Overview

Listen. Learn. Deliver. That's what we're about.

Dell empowers countries, communities, customers and people everywhere to use technology to realize their dreams. Customers trust us to deliver technology solutions that help them do and achieve more, whether they're at home, work, school or anywhere in their world.

The enterprise landscape is changing rapidly, and the pressure to introduce new technologies into your organization while efficiently maintaining existing servers, storage and networking has never been greater. Big Data, virtualization, application modernization, modular infrastructure and cloud computing can result in substantial benefits, but they require an even higher level of expertise. A complex environment means complex processes - and more potential problems. The more you depend on technology, the more important it is to have the right support.

Products

Partners

Renewals

Renewal Upsell Program

Presented by Carahsoft
Increasing Your Revenue with Dell Solutions!

Success Stories

Building a Manageable High-Performing Network

High-performance car maker Shelby American minimizes IT overhead by running its business on an IT infrastructure with Silver Peak SD-WAN and Dell EMC Networking solutions.

Digital Transformation in the Learning Environment

McAllen Independent School District equips students with 21st-century skills and saves $1 million in rebuilding its network.

HPC Tailored to Research Needs with OpenStack Cloud

With a centralized, open-source HPC model, the University of Kentucky offers academic researchers flexible compute resources while reducing licensing costs by up to 60 percent.

Contracts

EMC Contract Guide

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Federal Contracts

ITES-SW

Vendor(s): CoN Certified Term: March 2015 - March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Maryland MEEC

MEEC Contract No. UMD-972016

NASPO ValuePoint

Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

North Carolina Mass Storage Contract

Contract Number: 204J Term: through March 31, 2018

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

PEPPM CA

PEPPM CA - Kern County Superintendent of Schools Term:Through December 31, 2018

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-2660

Term: Through November 17, 2018

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2018


Events

Upcoming Events

February 28, 2018 at 11:00 AM ET
March 13, 2018 at 2:00 PM ET

Archived Events

News

Latest News

Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, announced that Dell Technologies has named Carahsoft a Federal Distributor for its entire line of products.
READ MORE >
Carahsoft Technology Corp., Carahsoft Technology Corp., the trusted government IT solutions provider, today announced that it will proactively market and sell Dell EMC VxBlock Systems through its ...
READ MORE >

Resources

Featured

This proposal breaks down Data Domain Virtual Edition, value to customers, and comprehensive regulatory & compliance.

This proposal breaks down VxRail and how the Department of Justice can reduce its data center footprint with this software.

Datasheet

Dell is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service through cloud computing. Dell accelerates the journey to cloud computing through their innovative products and services, enabling IT departments to optimize their use of dat...

Ransomware is a form of malware that targets both human and technical weaknesses in organizations in an effort to deny the availability of critical data and/or systems. When the victim organization determines they are no longer able to access their data, the cyber actor demands the payment of a ra...

Transform your IT environment with simple, efficient, and flexible virtualization solutions. EMC® VSPEX™ Private Cloud solutions combine the leading hypervisors with your choice of server and network together with Next Generation VNX and EMC powered backup for simpler more streamlined deploym...

Transform your end-user-computing environment with simple, efficient, and flexible virtualization solutions. EMC® VSPEX™ end-user computing for Citrix XenDesktop7 or VMware Horizon View 5.2 provide IT with proven flexible architectures that improve accessibility, centralize management, and in...

IT and Cloud managers often face the difficult task of being agile enough to react to ever increasing demands from line-of-business decision makers, developers, application owners, marketing, legal and a wide array of other internal customers. Each consumer of IT has different requirements and needs...

Companies are moving to next-generation backup and recovery as a result of exponential data growth, regulatory compliance, increased service-level agreements, and shrinking backup windows. The IT team faces additional challenges brought on by accelerated virtualization and the need to better protect...

Deduplication reduces the amount of disk storage needed to retain and protect data by an average of 10-30 times, making disk a cost-effective alternative to tape for protecting backup and/or archive data. Data on disk is available online and onsite for longer retention periods, and restores and r...

Why isolated recovery solutions? Recovery is the key. Ensuring your business critical data can withstand a cyber attack designed to destroy your data including backups and replicas. Could you survive? This datasheet outline the five steps to building a last line of defense.