Technology Lifecycle Management

Slides:



Advertisements
Similar presentations
Windows Server Deployment and Management With System Center.
Advertisements

State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Primary Benefit Types Value Discipline Benefits – Operating Excellence Reduce Cost Reduce Risk – Product Leadership Increase Revenue – Customer Intimacy.
Driving Efficient Cross-Border Trade Angela Baumann Solution Management SAP GTS SAP AG, 2005.
The future of Desktops Transform Your Desktop with Virtualization.
EIM Framework EIM Vision & Strategy EIM Governance EIM Core Processes
Security Controls – What Works
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
Adjusting EPLC to your Project Colleen Robinson & Teresa Kinley Friday, February 6, 2009.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Asset management guidelines
IT ASSET MANAGEMENT (From Booz-Allen & Hamilton).
Software Architecture April-10Confidential Proprietary Master Data Management mainly inspired from Enterprise Master Data Management – An SOA approach.
Enterprise Architecture
© 2007 IBM Corporation IBM Global Financing February 2007 An Introduction to IBM Global Financing for Software and Services.
Private Cloud: Application Transformation Business Priorities Presentation.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
The Dell Advantage For questions contact or
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
Security and Privacy Services Cloud computing point of view October 2012.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
1 COMPASS Common Processes and Shared Services Setting a Direction for IT.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
1102 Contract Specialist as a Business Manager Debbie Bartlett Defense Acquisition University.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
© 2013 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Achievement of an Integrated Applications Environment Enterprise.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Unclassified DoD ESI & The Joint Information Environment (JIE) July 20,
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
Innovations in GI Technologies Panel Discussion, GSDI 6 September 18, 2002 Innovations in GI Technologies Panel Discussion, GSDI 6 September 18, 2002 Jack.
Technology Lifecycle Management Bill Weber Vice President, Programs & Services GTSI.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
ITIL Drivers for Government Scott Spencer Vice President, Program Management, GTSI.
ERP For Payments Presented by: Greg Midtbo Oracle Corporation Industry Vice President Financial Services.
GreenOvations Consulting GreenOvation.com Green Datacenter Project for Minnesota State Colleges and Universities.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.Rev 5058-CO900C Migration Solutions Moving Toward a Competitive Tomorrow.
State of New Jersey IT Consolidation Charles S. Dawson CTO/CIO.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
1 Defense Standardization Achievement Award Defense Logistics Agency Standardization of Fuels Equipment, Training, and Laboratory Operations Panel Presentation.
Synerion Comprehensive Workforce Management Solutions.
Intuitive Business Transformation Milad Saad. IBT The Roadmap to Intuitive Business Transformation embraces results-based collaboration, technology, and.
Welcome Steve Hammond Director of State and Local Sales GTSI.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization Changing the Desktop Support Landscape Denise Harrison, CIO and Vice President.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
1© Copyright 2014 EMC Corporation. All rights reserved. Services Overview EMC Information Intelligence Group Maximizing the value of EMC software and cloud.
Make the Switch from Buying to Subscribing
Sample Fit-Gap Kick-off
Applications Modernization Services
Presenter: Mohammed Jalaluddin
Virtualized Dynamic Data Center: Secure Multi-Tenancy For Enterprise Cloud Architecture Mohamed Elrefai, Vice President, Enterprise Solutions Group &
CIM Modeling for E&U - (Short Version)
The Open Group Architecture Framework (TOGAF)
ESG 2010 IT Spending Intentions Survey
Transforming IT Management
Coordinated Workstation Purchasing Update
Automate Managing Oracle License Entitlements
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Cybersecurity ATD technical
MAZARS’ CONSULTING PRACTICE
Enterprise Content Management (ECM) Project
IT Management Services Infrastructure Services
Presentation transcript:

Technology Lifecycle Management Mohamed Elrefai Vice President, Enterprise Solutions Group GTSI

Technology Lifecycle Management Multi-phased approach based on proven, repeatable processes, enabling government agencies to extend the value of their IT infrastructure

Technology Lifecycle Management Assess and Identify Decouple organizational requirements from system requirements Communities of interest First step toward SIS is to build baseline – policy driven Build business case – high-level design Driver of consolidation Build a detailed solution for the short and long term Assess – Pain Points: End of life/warranty issues Out of data center space Power, cooling, maintenance, and operations costs too high Running too many different types of hardware/platforms

Technology Lifecycle Management Technology Acquisition Decouple security imperatives from traditional budget constraints Create a performance-based services contract Leverage technology innovation Build in flexibility for both information sharing and new threats Procurement schedules: Phased purchase/implementation of servers Server consolidation frees up your operating and maintenance budgets so you’re able to buy the latest technology Establish SLA’s that are actionable, have low upfront costs and are scalable

Technology Lifecycle Management Integrate and Implement Traditional integration methods apply Tuning security and information sharing Multi-layer integration, entire stack Implement Production Server Consolidation and Containment. Contain server sprawl by running software applications in virtual machines on fewer, highly scalable, reliable enterprise-class servers. Customers of VMware Infrastructure have been able to consolidate 10 or more virtual machines per physical processor, thereby drastically increasing server utilization and containing server sprawl. Provide Advanced Business Continuity Protection at Lower Cost. Deliver high availability for critical applications with cost-effective virtualization-based solutions. With VMware Infrastructure, customers can implement a unified disaster recovery platform that allows many production virtual machines to be recovered in the event of hardware failure without investing in costly one-to-one mapping of production and DR hardware. Streamline Software Test & Development. Consolidate disparate development, testing and staging environments involving multiple operating systems and multi-tier applications. Set up self-service developer portals to increase developer productivity. Secure and Manage Enterprise Desktops. Secure enterprise desktops of geographically dispersed workforce by providing a standard corporate desktop image in a virtual machine. At the same time, provide standardized enterprise desktop environments hosted in virtual machines accessed through thin clients or PCs. Simplify Infrastructure Provisioning. Reduce the time for provisioning new infrastructure to minutes with sophisticated automation capabilities. Virtual appliances combine simple deployment of software with the benefits of pre-configured devices. Centralize control and responsibility for hardware resources while giving business units and application owners complete control over how resources are utilized. Re-host Legacy Applications. Migrate legacy operating systems and software applications to virtual machines running on new hardware for better reliability.

Technology Lifecycle Management Support Services Quarterly audits – policy Security management Patch management Application performance Network/server/storage Configuration optimization Ongoing onsite engineer/support Maintenance Break/fix support Synchronize maintenance contracts Schedule quarterly audits – make sure customer is in compliance with best practices Provide ongoing administration – onsite engineer/support Maintenance – provide break/fix support Optimization – provide configuration changes to continually improve performance and reliability

Technology Lifecycle Management Technology Refresh Technological rate of change Content management Security management Virtualization Assess new requirements Information sharing threats Refresh end of the lifecycle hardware Assess and identify pain points and business drivers again Assess new technologies and the impact they could have to the current environment

Technology Lifecycle Management Asset Disposal Disposal costs of security equipment significant Avoid cutting into operational budgets Comply with security, environmental, and DoD requirements and regulations Migration of data or systems Decommission: Scrubbing disk drives Reclaiming IP assets Warehousing of equipment Deinstallation – breaking down/uninstalling systems Packaging/Prep: Unracking equipment Figuring out buy-back/trade-in value

Technology Lifecycle Management TLM offers Framework to proactively manage all phase of the IT environment Flexibility to respond to security requirements and government mandates Determination of price/performance ratio for lower total cost of ownership Ability to contract for IT as a service