K1000 as a Service
K1000 Systems Management Appliance
K2000 Systems Deployment Appliance
Today, the new SIM Community is live! Please join us on our new home for all Systems and Information Management content. Read about all of the new features with in the SIM Community and learn how our community seeks to give you the information you need. Please check out our new blog.
We promise to give you a more focused user experience in our new community where you can get the information you want through an easier navigation. If you have suggestions on how we can make our new home better, post your thoughts on our Feedback Forum.
A couple of weeks ago, I offered seven key questions for building a solid evaluation methodology to help you as you embark on any journey to select new technologies, whether you’re looking for information systems management software, endpoint security and endpoint management tools, cloud technologies, or other solutions.
But once you’ve defined your process for solution evaluation, what happens next?
It’s time to think about the broader questions. After all, it’s not all just a feature/function checklist that gets you where you need to be, but the sum of both tangible and less-tangible solution (and vendor) characteristics. Keep in mind your end game, which includes both enhancing your competitive advantage and returning more time for innovation, especially for the IT team.
Here are eight key questions to ask yourself:
Applying These Criteria to Systems Management Solutions
If you’re wondering how to work these questions into your solution evaluation, take at look at our new Endpoint Systems Management Evaluation Guide. This checklist includes not only features and functionality but also the best fit considerations detailed above. And if you’re in the market for a systems management solution, be sure to put Dell KACE on your list. Dell KACE systems management appliances provide an all-in-one solution that is comprehensive, easy to use, fast to implement and actively supported. We invite you to see how they rate under even the most rigorous solution evaluation methodology.
About Stephen Hatch
Stephen is a Senior Product Marketing Manager for Dell KACE. He has over eight years of experience with KACE and over 20 years of marketing communications experience.
View all posts by Stephen Hatch
Today is the first official day of summer and people are starting to get geared up for many warm weather activities. While your kids are on summer break, you’ll probably spend more time with family and friends. As the days get hotter and the nights get warmer, now is the perfect time to soak up some Vitamin D, spend some time away from work, and have a nice cold beverage.
How ever you decide to spend your time, here are five summer essentials to get you through the long, hot days, especially while you’re out on vacation:
No one likes a bad sunburn. Sunscreen is extremely important to protect your skin from UV rays, which can have long-term effects if not treated properly. Wearing sunscreen will ensure your skin is protected from sun damage and you won’t need aloe vera at your bedside.
Find a nice pair of sunglasses to shade your eyes from the blinding sun. This will ensure visibility to your surroundings when you go hiking or when you fire up the grill. Did you know your eyes can get sunburn too?
3. A comfortable wardrobe
Put away the sweaters and pull out the polo shirts. Shorts, swim suits, sandals/sneakers, and a hat are all a must if you are planning on some outdoor activities. It’s never too late to inventory what items you have, need to replace, or simply get rid of.
4. A beach bag or backpack
Whether you’re going to the beach or going to a theme park with the kids, a bag or backpack will take you far. Fill it up with everything you need so you know what’s on hand, and you’ll be set for the day.
5. The right gadgets
If you’re planning a pool party, barbeque, or a camping/fishing trip, you’re going to need the appropriate gadgets. Goggles and pool floats to swim, a cooler for food and drinks, bug repellant spray and a camp lantern, or some travel apps would make your life easier. Make sure you prepare ahead of time so you don’t forget an essential part of the plan.
6. A clean makeover (bonus)
Shave off that winter beard, clean up that hairdo and look fresh all summer while you’re at the beach or hitting the pool. Be careful of tan lines!
Summer feels like a much slower time, but I say this every year: Where did summer go? Fortunately, you won’t have to stress about work while you’re away because Dell KACE has it under control, and can be another one of your summer essentials. KACE systems management appliances can provision, manage, secure, and service all of your network connected devices so you can focus on spending time with your family instead of being trapped at work. Relax — it’s time to make summer memories, and let Dell KACE appliances handle your systems management chores.
About Alyssa Luc
Alyssa Luc joined Dell Software in 2015 as a Social Media and Community Advisor for the KACE product team. Her specialties include customer advocacy and advocate marketing.
View all posts by Alyssa Luc |
Nothing makes you feel more like a king at work than saving your company a bunch of money. Whether it’s actual cash money or just a ton of man hours, being able to wipe thousands of dollars off your organization’s list of expenses and add it back to the bottom line is a sure fire way to win the Employee of the Year or Decade throne.
So how do you accomplish such a huge achievement without dragons or sorcery?
First, you need to identify the opportunities in front of you. So take a look at the following questions and see if any of them hit home.
If two or more of these made you feel like winter is coming and had you grabbing for the nearest roll of antacids, then you, my friend, are in for a very nice surprise.
The surprise is the Dell KACE K2000 Systems Deployment Appliance. It’s a multi-OS solution chock full of deployment tools that streamlines initial provisioning and ongoing administration of master system images and driver updates, so you can easily ensure that all your connected systems remain up to date and secure. Because of its all-in-one, appliance-based form factor, the K2000 dramatically reduces complexity, deploys quickly and minimizes ongoing maintenance, reducing total cost of ownership. Even better, it enables deployment of disk images, operating systems, drivers and applications at remote sites via remote site management, without requiring dedicated, on-site hardware or staff, which will save you from those time eating treks.
The reward for utilizing system images and deployment software is pretty clear. A recent Gartner study stated that by 2020, there will be more than 21 billion connected devices. If there is nothing else you take away from this article, it’s that your network is growing, and to ensure connected systems remain up to date and secure, you need help.
There are a wide variety of examples of organizations that have invested in the K2000 and gone from spending multiple days and many IT staff hours manually updating systems, to updating their entire user base with a few clicks of the mouse and saving time and thousands of dollars at the same time.
How Green Clinic Won
One example is Green Clinic. When Green Clinic deployed an electronic medical records (EMR) system, the K2000 made quick work of getting the application into doctors' hands utilizing the KACE K2000 software deployment tool. While manual deployment methods would have required weeks of effort, the KACE K2000 enabled the IT team to image and deploy all 155 laptops in just one day, saving 80 hours of overtime valued at $20,000, in just one project.
If you haven’t deployed a true systems deployment appliance like the K2000, you are sitting on a savings motherlode. The benefits of systems imaging with the K2000 can be enormous: you may not end up with a flowy man perm like Jon Snow or even a dragon like Daenerys Targaryen, but it will save you a boat load of time and money and maybe even help you win the IT game of thrones! If you want to become your IT department’s hero, click on the link below to read our e-book and learn more about how you can save with the Dell KACE K2000 Systems Deployment Appliance.
Growing organizations have an increasing number of connected devices on their network, and IT teams are spending more time managing and securing these devices, and the applications they deliver. Device proliferation is a growing trend for which IT professionals are not prepared, requiring time consuming day-to-day tasks to simply keep the IT lights on, helping to keep end users productive. A recent Dimensional Research study reported 61 percent of IT organizations say they already have unknown devices and applications on their networks. This means that the more devices that are connected, the more vulnerable your network is to security threats, thus increasing your chances of malicious attacks from online sources and malware threats. Without an effective endpoint systems management solution, the business impact can be catastrophic.
That’s why your organization should have an endpoint systems management solution that works for — and with — you. In our upcoming Dell Software Virtual Trade Show on June 23, you can learn about the impact of device proliferation, and how to meet the challenges that affect your daily IT tasks using Dell KACE systems management appliances. They are fast to implement, easy to use, and provide the most comprehensive endpoint systems management solution for identifying and managing all network connected devices, including:
The plug-and-play Dell KACE appliances are available in a variety of form factors, including on premises physical and virtual appliances, as well as a hosted service. They can help your IT staff provision, manage, secure and service all network-connected devices faster – giving your organization more time to innovate.
Learn More: Register for this Live Webcast
There are multiple ways we can help you save valuable time:
Our goal is to become your ally and help you reduce IT administrative time so you can have more time to focus on strategic initiatives and help your organization grow. At the Dell Software Virtual Trade Show, join our live webcast at 11:00am ET where subject matter expert, Ken Chalberg, will discuss managing the entire endpoint systems management lifecycle, from systems deployment to retirement. Whether you need help with initial system deployment and imaging, managing and protecting your systems or providing them with world class support, Dell KACE offers a comprehensive set of tools to address your needs. Register today to learn more. We hope to see you there.
So you’ve been assigned to evaluate a new technology or application for your organization. Yikes! What next?
First of all, remember that you’re not alone. Many growing organizations are faced with the task of selecting a increasingly wide variety of sophisticated solutions for endpoint security, cloud initiatives, systems management and more. Accordingly, the codification of the fuzzy art surrounding the evaluation process itself has become increasingly important. It’s no long enough to cobble together an ad hoc committee, draft a list of requirements and then let the vendor pitches commence. Planning for and defining the components of the evaluation process are now an essential piece of the bigger project, and critical to its success.
Developing a comprehensive, reusable solution evaluation methodology
Some of these planning steps may seem obvious, while others take a bit more concentrated brain power to articulate. This list of seven key questions will help you develop a more comprehensive solution evaluation methodology:
There’s no doubt that solution evaluations require work — and lots of it. But as technology evolves and new offerings enter the market, the evaluation process itself becomes an even more critical foundation for future success.
Applying the evaluation methodology to systems management solutions
If you’re in the market for a systems management solution, we’ve done some of the work for you. Our new Endpoint Systems Management Evaluation Guide lays out a comprehensive list of features and functionality to look for in any candidate solution, helping to make the systems management solution evaluation process as inclusive and straightforward as possible, In fact, even if you’re not currently looking for systems management software at the moment, you might still find it useful to take a look at the guide and perhaps even use it as a template for your own list of questions and solution criteria.
Join the Dell Software Virtual Trade Show on June 23, 2016 and learn from industry experts through live webcasts, network with like-minded individuals, and explore Dell Software solutions, all from the comfort of your own chair. You’ll have the opportunity to share best practices, tips and tricks, and stay on top of the latest software trends and technologies. This virtual event features a full day of live presentations, so get ready, get comfortable, and collaborate.
At the Dell Software Virtual Trade Show, you’ll be able to:
Visit the virtual KACE booth to learn more about endpoint systems management and hear from subject matter expert, Ken Chalberg, who will discuss the challenges of device proliferation, ESM lifecycle management, and the benefits of all things KACE.
This is no-cost, one-day event will run live from 11:00 a.m. to 5:00 p.m. ET. It’s time for a new approach to controlling, securing and modernizing your IT world. Join us at the Dell Software Virtual Tradeshow, and see how the power to change your organization’s IT strategy is, literally, at your fingertips.
You don’t have to look hard in the media to find articles reporting a shortage of software developers and other IT professionals in the job market today. Educators and policy makers alike are responding. Computer science was finally listed as a core academic subject in the U.S. in December 2015 with the reauthorization of the Every Student Succeeds Act (ESSA), and initiatives such as CS for All promise increased funding. The topic even made President Obama’s 2016 State of the Union Address, when he urged the country to offer “every student the hands-on computer science and math classes that make them job-ready on day one.”
However, technology in education today extends far beyond computer science instruction. Technology is broadly recognized as a tool for enabling a variety of educational goals, from mathematics to languages to study skills and research. In addition, it is a key component of increasingly popular programs such as blended learning and personalized learning.
Moreover, EdNET Insight’s “State of the K-12 Market 2015: Executive Summary” notes that while the major technology companies began as providers of devices, operating systems and digital tools, they are moving in new directions as well. For example, the report notes, “Amazon, Google, and Apple have digital marketplaces to distribute the content and educational apps of others. Amazon has taken this a step further, acquiring ed tech company TenMarks in 2013 and elevating the startup’s co-founder to general manager of Amazon Education.”
With the support of companies like these, educators are increasingly using technology to drive collaboration — for both students and teachers. For example, Google Apps for Education comprises a suite of free productivity tools for classroom collaboration, and Google Educator Groups (GEGs) “provide a platform for educators to collaborate with one another, allowing them to pick up new creative ideas from one another, and to help each other best meet the needs of their students with Google solutions.”
It’s no wonder, then, that school districts are eager to put devices into the hands of all their students. The EdNET Insight report notes that the top two priorities of technology directors are building out their wireless networks and providing personal computing devices to their students. It also reports “some significant shifts in districts’ preferences for various kinds of devices and their plans for deploying them. Technology directors plan to rely on Chromebooks much more than a year ago, while tablets figure less prominently in their hardware plans.” However, both laptops and tablets still have a significant presence.
With the increasing use of Chromebooks for education against a backdrop of a diverse variety of other technologies in educational settings, it’s critical for IT administrators to have an effective tool for managing all network-connected devices from a single pane of glass, and not just the Chromebook management provided by the Google Chromebook Management Console. Only Dell offers a systems management solution that enables you to manage Chromebooks alongside all your other network-connected devices, with features such as comprehensive asset management, remote administration and an integrated service desk. To learn more, download our new tech brief, “Educators Love Chromebooks. Now IT Admins Will, Too.”
Common wisdom holds that server security is far more critical than workstation security. After all, a security problem in a server can affect thousands of users or even an entire organization, while an insecure workstation directly impacts just one user. Right?
Wrong. A security problem on any workstation connected to your network can cause widespread damage — and in fact most data breaches result from such problems. Verizon's 2016 Data Breach Investigative Report, for example, found that 63 percent of data breaches involved the use of weak, default or stolen user credentials. Malware, phishing and keyloggers were the next most common attack methods, Windows security expert Randy Franklin Smith concurs, noting that “all of the biggest breaches in recent times have started with a compromised workstation — not a server.”
The takeaway is clear: Workstation security is every bit as critical to your organization as server security. (Note that I’m using the word “workstation” here to mean not just desktops but all non-server Windows computers, so we’re talking about endpoint security broadly, including laptop security, tablet security and mobile security.)
Key security differences between servers and workstations
But how can this be? Even though servers and workstations run essentially the same Windows operating system, securing workstations is very different than servers — and often it’s actually far more complex. The key differences that impact security include:
Workstation security requires protecting users from themselves
More broadly, securing Windows servers is primarily about reducing attack surface and keeping remote users from accessing resources and services other than those they are authorized to use. Since trusted administrators are the only ones logging on interactively, and even they do so only for specific administrative tasks, interactive security is much less of an issue on most servers.
Hardening workstations, on the other hand, is very much about protecting end users from themselves. Of course, a key part of your organization’s workstation security strategy must be effective and continuous user training. However, the details and scheduling of that training is likely beyond your control. And in any case, even the best training is insufficient — IT security professionals have to accept that users will make mistakes. They will fall for phishing attacks, reuse easy-to-guess passwords, leave their workstations unattended, plead the expediency of downloading an unapproved application they need to meet a critical deadline, and so on.
Therefore, you need to use every strategy at your disposal to secure your user workstations.
Learn about the most important controls for ensuring workstation security
What are those strategies? We asked the aforementioned Randy Franklin Smith, who’s an expert on Windows security essentials. You can learn all about the top controls he recommends implementing on workstations in the free webinar Top 12 Workstation Security Controls. Smith built this list of controls based on his experience from his extensive IT audit/assessment practice, along with his research and knowledge of common desktop security standards such the Federal Desktop Core Configuration (now USGCB). Here are the 12 topics you’ll learn about in the webinar:
You’ll also learn how Dell KACE system management appliances can automatically discover and manage all the systems on your network — automating the otherwise laborious and error-prone work of securing workstations. The recorded webinar is available for you to watch at your convenience.
About Sean Musil
Sean Musil is a Product Marketing Manager for Dell KACE. He believes the internet should be free and secure.
View all posts by Sean Musil |
Today, May 4th, is a special day for "Star Wars" fans. “May the Fourth be with you” is a play on the popular line “May the Force be with you.” Many fans take the day to celebrate their love for the movie in various ways, such as hosting a Star Wars movie marathon, fighting with light sabers, dressing up as a favorite character or adding to their collection of "Star Wars" memorabilia.
We decided to celebrate "Star Wars Day" by having a fun discussion. We asked a few of our customers this question: “Are you on the dark side or the light side and why?” Which of their responses resonates best with you?
Choose Wisely You Must
“Light side. Sith are weaker than Jedi.”
“Dark side. We have more fun on this side.”
“Light side. Good needs to prevail if we are all to survive.”
“Dark side. We have cookies!”
“Light side. Ours is the correct path.”
“Dark side. Unlimited power!”
“Light side. The dark side may have cookies, but we have brownies.”
“Dark side. Clothes are way better looking.”
“Light side. It always seems to win and we don’t get hit by blasters.”
“Dark side. Red sabers — end of discussion.”
While our customers are divided on this great debate, one thing is certain: IT systems professionals maintain the balance in the IT force, which surrounds us, penetrates us and binds us together. And there’s no better solution to help balance the IT force than Dell KACE systems management appliances. With Dell KACE, the IT force can be strong with you, too.
Whether you’re on the light side or the dark side, we celebrate "Star Wars Day" with you.
May the Fourth be with you.