

namespace—a collection of virtual network

file shares that federates multiple physical CIFS

Object-based storage offers a cost-effective option to

manage unstructured data growth. The F5® ARX® device

uses a global namespace and automated storage tiering to

integrate the Dell™ DX Object Storage Platform for scalable,

transparent file access.

By Renny Shen and Muffadal Quettawala

Integrating object-based storage using a global namespace

Cost-effective, object-based storage

The Dell DX Object Storage Platform is designed to provide a massively scalable, cost-effective approach for long-term data retention and preservation. Use the DX Object Storage Savings Calculator to estimate the return on investment of deploying the DX Object Storage Platform to archive data intelligently.

qrs.ly/r41tjdv

Page 67: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 65

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

shares or NFS exports—to decouple logical

access to files from physical locations in the

environment. The global namespace helps

simplify file access, enabling files to be moved

between file systems and storage devices with

minimal impact to users and applications. The

F5 ARX Cloud Extender™ product augments

the DX Object Storage Platform with a file

system front end that the ARX device can

federate with existing file storage devices

into the global namespace. Using the ARX

device’s file-level data management policies,

IT can then automate file movement

between the DX Object Storage Platform and

existing storage according to organizational

goals, such as helping to reduce costs

through file-level storage tiering.

Virtualizing file storage

In a typical file storage environment, each

network attached storage (NAS) device

is contained within its own namespace.

However, because a namespace is tied to

a specific device, file storage and access

through the namespace is limited to that

device. Individual namespaces increase the

complexity of managing multiple storage

devices, even those of the same type—making

it difficult to share capacity or migrate files.

To address this storage management

challenge, the F5 ARX device is designed

to proxy CIFS- and NFS-based file access

through the global namespace to the

appropriate physical share or export.

It federates the individual namespaces

of storage devices in the environment,

regardless of type or manufacturer.

Figure 1 shows a virtual share federating

four physical shares: three presented

by Dell EqualLogic™, Dell Compellent™,

and Dell PowerVault™ systems and the

fourth by an ARX Cloud Extender device

acting as a front end to a Dell DX Object

Storage Platform cluster. The virtual share

aggregates physical capacity; for example,

if each physical share has 1 TB of available

space, then the virtual share would have

4 TB. Client systems map to the virtual share

in the global namespace instead of to the

individual physical shares. Within the virtual

share, files can reside on any physical share.

The virtualization of the file storage

environment provided by the ARX device

helps simplify file access and management

in environments with multiple file storage

devices. Instead of managing file mappings

to individual namespaces, administrators

can configure file mappings to a unified

global namespace.

Moreover, because clients access

files through a global namespace,

their files can be stored across multiple

heterogeneous devices in a unified

storage pool. This federation of storage

capacity enables organizations to

efficiently utilize storage capacity and

integrate different storage technologies

within their existing infrastructure.

By decoupling logical access to files

from the files’ physical locations, the ARX

device is designed to allow a file’s physical

location to change transparently to client

systems. In turn, it enables administrators

to perform management tasks that

require modifications to the physical

environment, such as tiering files between

different storage devices, with minimal

disruptions and downtime.

Figure 1. A global namespace virtualizes the file storage environment to enable easy, transparent file access for end users

User and application clients

home

Globalnamespace F5 ARX Series

Intelligent file virtualization

CIFS*/NFS

CIFS*/NFS

HTTP

home

Physical namespaces

home home

Dell Fluid File SystemDell EqualLogic, Compellent*, or PowerVault

Dell DX ObjectStorage Platform

CIFS*/NFS

home

Physicalnamespace

F5 ARX Cloud Extender

*Support for Compellent-based Dell Fluid File System and CIFS support for Dell Fluid File System products are planned for 2H 2012.

Page 68: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

66 2012 Issue 02 | dell.com/powersolutions

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Providing file access to

object-based storage

Unlike NAS devices and file servers, which use

CIFS or NFS protocols, the Dell DX Object

Storage Platform communicates using HTTP

through a proprietary REST-based API, making

it well suited to support Web applications.

However, organizations wishing to integrate

an object-based storage platform into a file

storage environment must first translate the

CIFS and NFS protocols to the REST-based

API. F5 ARX Cloud Extender provides a CIFS or

NFS front end that extends the ARX device’s

global namespace to a wide range of public

and private cloud storage options, including

the DX Object Storage Platform. This file

system front end provides several essential

components (see Figure 2):

• API translation: ARX Cloud Extender

translates CIFS- and NFS-based access

to the appropriate REST-based API call to

store or retrieve files through this interface.

• File staging: Because client systems

cannot access files directly from an

object store, the local file system

provides a staging area where client

systems can write or read files before

the ARX Cloud Extender migrates them

to the DX Object Storage Platform.

• File-level access control: ARX Cloud

Extender provides file-level access

control to data stored in the DX Object

Storage Platform, helping ensure that

client systems can read and write only

files for which they have the appropriate

access privileges.

• Local metadata cache: Some file-

access operations require only file

metadata instead of file contents. A

local metadata cache fulfills these access

requests without retrieving files from

the DX Object Storage Platform, helping

minimize file access latency.

When a client attempts to access a file,

ARX Cloud Extender verifies that the client

has the appropriate privileges, allowing or

rejecting access as necessary. In the case

of new file creation, it allows the client to

create the file in the local file system.

For a metadata-only operation, ARX

Cloud Extender satisfies the request from its

local metadata cache without recalling the

file. To read an existing file, the ARX Cloud

Extender issues an API call to GET the file

from the DX Object Storage Platform cluster

and then makes the file available to the client

for reading. To write to an existing file or

create a new file, the ARX Cloud Extender

issues the API call to PUT or POST the file

in the DX Object Storage Platform cluster.

Once the data has been moved to the DX

Object Storage Platform, the ARX Cloud

Extender discards the local copy of the file,

replacing it with a pointer containing the

file’s metadata and the location of the object

on the DX Object Storage Platform.

Automatically tiering files

From an operational perspective, smooth

integration of the Dell DX Object Storage

Platform into an existing file storage

environment requires automatic storage Figure 2. F5 ARX Cloud Extender helps manage the process by which files are stored on the Dell DX Object Storage Platform

CIFS/NFS file access

F5 ARX Cloud Extender Filestaging

PUT/GET/POST

Dell DX Object Storage Platform

File-level access control

Local metadata cache

API translation

Implementing object-based storageTo help organizations integrate object-based storage into their existing environments,

Dell Services uses experience gained through thousands of engagements with

organizations in a variety of industries. Consultants from Dell Services collaborate

with organizations to help them plan, assess, and implement data management

projects and keep projects focused and on schedule. Dell offers a wide range of

customized consultation services that deliver robust design and implementation to

facilitate successful deployment of the Dell DX Object Storage Platform for cloud

storage and archiving.

Page 69: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 67

Data managementSpecialsection

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

of files on appropriate storage platforms without

administrator intervention. F5 ARX devices provide

automated storage tiering policies that classify

files by their organizational value and match

classifications to appropriate types of storage.

The ARX device provides a simple, customizable

approach to classification using a variety of file

characteristics, including the following:

• Age: Files tend to have maximum organizational

value immediately after they are created and

while they are in active use. As files age, they

decline in value but may still need to be retained,

for compliance or other reasons. Policies can be

designed to place active files on high-performance

storage and move inactive files to lower-cost,

lower-performance storage when appropriate.

• Type: Different types of files have inherently

higher or lower value than others, depending

on organizational priorities. Administrators can

create policies to assign different types of files

to appropriate storage tiers.

• Location: Organizational value often can be

determined based on file location. For example,

the contents of file shares on corporate

servers used by a business application may

be of higher value than files in end users’

home directories.

ARX devices can automatically move or place

individual files on different storage tiers. In the

example scenario shown in Figure 3, most files are

automatically placed on tier 1, or primary storage,

when created. After 90 days of inactivity, the ARX

device migrates the files to tier 2, or backup/

secondary storage. Additionally, PST files in this

example scenario are always placed on tier 3 archival

storage, where administrators can apply a separate

backup policy. User clients have online access to their

files through the global namespace, regardless of the

type of storage where each file physically resides.

Effectively integrating object-based storage

The Dell DX Object Storage Platform provides

enterprises with simple, scalable, and cost-

effective storage that is well suited for many types

of applications, from Web publishing to long-

term archiving (see the sidebar, “Implementing

object-based storage”). F5 ARX and ARX Cloud

Extender help organizations seamlessly integrate

object-based storage into their existing file storage

environments to hold unstructured data.

The ARX device is designed to migrate and tier

files between heterogeneous NAS devices without

disrupting users and applications. The ARX Cloud

Extender brings migration and tiering of files to

cloud storage. Working together, these technologies

help federate capacity from multiple heterogeneous

storage devices into a unified storage pool;

provide CIFS- and NFS-based file access to data

stored on an object-based storage platform; and

automatically tier files between different types of

storage based on organizational value.

Using these capabilities, the ARX system

enables file-management efficiencies and reduced

operational costs through policies and tiering to

the DX Object Storage Platform. It extends the use

of archive storage within a scalable cluster to large

numbers of clients—helping to maximize the value

of an enterprise’s investment in an object-based

storage repository.

Learn more

Dell and F5 Networks:

bit.ly/qQVxA4

F5 DevCentral Dell community:

devcentral.f5.com/dell

Dell DX Object Storage Platform:

dell.to/fWmtkv

F5 trial software downloads:

f5.com/trial

Authors

Renny Shen is a product marketing

manager at F5 Networks.

Muffadal Quettawala is a storage

solutions engineer at Dell.

Figure 3. In an example scenario, automated storage tiering helps maximize cost-effectiveness by moving data at the right time to the right storage

User clients

home

Globalnamespace

F5 ARX

CIFS/NFS

CIFS/NFS

<90 days

Physical namespaces

>90 days *.PST

$$$$$$

Page 70: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

68 2012 Issue 02 | dell.com/powersolutions

Data management | Customer perspectiveSpecialsection

One of the world’s most recognizable automotive brands, Mazda Motor

Company manufactures roughly one million cars annually. To stay on the

fast track, the infrastructure services department at Mazda North American

Operations test-drove storage and virtualization options. Finding the right

solution would help the department streamline business operations for 1,100 internal

business users and more than 16,000 users at 800 dealerships across North America, as

well as global projects assigned by the head office in Japan.

Virtualized servers and tiered storage helped Mazda minimize IT

complexity and increase network and application performance,

freeing IT to focus on initiatives that advance business innovation.

Mazda North American Operations

Accelerating performance through virtualized, tiered storage

However, storage constraints

threatened to become a roadblock.

“Our legacy storage architecture had

adequate capacity but couldn’t provide

the performance we needed to support

virtualization,” says Kai Sookwongse,

department manager for IT infrastructure

services. Sookwongse and his team also

needed to cut annual spending and

maintenance time for over 200 physical

servers requiring lengthy backup and

snapshot processes. The staff spent

significant time swapping out servers and

moving critical applications.

Tiering to boost I/O throughput

Sookwongse and his colleagues

examined the Dell™ Compellent™ Storage

Center storage area network (SAN) array

based on Dell Fluid Data™ architecture.

“Thanks to the way the architecture

manages data at the block level, we

discovered we could perform I/O

writes to the storage system very rapidly,”

says Sookwongse.

The Mazda infrastructure services

department implemented a Compellent

storage architecture with three tiers

of capacity. Tier 1 comprises nine

solid-state drives (SSDs) that handle

VMware® virtualization software and

high-performance databases, as well as an

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 71: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 69

Data management | Customer perspectiveSpecialsection

SAP® accounting module and system-level

functions such as Microsoft® Windows®

OS page files. Tier 2 storage includes

15,000 rpm Fibre Channel drives and covers

lower-performing databases. Performance

remained high enough to cover some SAP

application support and write I/O to tier 2

directly. Tier 3 comprises 7,200 rpm drives

and is used for read-only storage, allowing

read-concurrency performance as high as

that in tier 1.

The Fluid Data architecture is designed

to intelligently move information across

and within the Compellent storage so

organizations can scale up and out

seamlessly. “The Dell Compellent SAN

accelerates VMware performance and helps

us get maximum value from our key storage

assets,” says Sookwongse.

Virtualizing for performance gains

Mazda virtualized its SAP applications

on 29 guest machines powered by

four Dell PowerEdge™ R710 servers.

“The newer, more powerful Dell servers

support the virtualized environment

extremely well,” says Barry Blakeley,

infrastructure architect at Mazda North

American Operations.

With an end-to-end virtualized server

and storage architecture powered by the

SAN in place, the Mazda infrastructure

services department has substantially

boosted application performance. “We

are now enjoying performance gains

anywhere from 80 to 400 percent,”

Sookwongse says. “Critical applications

like SAP actually run better.”

Compellent storage helped Mazda

reduce the window for nightly batch jobs

by 69 percent. Tight integration between

Compellent storage and VMware software

lets the IT team perform many backup

deduplication tasks more quickly than

before. Complete system snapshots now

take 30 seconds using the Dell Compellent

Data Instant Replay™ feature, and full

backup routines that once took 16 hours

now take 6 hours.

Furthermore, the auto-tiering capabilities

of Storage Center helped reduce time-

consuming manual tasks. “We simply set

up the storage profile, and the system

automatically moves the data to the

highest-performing storage tier based on

the actual usage of the application,” says

Blakeley. “It’s all handled without IT staff

intervention, which frees our staff to focus

on more important things.”

Innovating for the advantage

The Mazda infrastructure department

has been able to cut annual spending on

servers by 60 percent. Aggregating physical

disks into logical virtual volumes allows the

department to leverage a single dynamic

pool of storage resources shared by virtual

machines, regardless of disk type, RAID

level, or server connectivity.

Mazda is steering its network environment

toward 99 percent virtualization. Eighty

percent of the network environment is

virtualized, and hosting business-critical

applications on virtual servers is now the

standard North American service offering.

The new storage and middleware

has improved the department’s ability to

provision critical business applications on

demand. “We support sales and marketing

for all of North America, and virtualization

is simply the most cost-effective way

to support the various business units,”

says Sookwongse.

The Mazda infrastructure services

department now concentrates on helping

the company become more efficient in

daily operations. “We recently released

an iPad application for dealers to use in

the sales process, and we need to be

agile to do that,” says Jim DiMarzio, CIO

at Mazda North American Operations.

“Our Dell Compellent system gives us the

competitive advantage we need to come

up with innovative new applications that

work in mobile environments and be first

to market.”

Driving performance, savingsStorage and server virtualization helped the Mazda infrastructure services department boost operational performance and reduce the

amount of time it spends on support and management, allowing the company to reallocate resources to research and development.

As a result, Mazda aims to attain 99 percent virtualization of its network environment, capitalizing on the benefits of virtualization.

400%Mazda realized substantial gains in application performance—anywhere from 80 percent to 400 percent—by virtualizing its storage.

6 hoursIntegration between Compellent storage and VMware virtualization enabled the IT team to reduce full data backups from 16 hours to 6 hours.

60%By leveraging the single pool of shared storage created through virtualization, the IT team was able to cut annual spending on physical servers by 60 percent.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 72: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

70 2012 Issue 02 | dell.com/powersolutions

Intelligent server infrastructure

Large enterprise data centers

are not alone in requiring fast,

adaptable servers to help increase

infrastructure intelligence and

accelerate response to complex service

demands. The efficiency, performance,

and scalability of IT systems help drive the

success of any size organization.

Innovative 12th-generation Dell

PowerEdge servers reflect the input Dell

received about what customers worldwide

need to power their organizations. The

resulting portfolio of 12th-generation

PowerEdge servers is engineered with

intelligent infrastructure that is designed to

enhance IT flexibility and business agility

through advanced systems management,

fast deployment, and streamlined workload

provisioning. Moreover, these servers optimize

resource utilization through virtualization

and minimize power and cooling costs with

heightened energy efficiency.

Elevating data center intelligence

across a broad range of deployments

Earlier this year, Dell introduced innovations

in its first wave of 12th-generation PowerEdge

servers designed primarily for large enterprise

data centers.1 Dell is extending these

significant advancements in a second wave

of 12th-generation PowerEdge servers.

In addition to large enterprise operations,

these systems are expressly designed

to meet the needs of small and midsize

organizations as well as departments and

remote offices of large organizations (see

the sidebar, “Benefits rich, size agnostic”).

Centralized remote management

Organizations can utilize cost-effective

systems management capabilities built

into these PowerEdge servers, which are

By launching the latest members of the 12th-generation

Dell™ PowerEdge™ server family, Dell extends the benefits

of advanced innovations to organizations of all sizes—from

small and medium businesses to large enterprises.

By Lisa Onstot and Tad Walsh

Extending the benefits of server innovation

1 For more information on the first wave of 12th-generation Dell PowerEdge servers, see “The intelligent data center,” by Paul Steeves and Matt McGinnis, in Dell Power Solutions, 2012 Issue 1, qrs.ly/6e1tjdy.

2 For more information on Dell OpenManage Essentials, see “Streamlining basic hardware management,” by Travis Zhao, Rob Cox, Enrico Bracalente, and Kevin Noreen, in Dell Power Solutions, 2012 Issue 1, qrs.ly/1o1tjea.

Online systems management tool

IT decision makers can use the interactive Systems Management – Dell OpenManage advisor tool to help simplify data center planning. Its easy-to-use, interactive interface presents a series of multiple-choice questions designed to zero in on systems management requirements for server deployments.

dell.com/openmanageadvisor

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 73: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 71

designed to save time and reduce the

potential for error through automation.

These built-in capabilities are available

in Dell OpenManage™ Essentials2 and

Integrated Dell Remote Access Controller 7

(iDRAC7) with Lifecycle Controller for agent-

free embedded systems management.

Using these PowerEdge servers,

small or remote organizations can

access enterprise-scale, one-to-many,

automated management tools, and large

organizations can leverage these tools to

monitor their remote offices. Without this

level of monitoring in previous-generation

platforms, technicians often had to travel to

remote sites to diagnose and fix problems.

Instead, built-in monitoring and fault

systems management in PowerEdge servers

enable organizations to administer remote

systems from a primary site—enhancing

cost-effective use of IT resources.

Optimized virtualization support

As virtualization continues to expand into

production environments, PowerEdge servers

are designed to support the stepped-up

deployments. For example, dual embedded

Secure Digital (SD) media enables hypervisor

information to be mirrored, providing for

enterprise-quality hypervisor protection.

Moreover, these PowerEdge servers

are designed to offer significantly more

powerful processing capabilities with

either the Intel® Xeon® processor E5-2400

product family or the Intel Xeon processor

E5-4600 product family, together with

increased memory capacity compared to

previous generations. This augmented

processing power facilitates provisioning

for high numbers of virtual machines per

server. And to avoid bottlenecks in virtual

machine performance, these PowerEdge

servers also feature expanded I/O—offering

additional PCI Express (PCIe) slots as well

as PCIe 3.0 capability to provide more

lanes than in previous generations to help

speed throughput.

Room for organizational growth

Whether an organization is small, midsize,

or large, it needs capacity for growth. But

the rate of expansion often can be difficult

to predict. For example, IT decision makers

could anticipate an upcoming year’s

growth to be approximately 5 percent,

but it may just as easily end up being

50 percent or higher. For this reason,

Benefits rich, size agnostic The second wave of 12th-generation Dell PowerEdge servers advances business and organizational agility with innovative, enterprise-class

features designed to heighten data center efficiency, performance, and scalability. In addition, the systems span rack, tower, and blade server

form factors to meet specific platform needs for small or midsize organizations, small or branch offices, and large enterprises alike.

PowerEdge R820 PowerEdge R520 PowerEdge R420

Key features and

capabilities

Designed to excel at running a wide range of applications for both midsize and large enterprises, this ultradense four-socket, 2U rack server offers compute-intensive performance with highly scalable memory up to 1.5 TB and impressive I/O capabilities. Powered by the Intel Xeon processor E5-4600 product family, this server provides 48 dual in-line memory modules (DIMMs) and the capability to support dual RAID controllers. It readily handles demanding workloads including enterprise resource planning, data warehousing, and virtual desktop infrastructure.

This two-socket, 2U rack server powered by the Intel Xeon processor E5-2400 product family offers an excellent balance of performance and scalability that is well suited for Web serving and hosting, e-mail and messaging, or running a wide range of core applications. Its configuration flexibility and scalability, together with its memory capacity and balanced I/O bandwidth, provide a cost-effective platform for consolidation and virtualization.

Organizations requiring double-down density and performance may find this robust two-socket, 1U rack server powered by the Intel Xeon processor E5-2400 product family to be an excellent fit for compute-intense applications and high-performance computing workloads. A low profile also makes it attractive for departmental e-mail, workgroup collaboration, and file and print applications.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 74: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

72 2012 Issue 02 | dell.com/powersolutions

Intelligent server infrastructure

deploying servers that can expand with

organizational needs over time regardless

of the rate of growth is important.

When it comes to memory, hard drives,

and even processors, these PowerEdge

servers are designed to provide improved

expandability and flexibility. Enhanced

capacity helps IT organizations leverage their

initial server investment as they grow and

avoid downtime during reconfiguration or

server swaps. Increased internal storage in

these servers helps save space and reduce

storage systems management requirements

compared to external storage. This flexible

capacity can be a tremendous benefit not only

for large enterprises, but also for remote or

satellite offices and growing organizations that

may not have abundant internal IT expertise.

Fresh approach for cooling

and energy efficiency

Because 12th-generation PowerEdge servers

are Fresh Air compliant, they are designed

to continue operating without problems in

temperatures up to 113 degrees Fahrenheit (°F)

or 45 degrees Celsius (°C)—for example,

if it becomes necessary to raise the

temperature of the workplace to meet

brownout power limits set by a utility. This

Fresh Air compliance not only delivers

cost savings in the data center by helping

reduce cooling needs, but it also helps

organizations ride through power brownouts

that are commonplace during summer

months in many geographical areas.

Fresh Air compliance is also well suited

for organizations with small, remote, or

temporary installations in the field, from

producers of music concerts to oil and gas

companies. For example, oil exploration may

require a limited number of remote on-site

servers to keep track of seismic testing data,

and PowerEdge servers can operate in the

extended temperature ranges that might be

a condition in these field activities.

Exploring flexible form factors

The second wave of 12th-generation

Dell PowerEdge servers includes rack,

tower, and blade form factors. Rack-

mounted PowerEdge servers offer

more hot-swappable hard drives than

previous-generation PowerEdge servers

to provide added support for growing

volumes of internally stored data. These

next-generation servers also provide a

substantial increase in memory—up to

50 percent more dual in-line memory

module (DIMM) slots than the previous

generation. These DIMM slots can be

used to provide rapid response times for

memory-intensive workloads such as

small and medium database applications.

The rack servers are available with a small

form factor and enhanced density that is

well suited for virtualization deployments.

Locations that require a slim-profile server

may place this form factor on a desktop,

shelf, or countertop.

Reliability, availability, and serviceability

(RAS) features, such as memory mirroring,

that are not typically available in servers

designed for price-sensitive environments

are available in PowerEdge rack servers.

Memory mirroring allows the server to

keep working in spite of a DIMM failure,

preventing a potential server outage that

could put business activity at risk. The

PowerEdge R320 PowerEdge T420 PowerEdge T320

Featuring enterprise-class, high availability and high-capacity internal storage with up to eight hard drives, this one-socket, 1U rack server based on the Intel Xeon processor E5-2400 product family and Intel Pentium® processor product family is designed to offer highly reliable and secure Web serving and file sharing. Straightforward systems management helps free up time for IT administrators while providing cost-effective local and remote operations.

The acoustical profile of this two-socket, rackable tower server powered by the Intel Xeon processor E5-2400 product family is quiet office compliant and helps to reduce noise levels in data centers. Its performance and built-in capacity for nondisruptive growth make it an excellent platform for general-purpose business workloads such as data sharing, file and print, and e-mail. Small and remote offices, where IT skills may be limited, can benefit from its easy manageability enabled by Integrated Dell Remote Access Controller 7 (iDRAC7) with Lifecycle Controller.

With enterprise-class memory protection features that help keep organizations up and running, this powerful yet quiet one-socket, rackable tower server powered by the Intel Xeon processor E5-2400 product family is appropriate for workgroup collaboration and productivity applications. Small offices that may not have trained technical IT resources on-site can benefit from its robust design and easy manageability.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 75: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 73

servers also offer hard drive and memory

expandability for future growth.

Dell engineers were able to reduce

the depth of PowerEdge tower servers by

two inches, which enables them to fit into

a smaller space than previous-generation

PowerEdge tower servers, or allow more

room behind the server for cabling and airflow.

Moreover, enhanced acoustics allow these

servers to be placed unobtrusively in small,

quiet offices.

In addition, PowerEdge tower servers

can be converted to rackable units.

This feature can be advantageous for

fast-growing organizations and remote

offices. As organizations or departments

experience growth, they often lose space

underneath desks or on countertops

where tower servers are typically located.

Consolidating servers into one or more

racks helps conserve space in a confined

server closet or a small room serving as a

compact data center, as well as minimizing

the server footprint in large data centers.

Maximized performance, density, and

efficiency of PowerEdge blade servers

enable organizations to greatly reduce

the cost and complexity of managing

computing resources. This form factor

allows organizations to minimize the server

footprint by housing multiple blades in a single

enclosure. As business activity grows and

additional compute resources are needed,

organizations can simply slide additional

blades into the enclosure. Redundant

chassis components combine with remote

management and fail-safe hypervisor

capabilities to help ensure uptime for key

applications and virtualization deployments.

Scaling server platforms for optimal

agility and growth

By provisioning exceptionally flexible

compute capacity, IT organizations

can boost productivity and growth.

Twelfth-generation Dell PowerEdge

servers are designed to optimize energy

efficiency, streamline management, and

enhance compute power for heightened

application performance, with abundant

memory capacity to support virtualization

and increasingly complex workloads.

Continuous efficiency gains are essential

for organizations trying to do more with

less. Built to bring world-class, enterprise-

caliber performance and operational

efficiency to any size organization, this

fresh wave of 12th-generation PowerEdge

servers enables IT decision makers to

advance business and organizational

goals—with a significant return on their

technology investment.

PowerEdge M820 PowerEdge M520 PowerEdge M420

This feature-rich, enterprise-class platform powered by the Intel Xeon processor E5-4600 product family offers remarkable memory capacity that scales up to 1.5 TB per full-height, four-socket blade server. Its form factor and leading-edge performance are well suited for high-end databases or dense data center environments that require very capable and highly scalable nodes.

In this flexible, half-height blade platform powered by the Intel Xeon processor E5-2400 product family, energy efficiency and capable performance are well suited for mainstream business applications as well as e-mail, database, and virtual environments—even in small and midsize organizations where space may be at a premium.

This quarter-height blade server powered by the Intel Xeon processor E5-2400 product family delivers impressive computational density by leveraging the Dell PowerEdge M1000e chassis, which accommodates up to 32 individually serviceable blade servers. By providing enterprise-class features, this server offers a combination of performance and efficiency that is well suited for space-constrained data centers or organizations looking to achieve cost-benefits from high node-count density.

Authors

Lisa Onstot is a server marketing director in the

Enterprise Server Group at Dell.

Tad Walsh is outbound marketing manager

for server platforms in the Enterprise Solutions

Group at Dell.

Learn more

Dell PowerEdge 12th-generation servers:

dell.com/servers

Embedded server management:

dell.com/idrac7

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 76: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

74 2012 Issue 02 | dell.com/powersolutions

Point of view

At many organizations today, the

network that connects headquarters to

remote offices/branch offices (ROBOs)

has become crucial to maintaining

smooth, uninterrupted business operations. And

moving forward, the network will keep playing an

important role. For proof, just look at the number

of aggressively paced data center consolidation

and application centralization projects underway

across the business landscape—projects

happening with IT efficiency and application

delivery improvement in mind.

Because of the consolidation trend,

ROBOs are now connecting over much longer

distances than before. In a survey of networking

professionals representing midmarket and

enterprise-class organizations, IT analyst firm

Enterprise Strategy Group (ESG) uncovered

a number of interesting points tied to this

development.1 For one thing, physical data

center consolidation itself is now so prevalent

it is classified as a top-ten IT initiative. And

when ESG asked IT professionals about their

preferred deployment method for applications

supporting ROBOs, more than 50 percent of the

respondents indicated a preference for deploying

and managing applications centrally, rather than

having ROBOs access the applications over the

wide area network (WAN).

It is no surprise that data center merging has

become popular. Consolidating facilities and

applications leads to many benefits. For example,

an organization that consolidates its data centers

can avoid excess infrastructure and IT staff at the

remote sites. And the IT group that consolidates

applications can streamline upgrades and patches

efficiently, from a central point of control.

Organizations are being quite thoughtful

about their priorities for their ROBOs. Security,

application performance, and availability appear to

be their most important considerations. Efficient

information sharing, backup improvements, and

WAN cost reduction also factor highly on the

priority list. But balancing the multiple priorities

can get challenging.

Consolidation of regional data centers and

applications into larger, centralized operations is

a complicated endeavor. And as organizations

run more traffic over their WANs than before,

consolidation can begin to generate hassles.

The current state of affairs

In recent months, ESG has conducted

considerable primary research on network

trends—collecting enough intelligence to

formulate some high-level observations regarding

ROBOs and the centralized networks they now

rely on so much.2

First, ROBO network connection configurations

still vary widely. The most common types of

connections are virtual private networks (VPNs),

digital subscriber line (DSL) networks, and

Multiprotocol Label Switching (MPLS) networks.

But organizations are leveraging everything from

56 Kbps dial-up to private optical connections

that reach speeds exceeding 1 Gbps. Most links

Remote- and branch-office networking trends

The corporate network has become more important than ever

before. But is all that traffic flowing to and from remote offices

starting to impair the business-critical link?

By Bob Laliberte

1,2,3 “ Remote office/branch office network trends,” by Bob Laliberte, Enterprise Strategy Group, April 2012, qrs.ly/8i1u54y.

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 77: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 75

Point of view

are connecting at between 1.5 Mbps

and 45 Mbps. As one might expect,

the higher the head count at a remote

office, the faster the WAN connection

is likely to be.

Second, organizations are

experiencing challenges with these

ROBO-connected networks (see

Figure 1). Their number-one difficulty

involves managing WAN performance:

39 percent of the organizations ESG

spoke to consider performance

management to be problematic.

Following the performance issue are

challenges in managing WAN traffic,

configuring remote devices, and

accommodating video and voice over

IP (VoIP) applications.

The bigger truth

As organizations with ROBOs carry

on consolidating data centers

and centralizing applications, the

onus remains on them to ensure

adequate application performance

at all locations. ROBO environments

vary greatly. But the organizations

running them share similar goals: to

tighten security, improve application

performance, and better support

remote workers.

Unfortunately, organizations are

still working out how to establish the

proper bandwidth to manage WAN

performance while keeping WAN

costs under control (see the sidebar,

“Bandwidth hogs”). Given that most

organizations ESG surveyed pay more

than US$1,000 per month, per site,

the costs definitely add up. IT teams

should strongly consider using WAN

optimization technology to help

improve network performance and

reduce network costs.

Learn more

Enterprise Strategy Group:

enterprisestrategygroup.com

Author

Bob Laliberte is senior analyst at Enterprise

Strategy Group. He focuses on data center

networking technologies and management

software, tracking networking discontinuity

issues, software-defined networks, and

network optimization.

Figure 1. Many organizations face challenges in managing WAN performance for ROBOs

Bandwidth hogsWhat applications consume the most

network bandwidth? Here’s a list of culprits:

• E-mail:Even with top-notch spam filtering,

employees get a tremendous amount of

e-mail daily. In a typical in-box, half the

messages may have huge Microsoft®

PowerPoint® files, high-definition videos,

or digital pictures attached.

• Collaborationandfile-sharing

applications:For an application such

as Microsoft SharePoint® collaboration

software to have true value, it must

be centralized. This means that every

day, remote workers are accessing,

downloading, editing, and uploading

files. For the organization, collaboration

drives productivity. For IT, all that

bandwidth consumption eventually

causes a negative impact.

• Customerrelationshipmanagement

(CRM)andsalesforceautomation

(SFA):CRM and SFA tools also require

centralization and constant accessibility

to be beneficial. CRM traffic is already

affecting WANs.

• Videoandmultimediacreation:As

organizations increasingly leverage

video to impart information and

conduct training, multimedia

applications are likely to climb

higher on the list of bandwidth hogs

in the near future. Certainly, WAN

optimization vendors recognize the

need to support video, and they have

adapted their products accordingly.

• Webapplicationsande-commercesites:

Most commonly, organizations convert

previously distributed applications into

Web-based applications and deploy

them centrally.

WAN performance management

WAN availability

Configuring/managing remoteo�ce networking equipment

Monitoring/managing WAN tra�c

Managing latency-sensitive applicationslike video and IP telephony

Network configuration management

Load-balancing application accessacross multiple data centers

Identifying, prioritizing, and acceleratingapplication tra�c on the WAN

Installing/managing WANoptimization equipment

Configuring and managing ROBOwired and wireless networks

Managing WAN providers

Configuring/managingDomain Name System (DNS)

0 10% 20% 30% 40%

39%

30%

30%

29%

28%

27%

25%

25%

22%

22%

What would you consider to be the biggest networking challenges your organization faces when it comes to supporting IT requirements for ROBO locations and remote workers?(Percent of respondents, N=279, multiple responses accepted)3

22%

16%

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Page 78: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

76 2012 Issue 02 | dell.com/powersolutions

Networking

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

Ongoing adoption of cloud-based

systems for delivering applications

and services, coupled with a

corresponding steady rise in data

volume, is driving the demand for increased levels

of performance, accelerated throughput, and

enhanced security. To help meet the performance

needs required for implementing private or public

cloud platforms, many organizations are moving

to 10 Gigabit Ethernet (10GbE) connectivity in

their data centers. 10GbE networks offer increased

bandwidth for transmitting large volumes of data.

However, existing server deployments are often

not able to keep pace with the increased I/O that

results from cloud-based transactions and the rise

in data flowing through an expanded pipe.

Security is also a paramount consideration

in cloud-based delivery systems. The uptick in

sensitive information—personal identification,

financial transactions, medical histories,

proprietary business-critical data, and so on—

that is leaving the traditional on-premises IT

environment is intensifying the demand for

data encryption to meet the expectations of

authorized users. The necessary encryption and

decryption processing for the 10GbE line rate can

also create bottlenecks.

Data centers facilitating cloud computing

platforms require enhanced bandwidth and fast

encryption capabilities to deliver cloud-based

services flexibly, efficiently, and securely.

Working together, Dell and Intel have developed

networking innovations for a platform designed

to provide both high performance and increased

security across a wide array of operating systems.

Cost-effective 12th-generation Dell PowerEdge

servers powered by the Intel® Xeon® processor

E5 product family offer a flexible, easy-to-manage

platform for providing agile, secure, and efficient

delivery of cloud-based applications and services.

These servers can utilize Dell PowerEdge Select

Network Adapters based on Intel® Ethernet

technology to optimize 10GbE networking and

enable balanced, scalable I/O capabilities.

Through a combination of processor-level

and platform-level features, 12th-generation

PowerEdge servers are designed to improve

security and ensure fast encryption and

decryption at 10GbE speeds, while also helping

simplify management of virtual machines.

Scaling I/O for enhanced performance

To handle the increase in data traffic through

their networks, many organizations providing

cloud-based services are transitioning to 10GbE

connectivity for networks and storage, and

12th-generation Dell PowerEdge servers help

simplify this transition. These PowerEdge

server platforms are designed to support and

adapt to increasingly complex workloads,

and are well suited for building efficient,

virtualized environments.

Enterprises can enhance performance and security for cloud-based

services by deploying 12th-generation Dell™ PowerEdge™ servers

powered by the Intel® Xeon® processor E5 product family and the

Intel® Ethernet 10 Gigabit Converged Network Adapter family.

By Brian Johnson and Rahul Deshmukh

Optimizing network bandwidth for secure cloud environments

Page 79: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 77

Networking

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

In particular, Dell PowerEdge R720 servers based on the Intel

Xeon processor E5 product family support integrated 10GbE LAN

on Motherboard (LOM) connectivity with flexible networking

options. Intel Ethernet-based networking technologies offer low-

cost, power-efficient 10GbE bandwidth for next-generation server

platforms, while also supporting Gigabit Ethernet (GbE) for elastic

networking environments.

For example, the dual-port Intel® Ethernet Converged Network

Adapter X540-T2 (Intel® Ethernet CNA X540-T2) provides increased

bandwidth and enhanced capabilities for cost-effective 10GbE

deployments. Its Intel Ethernet Controller X540 silicon supports

10 Gbps Ethernet server LOM and Intel Ethernet-based Network

Daughter Card technology designs. Hot-swappable network

daughtercards, such as the Intel Ethernet CNA X540-T2, are included

in the family of Dell PowerEdge Select Network Adapters available for

12th-generation PowerEdge servers. This leading-edge 10GBASE-T

adapter is backward compatible to GbE connectivity, helping IT

organizations ease their transition to a 10GbE infrastructure.

By offering a range of LOM features, the daughtercards are

also designed with the flexibility to meet evolving networking

needs. The 10GBASE-T standard provides the physical interconnect

capability that helps optimize 10GbE networking, while it cost-

effectively enables organizations to use their existing Ethernet cable

infrastructure. And these 10GbE-capable adapters are also designed

to reduce power consumption and cost per port to facilitate a range

of usage models such as unified networking, I/O virtualization, and

Flexible Port Partitioning (FPP).

The Intel Xeon processor E5 product family includes additional

innovations for enhancing I/O in 12th-generation PowerEdge servers.

For example, Intel® Integrated I/O and its key Intel® Data Direct I/O

Technology (Intel® DDIO) feature avoid data traffic bottlenecks

and significantly help to reduce latency. Intel DDIO technology

allows Intel Ethernet-based controllers and adapters to talk directly

with the processor cache to enhance system bandwidth utilization

while minimizing power consumption. These performance

enhancements are designed to avoid the need to move and store

data in memory before transferring it to cache for processing. The

Intel Xeon processor E5 product family provides a large cache of

up to 20 MB, and Intel DDIO can set aside a portion of this cache

for I/O, which allows data to bypass memory and flow from the

network adapter silicon to the cache.

The Dell PowerConnect™ 8024 high-density 10GbE switch is

designed to further augment network performance and throughput in

densely virtualized cloud computing deployments. The PowerConnect

8024 switch also helps IT organizations ease the transition to 10GbE

networking by providing Data Center Bridging (DCB)–supported

Page 80: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

78 2012 Issue 02 | dell.com/powersolutions

Networking

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

10GBASE-T ports that enable reliable, high-

throughput 10GbE connectivity for converged

Ethernet environments. The switch supports

up to 24 ports of 10GbE connectivity along

with four combination ports, and it advances

scalability by managing multiple wire-speed

switches as a single unit. Hot-swappable,

redundant power supplies and convenient

stacking features help further simplify data

center networking. In addition to providing

robust security and enterprise management

capabilities well suited for high-volume data

center environments, the PowerConnect

8024 switch enables IT organizations to

leverage existing LAN infrastructure without

requiring additional components such as

cables, switches, and adapters.

Keeping pace with encryption

demands for 10GbE networks

In addition to requiring high levels of

performance and throughput to help

manage the escalation of large workloads,

private and public cloud computing

deployments also demand robust security

to help ensure that organizational data

is not compromised. Specifically, many

organizations require rock-solid data

encryption and decryption to help

secure the rising volumes of data that

are transmitted outside the data center.

The Intel® Ethernet 10GbE Network

Daughter Card capabilities available with

12th-generation Dell PowerEdge server

platforms powered by the Intel Xeon

processor E5 product family enable

organizations to achieve significant

throughput performance enhancements

without incurring a security trade-off.

Expanding on the existing Advanced

Encryption Standard (AES), the Intel®

Advanced Encryption Standard New

Instructions (Intel® AES-NI) included in the

Intel Xeon processor E5 product family

enables accelerated encryption and

decryption capabilities. AES-NI comprises

a new set of instructions that helps

improve data protection by performing

How a cloud provider boosts throughput without compromising securityLong-standing trade-offs between

performance and security and

advanced approaches to reconcile

them are important considerations

for decision makers in organizations

considering the transition to a cloud

computing environment. Expedient

Communications—a provider of cloud-

based services, data center co-location,

and managed services for enterprise and

commercial organizations—helps

organizations meet this challenge.

Expedient operates a network

of eight data centers in the United

States that utilizes extensive Ethernet

connectivity designed to deliver

secure and redundant facilities for

comprehensively managing applications.

The company also maintains a significant

focus in cloud computing by providing

infrastructure as a service.

Expedient helps organizations

focus on core business operations by

providing capabilities and technical

innovation, such as cloud computing.

Expedient advances its commitment

to innovation by developing specific

approaches to customer solutions. For

example, Expedient wanted to deliver

Secure Sockets Layer (SSL) tunneling

on top of four teamed 10GBASE-T

adapters and offer support for Intel®

Advanced Encryption Standard New

Instructions (Intel® AES-NI), which

accelerates encryption and decryption

on the Intel® Xeon® processor

E5-2600 product family.

To help achieve this goal, Expedient

deployed Dell PowerEdge R710 servers

running a custom version of the Linux®

OS, and then put its approach to the

test by running workloads on three

generations of Intel Xeon processors with

and without Intel AES-NI enabled. The

testing showed Expedient the value of its

platform solution to network throughput.

A significant increase in throughput for

each later generation with corresponding

enhanced processor utilization,

particularly when Intel AES-NI was

enabled, helped provide performance

gains while freeing compute resources

for other important workloads. (For

more information, visit qrs.ly/nh1tx4g.)

Building on this success, Expedient

is now refreshing its PowerEdge R710

servers with 12th-generation Dell

PowerEdge R720 servers designed

to take advantage of enhanced

performance, throughput, and security

capabilities. “Processor capacity is

an important resource in the cloud,”

says Alex Rodriguez, vice president

for systems engineering and product

development at Expedient. “Intel

AES-NI allows us to provide more of

that resource to our customers while

maintaining our encryption standards.”

Page 81: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 79

Networking

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

compute-intensive parts of the AES algorithm. It

delivers fast data protection and security cost-

effectively through hardware-based encryption

and decryption. (For information on an innovative

approach to balancing performance and security,

see the sidebar, “How a cloud provider boosts

throughput without compromising security.”)

Providers of cloud-based services need

to be particularly vigilant in protecting their

infrastructures from malicious software programs

or malware. The Intel Xeon processor E5

product family includes Intel® Trusted Execution

Technology (Intel® TXT) hardware-based security.

Intel TXT is a highly scalable architecture designed

to insulate systems from the threat of hypervisor,

BIOS, and firmware attacks and software-based

attacks. In addition to addressing evolving security

threats, Intel TXT enables organizations to comply

with government and industry data protection

standards and regulations.

Streamlining systems management

for secure virtual environments

The virtualized environments that facilitate cloud

computing provide IT administrators with a range

of alternatives for effectively managing cloud

computing platforms. The Intel Ethernet Converged

Network Adapter family provides Intel® Virtualization

Technology for Connectivity (Intel® VT-c) that is

designed to deliver high levels of throughput by

offloading network traffic management functions

from the processor to the Ethernet controller.

In VMware® virtualization environments, for

example, Virtual Machine Device Queues (VMDq)

built into these adapters support both Microsoft®

Hyper-V® hypervisor and VMware vSphere®

virtualized environments.

As production workloads and manual

workflows in virtual and cloud environments

rise, so does the likelihood that human error

may cause unexpected delays in the operational

environment. The Dell Management Plug-In

for VMware vCenter provides centralized,

consolidated management of 12th-generation

Dell PowerEdge servers in cloud infrastructures

supporting VMware virtualization environments.

This plug-in enables IT managers to define

and automate server provisioning, automate

BIOS and firmware updates, enhance security

through zero-touch hypervisor deployment,

and perform many other management tasks for

virtualized environments.

The Dell OpenManage™ systems management

portfolio also provides powerful enhancements

for virtualized environments supporting

complex, cloud-based workloads. This systems

management tool suite includes the embedded

Integrated Dell Remote Access Controller 7

(iDRAC7) with Lifecycle Controller, which helps

IT administrators manage 12th-generation

PowerEdge servers in physical, virtual, local, and

remote environments with or without a systems

management software agent. Dell OpenManage

integrates with and connects to third-party

systems management offerings, allowing IT

managers to maintain a single point of control

and capitalize on existing investments.

Enhancing performance and security

for the cloud

Traditional server platforms often present

a security and performance trade-off for

organizations striving to deliver secure, cloud-

based applications and services. Increasing

volumes of data traffic in cloud-based workloads

are driving the move toward the expanded

bandwidth available with 10GbE networking.

However, processors in existing server platforms

often cannot encrypt and decrypt data at the

10GbE line rate.

Dell and Intel have worked together to

innovate cost-effective 10GbE throughput-

enhancing capabilities by offering an integrated

10GbE LOM design that works with Category 6

copper cabling. The dual-port Intel Ethernet CNA

X540-T2 supporting Ethernet server LOM—together

with Intel Ethernet-based Network Daughter Card

technology—integrates 10GbE networking with

12th-generation Dell PowerEdge servers. These

features are designed to enable IT organizations

to operate high-performing, flexible data centers

that scale as specific networking needs change. In

addition to avoiding I/O bottlenecks, they facilitate

data encryption and decryption to provide the

heightened security required for delivering cloud-

based applications and services.

Authors

Brian Johnson is a product

marketing engineer at Intel for

10 Gigabit Ethernet products and

virtualization technologies.

Rahul Deshmukh is a senior

technical marketing manager

at Dell specializing in server

peripheral devices.

Learn more

Intel and Dell Ethernet

connectivity:

intelethernet-dell.com

Dell and Intel:

dell.com/intel

Page 82: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

80 2012 Issue 02 | dell.com/powersolutions

Cloud computing

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

The journey to the cloud often begins with consolidation and virtualization as first steps

along an evolutionary path. This approach facilitates expedient migration and deployment

of tier 1 applications including messaging, enterprise resource planning, online transaction

processing (OLTP) databases, and so forth. A virtualized environment for these types of

applications enables IT organizations to efficiently manage operations and workloads, accurately

meet service-level agreements (SLAs), and accelerate business outcomes.

Building out a virtualized infrastructure that is configured to support a production-ready

application, however, may require weeks or even months before the environment is ready for test

and deployment. This process also has the potential to elevate costs if diversified IT expertise is

required or outside consultants are brought in to complete the project. As a result, this path to

virtualization may be at odds with an organization’s timeline for deploying an agile, automated

Many IT decision makers are stepping up virtualization efforts to

cost-effectively pave the way toward a private cloud. Dell™ vStart

virtualization offers a pre-integrated, wired, and ready-to-deploy

infrastructure designed to be up and running quickly.

By Marc Stitt and Deepak Kanwar

Rapid virtualization deployment for private clouds

Page 83: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 81

Cloud computing

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

infrastructure that achieves strategic IT goals to meet business

demands and control costs.

Very often these organizations are also looking to take the next step

in their journey—deploying a private cloud. Private cloud computing

platforms offer an elastic, scalable environment for delivering IT

services quickly, flexibly, and cost-effectively to meet changing

enterprise needs. As IT decision makers around the world consider a

transition to private cloud computing, many organizations are wrestling

with the question of where to begin.

The organizational model to fulfill business demands for

applications and IT service delivery typically involves the following five

recurring needs:

• Leverage the infrastructure already in place to conserve

capital expenditures

• Continue to deploy virtualization as the foundation for

enhanced flexibility

• Preserve existing investments in management solutions

• Endorse vendor-agnostic options for infrastructure components

• Evaluate converged infrastructure approaches to expedite

service delivery

In response to these evolving needs, Dell has put in place a

strategy for deploying virtualization using innovative approaches

designed to address these IT demands and help pave the way to a

private cloud.

Accelerating application and service delivery

For many IT organizations, a virtualized infrastructure provides the

means to support new application workloads and IT projects such as

enabling private cloud computing platforms. However, at the outset IT

organizations may spend weeks evaluating, purchasing, and procuring

the components; additional weeks to rack, stack, and cable them; and

still more weeks to get those components ready for production. Even

well-organized, highly skilled IT teams may require a couple of months

to build the infrastructure to deploy a new application.

Dell leverages its extensive global experience and deep expertise

in virtualization and infrastructure design to now offer a pre-integrated

infrastructure that enables IT and business stakeholders to accelerate

application and IT service delivery. Dell vStart racks and cables

servers, storage, networking, management software, and deployment

services. Utilizing either VMware vSphere® virtualization or the

Microsoft® Hyper-V® hypervisor, organizations may rapidly deploy

vStart and gain an infrastructure designed and ready to support their

key IT initiatives. As a result, vStart enables organizations to focus on

strategic priorities for driving enhanced business agility and delivering

IT assets—not on building infrastructure. (For more information, see

the sidebar, “Ready-to-run virtualization.”)

Ready-to-run virtualizationTiming can be an important factor for organizations

moving toward a private cloud. Pennsylvania-based

Brodart Company is one example. The provider of

library solutions from shelf-ready books to electronic

ordering systems and furniture was looking to time a

much-needed refresh of its servers with its migration to

a virtualized server infrastructure.

To help simplify the project and accelerate

deployment, Brodart opted to implement the Dell

vStart 100—racked and cabled with the servers,

storage, networking, management tools, and services

required to successfully deploy virtualization in one

preassembled, validated solution. Working with

Interphase Systems, a Dell Premier and VMware VIP

Enterprise partner, the Brodart IT team deployed vStart

based on VMware vSphere virtualization software.

According to Brad Huyck, manager of IT

operations at Brodart, the organization expected a

six-month phase to complete the deployment. “The

Dell vStart solution came completely racked and

cabled, so all we had to do was plug it in,” Huyck says.

“Just four weeks after we made the purchase, we were

already achieving business value. That’s about six times

faster than I expected.”

The vStart infrastructure also enables virtual

machines to be deployed much faster than having to

first procure, rack, and configure a physical server.

“We can deploy a new server at least 10 times faster

now,” says Huyck.

Brodart is in the final stages of testing virtual

deployments of tier 1 messaging and document

collaboration software on the vStart infrastructure.

“Because we can clone virtual machines and we don’t

have to wait for hardware, we’ve reduced the time it

takes to stage, test, and introduce new applications

into our environment by 50 percent,” says Huyck.

“We’re also able to provide higher availability for

applications and databases once they are virtualized,

because we can move workloads between physical

host servers. I also like the fact that the vStart solution

is modular, so we can scale easily.”

Page 84: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

82 2012 Issue 02 | dell.com/powersolutions

Cloud computing

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

In addition, Dell vStart for Dell Private

Cloud is designed to improve business

agility by enabling organizations to

deploy their own private cloud through

a pre-engineered infrastructure and

automated self-service delivery of

IT assets. Utilizing vStart and Dell VIS

Creator—a component of the Dell Virtual

Integrated System (VIS) portfolio (see

the sidebar, “Optimized delivery across

physical and virtual environments”)—

vStart for Dell Private Cloud offers cloud

management software, servers, storage,

and networking (see Figure 1).

It also offers element-level management

plug-ins—Dell OpenManage™ systems

management, Dell EqualLogic™ Host

Integration Tools, and Dell Management

Plug-In for VMware vCenter (see the

sidebar, “Centralized, end-to-end

management”). This offering helps

eliminate long, drawn-out processes

to architect, build, and integrate virtual

infrastructure—enabling quick, low-risk

delivery of advanced cloud capabilities.

An organization can get its private cloud

up and running in days.

VIS Creator is designed to provide

secure deployment and management of

physical, virtual, and cloud—private, public,

or hybrid—workloads by helping remove

bottlenecks to speed IT service delivery

and enhance business operations. Using

vStart for Dell Private Cloud, which includes

VIS Creator, IT organizations can benefit

from accelerated deployment, enhanced

efficiency, and flexible scalability.

Advancing private cloud capabilities

Faced with the prospect of architecting,

designing, and configuring their

infrastructure and then finding a suitable

cloud computing platform, IT organizations

can opt for a fast-track alternative. Dell

vStart enables organizations to begin

realizing the benefits of virtualization for

a private cloud platform within days. By

leveraging extensive Dell experience in

Figure 1. Dell vStart for Dell Private Cloud architecture and VMware virtualization

Authorized user Infrastructure services

MicrosoftActive Directory®

directory service

Simple Mail TransferProtocol (SMTP) server

Workloadvirtualmachines

VIS Creator servervirtual machine

Dell VIS Creator core components Portal Web site Reports Web site Manager service

VIS Creator database

Distributed ExecutionManager

Windows Management Instrumentation (WMI) agent

VMware vSphere agent

Managed nodes

VMware vCenter Server

Dell vStart

Optimized delivery across physical and virtual environments The Dell Virtual Integrated System (VIS) portfolio provides software enabling

organizations to leverage existing infrastructure to improve the delivery of applications

and IT services across physical, virtual, and cloud environments. Organizations

may deploy VIS to help improve business agility and deliver IT as a service, increase

automation to enable rapid workload deployment, and optimize converged

infrastructure and operations across physical and virtual environments. A VIS

deployment helps organizations balance the need for enhanced agility with heightened

efficiency and cost controls for internal private clouds and external public clouds.

Page 85: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

dell.com/powersolutions | 2012 Issue 02 83

Cloud computing

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

virtualization, organizations can deploy

vStart for Dell Private Cloud, a pre-

engineered and tested infrastructure

designed to provide immediate access

to advanced private cloud capabilities.

In addition, the integrated Dell

management plug-ins help simplify

managing hardware and facilitating

rapid assimilation.

Dell VIS Creator and vStart for Dell

Private Cloud enable advanced cloud

capabilities that accelerate agility and

efficiency gains. These capabilities include

multitenancy, self-service provisioning of

assets, built-in auditing, and minimizing

virtual machine sprawl.

Different groups within an organization

often have diverse needs and varying skill

sets, and as a result they interact with

IT in different ways. Some groups may

reach out to IT for desktop or application

support, while others may issue requests

for additional assets. VIS Creator provides

multitenancy capabilities that allow IT

organizations to easily set different levels

of user interfaces. Using this capability,

administrators can provide a separate portal

for each department—for example, sales,

accounting, human resources, and IT.

One significant challenge these and

other departments may face is the delay

associated with IT asset acquisition. For

example, suppose human resources needs

to run a new application—an application

the organization has been requesting for a

long time—and needs to provision a server

to run it. The SLA from IT, however, may

specify two weeks for this acquisition. As a

result, a two-week delay is required before

the application can be mounted, tested,

and released. Dell vStart for Dell Private

Cloud avoids this kind of delay by enabling

an authorized user to select IT assets and

services from an authorized service catalog

for expedient availability. Not only does

this approach help eliminate the waiting

period specified by the SLA, but it also

helps ensure that access to the IT assets

is in line with the existing governance

rules (see Figure 2).

Organizations increasingly run IT

as a business; therefore, IT decision

makers need a way to identify end

users and address usage patterns.

This information helps ensure that

SLAs are being met cost-effectively,

without overprovisioning capacity.

Of course, external customers need to

be billed for the services they are

provided. Built-in auditing capabilities

allow authorized users of vStart for

Dell Private Cloud to quickly and easily

create reports such as those for IT

chargeback and IT showback.

As authorized end users continue to

activate virtual machine sessions to meet

their needs, there is often a tendency to

forget to end the session after the work

is done. Over time this tendency can

create life-cycle management problems,

such as virtual machine sprawl that

unnecessarily consumes resources

and affects service quality. vStart for

Dell Private Cloud can be used to

actively monitor the environment and

Figure 2. Dell vStart for Dell Private Cloud and self-service IT asset provisioning

Requisition

Provision

Manage

Retire

Businessgroups

Authorizedusers

Authentication and role-based authorization

A B C

End users

A

ABC

ResourcereservationsService

blueprints

Cost profile Cost profile

Approved

A A

Shared infrastructure

Public

Physical

Virtual

A

A

A B

B

C

B

B C

Page 86: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

84 2012 Issue 02 | dell.com/powersolutions

Cloud computing

Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved. Reprinted from Dell Power Solutions, 2012 Issue 2. Copyright © 2012 Dell Inc. All rights reserved.

automatically shut down inactive sessions based

on preconfigured rules.

In addition, vStart for Dell Private Cloud is

designed to scale to accommodate growing

organizational needs. The infrastructure can

scale vertically—by adding server or storage

capacity—or simply by connecting additional

vStart racks. The racks connect seamlessly, and

the multirack infrastructure can be managed

through a single console. Because vStart for

Dell Private Cloud is built and supported by Dell,

organizations have a single point of contact

and accountability.

As organizations continue to evolve their

cloud strategies, a hybrid cloud computing

platform can provide other advantages. For

example, a retailer may require a dramatic rise

in capacity during the holiday season compared

to its capacity needs during the rest of the year.

Instead of carrying additional capacity year-

round, it can choose to provision capacity

for the other months and only utilize the cloud

during the holiday season for on-demand

additional capacity. A hybrid cloud provides

a combination of on-premises private cloud

and off-premises public cloud computing.

Utilizing a hybrid cloud platform can present

different challenges, particularly for managing

the off-premises public cloud. To address these

challenges, the management layer within vStart

for Dell Private Cloud enables global cloud

management. Using the same interface, an IT

administrator can manage both the on-premises

private cloud and the off-premises public cloud.

Streamlining private cloud transformation

As IT and business needs grow, increasing

numbers of organizations are gravitating

to private clouds for enhanced agility and

cost-efficiency. Effective private cloud

deployments require virtualized environments

that facilitate easy management of workloads,

efficient creation and migration of virtual

machines, and rapid delivery of enhanced

business outcomes.

Having gained considerable experience

with virtualization deployment, Dell now

offers organizations the modular Dell vStart

infrastructure prebuilt with servers, storage,

networking, cabling, management software, and

deployment services. In addition, organizations

taking the next step on their journey to the cloud

can deploy Dell vStart for Dell Private Cloud.

This racked and cabled virtualized infrastructure

is designed to deliver advanced private cloud

capabilities including automated, self-service

delivery of IT assets. vStart for Dell Private

Cloud includes Dell VIS Creator and enables

organizations to quickly and easily transform data

center operations to private clouds that offer

their employees and customers advanced IT

asset and service delivery.

Authors

Marc Stitt is senior manager,

product marketing at Dell and

leads go-to-market strategies

for virtualization and private

cloud solutions.

Deepak Kanwar is a senior

manager at Dell and supports

the Dell vStart virtualization

solution line.

Learn more

Converged infrastructure:

dell.com/vis

Dell vStart:

dell.com/vstart

Centralized, end-to-end managementRunning data centers effectively and efficiently today requires

managing both the virtual and physical infrastructures.

However, managing both infrastructures can be complex

because it typically requires using multiple, disconnected

tools and processes. Time-consuming management can also

take away valuable time IT professionals could otherwise be

devoting to projects that advance the strategic business and

organizational agenda.

The Dell Management Plug-In for VMware vCenter offers

a native plug-in for the VMware® vCenter™ management

platform. It streamlines access to the tools and the tasks

associated with managing and deploying Dell PowerEdge™

servers in a VMware virtualization environment. The Dell

Management Plug-In for VMware vCenter is designed to

reduce complexity, speed deployment, and minimize the

risk of introducing errors or not keeping system BIOS and

firmware up to date.

Dell vStart for Dell Private Cloud includes the Dell

Management Plug-In for VMware vCenter, which provides

management capabilities for vStart components through a

single vCenter console. To learn more about the plug-in, visit

dell.com/vcenterplugin.

Page 87: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

Get storage without the baggage.

Complexity, high costs, and downtime can be the unwanted baggage that comes with data storage. Dell and F5 can help you better respond to the needs of your business with storage solutions that are simple to manage, highly scalable, affordable, and seamlessly integrated into your existing file storage environment.

By combining technologies from Dell and F5, you can create a dynamic storage infrastructure to simplify the management of rapidly growing unstructured data.

Learn how F5® ARX® can help you:

· Seamlessly integrate Dell storage solutions, including the Dell™ DX Object Storage Platform, into your existing file storage environment.

· Simplify file data management.

· Minimize disruptions and downtime.

· Automatically store files according to business value.

With F5 and Dell, you can cost-effectively store and manage data in a way that achieves your business goals.

>> Scan the QR code or visit http://qrs.ly/761q34l to read the article.

Page 88: dell.com/powersolutions Fast forwardi.dell.com/sites/content/business/solutions/power/en/Documents/ps2... · is the catalyst for hybrid cloud environments ... enterprise. We have

#1Data Warehouse

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates.Other names may be trademarks of their respective owners.

Source: IDC, “Worldwide Data Warehouse Platform Software 2010 Vendor Shares,” IDC #229498, July 2011; Table 5, (Data Warehouse Management Software). Vendor share based on software license and maintenance revenue.

oracle.com/datawarehouseor call 1.800.ORACLE.1

0 10 20 30 40 50

Oracle 40.5%

IBM 22.5%

Microsoft 16.5%

Teradata 11.8%

Worldwide Vendor Share