Mobile workforce management software solutions - Empowering the evolving workforce with an end-to-end framework

Page created by Christian Dennis
 
CONTINUE READING
Mobile workforce management software solutions - Empowering the evolving workforce with an end-to-end framework
Mobile workforce
management
software solutions
Empowering the evolving workforce with an end-to-end framework
Mobile workforce management software solutions - Empowering the evolving workforce with an end-to-end framework
© 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information
protected by copyright. No part of this document may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopying and recording for any
purpose without the written permission of Dell, Inc. (“Dell”).

Dell, Dell Software, the Dell Software logo and products—as identified in this document—are
registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and
registered trademarks are property of their respective owners.

The information in this document is provided in connection with Dell products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by
this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN
DELL’S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS
PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS,
IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT,
INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR
LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT,
EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no
representations or warranties with respect to the accuracy or completeness of the contents
of this document and reserves the right to make changes to specifications and product
descriptions at any time without notice. Dell does not make any commitment to update the
information contained in this document.

About Dell
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide
innovative technology, business solutions and
services they trust and value. For more information,
visit www.dell.com.

If you have any questions regarding your potential use of
this material, contact:

Dell Software
5 Polaris Way
Aliso Viejo, CA 92656
www.dell.com
Refer to our Web site for regional and international
office information.
Mobile workforce management software solutions - Empowering the evolving workforce with an end-to-end framework
Table of contents

Introduction                                                 IV

Challenges                                                   V
BYOD: Supporting a wide range of devices                     VI
Data security: Protecting critical enterprise information    VI
Application modernization: Delivering applications on
an array of devices                                          VI

Solutions                                                   VII
Desktop virtualization                                      VIII
Secure mobile access                                        VIII
Mobile network security                                      IX
Mobile endpoint security                                     IX
Mobile endpoint management                                    X

Case studies                                                XI
Simplifying identity and access management                  XII
Challenge                                                   XII
Solution                                                    XII
Results                                                     XII

Ensuring the right access at the right time                 XII
Challenge                                                   XII
Solutions                                                   XII
Results                                                     XII

Conclusion                                                  XIII
Introduction

Balancing user freedom
with IT control
As organizations expand their mobile workforces, IT groups must find new         The right solution for an effective BYOD foundation depends on customer
ways to support a growing and diverse collection of mobile computer              needs, current infrastructure, risk tolerance and overall business strategy.
systems and devices without adding costs, increasing complexity, or
sacrificing security. Employees now expect freedom of choice in device           Dell mobile workforce management software solutions can help
support, so IT groups must work to enhance user flexibility, promote             organizations address the key challenges of building this foundation and
productivity and provide secure access—anytime, anywhere—to                      deliver applications for improved end-user productivity while optimizing
information that employees require—all while maintaining tight control of        infrastructure investments. These solutions let organizations provide
sensitive corporate information.                                                 access to enterprise information and resources for employees using a
                                                                                 wide variety of devices and configurations. They help simplify a full range
The expanding bring-your-own-device (BYOD) trend makes that mission              of administrative tasks, from asset discovery and software provisioning to
more difficult, however. IT groups must support a broad array of platforms,      patch management and policy enforcement. And they help ensure security
operating systems and configurations. They also need solutions designed          by enabling administrators to effectively manage identities and access
to help streamline administrative tasks, deliver the right content and           while protecting the network from intrusions. Dell mobile workforce
applications to the right people, and keep business information secure—all       management solutions balance user freedom and IT control.
while keeping costs down.

To enable the mobile workforce with a solid and flexible BYOD approach,
organizations must:

• Define IT policies and acceptable devices
• Protect data while securing and managing the infrastructure
• Empower the workforce with access to data anytime, anywhere

IV    Mobile workforce management solutions | 2013 Dell. All rights reserved..
Challenges

V   Mobile workforce management solutions | 2013 Dell. All rights reserved.
BYOD: Supporting a wide range of devices                                        these hotspots are not always secure and may introduce additional risks.
The BYOD trend presents new challenges for IT groups, which must                For the IT group, this access presents a difficult challenge of balancing
support a much wider variety of end-user devices than ever before.              gateway security and control with network performance and system
Consumer devices are flooding into business settings, challenging               complexity.
IT groups to respond quickly with a robust platform that meets all
requirements and helps maintain user productivity without compromising
                                                                                Application modernization: Delivering applications on an array
network security or without exposing the network to potential                   of devices
cyberthreats.
                                                                                To deliver applications on an array of devices, organizations need to
Companies allow employees to use personal devices in part to help               ensure that mobile and remote employees can access key business
improve productivity and job satisfaction. Mobile smart devices are             applications on a wide variety of devices, with an array of screen sizes
driving a new workplace paradigm that fosters collaboration anytime and         and operating systems. Provisioning applications to multiple devices on
anywhere, and enhances communication through social networking and              multiple platforms outside the enterprise can be time-consuming and
online presence. The use of personal devices also enables organizations to      require varied areas of expertise. The challenge is not just to find ways to
embrace the concept of virtual teams, leveraging geographically dispersed       adapt applications to these new environments and deliver a robust user
talent working in different time zones.                                         experience, but also to track and monitor application performance without
                                                                                adding costs and complexity.
IT groups need efficient ways to conduct a full range of management
tasks on these diverse devices, from provisioning business applications
to installing security patches. At the same time, IT groups must be able
to sustain compliance with regulations such as the Health Insurance
Portability and Accountability Act (HIPAA), Payment Card Industry (PCI)
regulations and the Sarbanes-Oxley Act (SOX). Digital rights management
and software licensing issues can add layers of device management
complexity.

Data security: Protecting critical enterprise information

With this new mobile workplace paradigm comes the need for even
greater data security to protect critical enterprise information. Cloud-
based applications allow greater flexibility for workers on the go, but they
also introduce new data security risks. With mobile and remote employees
accessing business applications and data beyond the firewall, organizations
must take extra steps to protect data residing on devices as well as data in
transit. Most employees think it is someone else’s responsibility to protect
corporate information.

Organizations must also protect the company network, ensuring that
malware, viruses and other threats cannot enter through these mobile
devices. Mobile workers often use public WiFi hotspots to access data—but

VI    Mobile workforce management solutions | 2013 Dell. All rights reserved.
Solutions

VII   Mobile workforce management solutions | 2013 Dell. All rights reserved.
Desktop virtualization                                                           information and systems. Secure Sockets Layer (SSL) virtual private
   Dell software solutions for desktop virtualization can help you simplify         network (VPN) platforms for large businesses provide complete, secure
   implementation and management of desktop virtualization no matter                mobile access for up to 20,000 concurrent mobile enterprise users from
   what virtualization model—or models—you choose. Deploy a hosted                  a single appliance while controlling costs and complexity. Employees and
   virtual desktop infrastructure (VDI), offline/local VDI, Terminal Server/RD      extranet business partners gain secure, client—or clientless—access to the
   Session Host (TS/RDSH) solution, or a blended model that matches the             resources they need from virtually any device, anywhere.
   right technologies to individual user needs. You can take advantage of
   monitoring and management capabilities that help optimize performance            SSL VPN platforms for small and medium businesses (SMBs) offer powerful,
   and ensure a robust user experience.                                             easy-to-use and cost-effective secure remote access solutions. You
   Dell solutions include capabilities that help you accelerate deployment and      can enable users to easily and securely access e-mail, files, intranets,
   simplify ongoing management. For example, the Desktop Cloud capability           applications, remote desktops, servers and other resources on the
   helps speed deployment of virtual desktop environments of any size using         corporate local area network (LAN) from any location through a standard
   the free Microsoft® Hyper-V® Server.                                             Web browser.

                                                                                    With Web single sign-on and strong authentication solutions, you can

"Dell solutions for secure mobile access                                            provide a single user identity for each authorized user to simplify access
                                                                                    across devices and platforms. Give employees, customers and partners
 facilitate anywhere access to                                                      simple browser-based access to Web resources while protecting systems
                                                                                    and information. Select solutions that enhance security with two-factor
 corporate resources while helping you                                              and multifactor authentication.

 to ensure tight security for your                                                  Dell also offers solutions that enable mobile IT administrators to securely
 information and systems."                                                          access critical applications and Dell solutions from a mobile device. Your
                                                                                    administrators can respond rapidly to issues even when they are not
                                                                                    on-site. Alerting and reporting capabilities help them make informed
   With Dell solutions, you can easily add diagnostics, rich visualization and      decisions. Secure connections, authentication capabilities and additional
   reporting to virtual desktop management. Access real-time and historical         controls help prevent authorized access.
   data from Dell vWorkspace™ VDI and TS/RDSH implementations to
   optimize performance. Use analytics and diagnostic capabilities to identify      Related products:
   and resolve issues before they affect users.
                                                                                    •   Dell SonicWALL™ Aventail™ E-Class Secure Remote Access (SRA)
   Related products:                                                                •   Dell SonicWALL Secure Remote Access (SRA) Series
                                                                                    •   Quest Mobile IT
   • vWorkspace™                                                                    •   Quest One User Identity Management
   • Foglight™ for Virtual Desktops                                                 •   Defender™
                                                                                    •   Webthority™

   Secure mobile access

   Dell solutions for secure mobile access facilitate anywhere access to
   corporate resources while helping you to ensure tight security for your

   VIII   Mobile workforce management solutions | 2013 Dell. All rights reserved.
Mobile network security                                                          Security and analytics management
Dell network security solutions help you secure your network while               Dell offers management and reporting solutions to help simplify security
sustaining performance and simplifying management.                               solution administration and analytics reporting. With these solutions, you
                                                                                 can centralize management of security policies and appliance-based
Next-generation firewall                                                         solutions. Use real-time monitoring and alerting capabilities to optimize
Next-generation firewall solutions allow you to implement a                      the performance, utilization and security of your network.
comprehensive layer of defense that combines gateway anti-virus, anti-
spyware, intrusion prevention, content filtering and application intelligence
with real-time traffic visualization and inspection. These solutions scan
every byte of every packet for the deepest level of network protection. You             "Next-generation firewall solutions scan every byte
can scale to extend state-of-the-art security to growing and distributed
enterprise networks.
                                                                                         of every packet for the deepest level of network
                                                                                         protection, regardless of the ports and protocols.”
Unified threat management
Unified threat management solutions are designed for small businesses,
retail deployments, government organizations, remote sites and branch
offices. These solutions allow you to move beyond consumer-level                 Related products:
products with a solution that combines gateway anti-virus, anti-malware,
intrusion prevention, content/URL filtering and application control              •   Dell SonicWALL SuperMassive™ Series
capabilities along with broad mobile platform support for laptops,               •   Dell SonicWALL E-Class Network Security Appliance (NSA) Series
smartphones and tablets with the SSL VPN client and Mobile Connect.              •   Dell SonicWALL NSA Series
                                                                                 •   Dell SonicWALL TZ Series
Clean wireless                                                                   •   Dell SonicPoint-N Series
Dell wireless security solutions can deliver outstanding performance             •   Dell SonicWALL WAN Acceleration Appliance (WXA) Series
for employees, customers and corporate visitors while protecting                 •   Dell SonicWALL Global Management System
the corporate network. Plug-and-play deployment and centralized                  •   Dell SonicWALL Scrutinizer
management of access devices allow you to provide the connectivity that          •   Dell SonicWALL Analyzer
users expect while avoiding administrative complexity. Clean Wireless
combines Next-Generation Firewall solutions with high-speed wireless to
                                                                                 Mobile endpoint security
make sure wireless traffic is scrutinized with the same intensity as wired
network traffic.                                                                 As organizations increasingly support and facilitate mobile productivity,
                                                                                 maintaining tight security must be a top priority. Dell solutions for mobile
WAN acceleration                                                                 endpoint security can help protect mobile endpoint devices and company
Dell also offers solutions designed to improve WAN application                   resources while streamlining management. You can address potential
performance and enhance the end-user experience for distributed                  problems and maintain compliance with internal and external regulations.
organizations with remote and branch offices. You can reduce application         Protect endpoints from threats by making sure anti-virus and anti-spyware
latency and conserve bandwidth by transmitting only new and changed              software are always up-to-date.
data across the network. Combine with firewall security, application
intelligence and control service capabilities to optimize performance.           An appliance-based solution helps you uncover and remediate endpoint
                                                                                 security problems rapidly. You can scan endpoint systems to identify

IX     Mobile workforce management solutions | 2013 Dell. All rights reserved.
vulnerabilities, enforce compliance with company policies and create            tablets, laptops and desktops running a wide variety of operating systems
   a complete audit trail. Reduce risks while minimizing the potential for         and virtual platforms, all from a centralized console.
   downtime caused by infections and other breaches. The appliance-based
   approach helps simplify deployment and management while controlling             Appliance-based solutions can help accelerate endpoint deployments
   the costs of security audit and enforcement.                                    while reducing costs and complexity. You can automate a wide range
                                                                                   of deployment functions, from discovery and imaging to upgrades and
   An enhanced endpoint security solution allows you to protect servers,           system repairs. Provision Microsoft Windows and Mac platforms from a
   desktops and laptops from a growing number and increasingly diverse             single, centralized administrative console. An easy-to-use, Web-based
   range of threats, from viruses and spyware to spam and phishing attempts.       interface enables administrators of all levels to handle deployment tasks.
   Working with next-generation firewalls, the anti-virus and anti-spyware         A solution designed for tablets and smartphones can help simplify
   solution helps ensure that all endpoints have the latest versions of anti-      provisioning and security policy enforcement on those devices. Manage
   virus and anti-spyware software installed and active. An anti-spam solution     corporate and personal devices while protecting sensitive business content
   provides client-based anti-spam and anti-phishing protection for Microsoft      on all devices. Adopt a platform that enables you to manage these mobile
   Outlook®, Outlook Express, or Windows® Mail e-mail clients on Microsoft         devices alongside laptops, desktops, servers and virtual machines.

                                                                                   Related products:

"An enhanced endpoint security                                                     • Dell KACE Systems Deployment Appliance

 solution allows you to protect servers,                                           • Dell KACE Mobile Management Appliance

 desktops and laptops from a growing
 number and increasingly diverse
 range of threats."

   Windows–based desktops or laptops.
   Related products:

   • Dell KACE™ Systems Management Appliance
   • Dell SonicWALL endpoint security

   Mobile endpoint management

   To support the BYOD trend, IT groups must find efficient ways to provision
   business applications, install security patches and ensure compliance with
   company and government regulations. Dell solutions for mobile endpoint
   management can help you discover, provision, upgrade and secure mobile
   devices easily, accurately and cost-effectively. Manage smartphones,

   X     Mobile workforce management solutions | 2013 Dell. All rights reserved.
Case studies

 XI   Mobile workforce management solutions | 2013 Dell. All rights reserved.
Simplifying identity and                                                         • Provided a business-driven, security- and compliance-optimized, and
                                                                                      future-proofed IAM solution

   access management
                                                                                    Ensuring the right
   Challenge
   One of the leading integrated natural gas companies in the United States
   wanted to reduce the costs and complexity of its identity and access
                                                                                    access at the right time
   management (IAM) solution. To better support its mobile workforce, the
   company wanted to add an access request capability that was lacking in           Challenge
   its existing remote access system.                                               A prominent nonprofit organization for community-based care in
                                                                                    Miami and the Florida Keys wanted to streamline access to enterprise
                                                                                    information for its mobile and remote workers while ensuring the right
                                                                                    level of access to the right person. The organization needed to protect

"Identity intelligence capabilities offer...                                        extremely confidential data, including birth documents, Social Security
                                                                                    numbers and personal health information (PHI).
 the 360-degree visibility and complete
                                                                                    Solutions
 control that results from the next-                                                The organization deployed a Dell SonicWALL E-Class Network Security

 generation, object-based approach..."                                              Appliance (NSA) solution at its headquarters, as well as three NSA
                                                                                    appliances at remote site locations and 16 SonicPoint-N wireless access
                                                                                    points. To provide dedicated secure remote access, the agency deployed
                                                                                    a SonicWALL Aventail E-Class Secure Remote Access (SRA) appliance.

   Solution                                                                         Results
   The company decided to implement the Quest One Identity Solution                 • Gained a secure platform that lets users connect using their own
   from Dell to help substantially simplify tasks and reduce costs. Identity          devices while enabling the organization to offer new solutions
   intelligence capabilities offer the access request functionality that the        • Simplified management for the organization’s administrators
   company wanted, together with the 360-degree visibility and complete
   control that results from the next-generation, object-based approach of
   Quest One Identity Manager.

   Results
   • Secured the entire population of Unix and Linux systems efficiently
     through Microsoft Active Directory®
   • Deployed self-service capabilities for end users and managers through
     both the Quest One Identity Manager and Password Manager offerings,
     further simplifying administrative tasks and supporting end-user preferences

   XII    Mobile workforce management solutions | 2013 Dell. All rights reserved.
Conclusion

Dell end-to-end mobile
workforce management
Organizations need ways to efficiently manage a wide range of devices so
employees can choose the device that works best for them and optimize
the infrastructure for a dynamic, seamless end-user experience. At the same
time, IT groups must be able to protect data from the edge to the data center,
and develop and deliver apps for improved end-user productivity and the
bottom line.

Dell offers an extensive portfolio of mobile workforce solutions that can
help organizations meet these and other challenges in supporting a mobile
workforce. Built for flexibility and scalability, Dell mobile workforce solutions
allow organizations to effectively and efficiently empower the mobile
workforce while preparing for future change and growth. Designed to
streamline IT provisioning tasks and support business needs, Dell solutions
can also help organizations simplify administration even as IT environments
expand and BYOD numbers grow.

Dell works with organizations to determine the right solution based on needs,
current infrastructure, risk tolerance and overall business strategy.

For more information about Dell software solutions, contact your Dell sales
representative or visit: www.software.dell.com.

XIII   Mobile workforce management solutions | 2013 Dell. All rights reserved..
You can also read