Welcome!

News Feed Item

Dell Unveils Innovative and Powerful Desktop Virtualization Solutions Designed to Meet the Needs of Security-Conscious Organizations

Dell cloud client-computing today at Citrix Synergy 2014 announced additions to its industry-leading cloud client portfolio with the Dell Wyse 5000 series all-in-one thin client, the Dell Wyse quad display 7000 series thin client and the Dell Wyse Xenith 3 zero client for Citrix. Dell also announced a new version of its end-to-end VDI offering, Dell Wyse Datacenter for Citrix XenDesktop, which accelerates deployment time and improves manageability with the addition of Dell Foglight for infrastructure monitoring.

“More than 200 million people interact with Dell Wyse solutions every day—from ATMs to kiosks to classrooms to hospitals. We continue to raise the bar for thin client manageability, security, performance and value, as well as lead the way with innovative form factors and OS support,” said Steve Lalla, vice president and general manager, cloud client computing, Dell. “When these new portfolio additions are combined with Dell’s data center infrastructure solutions for Citrix, customers from a broad range of industries can improve security, better protect their content, and sharply reduce ongoing costs – all while delivering the computing experiences their people demand.”

Seamless Design, Ultimate Security

The Dell Wyse 5000 series, a multi-protocol, all-in-one thin client, features virus-immune Wyse ThinOS and offers a cutting-edge, seamless design that incorporates the best of Dell’s display technology with fully-integrated, thin client hardware. This all-in-one is perfect for organizations that want the security, manageability and versatility of a thin client in a package they will be proud to show off to employees and customers alike. Available with a keyboard and mouse, the Dell Wyse 5000 series fits into any high-style environment with a perfect combination of brains, brawn and beauty.

Big Performance, Tiny Footprint

The latest addition to Dell’s desktop-class cloud computing portfolio is the new Dell Wyse 7000 series quad-display thin client. With a high performance quad-core processor, the quad-display 7490 easily powers through the most demanding workloads and packs all of the hardware necessary to enable accelerated graphics and multimedia in a compact package. Ideal for CAD engineers to securities traders, the quad-display 7490 delivers high-performance in a minimal package and an affordable price.

End-to-End Citrix XenDesktop Support

Dell end-to-end solutions for Citrix encompasses the complete range of desktop virtualization components, from thin and zero clients to data center infrastructure for a Citrix verified desktop-equivalent experience to empower an increasingly mobile workforce. The Dell Wyse Xenith 3 zero client, the newest addition to the designed-for-Citrix Xenith line, enhances value by improving performance while keeping everything that customers already love about the Xenith 2. It is the first dual-core, System-on-Chip (SoC) Xenith zero client that features dual-band WiFi and horsepower to drive two high-definition displays, allowing customers to speedily and efficiently power through multiple tasks and workloads. The Dell Wyse Xenith 3 is certified for a wide range of Citrix HDX environments that enable the ease-of-use, security and manageability that organizations know and trust.

Also available is the new Dell Wyse Datacenter for Citrix XenDesktop 7.5, featuring comprehensive reference architecture with configuration support for a range of applications. This includes the recently announced Dell Wyse Datacenter for Virtual Workstations, which extends high-end, 3D, graphics intensive applications to virtual desktops leveraging shared virtual GPUs and includes a first-in-the-industry ISV certification process enabled by the Dell Center of Excellence for Virtualized Workstations. Dell Foglight, a new option, increases manageability through monitoring of performance, health and user experience for Citrix XenDesktop, Citrix XenApp and Dell infrastructure. With unified management across XenApp and XenDesktop with Citrix FlexCast, this new solution makes management simpler while improving productivity with a rich and customizable new feature set.

Supporting Quotes

“Cloud client-computing and desktop virtualization solutions continue to attract a broader array of customers across a more varied set of industries, so it’s essential for vendors participating in this space to create a wide range of different products to meet all these various needs,” said Bob O’Donnell, founder and chief analyst, TECHnalysis Research. “The new Dell Wyse end point products fit these diverse requirements, allowing companies who want virtual desktop solutions in everything from high-profile, design-critical locations like hotel lobbies, to high-performance, graphically intensive workload requirements like architecture or engineering firms, to find something that can fit their unique needs.”

Pricing and Availability

The Dell Wyse Xenith 3 starts at $329 USD and will be available mid-May. The Dell Wyse 5000 series all-in-one thin client starts at $599 USD and will be available mid-June. The Dell Wyse 7000 series quad-display thin client starts at $729 USD and will be available in mid-May. All products are available globally.

About Dell

Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...