Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121014_.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Accucom Systems Integration Pty Ltd / accucom.com.au.
Which server is right for you? Get in Contact with us
Getting to the Cloud Successfully!. Moderator– Kevin Dale, Rochelle Township HSD 212 Presenters: Mike Cloud, Peters & Associates Christine Haeggquist,
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
EarthLink Business IT Services. EarthLink Business IT Services Comprehensive IT and network services portfolio −Data center, virtualization, security,
The Cloud: Demystified Neil Cattermull Frontier Technology.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
An Introduction to DuraCloud Carissa Smith, Partner Specialist Michele Kimpton, Project Director Bill Branan, Lead Software Developer Andrew Woods, Lead.
EarthLink Business IT Services. EarthLink Business IT Services Snapshot Comprehensive IT services portfolio −Data center, virtualization, IT security,
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
Plan Introduction What is Cloud Computing?
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
CLOUD COMPUTING For Beginners.
Effectively Explaining the Cloud to Your Colleagues.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Maximize.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
041025_1 Your World-Class IT Business Solution _2 Bolt Networks, Inc. Providing you with world-class service and total technology solutions.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Dell Connected Security Solutions Simplify & unify.
110130_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
100709_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
120204_ 1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Introduction to Cloud Computing
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Hosted Voice & Hosted Contact Center
Combining Cloud Power with Mobile Technology, Fielding Systems Is Delivering the Digital Oilfield to Modern Oil and Gas Production Companies COMPANY PROFILE:
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Microsoft and Symantec
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
OFFICE OF INFORMATION AND TECHNOLOGY SERVICE DELIVERY AND ENGINEERING Briefing to Industry DEPARTMENT OF VETERANS AFFAIRS Charles De Sanno TAC APBI, Eatontown,
Secure Services Shared Hosted MS Exchange 2010.
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. © Ingram Micro Inc. 1.
Copyright 2016, Techarex Networks LLC. | | Call Toll-Free : Benefits Of Hosted QuickBooks For CPA Firms.
Lecture 6: Cloud Computing
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
What is Cloud Computing - How cloud computing help your Business?
How to prepare for the End of License of Windows Server 2012/R2
Workgroup Technology Partners
SLEDing through the Clouds
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Cloud Testing Shilpi Chugh.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Emerging technologies-
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Agenda The current Windows XP and Windows XP Desktop situation
Capitalize on Your Business’s Technology
OU BATTLECARD: Oracle Identity Management Training
Cloud Computing for Wireless Networks
Presentation transcript:

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 1 SLEDing through the Clouds Jason Bystrak Renee Bradford

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 2  Cloud Business Model – The New Channel  Ingram Micro Strategy and Resources  The State of: State and Local Government and Education  Ingram Micro Cloud Solutions Supporting SLED Business Drivers  Your Next Steps Agenda

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 3 Cloud Business Model Cloud Service Brokers VendorsVendorsBrokersBrokers End User SMBSMB BPaaSBPaaS Cloud Computing SaaSSaaS PaaSPaaS IaaSIaaS AggregationAggregation IaaSIaaS BPaaSBPaaS Source: Gartner The role of CSB in the Cloud Services Value Chain ConsultantsConsultants CustomizationCustomization IntegrationIntegration

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 4 Establish a cloud community Offer a comprehensive portfolio of cloud services The Leading Cloud Aggregator For The Channel Provide cloud business services Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. training, enablement, best practices, sales support solutions for every business need – over 100! vendor due diligence & contracting, procurement, provisioning, service management, invoicing

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 5 Are You a Broker? Or Provider? Ingram Micro supports both models The Broker The Solution Provider

000000_ 6 Service Desk and Device Management Network and Communications Security Business ApplicationsData Center Cloud Services Broker Cloud Services Provider Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Managed Print Services

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 7 The State of: State & Local Government and Education

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 8 ■ Shared Services ■ Cyber Security ■ BYOD ■ Budget and Cost Control ■ Portal/E-government ■ Healthcare Systems ■ Data Center Consolidation/Cloud ■ Virtualization; Server, Desktop/Client, Storage, Applications ■ Broadband and Connectivity ■ Disaster Recovery/Continuity of Operations State & Local Government: Technology Initiatives

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ Estimated State and Local Government IT Spend $93.1 Billion (+1.7%)* Vertical2013 Estimated IT Spend Health and Human Services$22.9 Billion Transportation$9.5 Billion Finance and Administration$8 Billion Criminal Justice/Public Safety$7 Billion 2013 Center for Digital Government * Includes Education Source: Center for Digital Education, White House, FCC, Xplana

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 10 ■ Secure remote access of data from computing devices by school staff, students and parents. ■ Ubiquitous Access: Anytime, Anywhere from Any device ■ Networking and Telecom ■ Software as a Service or “rented software” tools for users ■ Disaster Recovery and Business Continuity ■ Virtual Learning ■ Modern Network Environment ■ Wireless Access ■ Convergence of Communications, Safety, and Infrastructure ■ Video Capture Education: Technology Initiatives

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 11 K-12 Education Higher Education Technology Spend (2013) $9.7 B (+2%) $10.3 B (Flat) Textbook Spend (2012) $7 B$7.8 B Source: Center for Digital Education, White House, FCC, Xplana Public Education IT Spend $20 Billion 2013 Center for Digital Education

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 12 SLED Business Drivers ■ Improve infrastructure and lower cost – budget cuts the new normal, use technology to fill the gap ■ Constituents demand for services and information online ■ Strong need for Communication and Collaboration tools ■ Support for mobile devices: BYOD ■ Data backup and archiving ■ Security for data and information ■ Demand for Classroom Technology & Connectivity ■ On line teaching, learning, and assessment ■ Digital Classroom

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 13 Ingram Micro Cloud Solutions Supporting SLED Business Drivers

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 14 Solution: Virtualization and Infrastructure (IaaS) ■ Server and storage virtualization / migration / consolidation in the cloud ■ Mobility / flexibility ■ Scalable, usage on demand ■ Utility model; pay for use (opex vs. capex) ■ Multi-tenant public / private infrastructure ■ Managed environment Improve Infrastructure and Lower Cost Ingram Micro Services Network

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 15 Solution: Remote Infrastructure Monitoring ■ Remove IT staff and management costs ■ Proactive maintenance ■ Enhanced SLA’s (24X7) ■ Increase productivity and efficiency ■ Comprehensive suite of remote IT Infrastructure services ■ Secure ISO certified NOC facilities ■ Session recordings for auditability Improve Infrastructure and Lower Cost

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 16 Solution: Hosted Applications ■ Preconfigured solutions - Microsoft Exchange, SharePoint ■ Custom application development on PaaS (Force.com, Microsoft Azure) ■ Leverage IaaS to host proprietary applications ■ Software customization and integration ■ Scalable infrastructure - usage on demand (PAYG) ■ Managed or unmanaged infrastructure Need to provide access to constituent services and information services online Ingram Micro Services Network

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 17 Solution: Mobile device management and mobile security ■ Protects against anytime anywhere threats ■ Enforces IT group policies ■ No extra software installed on mobile devices ■ Comprehensive asset management ■ Remote configuration of devices ■ Remote lock and wipe devices ■ Mobile remote desktop management in the palm of your hand Support mobile devices: BYOD

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 18 Solution: Cloud backup ■ Cloud model is less expensive than duplicating on premise solution ■ Business class online backup and protection ■ Scalable across multiple environments ■ Addresses data compliance regulations ■ Improves business continuity ■ Provides high availability ■ Advanced backup and restore capabilities Data backup and archiving

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 19 Solution: SaaS security ■ No need for patch management – always latest version since it is hosted by the vendor/provider ■ Flexible pay-as-you-go model (opex vs. capex) ■ Manage employee productivity ■ Manage and secure your end point devices ■ Web and security ■ Real-time monitoring and reporting ■ Worry-free business security standards Security for data and information

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 20 SLED Case Studies

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 21 CUSTOMER NAME: ■ Walled Lake Consolidated School District ■ Location: Walled Lake, Michigan ■ Web Site: ■ Number of Employees: 2,000 CHALLENGE: ■ Give students the benefits of technology without exposing them to Internet threats ■ Avoid learning disruptions that result from infections ■ With reduced budgets and staff, manage security solutions and maximize the value they deliver to the students and staff ■ Take advantage of cloud computing without compromising security Trend Micro Case Study: Securing the Technology that Advances K12 Education

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 22 SOLUTION: ■ Switch to Trend Micro™ Enterprise Security for Endpoints and Mail Servers ■ Enable Trend Micro Smart Protection Network reputation technologies BUSINESS RESULTS: ■ Significantly reduced infection rates ■ Better endpoint system performance ■ IT staff time savings, with fewer systems requiring cleaning ■ More bandwidth-efficient update process, and off-network updates for mobile users ■ Increased confidence to let students use the web and public cloud resources Trend Micro Case Study: Securing the Technology that Advances K12 Education “ Trend Micro with Smart Protection Network is exactly what is needed for the web world that we have to live in… It gives us confidence to move forward with web and cloud-based innovations for the classroom.” — Mark A. Williams, Network Manager, Walled Lake Consolidated School District

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 23 Customer Stats: ■ Located in ST. Louis, Missouri, Higher education institution, Almost 3,900 students Service Offered: ■ dinBackup (Backup in the Cloud) Highlights: ■ The Client was seeking an infrastructure host to maintain a secondary backup ■ of their data from their current NetApp storage infrastructure to a hosted ■ NetApp infrastructure ■ Evaluated multiple providers ■ Successfully completed a Proof of Concept end of July 2012 ■ Been in production for a few months ■ Already seeing uptick in monthly invoice (adding services with dinCloud) dinCloud Case Study: Maryville University

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 24

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 25