SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Kevin Terwilliger
IoT Solutions Manager
@kdtwill
Keys to Successful Enterprise
Internet of Things Initiatives
2
disrupted by digitally
enabled competitors1
33%
By 2018
“Digital is the main reason just over half of the companies on
the Fortune 500 have disappeared since the year 2000”
Pierre Nanterme
CEO of Accenture
of all industry leaders will be
1 - Source: IDC - IoT and Digital Transformation:A Tale of Four Industries
Source: IDC
Why you need an IoT strategy
3
Predictive Maintenance
Richard Childress Racing
Eric Warren
Asset Management
The Weir Group
Leslie Powell
Real-time Quality
Action Point
John Savage
Learning from real implementations
Audience Poll
How mature is your IoT initiative?
• Learning
• Planning
• Deploying
Build your
business case
Operational
Efficiency
Customer
Experience
New Revenue
Models
Mitigate Risks
(Safety)
loT
business value
IoT
Unlock the potential
of the unconnected
by bridging IT and OT
Dell EMC brings 30+ years of IT
heritage, 15 years of customizing
Dell technology for OT environments
through OEM, and 50+ partners
offering OT expertise
Operational
Technology
• Yield
• Quality
• Efficiency
Information
Technology
• Infrastructure
• Security
• Governance
4,000+
OT customers
15
years
40+
industries
Dell EMC
OEM division
OUR MISSION
8
VerticalSolutionsDell IoT HW/SW Ingredients
Technology Partners
Vertical Expertise
Platforms
Analytics
Data Visualization
Wide Area Connectivity
Security
Services
Partners
Last Mile Delivery
Solution Support
System Integration
Deployment
Project Design
Procuring Accessory
Get to market faster with Dell’s curated partners
Define your
architecture
SECURITY │ MANAGEABILITY │ ANALYTICS
EDGE/FIELD CLOUDFOG
11
Real-time decision making
through Edge Analytics
Reduced data transfer cost
through compression & cleansing
Improved security and data continuity
through local operations
Value of the Fog
Adding compute at the Edge offers 3 advantages
12
Which complements existing cloud/datacenter advantages
Big Data analytics to get to
greater insights for your business
IT system integration to reduce data silos
Data continuity improved
on a broad scale
Value of the Cloud/Datacenter
13
SECURITY │ MANAGEABILITY │ ANALYTICS
EDGE/FIELD CLOUDFOG
Develop a
security
strategy
Be cautious but not paralyzed
Right-size security implementations for different use cases
Leverage trusted advisors who:
• Understand / take a holistic view
• Offer a layered approach
• Have ecosystem of partners to fill gaps
Security strategy best practices
Sensors &
Equipment
Gateway Management
Vmware Network Security (NSX)
Dell Edge Device Manager
Gateway TPM secure boot
Identity & Access Management
RSA SecurID Access (ViaAccess)
Network Assessment & Threat Analysis
Vmware Network Security (NSX)
Secureworks
Device Management
Communication Management
Edge
Dell Technologies security
APTs
Malware
APTs
Malware
Threats
Cloud/Data Center
Unauthorizedaccess
Unauthorizedaccess
Eavesdropping
Summary
1. Build your business case
2. Define your architecture
3. Develop a security strategy
Curated technology and
services partner program
Industry’s broadest
infrastructure portfolio
Proven use-case specific
solution blueprints
loT
practical approach
The leading infrastructure provider for enterprise IoT
EDGE/FIELD CLOUDFOG
IoT Solutions PartnerProgram:Analytics and Integration
GlobalSupport,Deployment,& Financing
Embedded Gateways
On-Premise
Appliances Data Center & Cloud
Cloud & App
Integration
Embedded Box PCs to
connect unconnected
machines & Software to
manage intelligent
devices
Edge Gateways to
aggregate data from
sensors and equipment,
complete local analytics
for real-time decision
making, and securing
both connected devices
and northbound data
Edge-optimized
converged
infrastructure, as well as
standalone computing,
networking, and storage
appliances for on-site
real time big data
processing, analysis,
and store & forward
Best-in-class data
center and cloud
computing infrastructure
and IaaS for advanced
data management,
storage, and petabyte+
scalability
Integrated PaaS
solutions to remove data
silos and enable cloud-
native app development
and deployment
Manageability:Assetmanagement,provisioning,and orchestration
Security: Identity,Privacy, Governance, Risk Control, and Compliance
Dell Technologies’ IoT Offering
EDGE/FIELD CLOUDFOG
Manageability: Edge Device Manager, VMware Airwatch, VMware vROps, Support Assist
Security: RSA SecureID,VMware Network Security (NSX), SecureWorks,Hardware TPM
IoT Solutions PartnerProgram:GE, SAP,Software AG, OSIsoft
GlobalSupport,Deployment,& Financing
Embedded Gateways
On-Premise
Appliances Data Center & Cloud
Cloud & App
Integration
Embedded Box3000
Embedded Box5000
Edge Gateway 5000
Edge Gateway 5100
VxRail
VRTX
FX2
VNX VSS
VNXe
DSSD
RTI
Gemfire/Spring
SMARTS
LogInsight
VirtuStream
vCloud Air
VMWare
FEHC
PowerEdge
Networking
Isilon
ScaleIO
ECS
FBDL
VCE/vxBlock
SDDC
Piv. BD Suite
OpenStack (M,C)
Pivotal Cloud Foundry
Pivotal Spring
Pivotal Labs
Boomi
Project Financing Options
$4B of hardware financed yearly
Global Scale and Support
180 countries supported with 1800 service centers
Trusted Brand
Brought you the world’s most secure notebook
Run mission critical OT applications
In 98% of Fortune 500 companies
The Dell Technologies difference
Q&A
Kevin Terwilliger
IoT Solutions Manager
Kevin_Terwilliger@Dell.com
@kdtwill
MT81 - Keys to SuccessfulEnterprise Internet of Things Initiatives
MT82 - Internet of Things Security Starts at the Edge
MT83 - IoT Analytics from the Edge to the Core
MT84 - Innovations in IIoT and Smart Manufacturing
MT85 - Challenges at the Edge:Dell Edge Gateways
HOL11 - Hands-on-Lab: Build an Internet of Things System
Attend other IoT sessions
Visit the IoT solution showcase for live, interactive demos
• Factory optimization
• Energy Management
• Remote assetmanagement
Connect with us
• dell.com/IoT
• Twitter @delloem
• LinkedIn:
• GE Minds + Machines
• Predictive maintenance
• Smart Infrastructure
• Supply chain management
Next Steps
Dell.com/iot
Dell.com/iotedge
MT81 Keys to Successful Enterprise IoT Initiatives

Weitere ähnliche Inhalte

Was ist angesagt?

Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
TheAnfieldGroup
 

Was ist angesagt? (20)

Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
Digital Transformation: Mission Meets Modernization
Digital Transformation: Mission Meets ModernizationDigital Transformation: Mission Meets Modernization
Digital Transformation: Mission Meets Modernization
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Enterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu OracleEnterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu Oracle
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 

Andere mochten auch

Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
Splunk
 

Andere mochten auch (18)

David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
MT102 Effectively powering the 21st century digital workplace
MT102 Effectively powering the 21st century digital workplaceMT102 Effectively powering the 21st century digital workplace
MT102 Effectively powering the 21st century digital workplace
 
Vito securitas - Luc Blyaert
Vito securitas - Luc BlyaertVito securitas - Luc Blyaert
Vito securitas - Luc Blyaert
 
Dell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeDell emc - The Changing IT Landscape
Dell emc - The Changing IT Landscape
 
The Transformation of your Data in modern IT (Presented by DellEMC)
The Transformation of your Data in modern IT (Presented by DellEMC)The Transformation of your Data in modern IT (Presented by DellEMC)
The Transformation of your Data in modern IT (Presented by DellEMC)
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
The Path to Digital Transformation
The Path to Digital TransformationThe Path to Digital Transformation
The Path to Digital Transformation
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
2016 m2 m_forum_industrie4_cybersecurity_tieghi
2016 m2 m_forum_industrie4_cybersecurity_tieghi2016 m2 m_forum_industrie4_cybersecurity_tieghi
2016 m2 m_forum_industrie4_cybersecurity_tieghi
 
Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 

Ähnlich wie MT81 Keys to Successful Enterprise IoT Initiatives

Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
Erik Ginalick
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
doan_slideshares
 

Ähnlich wie MT81 Keys to Successful Enterprise IoT Initiatives (20)

The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of Things
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
 
Cloud technology for hospitality
Cloud technology for hospitalityCloud technology for hospitality
Cloud technology for hospitality
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
AWS_AIoT_Blockchain_in_IoT
AWS_AIoT_Blockchain_in_IoTAWS_AIoT_Blockchain_in_IoT
AWS_AIoT_Blockchain_in_IoT
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
 

Mehr von Dell EMC World

Mehr von Dell EMC World (20)

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 

Kürzlich hochgeladen

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 

Kürzlich hochgeladen (20)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 

MT81 Keys to Successful Enterprise IoT Initiatives

  • 1. Kevin Terwilliger IoT Solutions Manager @kdtwill Keys to Successful Enterprise Internet of Things Initiatives
  • 2. 2 disrupted by digitally enabled competitors1 33% By 2018 “Digital is the main reason just over half of the companies on the Fortune 500 have disappeared since the year 2000” Pierre Nanterme CEO of Accenture of all industry leaders will be 1 - Source: IDC - IoT and Digital Transformation:A Tale of Four Industries Source: IDC Why you need an IoT strategy
  • 3. 3 Predictive Maintenance Richard Childress Racing Eric Warren Asset Management The Weir Group Leslie Powell Real-time Quality Action Point John Savage Learning from real implementations
  • 4. Audience Poll How mature is your IoT initiative? • Learning • Planning • Deploying
  • 7. IoT Unlock the potential of the unconnected by bridging IT and OT Dell EMC brings 30+ years of IT heritage, 15 years of customizing Dell technology for OT environments through OEM, and 50+ partners offering OT expertise Operational Technology • Yield • Quality • Efficiency Information Technology • Infrastructure • Security • Governance 4,000+ OT customers 15 years 40+ industries Dell EMC OEM division OUR MISSION
  • 8. 8 VerticalSolutionsDell IoT HW/SW Ingredients Technology Partners Vertical Expertise Platforms Analytics Data Visualization Wide Area Connectivity Security Services Partners Last Mile Delivery Solution Support System Integration Deployment Project Design Procuring Accessory Get to market faster with Dell’s curated partners
  • 10. SECURITY │ MANAGEABILITY │ ANALYTICS EDGE/FIELD CLOUDFOG
  • 11. 11 Real-time decision making through Edge Analytics Reduced data transfer cost through compression & cleansing Improved security and data continuity through local operations Value of the Fog Adding compute at the Edge offers 3 advantages
  • 12. 12 Which complements existing cloud/datacenter advantages Big Data analytics to get to greater insights for your business IT system integration to reduce data silos Data continuity improved on a broad scale Value of the Cloud/Datacenter
  • 13. 13 SECURITY │ MANAGEABILITY │ ANALYTICS EDGE/FIELD CLOUDFOG
  • 15. Be cautious but not paralyzed Right-size security implementations for different use cases Leverage trusted advisors who: • Understand / take a holistic view • Offer a layered approach • Have ecosystem of partners to fill gaps Security strategy best practices
  • 16. Sensors & Equipment Gateway Management Vmware Network Security (NSX) Dell Edge Device Manager Gateway TPM secure boot Identity & Access Management RSA SecurID Access (ViaAccess) Network Assessment & Threat Analysis Vmware Network Security (NSX) Secureworks Device Management Communication Management Edge Dell Technologies security APTs Malware APTs Malware Threats Cloud/Data Center Unauthorizedaccess Unauthorizedaccess Eavesdropping
  • 17. Summary 1. Build your business case 2. Define your architecture 3. Develop a security strategy
  • 18. Curated technology and services partner program Industry’s broadest infrastructure portfolio Proven use-case specific solution blueprints loT practical approach
  • 19. The leading infrastructure provider for enterprise IoT EDGE/FIELD CLOUDFOG IoT Solutions PartnerProgram:Analytics and Integration GlobalSupport,Deployment,& Financing Embedded Gateways On-Premise Appliances Data Center & Cloud Cloud & App Integration Embedded Box PCs to connect unconnected machines & Software to manage intelligent devices Edge Gateways to aggregate data from sensors and equipment, complete local analytics for real-time decision making, and securing both connected devices and northbound data Edge-optimized converged infrastructure, as well as standalone computing, networking, and storage appliances for on-site real time big data processing, analysis, and store & forward Best-in-class data center and cloud computing infrastructure and IaaS for advanced data management, storage, and petabyte+ scalability Integrated PaaS solutions to remove data silos and enable cloud- native app development and deployment Manageability:Assetmanagement,provisioning,and orchestration Security: Identity,Privacy, Governance, Risk Control, and Compliance
  • 20. Dell Technologies’ IoT Offering EDGE/FIELD CLOUDFOG Manageability: Edge Device Manager, VMware Airwatch, VMware vROps, Support Assist Security: RSA SecureID,VMware Network Security (NSX), SecureWorks,Hardware TPM IoT Solutions PartnerProgram:GE, SAP,Software AG, OSIsoft GlobalSupport,Deployment,& Financing Embedded Gateways On-Premise Appliances Data Center & Cloud Cloud & App Integration Embedded Box3000 Embedded Box5000 Edge Gateway 5000 Edge Gateway 5100 VxRail VRTX FX2 VNX VSS VNXe DSSD RTI Gemfire/Spring SMARTS LogInsight VirtuStream vCloud Air VMWare FEHC PowerEdge Networking Isilon ScaleIO ECS FBDL VCE/vxBlock SDDC Piv. BD Suite OpenStack (M,C) Pivotal Cloud Foundry Pivotal Spring Pivotal Labs Boomi
  • 21. Project Financing Options $4B of hardware financed yearly Global Scale and Support 180 countries supported with 1800 service centers Trusted Brand Brought you the world’s most secure notebook Run mission critical OT applications In 98% of Fortune 500 companies The Dell Technologies difference
  • 22. Q&A Kevin Terwilliger IoT Solutions Manager Kevin_Terwilliger@Dell.com @kdtwill
  • 23. MT81 - Keys to SuccessfulEnterprise Internet of Things Initiatives MT82 - Internet of Things Security Starts at the Edge MT83 - IoT Analytics from the Edge to the Core MT84 - Innovations in IIoT and Smart Manufacturing MT85 - Challenges at the Edge:Dell Edge Gateways HOL11 - Hands-on-Lab: Build an Internet of Things System Attend other IoT sessions Visit the IoT solution showcase for live, interactive demos • Factory optimization • Energy Management • Remote assetmanagement Connect with us • dell.com/IoT • Twitter @delloem • LinkedIn: • GE Minds + Machines • Predictive maintenance • Smart Infrastructure • Supply chain management Next Steps