Feeds

Dell takes aim at iPad, uncloaks enterprise-level Win8 tablet

Latitude 10 Enhanced Security: the fondleslab grows up, gets a job

Choosing a cloud hosting partner with confidence

MWC 2013 Dell has updated its Windows 8 tablet line, and in doing so has juiced the industry's increasing realization that fondleslabs are here to stay, belong in the enterprise, require enterprise-level security features, and are not just for playing Angry Birds.

"At Dell, we have – unequivocally – the most secure, most manageable, and most reliable product portfolio in the industry," Dell VP and general manager of tablets and performance PCs Neil Hand bragged to a group of journalists invited to a tablet-centric event earlier this month.

"What I'm proud of is we're bringing that same kind of resilience and capability to our tablet products as we do to our traditional Latitude and OptiPlex desktops and laptops," he said.

Last October, Dell introduced what Hand called the company's "first really complete" touch-enabled devices: the 32-bit Windows 8 Latitude 10 tablet and 64-bit Windows 8 XPS 12 convertible, and the Windows RT XPS 10 tablet with optional dockable keyboard.

Monday's announcement adds the Latitude 10 Enhanced Security edition, powered by a 1.8GHz dual-core Intel Atom Z2760, running 32-bit Windows Pro 8, and claiming a 20-hour battery life. What lifts this tablet above its fellows are – as might be guessed by its name – its security enhancements, including a smart card and fingerprint reader.

Other security goodies in the $779 Latitude 10 Enhanced Security edition include Dell Data Protection | Access validation-management drivers, Microsoft BitLocker full-drive encryption, Trusted Platform Module 1.2 network-aware hardware protection, and support for Computrace device-recovery, remote-wiping, and asset-tracking software. Dell Data Protection | Encryption enterprise-wide endpoint encryption and encryption auditing will also be available by mid-year.

"I'd compare [the security features] to some competitive product – perhaps an iPad," Hand said, and he didn't mean that comparison would be a close one. From his point of view, hackers can de-encrypt encrypted data on an iPad "in minutes," but "In our case, it's secure for good."

In addition to security, Hand said, the new Latitude 10 Enhanced Security edition has cost and management advantages that make it more enterprise-worthy than the iPad. Citing a study conducted for Dell by the technology-assessment firm Principled Technologies, he said that there's a "huge comparison in savings compared to iPad deployment if you're deploying hundreds to thousands of devices."

How huge? Principled Technologies conducted a cost of ownership and device-management study for deployments of 1,000 Latitude 10s and 1,000 iPads, and found the Latitude 10 group to be 17 times faster and 94 per cent cheaper to deploy than the iPad group, 85 per cent cheaper to manage over a three-year period, and 99 per cent faster to upgrade.

You should certainly take those numbers with the requisite grain of salt, as is always wise when looking at figures from a company-commissioned study, but it's hard to argue with the premise: iOS and the iPad are designed for individual consumers, while Windows 8 tablets – the Latitude 10 Enhanced Security edition especially – can more easily slot into an enterprise-level, admin-controlled environment that's armed with such tools as Microsoft's System Center Configuration Manager (SCCM).

"The iPad world is essentially an admin-free world," Hand said. "You are the administrator of your own device and what you can go and do and control, and that's very difficult to manage" from an enterprise point of view.

iPads are not going away – and neither should they, Hand said. "But when you cross over into the slightly more professional use of it, being in education, healthcare, areas like that, to get the best benefit you have to get some control back. If it's an uncontrolled world you get chaos, and you don't get the benefits you want," he said.

"By providing that level of control, but still allow that 'Hey, I can read my books, I can watch my movies, I can do whatever else,' you get the best of both worlds. That's what we're aiming for." ®

Intelligent flash storage arrays

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Ofcom snatches 700MHz off digital telly, hands it to mobile data providers
Hungry mobe'n'slab-waving Blighty swallows spectrum
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.