New Service Provider Program Dell Facilitates Hosting Services Providers

As part of its PartnerDirect program enhancements, Dell has launched a new Service Provider program that will facilitate the specific needs of hosting providers.

dell-softwareHistorically, the Dell PartnerDirect program has focused on enabling and promoting hardware sales for Dell partners. Over the past year, Dell has launched an aggressive strategy to build scalable enterprise software offerings into its solution portfolio in the areas of data center and cloud management, information management, mobile-workforce management, and security and data protection. Dell’s intentions? The objective of Dell is to become a full service, end-to-end IT solutions provider.

Dell Software, a $1.2 Billion Business

Dell has currently more than 150 software products available to service providers, products that would simplify service provider business processes. In fact, Dell’s software division is currently one of the largest software companies in the world, with a $1.2 billion business selling into 90 percent of Fortune 1000 companies and supported by 6,000 dedicated software employees worldwide.

So, what are the benefits of the new program? Dell states that hosting services providers will receive flexible pricing and billing to suit their unique business models, such as cloud hosting, IaaS Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (Saas). And, in many cases, hosting services providers are only required to manage one contract, one usage report and one invoice each month or quarter.

The new Dell Service Provider Program would enable hosting services providers to use Dell solutions for managing Windows messaging, collaboration and identity management, as well as virtual environments, databases and applications, without incurring capital expense or extending that cost to their customers. Dell Service Provider program benefits also include marketing and business planning support as well as training and certification.

Here’s a snapshot of the workloads where Dell might be able to add value:

Systems Management

  • Streamline management, migration, customization, and protection of Microsoft Windows-based infrastructure, as well as other platforms and enterprise applications.
  • Maintain fast response times for physical and virtual applications.
  • Easily deploy virtual desktop environments to a wide variety of BYOD endpoints as well as integrate hardware, software and services from one source.
  • Simplify capacity management, provisioning, deployment, and conversions in virtual environments.

Information Management

  • Simplify business intelligence, big data analytics, and database management.
  • Access, provision, analyze and share data from nearly any source.
  • Optimize code, automate maintenance and help ensure high availability.
  • Accelerate Oracle and SQL Server backup and recovery while dramatically reducing storage requirements.
  • Integrate applications with ease and ensure master data is accurate, complete, and updated.

Data Protection

  • Help safeguard customers’ data across physical, virtual, application and cloud environments.
  • Help ensure continuous, integrated data protection for the applications that customers rely on.
  • Help protect and preserve data with globally enforced granular controls over the entire back operations.
  • Take advantage of a worldwide attack identification and monitoring network to help protect customers against viruses, zombies, spam, phishing and other attacks.
  • Help achieve backup and recovery SLAs and reduce your customers’ total cost of ownership for data protection.


  • Help prevent intrusions with real-time visibility and superior protection for distributed enterprise networks.
  • Simplify security and compliance with access governance, privileged account management, identity administration and user activity monitoring.
  • Provide remote users with secure access to corporate resources anytime, anywhere.
  • Help protect customers and their data from advanced persistent threats, cybercriminals, spam, malware, and loss.