Welcome!

Wearables Authors: Craig Lowell, Elizabeth White, Pat Romanski, Dana Gardner, Bob Gourley

News Feed Item

Dell Latitude 10 Enhanced Security Tablet Meets the Security, Manageability and Reliability Needs of Government Agencies, Financial Institutions and Healthcare Organizations

Dell today introduced the Latitude 10 enhanced security configuration, a business-ready tablet designed to address the costly and time consuming management and security challenges faced by organizations deploying tablets. The Dell Latitude 10 is ideal for highly regulated industries such as government agencies, financial institutions and healthcare organizations and builds upon Dell’s heritage of delivering trusted business PCs with industry-leading manageability, security and reliability.

Study Reveals Multiple IT Challenges of Deploying Tablets in Enterprise Settings

A recent Dell and Intel-commissioned Harris Interactive online survey2 of 204 U.S. healthcare IT decision makers highlights the tablet management challenges faced by organizations today. The results show that tablets are increasingly becoming a standard IT device (51 percent of the healthcare organizations surveyed have deployed them). However, other studies show tablets can cost significantly more time and money to manage than other standard Windows-based devices such as laptops and desktops. According to the results of the Harris survey:

  • On average, those institutions managing tablets spend an estimated $2,235.20 configuring these devices to work within their organizations. These costs are often several times more than the actual expense of acquiring the device.
  • Fifty-one percent of tablet using institutions report that the devices required additional software or tools beyond what is used to manage laptops and desktops.
  • Forty-two percent of IT decision makers in tablet using organizations spent between 10 and 29 minutes per tablet to achieve the same level of security inherent in Trusted Platform Module (TPM) chips.
  • Forty-four percent of those in tablet using organizations reported that there are applications that are currently used in their organization on desktop and laptop computers that cannot currently be accessed on tablets.

These results demonstrate that the introduction of tablets into enterprise environments has created a more expensive and difficult management process for IT managers in multiple industries. The Dell Latitude 10 was designed to overcome these challenges by combining a great user experience with ease of management and deployment by IT. The Latitude 10 fits easily and securely into existing IT environments to help improve IT efficiency and decrease total cost-of-ownership. Because it is managed like any standard Windows-based laptop, the Latitude 10 is significantly easier to deploy and manage than the Apple iPad in large scale enterprise implementations. According to third-party testing performed by Principled Technologies1, when compared to the iPad the Latitude 10 tablet is:

  • Up to 17 times faster and 94 percent less expensive to deploy saving approximately 580 hours in system prep and applications installation.
  • Up to 99 percent faster for software updates, saving approximately 197 hours with automated updates.
  • Up to 85 percent cheaper per device to maintain over a three-year period.

Industry-Leading Tablet Security

The Latitude 10 tablet, powered by the dual core Intel® Atom™ processor Z2760, delivers more hardware, authentication, data protection, tracking and recovery security features than any other tablet device on the market today and is ideal for organizations that must comply with stringent regulations such as the Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Federal Information Processing Standard (FIPS). The Latitude 10 enhanced security configuration is the only dual-authentication Windows 8 tablet with both an integrated smart card and fingerprint reader, in addition to the Latitude 10’s already robust security features that include:

  • Dell Data Protection|Access providing an integrated end point security management suite that utilizes the fingerprint and smart card reader in the Latitude 10 as well as third-party security devices. A Dell wizard provides simple setup.
  • Trusted Platform Module (TPM) 1.2 hardware to allow networks to check device integrity and to assign full trust.
  • Microsoft® BitLocker Drive Encryption.
  • Computrace Support for stealth tracking software to allow the recovery of lost or stolen devices.
  • A Noble Lock slot for added hardware security.

Quotes

“Other tablets being deployed in business environments can cause more harm than good in the long run with unforeseen management costs and unsecure data protection and access,” said Neil Hand, vice president of tablets and performance PCs, Dell. “With Latitude 10 enhanced security configuration, our customers will be able to give their workers the mobility and productivity they want while having the peace of mind they can easily enforce and adhere to some of the most rigorous security regulations.”

“While tablets can improve access to patient information for clinicians at the point of care, healthcare IT decision-makers should be informed about potential side-effects,” said Andrew Litt, M.D., Dell’s Chief Medical Officer. “The time and expense to connect, manage and secure these devices could be nearly five times the device’s purchase price2, which can be a significant concern for most healthcare institutions. Dell’s Latitude 10 tablet and integrated solutions like Mobile Clinical Computing address these concerns by simplifying device management and ensuring that information is both secure and accessible for patient care.”

“In our testing and analysis we found substantial advantages in managing the Dell Latitude 10 over an Apple iPad in an enterprise SCCM environment,” said Bill Catchings, co-founder of Principled Technologies. “Our analysis found that these advantages would translate to significant cost savings, especially when managing large numbers of these devices.”

Product Availability and Pricing3

The Dell Latitude 10 Enhanced Security is available worldwide today and costs $779USD. The Latitude 10 essentials 64GB configuration is available starting at $579USD. The Latitude 10 essentials 32GB configuration is available for $499USD.

Additional Resources:

More information, including images, infographics, full research reports and blogs that further explore the research findings and Latitude 10 with enhanced security can be found here.

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

1Tablets in Large Enterprises: Dell Latitude 10 with Windows 8 vs. Apple IPAD, A Principled Technologies Test Report, Commissioned by Dell, Jan. 2013

2The Dell Healthcare and Technology study is a third-party study commissioned by Dell. It was conducted online within the US and UK by Harris Interactive on behalf of Dell between Dec. 27, 2012 and Jan. 17, 2013 among 204 US and 81 UK IT decision makers who work in the healthcare industry who were either hospital/clinic administrators or IT professionals working inside or outside a dedicated IT department, and who had at least a major influence on decision making regarding purchasing computer equipment for hospitals/clinics. 105 IT decision makers in the US and 50 in the UK report that tablets are used in their organization. No estimates of theoretical sampling error can be calculated; a full methodology is available here.

3Offers subject to change, not combinable with all other offers. Taxes, shipping, handling and other fees apply. Offers available only to qualified U.S. customers and subject to restrictions in your applicable contract, if any. Dell reserves right to cancel orders arising from pricing or other errors.

About Harris Interactive

Harris Interactive is one of the world's leading market research firms, leveraging research, technology, and business acumen to transform relevant insight into actionable foresight. Known widely for the Harris Poll® and for pioneering innovative research methodologies, Harris offers proprietary solutions in the areas of market and customer insight, corporate brand and reputation strategy, and marketing, advertising, public relations and communications research. Harris possesses expertise in a wide range of industries including health care, technology, public affairs, energy, telecommunications, financial services, insurance, media, retail, restaurant, and consumer package goods. Additionally, Harris has a portfolio of multi-client offerings that complement our custom solutions while maximizing our client's research investment. Serving clients in more than 196 countries and territories through our North American and European offices, Harris specializes in delivering research solutions that help us - and our clients—stay ahead of what's next. For more information, please visit www.harrisinteractive.com.

About Principled Technology and Management Cost Methodology

Principled Technologies (PT) compared a set of typical enterprise IT management operations on the Latitude 10 and the Apple iPad. PT looked at what the cost of doing these operations would be in a typical enterprise with 1,000 of the devices using existing management tools like SCCM. Principled Technologies provides industry-leading technology assessment and fact-based marketing services relying upon extensive experience with and expertise in all aspects of technology testing and analysis, from researching new technologies, to developing new methodologies, to testing with existing and new tools. Principled Technology’s founders have worked in technology assessment for over 20 years. They created and led the Ziff-Davis Benchmark Operation, which developed such industry-standard benchmarks as Ziff Davis Media’s Winstone and WebBench. They founded and led eTesting Labs, and after the acquisition of that company by Lionbridge Technologies were the head and CTO of VeriTest.

Dell, Latitude and OptiPlex are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.