I'm in Austin, TX, at Dell's bash, Dell World. I attended an interesting roundtable, "Making BYOx a Reaility" and thought you'd like a quick review of what was discussed.
How Dell Described the Roundtable
"Do you have concerns about security and management which is stopping you from embracing consumerized IT as part of your corporate infrastructure? Come join experts from Dell to answer your questions and dive into the details about Dell's comprehensive portfolio of device, application and content management solutions."
At first glance, the session appeared to be the painful, detailed study of what both the media and analysts have been saying about the trend for staff to bring their own devices to work (BYOD) combined with a review of what Dell and its recent acquisitions, Quest and Wyse, are doing to address the trend.
It is clear that Dell believes that it understands why people would bring in their own smartphones, tablets and other intelligent devices and what the organization needs to do to both support them and make sure that the devices operate in a secure and manageable way.
Dell/Quest's and Dell/Wyse's representatives pointed out that tools that allow end-to-end management of everything, such as the devices, the network, and the applicaitons, is necessary for a good BYOD program implementation. Quest and Wyse both have long addressed these issues and have products and services that are in use today. Dell's partners, BMC, CA, Citrix, Microsoft, Red Hat and VMware offer useful tools as well.
The endpoints also need content and user profile management as well.
The descussion went on to point out that management considerations go beyond the devices, their applications and the network connecting them to the enterprise data center to management inside the firewall. The Dell/Quest representative pointed out that Dell combined with its partners offer an extensive portfolio of tools to address management in the data center and cloud.
The discussion turned to a very important topic, security. The Dell representatives stressed that security needs to be woven through the entire infrastructure rather than being added on as an afterthought.
Since I've spoken with representatives of all of these suppliers and quite a few others, I didn't find the messages to be new. The customers in the audience, however, appeared to be getting quite a bit from the discussion.
As more interesting things come up during the event, I'll post something here.