Infrastruktuuri optimeerimine Tallinn 28.02.2008.

Slides:



Advertisements
Similar presentations
What is Infrastructure Optimisation and Why should you care?
Advertisements

Ljubomir Ivaniš CPU d.o.o.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Windows Server Deployment and Management With System Center.
Which server is right for you? Get in Contact with us
Building an Optimized Infrastructure
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
The future of Desktops Transform Your Desktop with Virtualization.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Infrastructure Optimization Establishing a Platform for a People_Ready Business Colin Timm Director, Enterprise Group Microsoft Australia.
Why Improve Datacenter Automation? “ Studies show up to 80% of network availability incidents and 60% of security issues can be tied to human error” CIO.
4/17/2017 7:22 AM ©2005 Microsoft Corporation. All rights reserved.
Realising the Potential of Service Oriented Architecture Kris Horrocks Connected Systems Division Microsoft.
Connect – Mersey Care NHS Trust & SCC Knowledge Driven Health.
Software Asset Management
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Optimizing Business Operations Business Priorities Presentation.
Private Cloud: Application Transformation Business Priorities Presentation.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
What is Infrastructure Optimization and Why do I Care?
Selling with Core IO Helping customers cut costs and driving revenue with Core Infrastructure Optimisation Adam Barker Infrastructure Optimisation Lead.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
A Microsoft Perspective Kirby Bartholomew Product Manager Application Platform & Developer Marketing
Dell Connected Security Solutions Simplify & unify.
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Private Cloud: Manage Data Center Services Business Priorities Presentation.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Microsoft Services Overview Maria Martinez Corporate Vice President Worldwide Services.
2 Reduce Costs, Simplify IT, and increase Your Value to the Business Damir Bersinic Senior IT Pro Advisor, Microsoft Canada
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
SAM for SQL Workloads Presenter Name.
The Infrastructure Optimization Journey NameTitleCompany.
Selling with Role Based Productivity Use People-Ready Messaging to Save Customers Money and Drive Productivity Adam Barker Infrastructure Optimisation.
Optimizing IT Operations Lessons From the Field A practical guide for maturing your IT Infrastructure Presenter’s name IT Architecture & Planning Microsoft.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Steven Adler Enterprise Technology Strategist Microsoft EMEA.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization Changing the Desktop Support Landscape Denise Harrison, CIO and Vice President.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Partner Toolbox Cloud Infrastructure & Management
Transforming business
CIM Modeling for E&U - (Short Version)
How to prepare for the End of License of Windows Server 2012/R2
M365 skills initiative / Overview
Microsoft Services Cloud Productivity Solutions
Transforming IT Management
Windows Embedded Design Review
The People Ready Vision for Business in the Enterprise
Agenda The current Windows XP and Windows XP Desktop situation
OU BATTLECARD: Oracle Identity Management Training
Microsoft Virtual Academy
Presentation transcript:

Infrastruktuuri optimeerimine Tallinn

Empowering People in a Changing Workplace Increased pressure and opportunity for IT Meet changing business needs Work across boundaries Digest an overload of information Manage compliance and risk Manage IT cost, complexity Maximize the value of LOB systems Rationalize redundant investments Improve operational efficiency

More Pressure Than Ever On IT 30% New 70% Maintenance …with limited resources for advancing capability Business Results & New Value End User ProductivityCustomerConnection Cost Reduction Competition Technology Change Regulatory Compliance Security Keep Business Up & Running

Top 5 things in CIO list

IT fuels profitable revenue growth Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006 Top 25% of IT capable firms grew revenue 6.8% faster per year Top 25% of IT capable firms realize 23% higher revenue per employee Managers in IT capable firms state they have significantly better insight and control over key dimensions of their business IT gives managers more insight and control Firms with better IT have more productive employees Driving Business Outcomes

Purchasing does not mean acquiring a capability RFP or RFQ feature set Years RFP or RFQ feature set RFP or RFQ feature set RFP or RFQ feature set Requested Implemented Trained IntegrationComplexity More people increase complexity More tools also increase complexity $$$

Integration complexity is not solved by tools Will newer HW alleviate growth needs? Does backing up mean we are prepared? Will newer versions of the software increase operational efficiency? By adding more people will we be able to get more operational reach? Are we compliant, on which layer… application, network? Will more management tools increase our control? Or our operational quality? Will more security tools decrease our threats ? When we develop an application, does it consume from our existing operational best practices? By having a single network directory do we simplify application access? You can take all of these actions and only increase complexity !!!

Applied Governance: A Different Approach Is Needed An approach that… –Holistic –Addresses existing complexity –Creates an integrated, uniform environment –Adopts to proven Best Practices –Recognizes Role Based Productivity –Prioritizes and sequences IT projects in a structured, systematic manner

Dynamic IT for the People-Ready Business Manage Complexity, Achieve Agility Advance the Business with IT Solutions Amplify the Impact of Your People Protect Information, Control Access

IT Infrastructure Optimization Model A new approach for managing IT as a strategic asset. Provides a capability based technology neutral framework upon which you can base an optimized infrastructure Establishes a foundation based on industry analysts, academic and consortium research Provides guidance and best practices for step-by- step implementation Drives cost reduction, security and efficiency gains Enable agility Application Platform Optimization Model Business Productivity Infrastructure Optimization Model Core Infrastructure Optimization Model

What Is Dynamic IT? Unified & Virtualized User- Focused Service- Enabled Service- Enabled Process-Led, Model-Driven Separate logical operation from physical hardware More flexible to and streamline change Strengthen business continuity Scale rapidly to meet business demand Separate logical operation from physical hardware More flexible to and streamline change Strengthen business continuity Scale rapidly to meet business demand Captures process, structure and expertise in models Sets rules and tolerances for system health Triggers self-correction when outside tolerance Provides visibility between people and systems Captures process, structure and expertise in models Sets rules and tolerances for system health Triggers self-correction when outside tolerance Provides visibility between people and systems Provides link between internal & external services Extend capability with.NET, XML, ‘web2.0’ services Integrate emerging services without internal dev Strengthen connections with customers, partners Provides link between internal & external services Extend capability with.NET, XML, ‘web2.0’ services Integrate emerging services without internal dev Strengthen connections with customers, partners Connects natural workflow with applications Weave real workflow into application design Enable rich user experiences Integrate familiar interface with powerful apps Connects natural workflow with applications Weave real workflow into application design Enable rich user experiences Integrate familiar interface with powerful apps Dynamic IT is Microsoft’s vision for a new generation of integrated products and technologies that helps customers gain strategic advantage through their IT

Dynamic IT and Infrastructure Optimization Unified & Virtualized User- Focused Service- Enabled Service- Enabled Process-Led, Model-Driven BasicStandardizedRationalizedDynamic Uncoordinated,manualinfrastructure Managed IT Infrastructure with limited automation automation Managed and consolidated IT Infrastructure Infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLAs

Infrastructure Optimization Infrastructure Optimization is a structured, systematic process of assessing maturity across IT capabilities, then prioritizing projects to progress towards a Dynamic state BasicStandardizedRationalizedDynamic Uncoordinated,manualinfrastructure Managed IT Infrastructure with limited automation automation Managed and consolidated IT Infrastructure Infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLAs People  Process  Technology

Infrastructure Optimization - Examples Basic Many ways of achieving the same objective, often in reaction to problems Standardized A standardized, repeatable process Rationalized Managed and consolidated through automation Dynamic Fully automated management, dynamic resource usage, business linked SLAs

BasicStandardizedRationalizedDynamic Inconsistent or non-existent policies for security and compliance Inconsistent or non-existent policies for security and compliance Unknown health of services due to the lack of tools and resources Unknown health of services due to the lack of tools and resources No vehicle for sharing accumulated knowledge across IT No vehicle for sharing accumulated knowledge across IT Environments are extremely hard to control Environments are extremely hard to control Very reactive to security threats Very reactive to security threats Software deployments, patches and services are provided through high touch Software deployments, patches and services are provided through high touch Inconsistent or non-existent policies for security and compliance Inconsistent or non-existent policies for security and compliance Unknown health of services due to the lack of tools and resources Unknown health of services due to the lack of tools and resources No vehicle for sharing accumulated knowledge across IT No vehicle for sharing accumulated knowledge across IT Environments are extremely hard to control Environments are extremely hard to control Very reactive to security threats Very reactive to security threats Software deployments, patches and services are provided through high touch Software deployments, patches and services are provided through high touch Unstructured and lacking central control, infrastructure based on manual processes, ad hoc security and disparate resources

BasicStandardizedRationalizedDynamic Standards and policies to manage desktops, mobile devices, and servers introduce controls and operational consistency Active Directory is used to manage resources, security policies and network access Active Directory is used to manage resources, security policies and network access The value of basic standards and policies are recognized but not yet implemented broadly The value of basic standards and policies are recognized but not yet implemented broadly Deployments, patches and desktop services are provided at medium touch Deployments, patches and desktop services are provided at medium touch Inventory of hardware and software assets are maintained and license use managed Inventory of hardware and software assets are maintained and license use managed Security is improved with a locked down perimeter, though internal security may still be a risk Security is improved with a locked down perimeter, though internal security may still be a risk Active Directory is used to manage resources, security policies and network access Active Directory is used to manage resources, security policies and network access The value of basic standards and policies are recognized but not yet implemented broadly The value of basic standards and policies are recognized but not yet implemented broadly Deployments, patches and desktop services are provided at medium touch Deployments, patches and desktop services are provided at medium touch Inventory of hardware and software assets are maintained and license use managed Inventory of hardware and software assets are maintained and license use managed Security is improved with a locked down perimeter, though internal security may still be a risk Security is improved with a locked down perimeter, though internal security may still be a risk

BasicStandardizedRationalizedDynamic Security is proactive and response to threats is rapid and controlled Security is proactive and response to threats is rapid and controlled The use of zero-touch deployment helps minimize cost and time The use of zero-touch deployment helps minimize cost and time Minimal number of desktop images and low-touch management Minimal number of desktop images and low-touch management Hardware and software inventory is managed, with optimal license use Hardware and software inventory is managed, with optimal license use Security measures involve strict policies and control Security measures involve strict policies and control Security is proactive and response to threats is rapid and controlled Security is proactive and response to threats is rapid and controlled The use of zero-touch deployment helps minimize cost and time The use of zero-touch deployment helps minimize cost and time Minimal number of desktop images and low-touch management Minimal number of desktop images and low-touch management Hardware and software inventory is managed, with optimal license use Hardware and software inventory is managed, with optimal license use Security measures involve strict policies and control Security measures involve strict policies and control Costs involved in managing desktops and servers are at their lowest, with integrated IT management policies, tools, and processes

BasicStandardizedRationalizedDynamic Costs are fully controlled Costs are fully controlled Integration between users and data, desktops, and servers; collaboration is pervasive Integration between users and data, desktops, and servers; collaboration is pervasive Mobile users have nearly on-site levels of service and capabilities Mobile users have nearly on-site levels of service and capabilities Processes are fully automated, often incorporated into the technology itself Processes are fully automated, often incorporated into the technology itself Additional investments in technology yield specific, rapid and measurable benefits Additional investments in technology yield specific, rapid and measurable benefits Self-provisioning software and quarantine-like systems allow automated processes Self-provisioning software and quarantine-like systems allow automated processes Costs are fully controlled Costs are fully controlled Integration between users and data, desktops, and servers; collaboration is pervasive Integration between users and data, desktops, and servers; collaboration is pervasive Mobile users have nearly on-site levels of service and capabilities Mobile users have nearly on-site levels of service and capabilities Processes are fully automated, often incorporated into the technology itself Processes are fully automated, often incorporated into the technology itself Additional investments in technology yield specific, rapid and measurable benefits Additional investments in technology yield specific, rapid and measurable benefits Self-provisioning software and quarantine-like systems allow automated processes Self-provisioning software and quarantine-like systems allow automated processes Highly responsive and efficient IT infrastructure; automated processes and flexible resources drive business agility and competitive advantage

DynamicStandardizedRationalizedBasic Helping CIOs Show Leadership And Value Freeing Resources The IO Journey frees resources and provides the foundation for organizational agility Cost Center Uncoordinated, manual infrastructure; knowledge not captured More Efficient Cost Center Managed IT infrastructure with limited automation and knowledge capture Managed and consolidated IT infrastructure with extensive automation; knowledge captured and re-used Fully automated management; dynamic resource usage; business- linked service level agreements (SLAs); knowledge capture and use automated Business Enabler Strategic Asset

Core IO Progression to Dynamic IT Cost CenterEfficient Cost Center Business Enabler Strategic Asset Uncoordinated, manual Infrastructure Managed IT infrastructure with limited automation and knowledge capture Managed and consolidated IT infrastructure with extensive automation; knowledge captured and reused Fully automated management dynamic resource usage, business linked SLAs; knowledge capture automated BasicStandardizedRationalizedDynamic Identity and Access Management Manage Identities and Access to Resources * Protect Identities Data Protection and Recovery Provide Backup * Protect Information * Recover Data Quickly Desktop, Device, and Server Management Manage Desktops and Mobile Devices * Deploy Applications Security and Networking Protect Information * Protect Infrastructure * Provide Access to Resources

Infrastructure Optimization Improves IT Efficiency PCs managed per IT FTE Organization $1, $ $230 Avg PC’s per/IT FTE IT Labor/PC Source:IDC data analyzed by Microsoft %60%20%

BasicStandardizedRationalizedDynamic Benefits of Desktop Optimization Gains in service levels and agility are significant

Benefits of Desktop Optimization Labor efficiencies with optimized desktop infrastructure

World Wide IO Analysis 12,034 Customers Analyzed (>500 Employees)

EMEA IO Analysis 3,342 Customers Analyzed (>500 Employees)

Control Cost Simplify, automate and centralize IT operations to optimize resource utilization Improve Service Levels Integrate management and security tools to maximize system uptime Drive Agility Adapt the IT infrastructure rapidly according to business needs Cost Agility Infrastructure Maturity Service Levels

Kuidas alustada? Andke endale ise hinnang: Kontakteeruge Microsofti partneriga, et läbi viia põhjalikum analüüs ja saada soovitused jätkamiseks! Partnerid Eestis: – GT Tarkvara – Uptime Systems – IT Grupp – MarkIT – MicroLink Eesti – PC Expert

Identity and Access Management Standardized to Rationalized Projects Architecture S to RS to R BACK Difficult to manage user and resource settings and configurations Users have multiple identities across heterogeneous systems No solution to protect user data from unauthorized access Concern over unauthorized access to sensitive information No solution to allow users to protect content for being copied, printed, distributed without proper rights/permissions Identities are stored in different application directories IT Enable potential for rapid change and configuration Provide consistent user experience across computers based on business roles Protect user data Mitigate risk associated with unauthorized access Safeguard digital information from unauthorized use—both online and offline Reduce operations and desktop support costs IT Fundamental Deploy a solution to synchronize identity stores with non-Windows application directories Advanced Deploy a metadirectory solution for identity synchronization, and deploy a smartcard and certificate management solution Deploy full-drive encryption and persistent data protection technologies Deploy a federated trust- based authentication system for external applications, and Enable personal information card access for non-federated users Deploy a multi-factor authentication solution for access control to high-risk systems, and deploy certificate-based authenticationChallengesProjectsBenefitsBUSINESSBUSINESS

Projects Fundamental Implement Active Directory forest with one instance of trust in the organizationResources Identity and Access Management Standardized to Rationalized Projects Architecture S to RS to R BACK Windows 2003 Active Directory Introduction Windows 2003 Active Directory Introduction Designing and Deploying Active Directory Best Practice Guide for Securing Active Directory Installations Best Practice Guide for Securing Active Directory Installations Active Directory Web Casts Series Training Simulation (AD, ADMT) V-Labs Fundamental Deploy a solution to synchronize identity stores with non-Windows application directories Deploy a metadirectory solution for identity synchronization, and deploy a smartcard and certificate management solution Microsoft Identity Lifecycle Manager 2007 Product OverviewMicrosoft Identity Lifecycle Manager 2007 Product Overview Identity Lifecycle Manager 2007 (ILM 2007) Technical LibraryIdentity Lifecycle Manager 2007 (ILM 2007) Technical Library Microsoft Certificate Lifecycle Manager 2007 (CLM 2007)Microsoft Certificate Lifecycle Manager 2007 (CLM 2007) Microsoft Identity Integration Server 2003 (MIIS 2003) Technical LibraryMicrosoft Identity Integration Server 2003 (MIIS 2003) Technical Library Case Studies: MIIS MIIS Walkthrough Scenarios MIIS Virtual Labs

Projects Advanced Deploy a federated trust-based authentication system for external applications, and Enable personal information card access for non- federated usersResources Overview of Active Directory Federation Services (ADFS) in Windows Server 2003 R2Overview of Active Directory Federation Services (ADFS) in Windows Server 2003 R2 ADFS Concepts ADFS Design Guide ADFS Deployment Guide Identity and Access Management Standardized to Rationalized Projects Architecture S to RS to R BACK Deploy a multi-factor authentication solution for access control to high-risk systems, and deploy certificate-based authentication Implementing Multifactor Authentication Using Smart CardsImplementing Multifactor Authentication Using Smart Cards Public Key Infrastructure for Windows Server 2003 Active Directory Certificate Services Designing a Public Key Infrastructure Microsoft Certificate Lifecycle Manager Overview ILM Certificate management

ArchitectureProjects BACK Identity and Access Management Standardized to Rationalized Technologies Active Directory Group Policy Objects (GPO)Active Directory Group Policy Objects (GPO) Microsoft Identity Lifecycle Manager 2007Microsoft Identity Lifecycle Manager 2007 Active Directory Lightweight Directory Services (ADLDS)Active Directory Lightweight Directory Services (ADLDS) Windows Vista - EFS Rights Management Services Windows Vista Enterprise (For Bitlocker)Windows Vista Enterprise (For Bitlocker) Windows Mobile 6 IRM enabled Pocket Office and Pocket InboxWindows Mobile 6 IRM enabled Pocket Office and Pocket Inbox Microsoft Identity Lifecycle Manager Smart Card Lifecycle ManagementMicrosoft Identity Lifecycle Manager Smart Card Lifecycle Management Windows Certificate Services Resources S to RS to R Windows Server 2003 R2 Helps Simplify Identity and Access Management Windows Server 2003 R2 Helps Simplify Identity and Access Management Network Architecture Blueprint Microsoft's Vision for an Identity Metasystem Microsoft's Vision for an Identity Metasystem

Küsimused?

Tänan!