Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Federation Enterprise Hybrid Cloud: Redefining Comprehensive

When we first introduced Federation Enterprise Hybrid Cloud, we proved we could plan, scope and implement it in as few as 28 days. Then at EMC World we showed how we could enable IT organizations to add new services with ease after deployment. Want a sneak preview of what’s to come next?

How about:

  1. The ability to deliver self service for new and existing multi-tiered applications and update them in a simple drag-and-drop experience
  2. Always-on and secure Infrastructure-as-a-Service
  3. Accelerated deployment through cost-optimized hyper-converged infrastructure

Sound good? Well, we’re hard at work in the Federation lab engineering these features into our Federation Enterprise Hybrid Cloud solution – and what outcomes do we expect them to deliver?

(more…)

Virtual Desktops Just Got Simpler

Jay Chitnis

Jay Chitnis

Senior Director, End User Computing Solutions at EMC
Jay Chitnis

Latest posts by Jay Chitnis (see all)

I’ve become a nomad. Wherever I work, and whatever device I use, my virtual desktop follows me. That freedom to access my desktop, applications, and data from anywhere helps me make the most of my workday.

Now the EMC Federation has made it much easier for customers to deploy virtual desktops at scale, with EMC Federation End-User Computing (Fed EUC) solution. The solution includes all hardware and software needed for end-user computing—not just virtual desktop infrastructure (VDI), but also the support desk software, orchestration and automation tools, security, installation services, and one-call support.

(more…)

It’s the End of August and Thoughts Turn to…

Connie Hastings

Connie Hastings

Director, Technology Alliances at EMC

Every August as summer days start to shorten, and our attention quickly shifts from beach fun to back-to-school shoes and bus schedules, many of us here at EMC are sprinting to the finish line of another important event. Oh yes – you guessed it – it’s time for VMworld.   Let’s run through where you will find EMC and the Federation at VMworld.

With 23,000 attendees, more than 400 technical sessions and 240 sponsors and exhibitors – VMworld takes over the city of San Francisco.  Having been there from the beginning, EMC has grown with VMworld and is dedicated to showcasing to our customers our alignment with VMware and demonstrating why we are indeed better together.

(more…)

Yamaha Motor Revs Up IT Innovation with EMC

EMC Pulse

EMC Pulse

EMC Pulse

Yamaha Motor creates products that the company promises will “Rev Your Heart.”  That same spirit is at the heart of YaYamaha 1maha Motor’s approach to innovate and revolutionize IT.

To keep up with rapid global demand, Yamaha needed a winning IT strategy that would transform its business processes and accelerate organization-wide innovation.

The company operates in an environment of constant change and needed an IT infrastructure that can rapidly adapt. That’s why Yamaha began working with EMC to transition the company’s IT infrastructure to a hybrid cloud.

“I believe the move towards hybrid cloud technology is the exact definition of innovation,” said Tomoyasu Aiba, group manager, Yamaha Motor IT technology strategy group, process and IT division. “Yamaha Motor does not hesitate to revolutionize IT.”

(more…)

Advanced Malware Defense: The Need for Speed

Zulfikar Ramzan

Zulfikar Ramzan

Chief Technology Officer at RSA
Zulfikar Ramzan

Latest posts by Zulfikar Ramzan (see all)

According to the Verizon Data Breach Report 2015, 70 to 90 percent of malware samples are unique to an organization, which means the malware Red-Eyed-Cat-Cwouldn’t automatically be identified as a threat. This puts any organization relying only on signature-based tools at great risk, as they could have malware actively running in their environments yet be unaware of any compromise. Motivated threat actors can typically find ways to bypass purely preventative measures, including “advanced” measures that still must rely on previous experience or knowledge of a strain of malware to detect and stop it. Techniques like metamorphism, polymorphism, and sandbox evasion have changed the game and unfortunately, are no longer confined to the domain of sophisticated threat actors. Nowadays, they’re the status quo.

In the face of such a reality, effective approaches for addressing malware can’t be predicated on just prevention alone, but must be focused on deep visibility and swiftness of response.

(more…)

Pulse in...

Follow EMC

Archives

Twitter: @EMC_News

Live from #VMworld 2015, the EMC Federation announces a new end-user computing solution: http://t.co/ACkgzMVzKf http://t.co/TArUiZquZW about 17 mins ago
Who says you can't be at #VMworld? Follow us on social for live updates from the show! http://t.co/xLLlFTk39B http://t.co/GSsMHcN3Yt about 2 hours ago
6 ways IT responsibilities are evolving. Insights from EMC's CTO: http://t.co/27W028d63v http://t.co/W7ERY8Eaj3 about 4 hours ago
How to succeed with #BigData http://t .co/DvkIXiwWqr http://t.co/K7imJMqP6T about 6 hours ago