Atrium automates IT processes with Dell Kace appliance

Insurer Atrium is streamlining its IT processes across the board after buying a systems management appliance from...

Insurer Atrium is streamlining its IT processes across the board after buying a systems management appliance from Dell.

The company invested in a Kace appliance from Dell to help it manage multiple systems on limited resources.

Dell acquired Kace Networks earlier this year to offer mid-sized customers an appliance that can cut costs and time related to processes such as patch management and application deployment.

George Stylli, IT systems manager at Atrium, said the Dell Kace was significantly lower-cost than similar systems it looked at.

"The main things we use it for are patch deployment and management and application deployment," said Stylli.

The system is supporting the business in London and Singapore. It is supporting about 170 PCs in London and about 12 in Singapore. About 45 servers are also managed by the appliance.

Managing these machines was challenging because the company has only five dedicated IT staff in London.

Before the Dell Kace was installed engineers would visit all PCs to manually run updates or install applications. But now it can be done centrally in a fraction of the time.

"A year before we put the box in it took four people a whole weekend to upgrade an application. The same process now takes one person about two hours," said Stylli.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Integration software and middleware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...