Dell Technologies bietet eine Drei-Punkte-Strategie für den erfolgreichen Aufbau eines IT-Fundaments für die zukünftige Arbeitswelt. | Dell Technologies offers a three-point strategy for successfully building an IT foundation for the future of work. |
---|---|
Arbeit verändert sich und nach der Pandemie entsteht eine neue Normalität. Doch die Diskussionen über die neue Arbeitswelt sind oft reaktiv. Sie drehen sich meist endlos um die Frage, wie Unternehmen mit Trends wie künstlicher Intelligenz oder digitaler Transformation umgehen sollen. Sinnvoller ist ein proaktiver Ansatz, der die Einführung von Zukunftstechnologien und neuen Arbeitsmodellen beschleunigt. Bevor es losgeht, sollten Unternehmen ihre technologische Infrastruktur genau prüfen und sicherstellen, dass sie für die kommenden Herausforderungen optimal aufgestellt ist. Die folgende Drei-Punkte-Strategie von Dell Technologies kann dabei helfen.
„Unternehmen benötigen ein starkes Fundament, um in der neuen Arbeitswelt durchzustarten“, erklärt Ulrike Rüger, Senior Sales Director & Regional Leader Germany bei Dell Technologies. „Dafür müssen sie ihre Bedürfnisse kennen, die Sicherheit wahren und dürfen die individuellen Bedürfnisse der Mitarbeitenden nicht ignorieren. Unsere Drei-Punkte-Strategie hilft ihnen dabei, diese wichtigen Schritte zu gehen, ohne Essenzielles aus den Augen zu verlieren. Auf diese Weise gehen sie proaktiv vor, statt sich mit reaktiven Diskussionen aufzuhalten.“ | Work is changing and a new post-pandemic normal is emerging. But discussions about the new world of work are often reactive. They tend to revolve endlessly around how companies should deal with trends like artificial intelligence or digital transformation. A more useful approach is a proactive one that accelerates the adoption of future technologies and new work models. Before getting started, organizations should take a hard look at their technology infrastructure and make sure it is ready for the challenges ahead. The following three-point strategy from Dell Technologies can help. 1. Streamline the multi-cloud approach. Many organizations have invested in IT and security solutions and adopted new cloud services in recent years. This has been necessary to respond to the ever-changing business environment and to implement new technologies. Managing and operating multiple clouds is a major challenge for IT departments because each cloud is slightly different and the complexity increases with each expansion. To solve this problem, organizations should streamline their IT infrastructure using a multi-cloud by design approach. This involves assessing actual IT needs. This may include private clouds, on-premises solutions, public clouds, colocation or edge, or a combination of these environments. Management is then done through a Multicloud by Design platform that provides IT with a unified view of the different components and enables centralized management. As a result, organizations can run their workloads where it makes the most sense without additional effort. 2. building and extending protections. Companies manage around ten times more data today than they did five years ago – and the trend is rising. The priority must be to protect this data and close gateways for cybercriminals. This is all the more true as hybrid working models increase the attack surface for hackers. The practical implementation must include every device and every system, because even just one unprotected endpoint can suffice as a source of entry into the corporate network. Once the appropriate security software has been implemented, the security infrastructure must also be extended to the users. This is best achieved with a zero-trust approach, an authentication model that checks every interaction within the system and network. Last but not least, companies need an elaborate recovery plan: Despite all security measures, it is unlikely that they will be able to fend off all cyberattacks. So, in order to build resilience and ensure business continuity, they need to be ready to recover data and resume operations quickly in the event of an emergency. 3. Acquire necessary end-user systems. Once the backbone of IT is in place and its security is assured, companies can equip end users. The focus of selecting devices and tools must obviously prioritize performing their regular tasks – supporting new work models should be secondary. It is advisable that companies conduct an individual analysis to understand their employees‘ work patterns and their requirements for work tools. With this understanding, they can find specifically adapted solutions that also support innovative work models. This approach makes more sense than pushing suboptimal one-size-fits-all solutions for all departments and teams. It also enhances the employee experience and employee satisfaction. „Companies need a strong foundation to take off in the new world of work,“ explains Ulrike Rüger, Senior Sales Director & Regional Leader Germany at Dell Technologies. „To do so, they need to know their needs, maintain security and not ignore the individual needs of employees. Our three-point strategy helps them take these important steps without losing sight of essentials. This way, they take a proactive approach instead of getting bogged down with reactive discussions.“ |
Dr. Jakob Jung ist Chefredakteur Security Storage und Channel Germany. Er ist seit mehr als 20 Jahren im IT-Journalismus tätig. Zu seinen beruflichen Stationen gehören Computer Reseller News, Heise Resale, Informationweek, Techtarget (Storage und Datacenter) sowie ChannelBiz. Darüber hinaus ist er für zahlreiche IT-Publikationen freiberuflich tätig, darunter Computerwoche, Channelpartner, IT-Business, Storage-Insider und ZDnet. Seine Themenschwerpunkte sind Channel, Storage, Security, Datacenter, ERP und CRM.
Dr. Jakob Jung is Editor-in-Chief of Security Storage and Channel Germany. He has been working in IT journalism for more than 20 years. His career includes Computer Reseller News, Heise Resale, Informationweek, Techtarget (storage and data center) and ChannelBiz. He also freelances for numerous IT publications, including Computerwoche, Channelpartner, IT-Business, Storage-Insider and ZDnet. His main topics are channel, storage, security, data center, ERP and CRM.
Kontakt – Contact via Mail: jakob.jung@security-storage-und-channel-germany.de