Blog Group Posts
Application Performance Monitoring Blog Foglight APM 104
Blueprint for Big Data and Analytics - Blog Blueprint for Big Data and Analytics 0
Blueprint for Cloud - Blog Blueprint for Cloud 0
Blueprint for HPC - Blog Blueprint for HPC 0
Blueprint for VDI - Blog Blueprint for VDI 0
Latest Blog Posts
  • Dell TechCenter

    Foglight for Java and .Net Version 5.9.8

    Foglight for Java 5.9.8 and Foglight for .Net 5.9.8 were released on April 15th.  The release contains enhancements, quality improvements and additional platforms for Java and .Net.

    One feature I want to call your attention to is improvements on service building for Java and .Net servers. Specifically, on the Application Server Monitor dashboard, users can now select individual application servers and applications when they create a service. The service can now also be reused locally or globally.  This makes it easy for administrators to create their own service groups for quick filtering by system, server or application.

    We have also done some dashboard tweaking to improve UI performance on the Application Server views, and we have added the following new platforms:  

    • Java:

      • WebLogic 12.1.3, 12.2.1 (12C)

      • JBoss EAP 6.4.0 to 6.4.4

    • .Net

      • .Net Framework Version 4.5.1, 4.5.2, 4.6.0, 4.6.1

      • Microsoft SharePoint

    If there are additional platforms that you are planning to implement this year, please contact me directly ( so that I can prioritize your platforms into our test matrix.

  • Identity and Access Management - Blog

    What's up With All This Fuss About Digital Transformation Anyway?

    Earth-shattering mega-trend, or flash in the pan?…you be the judge

    We’ve all heard about the inevitable digital transformation. In fact, many of us already have digital transformation initiatives. But what is digital transformation and is it really worth all the attention it’s getting? We’ve teamed up with Andras Czer of Forrester Research to address just that topic.

    Join Andras and our own Todd Peterson as they discuss digital transformation, what opportunities it brings, what challenges it presents, and how identity and access management can act as either a barrier or enabler of digital transformation.

    Sign up for the webinar

    Title: Forrester analyst highlights IAM’s Role in Digital Transformation

    Date: May 31, 2016

    Time: 11:00-12:00 EDT

    Perhaps in no other area is the motivation to undertake a shift in thinking from security being “the guys that say no” to becoming the “department of yes” than with digital transformation. A digital transformation is all about enabling users, facilitating collaboration, empowering business improvement, and shifting to a can-do attitude. But security can’t be sacrificed in an effort to be digitally transformed – but it doesn’t have to be. Check out the webinar to find out how.

    And if you want to get a jump on the topic, check out the Digital Transformation section of our new website or watch this short video.What's up With All This Fuss About Digital Transformation Anyway?

  • Data Protection

    APIs, the Internet of Me, and Your Data Protection Wake-Up Call [New White Paper]

    How do fast-moving digital businesses keep up with their customers and still maintain adequate data protection?

    Actually, some of them don’t.

    Data Protection Wake-Up Call

         Photo Credit: Tony Hisgett Licensed under CC BY 2.0

    Sure, they keep up with their customers because that’s how they survive. But data protection has never been especially glamorous, and when you’re growing fast, it’s likely to fall to the bottom of your priority list.

    In my previous post I described how IT trends in slow-growing companies sound the data protection wake-up call. In this post I look at trends at the other end of the spectrum: the ones that serve to remind fast-moving companies that there are always new sources of data to protect and new ways to protect it.


    In the same way that digital business is being conducted in the cloud, it is also going to application programming interfaces (APIs) that move data like physical goods in a shipping container. The API in Product A ships a bit of data to an API that pulls it into Product B, which combines and operates on it, then generates a third set of data. Whether that data takes the form of a spreadsheet, a text file or an entire database table, it has its own, new value to the business. That means that it’s worth backing up.

    Think about it in terms of an analytics package running on one database that you then connect with three, five or ten other databases. The result is a new set of data. All the records exist in their source databases, but at the point where they connect, you now have new data that is the analysis of multiple databases for a specific purpose.

    Data like this will be the bread and butter of digital business. It will be annoying to have to regenerate it if it is lost, deleted or corrupted. But is the enterprise thinking about backing it up? Is it part of a data protection strategy yet? Not that I’ve seen.

    Worse yet, the new data may be unstructured. If your thinking and your data protection assume structured data and databases, then as soon as analytics becomes popular for reporting and other purposes in your organization, you have to protect the resulting data differently from anything you’re currently protecting.

    The Internet of Me

    The Internet of Things is bringing us big data, and the Internet of Me is bringing us fast data.

    The Internet of me, a term coined by Accenture, embodies user expectations about how they want to conduct business. The trend is toward an entire internet and digital environment that surrounds users, is all about them and answers their questions immediately. Here are a few use cases:

    • Do you ever go past the first page of search results? Few people do these days. “Never,” they tell you. “In fact, I don’t even go past the middle of the first page.” The search engines know this, of course, and they know that they will slide into irrelevance if they don’t figure out who you are and how you search, then give you that search experience quickly every time.
    • Look at the emergence of the SMACK (Spark, Mesos, Akka, Cassandra and Kafka) stack, aimed at solving fast data problems. They and their ilk are open source projects you can connect and configure for quick answers to simple questions like “Who sells the best pizza around here?” and “Can I trust this guy to pay the rent on time?”
    • Large populations of customers, prospects and users – particularly young people, I suppose – have reached the point where they would rather interact with businesses digitally than with someone in person. My generation will put up with “Your call is very important to us...” but young people won’t, and I don’t blame them. My college-age daughters know how to set up dormitory assignments and find compatible roommates entirely online, without budging a vocal cord. One of them had to contact an admission *** last week. "Do I need to call her?” she complained. “Can’t I email her? Where can I get her cell number so I can text her?" The final victory of fast data will come when users can get all their problems solved with a few taps or a chat bot instead of with a human-to-human conversation.

    There’s no great need to back up and protect every byte that goes into and comes out of the Internet of Me, but it’s important to save the configuration data, settings and preferences on which the user experience depends.

    Changes in production mean changes in protection – New white paper

    Whether the data is big or fast or both, it needs protection. In Dell’s experience, few digital businesses have heard or responded to that wake-up call yet.

    Businesses that move fast change their production models fast. We’ve published a white paper called “When You Make Changes in Production, Don’t Forget to Make Changes in Data Protection” that explores the IT trends shaping backup and the places your users and customers are generating new data. Read the paper for more ways you can keep up with them.

    Download White Paper

    Michael Grant

    About Michael Grant

    Michael Grant is the director of product marketing for Data Protection software solutions at Dell, where he helps oversee the strategy and delivery of a comprehensive portfolio of backup and recovery solutions.

    View all posts by Michael Grant 

  • Dell TechCenter

    This Geek works for Dell Software

    Am I a Geek? Yes I thought, but then I started thinking that what geek used to mean and what it has grown to mean are probably different then what I had in mind. So being a Knowledge Management (KM) Manager I did the obvious, I searched. I searched Google for ‘what is a geek’, and it returned the following definition


    Immediately after reading definition number one I though "check". Definition number two "ugh, no, not me". Verb definition yes, but I’m geeking out over things like KM, Knowledge Centered Support (KCS) and Star Wars. [By the way Dell Software Support has an awesome Support Portal and Knowledge Base, be sure to check it out here]

    In the past year I’ve come to realize that my love for Star Wars is strongly shared by people other than my family. It’s widely licensed now so it’s easy to spot another Star Wars fan. This is great because it means that I no longer have to wear men’s Star Wars t-shirts, women’s Star Wars shirts are now widely available!! Though I’ll admit the cut is nice I still prefer the graphics on the men’s tee’s versus the feminized images on the women’s, which means I still steal Star Wars shirts from my husband. We are indeed Star Wars geeks. I love this topic because Geek Pride day May 25 shares the anniversary of the first Star Wars film, Episode IV: A New Hope, released on May 25, 1977. I wasn’t born yet… OK that’s an untruth J I was born but not old enough to sit still and watch a full length film. Eventually the love for the genius behind these films would fill my life, and my house.

    Just a FEW of the items -

    The creativity that George Lucas displayed in writing and creating these stories is amazing and I could write on and on about many aspects of this but since this is a short and sweet blog I’ll refrain. I will however tell you that the appreciation of the Star Wars Universe and expanded stories (films, books, comics, etc.) have allowed my family and I to share and enjoy something together. Something we all love "geeking out" about. Here is a picture of us at the 2015 Star Wars Convention. We would have loved to attend the 2016 Convention, but it’s in a galaxy far far away (London, England) and requires lots of Republic Credits – seriously, London is far from Colorado.

    Hope you all have a wonderful geeky day. May the Force be with You!

    Monique Cadena

    About Monique Cadena

    Monique has worked in the field of Knowledge Management (KM) and Knowledge Center Support (KCS) for over 19 years. She is recognized as an Innovator by the Consortium for Service Innovation (CSI).
    She been working for Dell since 2013 and is currently responsible for driving governance of the Dell Software KM program best practices and ensuring Dell Software is up-to-date with current KM, KCS and Social Support trends.

    View all posts by Monique Cadena |  Twitter

  • Hotfixes

    Optional Hotfix 618516 for vWorkspace 8.6 MR1 Web Access Released

    This is an optional hotfix and can be installed on the following vWorkspace roles -

    • vWorkspace Web Access

    The following is a list of issues resolved in this release.



    Feature ID

    HTML5 Connector

    HTML 5 session may occasionally freeze.


    HTML5 Connector

    Microsoft Office application is launched a second time on   reconnecting to a disconnected session.


    HTML5 Connector

    Improvements to Web Access site security.


    HTML5 Connector

    Copy/paste operation does not work in Microsoft Excel when using   the HTML5 connector.


    HTML5 Connector

    Failed to connect to RDP Proxy error when space in username


    This hotfix is available for download at:

  • Network, SRA and Email Security Blog

    Expand Your Knowledge Through the Power of Dell Security at PEAK16

    Eamon MooreThe following in a guest post from Eamon Moore is Managing Director of EMIT, an Irish IT solutions company and Dell Security Preferred Partner specialising in IT Consultancy, Cloud Computing, IT Security & IT infrastructure solutions.


    At EMIT, providing innovative security solutions that allow our customers to both achieve and surpass their goals has become a core part of what we do. Our clients look to us for inspiration and innovation, for cutting-edge solutions that will solve a long-standing issue or help elevate their business to the next level. Sometimes, however, we need to seek inspiration from our peers, to meet, network and explore new ideas and ways of doing business, so that we can broaden our own horizons to expand those of our clients.

    So, we’re excited to be attending Dell Security EMEA PEAK16 in Valletta, Malta, which promises to be a fantastic event, showcasing how Dell partners can increase security sales, discover up-sell and cross-sell opportunities, and how customers can be enabled to do and achieve more. Designed for business and technical leaders, it’s an opportunity to, in Dell’s words, “Come for knowledge and Leave with power,” a chance to share the insights your work has kindled with colleagues from across Europe.

    And we here in EMIT have a lot to share.

    The last 12 months have been a tremendous period for us. In October 2015, we were recognised as the Dell Global Social Media Partner of the Year at Dell World in Austin, Texas - Dell recognised our unique ability to collaborate and engage audiences within the social sphere, which bolstered both EMIT and Dell’s business initiatives in Ireland. The following month we also received Dell’s Security New Partner of the Year award, a fantastic achievement that represents a real recognition of our hard work in developing our Dell Security business, and in particular the success of our Firewall-as-a-Service solution. Considering our position as the top Managed Service Provider in Europe on the Dell SonicWALL Firewall-as-a-Service programme, alongside being shortlisted for Ireland’s Tech Excellence Awards, we look back on the past year with a mixture of pride and a determination to replicate and improve on this success in the months ahead.

    These achievements were the result of a combination of hard work, a commitment to excellence, and capitalising on connections forged during Dell Security EMEA PEAK15, as IT security is one of our four business pillars, with Dell Security at the forefront of the solutions that we deliver to clients. I made the most of my time in Berlin last May - my first experience of Dell PEAK - meeting and building relationships with Dell executives, partners and distributors. Jason Hill and the team at Exertis VAD, whom I met for the first time in Berlin last year, have become a key distribution partner for EMIT’s Firewall-as-a-Service solution, and their support over the past year has been a huge advantage. We came to Berlin for knowledge and left with the power to evolve and expand our reach!

    So what’s on offer this year?

    Dell Security PEAK16 represents a fantastic opportunity to share your successes and insights with industry colleagues, to discuss what lies ahead with top executives and industry leaders, to discover more about new and innovative products and solution roadmaps, and to learn about best practice for delivering Dell Security solutions from those with a wealth of experience in the field, including Curtis Hutcheson, Vice President and General Manager, Dell Security Solutions; Steve Pataky, Vice President, Worldwide Sales; Patrick Sweeney, Vice President, Marketing and Product Management and Florian Malecki, International Product Marketing Director, Dell Security.

    Speaking from personal experience, the breakout and technical sessions are a great way to learn more about how you can expand your security portfolio, with discussions revolving around Network Security-as-a-Service, selling in the retail space, and expanding your services with Dell’s Connected Security, to name but a few. Add to that a fantastic commitment from Dell that many of the senior leadership team members will be in attendance, and will take the time to meet one-on-one with partners, and it’s hard to disagree that three days in Malta could provide you with a roadmap for your future that you might never have imagined.

    And then there’s the location, a stunning city full of architectural marvels designed in the artistic and exuberant baroque style. If you’re a history buff then you’ll be in heaven (the entire city is a UNESCO World Heritage Site), from the magnificent St. John’s Co-Cathedral, built by the Knights of Malta, to the fabulous Manoel Theatre - Malta’s national theatre and Europe’s third oldest. Don’t forget to sample the local fare - Mediterranean cuisine is famous for its healthy ingredients and rich flavours.

    There’s no doubt that Dell’s PEAK15 conference played a significant role in our successes over the past year, and we eagerly await what the next 12 months will hold for EMIT following our mingling in Malta. It represents a clear opportunity to benefit from the knowledge of those who have risen to the top of their field, to discover new and innovative avenues for business, and the power to shape your future. So, are you willing to discover what Dell and PEAK16 can do for you?

    Top tips for PEAK16


    • Plan your sessions in advance and make the most of your trip.
    • If more than one person is attending from your business, try to split the sessions between business and technical.
    • Download the Dell PEAK app ahead of the conference - it’s a great way to engage with other attendees.
    • Get to know members of the Dell team, other partners and distributors.
    • Finally, don’t miss Florian Malecki speaking - one of the highlights from Berlin in 2015.


    Eamon Moore, Founder and Managing Director of EMIT

    Eamon Moore is the Founder and Managing Director of EMIT, an award winning business productivity and technology company with thirteen years’ experience in delivering professional IT services to the Irish market. Since 2003 Eamon has led EMIT in becoming one of Ireland’s leading technology providers across infrastructure, cloud computing, security and business productivity. EMIT’s partnership with Dell dates back to the company’s formation and now positions itself as an industry leader in Dell Security, Networking and Data Protection Solutions.

    Eamon is actively involved with a number of Irish business organisations including the Small Firms Association, the Institute of Directors and the Dublin Chamber of Commerce. He was recently appointed to the industry steering board of the Innovation Value Institute in Maynooth University in Ireland. Eamon is also an active commentator in the technology and business sectors and has contributed to many of Ireland’s leading publications as well as presenting at various business conferences worldwide.


  • Dell TechCenter

    Geek Pride Day! A day to celebrate what you love

    Geek Pride Day; a day we celebrate what we love, what makes us unique, but also what makes us part of something bigger. Sometimes we're described as eccentric, sometimes obsessive, but what I personally find to be relatable; we're enthusiastic about something and want to share our love for that with friends, family, and the community of like-minded individuals. Our fellow geeks.

    In anticipation of Geek Pride Day, we reached out to our coworkers to see what they loved; check out what they had to share.

    Madison from marketing loves going to conventions like ComicCon and Stan Lee’s Comikaze. Here she is at a ComicCon taking pics with Daft Punk and the popular Smiling Man meme from Reddit. Later on, she worked up a sweat killing a few zombies over at The Walking Dead booth.

    Danny from Support enjoys an evening of cosplay with his wife. I'm sure you can guess both of their incredible costumes! 

    Danalynne from Marketing is a Whovian! After discovering Doctor Who as a child, she developed a fondness for multicolored scarves, which later led to not only a Dalek on her desk but also drinking tea from a mug that features a disappearing TARDIS. Years ago while on a business trip to Cardiff she missed some on-location filming by mere hours, but later made up for it with a visit to the Doctor Who Experience museum. 

    Lori from Support is an artist in her free time that enjoys Anime. Here she is doing some shopping at Anime Expo for high-quality art pens. She also enjoys the occasional energy drink at work with friends that have an appreciation for the same movie. 

    Tulio from Marketing enjoys cosplay at conventions with friends and family in his free time. He also has some of the best home office decoration I've seen yet! 

    Cynthia from Support enjoys understanding the evolution of how humans standardize and interact with the concept of time. A year ago, while at the Royal Observatory in Greenwich, London, her friends all took turns photographing each other’s sneakers as they straddled the Greenwich meridian.  The caption of the photo would be Cynthia shouting gleefully “It’s Zero o’clock!!”

    Claudia from Marketing enjoys a night out with the Dell Space cadets at the SQL Bits Conference party in Liverpool in May! Party on fellow guardians of the SQL Server database galaxy!

    Prudence from Support is strong with the power of the dark side. Here she is in full cosplay at Comic Con, where she goes to find her apprentices. 

    Emily from Marketing took a studio tour in Burbank, Calif. There she got to pose with one of her favorite superheroes, Batman. Later that day, a photo was taken seconds before Emily discovered she is a Hufflepuff!

    Derek from Support enjoys cosplay; here he is with Harley Quinn at Toronto Comic Con. Later, he ran into some 'friends' at the con! Derek is also very involved in the burgeoning board game community. He has various friends with games in development and gets to act as a beta tester! 

    Kris from Marketing, along with his wife, have enjoyed an annual visit to Comic Con since 1997. Once their son was old enough, he started to join them which gave Kris an excuse to cosplay as our favorite video game characters. He also enjoys taking goofy pictures with other cosplayers and attending events where a surprise celebrity will show up from time to time. 

    Monique from Support enjoys going to conventions with her husband and son. Here they are waiting in line to see the one and only Carrie Fisher! She also has outstanding taste in home office decor. 

    In my experience, here at Dell Software, Geek Pride Day is every day. We're enthusiastic about developing, supporting, marketing, and selling end-to-end IT solutions enabling people to save time and enjoy the things they love to do. 

    What are you doing to celebrate Geek Pride Day? I'd love to hear from you in the comments. 

    Kris Freedain

    About Kris Freedain

    After spending 15 years in the Support and Support Operations organizations, he moved to a Marketing Role, and is now responsible for the corporate channel messaging for Dell Software.

    View all posts by Kris Freedain | Twitter

  • Data Protection

    End of Life, Status Quo and Your Data Protection Wake-Up Call [New White Paper]

    So, what does a data protection wake-up call sound like?

    Picking up from my previous post on trends like Bimodal IT, I want to focus on organizations that move slowly and take a long time to adapt to trends in IT. Even among digital businesses (in other words, almost every business in the 21st century), some organizations react more slowly to IT trends simply because they can afford to.

         Photo Credit:  m01229 Licensed under CC BY 2.0

    Not every business wants to be the next Uber or Snapchat or Frogbox (check them out if you have to move kids into or out of a dorm). If you run IT in a lower-paced organization, the data protection wake-up call is not so loud and relentless as in a fast-moving company. You hear it, realize that your backups are safe, hit the Snooze button and drift off for a little while longer before you really need to get moving.

    Still, even if you’re more accustomed to treading water than to swimming upstream, IT trends in data protection will find you eventually. They serve to remind you that there are always new kinds of data to protect and new ways to protect it.

    Protecting data through end of life (EOL)

    What do you do when the software you’ve used and relied on for ages reaches end of life? You retire it, of course, because if you don’t, you run unnecessary security risks.

    Take Windows Server 2003, for example. It had a very long life in a lot of data centers because it ran a variety of services so reliably. Microsoft EOLed it in 2015. Maybe you’re one of the holdouts who didn’t upgrade until support stopped. Maybe you’re still running it on four-year-old hardware not connected to the Internet. Good for you.

    But if you built your data protection around Windows Server 2003 and other old products, that’s an indicator that your protection is outdated. What worked well for all those years won’t even come close to working well for the rest of your environment now.

    Your data protection wake-up call: What has been EOLed? How have you been protecting it all this time? What was adequate data protection then, and what’s adequate now?

    The status quo and data protection

    That’s related to another trend in companies where IT evolves slowly: maintaining the status quo. “Things being what they are, everything is going as well as possible,” goes the French saying.

    Dell Software’s biggest competitor in data protection is the status quo. A lot of the people we talk to – including long-time customers who are very happy with Dell products – understand the importance of data recovery and high availability. But until they face a dire need to think differently about backup, they’d rather continue pumping money into extended support on the same products they’ve used for ages.

    By embracing the status quo, they’re adding more layers to the encrusted infrastructure in their environment. They’re a long way from meeting their protection needs, but it’s been so long since they looked at their environment that they don’t realize it.

    Changes in production mean changes in protection – New white paper

    So even if your approach to IT is more like treading water than shooting the rapids, you’ll still be subject to IT trends and you’ll always need adequate data protection.

    Every growing company makes changes in the way it produces goods and provides services. Those changes in production require changes in data protection, so we’ve put together a new white paper, “When You Make Changes in Production, Don’t Forget to Make Changes in Data Protection” around that fact of business life. Whatever the pace of growth in your IT environment, you’ll find ideas in the paper to help you hear the data protection wake-up call more clearly.

    Michael Grant

    About Michael Grant

    Michael Grant is the director of product marketing for Data Protection software solutions at Dell, where he helps oversee the strategy and delivery of a comprehensive portfolio of backup and recovery solutions.

    View all posts by Michael Grant | Twitter

  • Information Management

    Your SQL Server Summer – Mobility Tranquility Is On Its Way

    Let me introduce you to Al and Don, my two SQL Server DBA beach buddies.

    Cruel Summer? Or Cool for the Summer?

         Photo Credit: Alex Liivet Licensed under CC BY 2.0

    Al administers about 60 SQL Server databases in his company. He spends most of his life monitoring the performance of his SQL Server environment. Every year around mid-June he starts singing, “Summertime Blues,” “Cruel Summer” and “This Summer’s Gonna Hurt,” and he continues singing them well into September.

    Al spends most of his summer at his desk: leaning over his keyboard, cobbling together root cause analysis, wondering why he couldn’t see database problems before they hit, and guessing at which layer (OS, SQL Server, virtual, Azure, application) they reside in.

    Al’s never going to get a sun tan. He ends every summer as pale as he started it.

    Then there’s Don. He’s SQL Server DBA for about 90 databases in his company. Like Al, he’s responsible for monitoring SQL Server performance, but unlike Al, he doesn’t spend most of his life at it. What’s on his playlist this time of year? “All Summer Long,” “Summer Girls” and “Cool for the Summer.

    He has to deal with the same problems that fill Al’s day: running out of physical and virtual resources, poor session response time, high disk input/output, high CPU usage due to poorly written SQL statements and, most of all, users who are unhappy and unproductive because of those problems.

    Yet Don finds plenty of time to work on his suntan.

    So, what’s the difference between Al and Don? (Hint: They use the same sunscreen.)

    Al uses a handful of different tools for his troubleshooting. He’s found some on the web, he uses utilities that come with SQL Server and he’s even put together a few tools on his own. But he has to put a lot of effort into bouncing from tool to tool when he’s trying to improve database performance and keep his users happy. If he plugs away at it long enough, he can fix what’s broken, but he never manages to prevent issues before they affect users and productivity.

    And he doesn’t get much of a summer.

    Don, on the other hand, got the memo a while ago and started using Spotlight on SQL Server Enterprise. He gets end-to-end monitoring, diagnosis and SQL Server optimization all rolled into a single tool. Even before users have the chance to complain about database performance problems, Don can see many of those problems coming and he can see which levels in his SQL Server environment are affected by them. He finds what he needs to fix and where to fix it.

    Then he gets back to working on his tan.

    Better yet, he saw a webcast called SQL Server DBAs: Do You Have Mobility Tranquility? in which Dell Software’s Peter O’Connell walked through the Spotlight mobile app. Don can receive and address specific notifications on his mobile devices from all of the instances he monitors, anytime and anywhere (including from the beach).

    “Dude, this summer’s gonna rock,” says Don. “I’ll have fun, fun, fun ‘til my manager takes my smartphone away.”

    Get your Mobility Tranquility – On-demand Webcast

    How do you want your tan to look by the end of the summer? Like Al’s or like Don’s?

    More important, how do you want to handle your SQL Server performance monitoring? Hunched over your keyboard Alt-Tabbing from tool to tool, or using a single mobile app to monitor your SQL Server environment and run SQL Server diagnostics?

    We’ve recorded an on-demand webcast called SQL Server DBAs: Do you have Mobility Tranquility? If you’re already monitoring your SQL Server performance with Spotlight, join Peter O’Connell as he reviews the desktop functions you can now access through the mobile app. And if you’re new to Spotlight, Peter will introduce you to the wide range of SQL Server metrics you can monitor, plus the convenience of doing it through your mobile devices.

    Sunscreen not included.

    Claudia Coleman

    About Claudia Coleman

    Claudia Coleman is a Senior Product Marketing Manager in the Dell Software Systems and Information Management Business Unit. With a focus on database monitoring and management technology, Claudia speaks to the issues important to the DBA and spends the majority of her time in the world of SQL Server.

    View all posts by Claudia Coleman | Twitter

  • Identity and Access Management - Blog

    The Forrester Wave™: Identity Management And Governance, Q2 2016 Dell One Identity Manager positioned as a Leader

    See why Dell One Identity Manager is positioned as a Leader in The Forrester Wave™: Identity Management and Governance (IMG), Q2 2016.

    The independent research firm uses a 17-criteria evaluation of identity management and governance providers to identify the nine most significant ones. This report shows how each provider measures up and helps security and risk professionals make the right choice for managing and governing user access.

    In this evaluation, Dell’s top scores were in the criteria of:

    •          Administration

    •          Development, sales, and technical support staffing

    •          Global presence (verticals and geographies)

    •          IMG partner ecosystem

    •          IMG pricing terms and flexibility

    The IMG solution also scored a four out of five in the criteria of:

    •          Role management

    •          Overall solution complexity

    •          IMG strategy and vision

    •          IMG implementation complexity

    •          Customer satisfaction

    According to Forrester Research, “This market is growing because security professionals use these solutions to address key identity-related risks and streamline operational efficiencies by migrating away from existing inaccurate, manual, and inefficient identity processes. … As this market continues to mature, improved end user interfaces, simplified and flexible administration, and broader identity analytics will dictate which providers lead the pack.”

    Dell One Identity Manager enables you to mitigate risk for your organization; control user and privileged access; govern identities and secure data. Now you can achieve governance, unify security policies, meet compliance needs and improve business agility with a modular and scalable solution. Plus, it offers a common web user interface to administer all of its core functionality, and Forrester’s evaluation found “the Dell administrative portal was intuitive and less complex than other solutions evaluated in this Forrester Wave.”

    The Dell One Identity Manager automated architecture enables organizations to simplify major identity and access management tasks in a fraction of the time or expense of traditional framework solutions, and also facilitates better security decisions so organizations can control user and privileged access, govern identities, secure data, and reduce information silos and risk exposure.