Small, secure and simply managed
Ultracompact, energy efficient desktop with versatile deployment and custom mounting options.
Small but mighty
Powerfully efficient: Powered by 6th generation Intel® Core™ processors.
Multitask smoothly: Up to 16GB of DDR3 memory for seamless workflow across multiple apps.
Support for two displays DisplayPort, HDMI and optional VGA connectivity allows greater visibility of your tasks.
World’s most manageable: Manipulate BIOS settings and configure systems with ample flexibility that organizational IT infrastructures require.
You hold the keys: Dell Client Command Suite free tools allow flexible and automated BIOS or system configurations for your desktop fleet.
Offsite? No sweat: Remotely manage your desktop fleet with optional Intel® vPro™ technology plus Dell unique capabilities for out-of-band BIOS management.
Packaged to perform: Receive automatic update notifications from factory-installed Dell Command | Update.
Serves organizations of all sizes: Dell KACE System Management solutions available to meet demanding IT management needs.
The best security, right out of the box
The world’s most secure desktops are armed with Dell Data Protection hardware and software along with additional optional features.
Centralized remote management: Meet compliance regulations right out of the box and protect data on any device with Dell Data Protection | Encryption.
Authentication options: Ensure only authorized users have access to your data with FIPS 201-certified smart card, fingerprint readers or contact-less smart card reader.
Secure credential storage: FIPS 140-2-certified TPM and Dell ControlVault add extra layers of hardware security by isolating user passwords and credentials on a separately controlled hardware chip.
Stop advanced malware: Dell Data Protection | Protected Workspace launches apps in a virtualized container and restores a safe environment in only 20 seconds.
Single console security: Dell Data Protection | Endpoint Security Suite offers comprehensive threat protection, authentication and access management, and encryption, all centrally managed.