Jeff Putt Head of VoIP Strategy AAPT
Phil Osborne Senior Consultant, Enterprise Business Unit, Citrix Systems Asia Pacific
Phil Osborne Senior Consultant Enterprise Business Unit Citrix Systems, Asia-Pacific Phil Osborne Senior Consultant Enterprise Business Unit Citrix Systems, Asia-Pacific The Case for Implementing an Access Strategy to become an OnDemand Enterprise
4 10% 30% 60% Today OPERATION Committed projects INNOVATION 3 years from now 40% % % Moving from Run to Grow INNOVATION “Grow the business” Committed Projects OPERATION “Run the business” 40%
5 CIOs Are Changing Their Focus Reduce the costs of the business running growing to invest more in the business. Grow Run
6 Devices Users Networks Access Complexity
7 Challenge: Connecting Worlds of Complexity Devices Users Networks
8 Legacy Applications Challenge: Connecting Worlds of Complexity
9 Browser Applications
10 Challenge: Connecting Worlds of Complexity Composite Applications
11 Solution Access Strategy Windows Apps Web Apps Legacy 3270 UNIX/Linux Apps Web Services
12 Building Blocks of Access Infrastructure Strategy Desktop, or Server, Web, Services-based Application Infrastructure Deliver Protect Organize Display Manage Trusted & Untrusted Devices User Access Scenarios On-Demand Enterprise
13 Citrix Solutions/Product Set applications web files help desk office PC home PC passwords/ web files applications
14 Citrix Solutions/Product Set applications web files help desk office PC home files applications GoToAssist GoToMyPC MetaFrame Presentation Server web MetaFrame Secure Access Manager passwords/ authentication MetaFrame Password Manager MetaFrame Conferencing Manager GoToMeeting
15 JP Morgan Chase – Citrix largest customer and growing 0 25,000 50,000 75, , Initial DeploymentExpansionStandardization
16 SUMMARY – Top Level Business Benefits arising from implementation of an Access Strategy Develop a World Class Access Strategy that has THREE top level imperatives: 1.Substantially lower TCO of IT operations through transition to an On Demand utility model. 2.Provide very fast ROI by transparently & universally providing ubiquitous on-time availability of both back office and front office business functionality across disparate networks, O/S’s and hardware. 3.Substantially reduce RISK of new business based IT initiatives and deliveries while boosting overall security of entire enterprise infrastructure
Business Depends On Depends On