|

Stand Alone

  • Results for "Stand Alone"
  1. Cloud As an Enabler to IT Transformation and Innovation

    Choice is a key factor in discovering the right fit of cloud delivery models to meet future federal agency mission needs in a multi-cloud world.

  2. Dell Bag Voucher Program Customer

    Dell Bag Voucher Program Customer

  3. Dell Precision Tower 3000 series (3420)

    Dell Precision Tower 3000 series (3420)

  4. Precision 7920 Tower Spec

    The revolutionary multichannel thermal design delivers advanced cooling and acoustics so you can enjoy longer productivity under heavy workloads. Precision Workstations are tested (Independent Software Vendor certified) to ensure the high-performance applications you rely on every day run smoothly.

  5. Precision 7820 Tower Spec

    FlexBay design supports a range of modules from scalable storage to audio options, you can build the workstation designed for your creative expertise. Secure your data with the optional Smart Card (CAC/ PIV) reader and lockable hard drive carriers. The best-in-class smart design includes integrated front and rear handles for easy deployment and moves and an externally accessible tool-less (lockable) power supply for superior serviceability.

  6. Precision 5820 Tower Spec

    Ready for complex projects, including virtual reality workflows, with the next generation AMD Radeon Pro™ and highest performing NVIDIA Quadro® professional graphics with support for up to 600W of graphics power.

  7. Dell EMC PowerEdge R740xd Spec Sheet

    The PowerEdge R740xd delivers a perfect balance between storage scalability and performance. The 2U two-socket platform is ideal for software defined storage, service providers or as virtual desktop infrastructure.

  8. Dell Precision Technology Partner Program Certification

    Dell Precision Technology Certifications 2018.01.18

  9. Simple switch mode: Port Aggregator Feature White Paper

    Simple switch mode: Port Aggregator Feature White Paper

  10. Dell Endpoint Security Suite Enterprise Datasheet

    07 Feb 2018

    Endpoint security and compliance are critical to every organization, no matter the size. Organizations must secure physical and virtual endpoint devices and the data on them, while still satisfying end user requirements to embrace computing trends like bring-your-own-device (BYOD), sharing data in public cloud services and workforce mobility. Traditional data security point solutions attempt to address these needs, but managing multiple clients and consoles is difficult for resource constrained IT teams, especially those without security experts in house.