|By Business Wire||
|February 25, 2013 09:01 AM EST||
Dell today introduced the Latitude 10 enhanced security configuration, a business-ready tablet designed to address the costly and time consuming management and security challenges faced by organizations deploying tablets. The Dell Latitude 10 is ideal for highly regulated industries such as government agencies, financial institutions and healthcare organizations and builds upon Dell’s heritage of delivering trusted business PCs with industry-leading manageability, security and reliability.
Study Reveals Multiple IT Challenges of Deploying Tablets in Enterprise Settings
A recent Dell and Intel-commissioned Harris Interactive online survey2 of 204 U.S. healthcare IT decision makers highlights the tablet management challenges faced by organizations today. The results show that tablets are increasingly becoming a standard IT device (51 percent of the healthcare organizations surveyed have deployed them). However, other studies show tablets can cost significantly more time and money to manage than other standard Windows-based devices such as laptops and desktops. According to the results of the Harris survey:
- On average, those institutions managing tablets spend an estimated $2,235.20 configuring these devices to work within their organizations. These costs are often several times more than the actual expense of acquiring the device.
- Fifty-one percent of tablet using institutions report that the devices required additional software or tools beyond what is used to manage laptops and desktops.
- Forty-two percent of IT decision makers in tablet using organizations spent between 10 and 29 minutes per tablet to achieve the same level of security inherent in Trusted Platform Module (TPM) chips.
- Forty-four percent of those in tablet using organizations reported that there are applications that are currently used in their organization on desktop and laptop computers that cannot currently be accessed on tablets.
These results demonstrate that the introduction of tablets into enterprise environments has created a more expensive and difficult management process for IT managers in multiple industries. The Dell Latitude 10 was designed to overcome these challenges by combining a great user experience with ease of management and deployment by IT. The Latitude 10 fits easily and securely into existing IT environments to help improve IT efficiency and decrease total cost-of-ownership. Because it is managed like any standard Windows-based laptop, the Latitude 10 is significantly easier to deploy and manage than the Apple iPad in large scale enterprise implementations. According to third-party testing performed by Principled Technologies1, when compared to the iPad the Latitude 10 tablet is:
- Up to 17 times faster and 94 percent less expensive to deploy saving approximately 580 hours in system prep and applications installation.
- Up to 99 percent faster for software updates, saving approximately 197 hours with automated updates.
- Up to 85 percent cheaper per device to maintain over a three-year period.
Industry-Leading Tablet Security
The Latitude 10 tablet, powered by the dual core Intel® Atom™ processor Z2760, delivers more hardware, authentication, data protection, tracking and recovery security features than any other tablet device on the market today and is ideal for organizations that must comply with stringent regulations such as the Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Federal Information Processing Standard (FIPS). The Latitude 10 enhanced security configuration is the only dual-authentication Windows 8 tablet with both an integrated smart card and fingerprint reader, in addition to the Latitude 10’s already robust security features that include:
- Dell Data Protection|Access providing an integrated end point security management suite that utilizes the fingerprint and smart card reader in the Latitude 10 as well as third-party security devices. A Dell wizard provides simple setup.
- Trusted Platform Module (TPM) 1.2 hardware to allow networks to check device integrity and to assign full trust.
- Microsoft® BitLocker Drive Encryption.
- Computrace Support for stealth tracking software to allow the recovery of lost or stolen devices.
- A Noble Lock slot for added hardware security.
“Other tablets being deployed in business environments can cause more harm than good in the long run with unforeseen management costs and unsecure data protection and access,” said Neil Hand, vice president of tablets and performance PCs, Dell. “With Latitude 10 enhanced security configuration, our customers will be able to give their workers the mobility and productivity they want while having the peace of mind they can easily enforce and adhere to some of the most rigorous security regulations.”
“While tablets can improve access to patient information for clinicians at the point of care, healthcare IT decision-makers should be informed about potential side-effects,” said Andrew Litt, M.D., Dell’s Chief Medical Officer. “The time and expense to connect, manage and secure these devices could be nearly five times the device’s purchase price2, which can be a significant concern for most healthcare institutions. Dell’s Latitude 10 tablet and integrated solutions like Mobile Clinical Computing address these concerns by simplifying device management and ensuring that information is both secure and accessible for patient care.”
“In our testing and analysis we found substantial advantages in managing the Dell Latitude 10 over an Apple iPad in an enterprise SCCM environment,” said Bill Catchings, co-founder of Principled Technologies. “Our analysis found that these advantages would translate to significant cost savings, especially when managing large numbers of these devices.”
Product Availability and Pricing3
The Dell Latitude 10 Enhanced Security is available worldwide today and costs $779USD. The Latitude 10 essentials 64GB configuration is available starting at $579USD. The Latitude 10 essentials 32GB configuration is available for $499USD.
More information, including images, infographics, full research reports and blogs that further explore the research findings and Latitude 10 with enhanced security can be found here.
Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
1Tablets in Large Enterprises: Dell Latitude 10 with Windows 8 vs. Apple IPAD, A Principled Technologies Test Report, Commissioned by Dell, Jan. 2013
2The Dell Healthcare and Technology study is a third-party study commissioned by Dell. It was conducted online within the US and UK by Harris Interactive on behalf of Dell between Dec. 27, 2012 and Jan. 17, 2013 among 204 US and 81 UK IT decision makers who work in the healthcare industry who were either hospital/clinic administrators or IT professionals working inside or outside a dedicated IT department, and who had at least a major influence on decision making regarding purchasing computer equipment for hospitals/clinics. 105 IT decision makers in the US and 50 in the UK report that tablets are used in their organization. No estimates of theoretical sampling error can be calculated; a full methodology is available here.
3Offers subject to change, not combinable with all other offers. Taxes, shipping, handling and other fees apply. Offers available only to qualified U.S. customers and subject to restrictions in your applicable contract, if any. Dell reserves right to cancel orders arising from pricing or other errors.
About Harris Interactive
Harris Interactive is one of the world's leading market research firms, leveraging research, technology, and business acumen to transform relevant insight into actionable foresight. Known widely for the Harris Poll® and for pioneering innovative research methodologies, Harris offers proprietary solutions in the areas of market and customer insight, corporate brand and reputation strategy, and marketing, advertising, public relations and communications research. Harris possesses expertise in a wide range of industries including health care, technology, public affairs, energy, telecommunications, financial services, insurance, media, retail, restaurant, and consumer package goods. Additionally, Harris has a portfolio of multi-client offerings that complement our custom solutions while maximizing our client's research investment. Serving clients in more than 196 countries and territories through our North American and European offices, Harris specializes in delivering research solutions that help us - and our clients—stay ahead of what's next. For more information, please visit www.harrisinteractive.com.
About Principled Technology and Management Cost Methodology
Principled Technologies (PT) compared a set of typical enterprise IT management operations on the Latitude 10 and the Apple iPad. PT looked at what the cost of doing these operations would be in a typical enterprise with 1,000 of the devices using existing management tools like SCCM. Principled Technologies provides industry-leading technology assessment and fact-based marketing services relying upon extensive experience with and expertise in all aspects of technology testing and analysis, from researching new technologies, to developing new methodologies, to testing with existing and new tools. Principled Technology’s founders have worked in technology assessment for over 20 years. They created and led the Ziff-Davis Benchmark Operation, which developed such industry-standard benchmarks as Ziff Davis Media’s Winstone and WebBench. They founded and led eTesting Labs, and after the acquisition of that company by Lionbridge Technologies were the head and CTO of VeriTest.
Dell, Latitude and OptiPlex are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a business application to multiple users (multi-tenancy). Docker, a container technology, was used to ...
May. 27, 2015 01:00 AM EDT Reads: 2,448
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
May. 26, 2015 09:00 PM EDT Reads: 5,223
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
May. 26, 2015 06:00 PM EDT Reads: 2,267
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
May. 26, 2015 05:00 PM EDT Reads: 4,954
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
May. 26, 2015 02:00 PM EDT Reads: 6,688
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry.
May. 26, 2015 01:15 PM EDT Reads: 1,141
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
May. 26, 2015 01:00 PM EDT Reads: 7,305
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
May. 26, 2015 01:00 PM EDT Reads: 4,605
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
May. 26, 2015 12:15 PM EDT Reads: 2,704
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers is very hard. You have to learn five new and different technologies and best practices (libswarm, sy...
May. 26, 2015 12:00 PM EDT Reads: 2,468
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
May. 26, 2015 12:00 PM EDT Reads: 2,245
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
May. 26, 2015 11:00 AM EDT Reads: 4,262
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
May. 26, 2015 11:00 AM EDT Reads: 5,963
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
May. 26, 2015 10:15 AM EDT Reads: 1,920
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehe...
May. 26, 2015 10:00 AM EDT Reads: 3,381
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fil...
May. 26, 2015 10:00 AM EDT Reads: 2,178
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
May. 26, 2015 09:00 AM EDT Reads: 5,430
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
May. 26, 2015 08:00 AM EDT Reads: 5,682
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
May. 26, 2015 08:00 AM EDT Reads: 6,184
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
May. 25, 2015 11:00 PM EDT Reads: 6,305