Following-up on its promise to diversify its business in the face of the rapid decline of the PC market, Dell has just announced a new portfolio of mobile solutions that will facilitate Bring-Your-Own-Device strategies within the enterprise.
That Dell, of all IT companies, should be doing this is ironic in that mobile devices and solutions are the very products that created a lot of Dell’s solutions in the first place. But then, if the mountain won't come to you, you gotta' go to the mountain yourself.
And Dell really does need to move. Since the original announcement by Michael Dell that he was tying to move Dell back into the private sector so as to find solutions to its ongoing problem out of sight of public investors, its had a pretty bumpy ride.
Over the past few days alone, the often public spat between Michael Dell and shareholders took another turn after private equity firm, Blackstone Group, pulled out of the deal resulting in the sell-off by Oakmark Funds of its stake in Dell.
But again, and much like the HP-Autonomy corporate mess, behind the financial headlines, there is a portfolio of products that many business consumers would be happy to get their hands on.
In this case, it is the portfolio of mobile products that Dell built up through the acquisitions of SonicWall, Credant and MokaFive for mobile security and identity, and access management software from Quest, among others.
The idea is to offer enterprises an entire product set that will enable organizations to plan, deploy and manage Bring-Your-Own-Device (BYOD) strategies.
In an aside, found in the in the marketing literature around the releases and, which also points to Dell’s path in the future, it says the latest offering also reinforces “…Dell’s role in delivering innovative, end-to-end solutions that simplify complex data environments, accelerate cloud transformations, reduce mobility obstacles and mitigate security risks.”
The solutions are designed to help users connect different devices, enterprise workspaces and professional services all from Dell together to make the best of their own devices working in tandem with their enterprise networks.
On top of that, they can be configured to work together as a complete turnkey offering with a whole range of Dell devices including endpoint management solutions, remote network access, monitoring, security and identity management. The solutions cover four areas and include:
- Extending PC management technology to mobiles
- Mobile access to virtual desktops and cloud applications
- Secure network access
- Mobile access to applications
- Dell also has unveiled new endpoint security enhancements to simplify the protection of corporate data, regardless of OS or device.
Dell Migration Manager
But these solutions were not the only new releases from Dell this week. It has also upgraded its migration software with a new release of Migration Manager for Exchange that enables enterprises to securely migrate from 2000–2003 to Exchange 2013.
This facilitates all kinds of migration scenarios be it premises to premises, premises to cloud or hybrid migration including the migration of public folders and the migration of m mailboxes to Office 365.
In addition this, the new Migration Manager for Active Directory facilitates efficient migration and restructuring of Active Directory, supporting all of Microsoft’s latest platforms and technologies. Dell has also upgraded its Toad Business Intelligence Suite 2.0 to enable analysis across complex data environments.
Whether business consumers actually go for this in sufficient numbers to change Dell’s fortunes remains to be seen, but given that Dell and PCs have become almost synonymous its not clear that it can re-invent itself going forward.
- Has Google Delivered a Killer Blow to Microsoft Office Apps?
- Should You Use LinkedIn to Build a Network or an Audience?
- 5 Marketing Lessons From HubSpot
- Microsoft Leaves Ballmer Bleeding as It Moves On
- A Graceful Exit for Box?
- Dave Gray on Work Like a Network and the Role of Hierarchies
- Does Jive Do Social Better by Putting the End User First?