News Feed Item

New Dell KACE K1000 Endpoint Systems Management Appliance Helps Customers Securely Manage the ‘Internet of Things’

Dell today announced the latest release of its award-winning Dell KACE K1000 Systems Management Appliance, which is designed to help customers better prepare and secure their IT environments from the deluge of devices, sensors and objects driven by the “Internet of Things.” Dell KACE K1000 version 6.0 enables organizations to boost their Internet of Things (IoT) readiness with new features that provide greater visibility across a company’s entire IT infrastructure, and lay the foundation for improved endpoint security.

According to IDC, the installed base of the IoT will be approximately 212 billion “things” by 2020. This year alone, IDC expects shipments of smart-connected devices (e.g., PCs, tablets and smartphones) to surpass 1.7 billion units worldwide.1 As more endpoints and devices enter the workplace, IT must grapple with increased interdependencies that create a wide range of management complexities and challenges.

Earlier this year, Dell Software sponsored a Dimensional Research survey of nearly 700 IT professionals worldwide to assess the array of things connected to corporate networks, and understand the current state of endpoint security.2

Key findings include:

  • 48 percent of those polled reported having non-traditional endpoints on their networks, while 63 percent expected new types to be connected over the next three years;
  • 58 percent of the survey participants predicted they’ll need to manage more than twice as many endpoints in a decade;
  • 93 percent of respondents had concerns about supporting new types of devices or objects;
  • Security, visibility and internal expertise for managing new devices topped a list of IoT concerns;
  • 35 percent were sure that unknown devices or applications already were connected to their networks; and,
  • 39 percent of those surveyed weren’t confident that their existing tools could scale sufficiently to handle the growth in the types of platforms they would be expected to manage.

Securing the Internet of Things with Dell KACE K1000 v6.0

The latest release of the Dell KACE K1000 unifies IT asset discovery, inventory, management and reporting for all endpoint systems and devices through an integrated web-based console. With Dell KACE, organizations can rely on comprehensive systems management that scales seamlessly to keep pace with the proliferation of devices and OS platforms. Greater visibility across the entire infrastructure enables IT to improve security without adding undue management complexity or requiring the purchase of disparate tools or point solutions.

New Dell KACE K1000 features include:

  • Agentless technology extends agent-based management to now track all connected devices, spanning printers, power, storage and network switches, routers, firewalls, and more without having to install software directly on those devices
  • Broader cross-platform inventory support provides management of a multitude of new Mac OSX, Linux and UNIX systems
  • Automated software blacklisting helps customers prevent the execution of known malware, harmful freeware and undesirable programs known to contain security threats or vulnerabilities

A new user interface further simplifies IT management with customizable views, search and usage functionality, as well as tailored dashboards and home views designed to reduce training, speed task execution and increase overall administrative efficiency. Another way Dell KACE eases systems management is with the latest version of its free Dell KACE K1000 GO app, which provides IT with “on the go” access to the K1000 from iOS or Android devices. KACE K1000 GO app v2.0 enables end users to submit service desk tickets, as well as check status and access helpful information from a knowledge base—all from their mobile devices.

Supporting Quotes

  • David Kloba, general manager, Endpoint Systems Management, Dell Software

“IT departments are on the frontlines of the IoT assault, especially when it comes to configuring, managing, updating and securing all the devices that need to communicate and interact. The new Dell KACE K1000 enables companies to be better prepared for IoT by giving them greater visibility across their entire IT infrastructure, while delivering enhanced functionality to help reduce security risks, ensure endpoint integrity and ease ever-evolving systems management demands.”

  • Robert Young, research manager, Enterprise Systems Management Software, IDC

“As the number of Internet-connected computing devices that interact with back-end corporate IT infrastructures continues to grow, IT organizations should increasingly seek device-agnostic unified management solutions that encompass IT asset discovery, control, configuration and monitoring capabilities across a wide range of hardware and software platforms.”

  • Lee Frith, field IT group manager, Southeast Alabama Medical Center

“Dell KACE plays an important role in our 24/7 hospital environment, especially when it comes to discovering all devices being used by physicians and nurses while ensuring that all software is updated, including our McKesson Paragon hospital information system and electronic health records. With KACE’s new agentless technology, we’ll be able to track and assess the wellbeing of everything from vital servers and systems to radiology stations. Moreover, app blacklisting should help us block browsers that aren’t compatible with specific healthcare software.”

  • Paul Neyman, president, Waypoint Business Solutions

“As a Dell Premier partner and member of the Dell GeoPartner program, we’re focused on taking advantage of solutions that enable us to optimize our clients’ IT infrastructure. With the latest version of the Dell KACE K1000, we’ll be able to see and do more when it comes to assessing, deploying and managing mission-critical systems. For many of our customers in the oil and gas industry, this will translate into improved security through better visibility of technical assets on drilling rigs and platforms, field offices, and wells that touch the network.”

Pricing and Availability

  • Dell KACE K1000 v6.0 is available as a physical, virtual or hosted appliance. Dell KACE K1000 pricing is $8,900 for the physical or virtual appliance and 100 managed computers. The K1000 as a Service is available for $6.50 per managed computer per month. The Dell KACE GO app is available as a no-charge download from the Google Play Store or Apple App Store.
  • Existing Dell KACE K1000 customers can upgrade to the latest version at no additional cost. The Dell KACE K1000 is sold direct by Dell and through an extensive network of Dell certified channel partners.

Additional Resources

About the Survey

  • In January 2014, a global database of IT professionals was emailed an invitation to participate in an online survey on the topic of management and security for networked devices.
  • A total of 684 individuals completed the survey. Participants included a variety of stakeholders, including IT executives, managers, front-line IT professionals, and others representing companies of varying sizes and across different industry verticals.

Dell KACE Delivers Comprehensive Endpoint Systems Management

The award-wining Dell KACE systems management appliances provide comprehensive, easy-to-use and affordable solutions for securing and maintaining critical IT assets. Only Dell ESM delivers endpoint systems management capabilities in an appliance-based architecture that simplifies deployment and ensures fast time to value. Dell KACE also provides best-of-class systems management capabilities as part of Dell’s Enterprise Mobility Management solution. For more information, visit www.dell.com/kace.

About Dell

Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

1 IDC, “Rethinking IT Asset Management in the Age of the Internet of Things,” Robert Young, March 2014
2 Dimensional Research, “The Internet of Things: A Survey of IT Professionals,” March 2014

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...