Presentation is loading. Please wait.

Presentation is loading. Please wait.

Optimize and Secure Your Core Infrastructure for Midsize Businesses

Similar presentations


Presentation on theme: "Optimize and Secure Your Core Infrastructure for Midsize Businesses"— Presentation transcript:

1 Optimize and Secure Your Core Infrastructure for Midsize Businesses
4/6/ :37 AM Optimize and Secure Your Core Infrastructure for Midsize Businesses Field TDM Deck During the past few years, there has been much debate about how to define business success and where business leaders should invest their resources to get the best possible outcomes. As a part of this discussion, industry experts and luminaries have debated the value of IT, its role in the organization, and whether technology should be treated as a strategic asset or relegated to a utility function of the business. As we listen to our customers and partners, one thing has become clear. Spending large amounts of money to simply build IT infrastructure or address a single business issue does not meet the overall objectives of the company. IT must be tied to business performance and it must be treated as an asset with specific Return on Investment (ROI) or Total Cost of Ownership (TCO) metrics. Every few years the industry reaches an inflection point. The last inflection point came with the end of the dot-com era, when business bet big on technology in two ways. First, massive investments infrastructure and silo’d applications (like CRM) led to disappointment when those investments did not live up to there promise. Second, business spent against the idea of moving customer experiences to the web. But very few of these technologies were connected together. The data existed but was not accessible. Applications solved specific problems, but created new ones when the information couldn’t be ported to related business functions and processes. And the load on infrastructure increased with systems and technology that wasn’t connected and integrated. All of this created an opportunity for the industry. We rose to the occasion by developing new ways to interoperate with each another. With the introduction of technology like Web services we are now able to break down the barriers and take advantage of all the investments in technology that were spent in previous years and decades. So, it’s a new day for business and technology. IT has become a strategic asset to the business to drive new value to employees, managers and teams. But we now invest in technology in a different way because technology does not drive a business – people do. IT infrastructure is not capable of making decisions – people do. Therefore, the only way a business can optimize its investments in technology is to optimize for the people who use the technology. Therefore, a people-ready business is one who empowers their people to deliver business results. GUIDANCE: © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

2 How to use this deck This deck was designed to provide the world-wide field with a customer-ready TDM level presentation. Use this presentation as is or customize it to meet your needs. This deck can also be “partnerized” if you wish to leverage it as a through-partner resource. If you choose to “partnerize” it please be sure to follow world wide partner branded guidelines.

3 Agenda IT Challenges Core IO Technology Solutions Customer Scenarios
4/6/ :37 AM Agenda IT Challenges Core IO Technology Solutions Customer Scenarios © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

4 4/6/ :37 AM 4/6/ :37 AM Microsoft’s Promises to IT: Enabling IT Pros and Development Teams Across the IT Lifecycle Objective: Outline Microsoft’s Promise to IT: Enabling IT Pros Talking Points: Today’s session focuses on your Infrastructure – they key enabler of IT solutions that can manage complexity and achieve agility. With this promise we are really making this statement: IT departments want to be an enabler of business success. Certainly the role of IT expands well beyond operational efficiency or reactive execution: we believe that IT and development teams are in the best position to drive that business value with infrastructure that dramatically reduces the complexity and TCO of developing, deploying, and managing applications so an IT staff can focus on delivering new business value. Today we’re going to overview Microsoft’s approach to delivering on this promise to you. So now let’s look at how you’re trying to accomplish this goal by managing complexity and achieving agility . Transition: It all starts with shared goals and alignment . . . 4 4 ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

5 Linking IT to Performance
4/6/ :37 AM Linking IT to Performance Information technology fuels profitable revenue growth Firms with better IT have more productive employees Robust IT infrastructure is a key driver of productivity and growth Information technology gives managers more insight and control Companies in the top 25% of IT capability grew revenue 6.8% faster per year than their peers in the bottom 25% of IT capability. The firms in the top 25% of IT capability enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability. Isolating the impact of all IT functions on productivity shows that IT Infrastructure is a key determinant of superior productivity. Managers in firms that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business.  Objective: Linking Information Technology to Performance Talking Points: Information technology fuels profitable revenue growth. Companies that rank in the top 25% for IT capability enjoy a faster revenue growth rate than their peers in the bottom 25% of IT capability. [Build1] Firms with better IT have more productive employees. The businesses in the top 25% of IT capability have a 23% higher revenue per employee than the companies in the bottom 25%. [Build2] Robust IT infrastructure is a key driver of productivity and growth. Isolating the impact of IT functions on productivity shows that an organization’s IT infrastructure is a key factor in superior productivity. [Build3] Information technology gives managers more insight and control. Managers in companies that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business. Sources: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006 5 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

6 Align IT with the business; control complexity
4/6/ :37 AM IT as a Strategic Asset Align IT with the business; control complexity IT Goals Eliminate Unnecessary Complexity Manage IT resources efficiently by eliminating unnecessary redundancy, reducing manual tasks and lowering costs Establish a Responsive Infrastructure Proactively leverage IT investments to meet business needs Ensure Your Business Is Always Running Use IT as a trusted partner in meeting business goals Move from complexity to efficiency Objective: Transforming Information Technology into a strategic asset. Talking Points: One of the keys in infrastructure optimization model is to align IT with the business goals, controlling complexity, and transforming the IT department into a strategic asset. There are some common goals in this process. First, the organization needs to manage IT resources and budgets more effectively. Second, IT needs to evolve to the point that it helps to deliver new business value to the organization instead of just being an expense. Third, as the organization grows more dependant upon the IT resources, it is critical that the network is secure and available. [Build1] The consistent theme in this process is the concept of moving from complexity to efficiently. IT resources and budgets will be better utilized by eliminating unnecessary complexity. Needless redundancy, repetitive manual tasks and complex management systems increase IT costs and don’t contribute to an efficient IO model. [Build2] Establishing a response infrastructure will allow an organization to proactively leverage the investment in IT to better meet the changing needs of the business. [Build3] Ensuring that the organizations network, data and services are always available and secure is a key requirement in turning IT into a trusted partner that helps to meet critical business goals. 6 © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

7 Management – The Manual Reality People intensive nature drives costs
4/6/ :37 AM 4/6/ :37 AM Management – The Manual Reality People intensive nature drives costs Those people are spending their time on manual tasks 53% 24% 23% 54% 17% 29% 56% 28% 58% 18% 60% 16% 62% 14% 25% Percent of Reponses Degree of Automation Manual Scripts Automated Tools Source: IDC 2002, Microsoft Primary Quantitative Research. 400, 30 min phone surveys of IT professionals in data centers with 25 or more servers Over 60% of TCO over a 5 year period driven by people costs Objective: Emphasize the costs of people intensive tasks Talking Points: How is your infrastructure helping your business grow new customers, build better relationships with suppliers and partners, and enter into new markets? Infrastructure is often thought of as a necessary overhead to a business, partly because as users we do not directly interact with the software that is working behind the scenes. We typically only think about the core infrastructure of the business when something goes wrong…if a server is down and a file cannot be accessed, or if a security threat halts application performance. Today we are going to discuss how infrastructure can be a strategic asset for the business. Let’s start by taking a look at a survey of 400 companies like yours. Across the top 6 categories of IT Management, over half of tasks are done manually rather than utilizing automated tools or scripts. [Build1] Now some manual interaction will always be required. But when folks are managing many different operating systems with many different interfaces, automating these are nearly impossible. As business leaders, we’re always on the lookout for the ‘low hanging fruit’ way of improving our businesses. And this might be considered one of those opportunities. [Build2] All that manual activity means that over 60% of 5 year total cost of ownership for IT systems are staff costs. This means that decreasing these costs provides the biggest effect on the bottom line budget. Not to mention the soft ‘costs savings’ of re-deploying those folks to revenue generating activities. Notice also that the second highest cost area is downtime. This includes downtime of the network from server failures and downtime of your employees due to problems with their desktop. Transition: So – that’s the framework for our discussion about IT. IT IS challenging – even for a CIO The biggest elements of a corporation’s IT budget are STAFF COSTS and DOWNTIME And… A large percentage of that staff cost is caused by a huge amount of manual tasks needed to automate management of a network. 7 7 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

8 Does Your Infrastructure Look Like This?
4/6/ :37 AM 4/6/ :37 AM Does Your Infrastructure Look Like This? Objective: Emphasize challenges that medium-sized businesses face and how they affect business success. Talking points: Medium-sized companies often feel squeezed between smaller competitors that might offer more high-touch service and larger competitors that may give deep discounts because of their economies of scale. Medium-sized companies feel increasing pressure from: High customer expectations and low customer loyalty. Competition, such as: new entrants into their markets. larger competitors acquiring others to dominate the market. outsourcers grabbing market share. The need for better business insight. The need to create more efficient business processes and increase productivity among employees. Difficulties keeping up with changing technology and costs associated with upgrading to new systems. Even medium-sized businesses that run well and are perceived to be successful continuously look for ways to seize and keep a competitive advantage. Along with business challenges, there are further IT challenges. (talk about some of the IT challenges…limited IT resources, reactive, etc… Transition: MSFT has developed and designed infrastructure solutions for midsized businesses to address the business and IT challenges we talked about. Let’s see what this looks like. Pieced together No end-to-end architecture Requires lots of manual intervention Not sure if it’s secure 8 8 ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

9 A More Secure and Well Managed Infrastructure for Midsized Businesses
Network Srv Windows Server 2003 R2 Core Services AD/GPO IAS DNS, DHCP, WINS IIS CertService File/Print Messaging Srv Windows Server 2003 R2 Core Services AD/GPO IAS DNS, DHCP, WINS IIS Exchange OWA Management Srv Windows Server 2003 R2 Core Services SC Essentials WSS R2 RIS Branch/Remote Office Home Office Objective: Define a more secured and well-managed mid-size infrastructure Talking Points: Simple Integrated Agile Extensible Transition: Summarize the discussion…why infrastructure is important and how midsized businesses can transform IT from a cost center to a strategic asset with the infrastructure optimization model. Remind them of the highly complex and disparate network diagram above, then talk about how infrastructure, as a platform for biz performance, when complexity, cost, are reduced can drive a more secure and well managed business. PDA WAP Printer Workstations 9 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

10 How Do You Get There? Infrastructure Optimization Model
4/6/ :37 AM How Do You Get There? Infrastructure Optimization Model Managed and consolidated IT Infrastructure with extensive Automation, knowledge captured and re-used Fully automated management, dynamic resource Usage , business linked SLA’s. Knowledge capture automated and use automated Managed IT Infrastructure with limited automation and knowledge capture Uncoordinated, manual Infrastructure Knowledge not captured . Objective: Show how the IO Model guides optimization Talking Points: The Infrastructure Optimization Model from Microsoft has been developed using Industry best practices, Microsoft’s own experiences with its enterprise customers, and is based upon analyst models (heavily influenced by Gartner) and MIT’s Architecture Maturity Model. A key goal for Microsoft in creating the Infrastructure Optimization Model was to develop a simple way to use a maturity framework that is flexible and can easily be used as the benchmark for technical capability and business value. The first step in using the model is to evaluate what maturity level you are at in the model. Once the current maturity level has been established, the next step is to use the model to develop a plan on how to progress through each maturity level in order to reach the target level needed for maximum business benefit. We’ll look more at what each phase represents later. Transition: So what is the real value to evolving your infrastructure beyond. How can I justify investing? More Efficient Cost Center Business Enabler Strategic Asset Cost Center 10 © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

11 Key Drivers People, Process and Technology
4/6/ :37 AM Key Drivers People, Process and Technology Identity and Access Management Desktop, Server and Device Management Security and Networking Objective: Cover the key factors that drive optimization of the infrastructure. Talking Points: People, process and technology are the keys that drive the optimization of an organization’s infrastructure. Optimization normally focuses on one of these categories: Identity and access management Desktop, server and device management Security and networking Data protection and recovery IT process and policy Data Protection and Recovery IT Process and Policy 11 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

12 Technology View of Model One Example
No server-based identity or access management Users operate in admin mode Limited or inconsistent use of passwords at the desktop Minimal enterprise access standards Active Directory for Authentication and Authorization Users have access to admin mode Security templates applied to standard images Desktops not controlled by group policy Active Directory group policy and security templates used to manage desktops for security and settings Desktops are tightly managed Centrally manage users provisioning across heterogeneous systems Objective: Identity and access management within the infrastructure optimization model. Talking Points: Identity and access management plays a key role in an organization’s movement through the levels of the infrastructure optimization model. We’ll look at the conditions present in each of the levels. Basic: No server based identity or access management Users operate in admin mode Limited or inconsistent use of passwords at the desktop level Minimal enterprise access standards Standardized: Active Directory for Authentication and Authorization Users have access to admin mode Security templates applied to standard images Desktops not controlled by group policy Rationalized: Active Directory group policy and security templates used to manage desktops Desktops are tightly managed Dynamic: Centrally manage users provisioning across heterogeneous systems. 12 © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

13 Process Culture View Operations Framework/ITIL in IOM
Most effort spent in: Reactive Ad hoc Problem-Driven “Avoiding Downtime” Reactive Stable IT Request Driven Change Management and Planning “Keeping It Running” Proactive Accountable Increased Monitoring Formal Change Management SLA’s Improvement Predictability “Quality Driven” Proactive Optimizing Costs and Quality Agile Self Assessing and Continuous Improvement “Taking The Lead” Objective: The Microsoft Operations Framework within the Infrastructure Optimization Model Talking Points: There are several identifying characteristics of each IO level within an organization’s operations framework. Basic: Reactive Ad hoc Problem-driven “Avoiding Downtime” Standardized: Stable IT Request Driven Change management and planning “Keep it Running” Rationalized: Proactive Accountable Increased monitoring Formal change management SLA’s Improvement Predictability “Quality Driven” Dynamic: Optimizing costs and quality Agile Self assessing and continuous improvement “Taking the Lead” 13 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

14 Infrastructure Optimization Model
4/6/ :37 AM Cost Reduction Infrastructure Optimization Model Managed and consolidated IT Infrastructure with maximum automation Fully automated management, dynamic resource Usage , business linked SLA’s Managed IT Infrastructure with limited automation Uncoordinated, manual infrastructure Objective: Cost reduction within the levels of the IO Model Talking Points: As an organization moves up through the infrastructure optimization model, they will enjoy a reduction in IT labor costs. IT Labor IT Labor $232 (30%) $281 (52%) Basic to Rationalized: IT Labor Costs reduced $513 (66%) IT Labor Costs $774 $542 $261 14 © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

15 Best Practices Lower IT Costs
4/6/ :37 AM Best Practices Lower IT Costs Best Practice Research Supports IT Maturity Basic = 0-2 Best Practices Adopted Standardized = 3-4 Best Practices Adopted Rationalized = 5-6 Best Practices Adopted Best Practice Annual Benefit per PC IT Tasks Improved Enabling MS Technology 1: OS Standardization $52 Image Management Desktop Administration Service Desk/Deskside Support Vista WIM Image Management Vista Virtualization 2: Centrally Managed PC Firewall $39 Security & Patching Vista Firewall Active Directory Group Policies 3: Automated Password Reset $29 3rd Party 4: Users Cannot Install Software $50 Application Management Service Desk Vista User Account Protection Active Directory/Group Policies Automated SW Deployment (SMS) 5: Users Cannot Change Settings $30 6: Automated Software Distribution $26 Vista Windows Installer Service Systems Management Server (SMS) Objective: Improving IT practices results in lower IT costs Talking Points: Research shows that utilizing “Best Practices” lowers the IT costs within a business. Key “Best Practice” policies have a direct per-PC impact on the IT management and support costs. 15 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

16 4/6/ :37 AM 4/6/ :37 AM The Foundation for Midsize Businesses to A More Secure and Well Managed Infrastructure Objective: Show the Microsoft product solutions within the midsize business infrastructure Talking Points: In the midsize business, Microsoft’s comprehensive solution address all aspects of the infrastructure. Windows Server 2003 RD provides the core networking capabilities. The Forefront family of security products protects the network, both at the edge and on the desktops and servers within the network. System Center Essentials 2007 simplifies IT management and administration. Windows Vista provides new features and optimizations for the desktops. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 16 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

17 Technology Solutions Identity and Access Management
4/6/ :37 AM Technology Solutions Identity and Access Management We will walk through the Windows Server solution for midsize business, and show you how this integrated solution can help midsize businesses to Reduce Costs and complexity, enhance productivity, improve security, and simplify infrastructure management. Through the Windows Server System Common Engineering Criteria, Windows Server System products deliver unmatched integration and manageability as well as best-of-breed functionality to provide the most consistent and predictable user experience that enables: Reduced IT complexity Lower TCO More secure and reliable IT infrastructure This means IT professionals can confidently meet IT project objectives on schedule and within budget, leaving more time to focus on other priorities that are important to them and their organization. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

18 Identity and Access Management Challenges
4/6/ :37 AM Identity and Access Management Challenges No centralized management of user identity Users have multiple digital identities Objective: Identity and Access Management Challenges Talking Points: As companies grow, so do their infrastructure. Decentralized deployment and management of user accounts simply doesn’t scale. [Build1] In the “basic” level of the IO model, uUsers have multiple IDs and passwords, different one’s on each system they connect to. This leads to a loss in productivity for the user, who has to track and remember identity information, and is less secure, because password policies can’t be enforced and users will often times leave identity information out in the open to help them remember how to connect to systems, or even use shared IDs. User name Password 18 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

19 The Solution – Active Directory
4/6/ :37 AM The Solution – Active Directory Provide single sign-on Enforce password security Implement scalable centralized management Robust replication Policy Driven Security Objective: Describe Active Directory as the solution to the identity management problem. Talking Points: Active Directory is included with Windows Server 2003 R2 and is a robust, hierarchical directory structure that stores user account data and other information about applications and services on the network. Active Directory stores user and computer accounts, making this data available to network users and administrators. Active Directory provides a centralized, scaleable solution that is easy for IT to manage and that will continue to be easy to manage with continued growth. [BUILD1] Active Directory provides single sign-on to other domain resources. With a centralized database and robust, scalable replication infrastructure, Active Directory is designed so that it can be easily distributed if more sites come online. [BUILD2] Active Directory integrates with several key applications and network services, such as Microsoft Exchange and DNS. [BUILD3] Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network. [BUILD4] With powerful management tools, Active Directory can be managed locally or remotely. The directory can be partitioned and segmented to enable the delegation of administration. [BUILD5] Active Directory provides scalability and extensibility that can grow and adapt as your organizations grows and changes. Active Directory Application-friendly Simplified administration Scalable infrastructure 19 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

20 Identity and Access Management
4/6/ :37 AM Identity and Access Management Single sign-on Centralized accounting Application Integration Standardized Security Policies controlled and enforced Access control through security polices Delegation of administration as necessary Rationalized Objective: Describe how identity management evolves as you move up the IO Model Talking Points: By implementing Active Directory, your mid-market company will get the benefit of single-sign-on. One ID that allows users to gain access to all network resources. In addition, Active Directory provides centralized accounting. Administrators manage user and computer accounts centrally, not at each workstation or server. Applications such as Exchange use Active Directory for their directory service and for access control. This would move your company to the standardized level for identify and access management. IT is moving from reactive to proactive. [BUILD1] By implementing Group Policy to control and enforce password and access security, and by assigning permissions to restrict access to sensitive data and delegating administrative authority where necessary, your organization would move to the rationalized level. Now IT is proactive, users have the permissions they need, and only have access to the resources that they’re supposed to. [BUILD 2] Automated User Provisioning is implemented reducing administrative time to create accounts, and ensuring that accounts are granted only the appropriate level of access. Single sign-on Centralized accounting Application Integration Dynamic Automated User Provisioning 20 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

21 Reducing Cost and Complexity of Infrastructure
4/6/ :37 AM Increase efficiency Drastically reducing the manual effort of security administration using group policy and software tools to easily make one-to-many changes,. (Active Directory®, WSUS, GPMC). Minimizing local administration & local back-up (Branch). Proactively reducing time to diagnose, troubleshoot, and repair unauthorized configuration changes or software installations. Reduce administration costs Consolidating domains and application directories on Windows Server 2003 and Active Directory. Realizing problem resolution with System Center Essentials. Using group policy and software tools to easily make one-to-many changes, drastically reducing the manual effort and cost of security administration. (Active Directory, WSUS, GPMC). Reducing the possibility that users will make configuration changes or install unauthorized software that decreases the security of your infrastructure by locking down user desktops (Active Directory, Group Policy). Minimizing local administration & local back-up (Branch). Reducing the cost of desktop support and decreasing the cost of keeping systems updated with Windows Vista. Objective: Explain how Microsoft can help your IT staff increase efficiency and reduce costs. Talking point: Microsoft provides your company with a cost-effective and time-efficient infrastructure security solution using automated security updates, providing secure access for remote users, and ensuring continuity of protection through trustworthy, integrated Microsoft solutions. Transition: What are the benefits? © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 21

22 Technology Solutions Security and Networking
4/6/ :37 AM Technology Solutions Security and Networking © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

23 Security Threats and Challenges
4/6/ :37 AM Security Threats and Challenges Network Challenges Messaging Challenges Protection from attacks Threat alerts Secure Remote Access to the network Security connectivity to Remote Offices Secure Publishing of Applications External viruses Internal viruses SPAM Access for Remote / Mobile Users Objective: Review the network and messaging challenges facing the mid-size business. Talking Points: First, we’ll look at the threats and challenges that directly target the network: The Forefront family of security products offers a comprehensive end-to-end security solution. Depending on the needs, either ISA Server 2006 or the Whale Intelligent Application Gateway (IAG) can provide the needed protection at the network edge. Forefront Client Security can monitor threats within the network and provide administrators with threat alerts and detailed reporting. To provide secure access to remote users, we will deploy and configure ISA Server 2006. For branch offices that need secure connectivity to the corporate network, ISA Server 2006 can provide security-enhanced VPN client access. ISA Server 2006 also lets the mid-sized business securely publish their mail and applications servers. [Build2] The second aspect of threats and challenges that needs addressed is and messaging: Forefront Security for Exchange will provide protection, eliminating inbound borne viruses and threats. The multi-scan features will also prevent any users within the network from inadvertently sending a virus via to the outside world. Businesses can eliminate spam and other undesirable message traffic on gateway and Exchange servers with Forefront Security of Exchange. For remote and mobile users who need to access their , ISA Server 2006 can securely publish the Exchange server to enable Outlook Web Access. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

24 Solution - Powerful Tools Built on Proven Technology
4/6/ :37 AM Comprehensive Control & protection of: Operating systems Servers Server applications Network “edge” Content Current & emerging threats 24/7 research & response Heterogeneity through partner ecosystem Integrated Cross-product integration MSFT security products MSFT server apps Integrates with existing Microsoft IT infrastructure Integration with ecosystem partners Simplified Centralized management Unified state view & analytics Simplified deployment Integrates into existing IT infrastructure Choice of form factors Prescriptive guidance Objective: Explain how Microsoft helps improve security for the IT environment. Talking point: The Microsoft comprehensive security product portfolio allows your IT professionals to confidently provide end-to-end security for all your people. Microsoft helps put your IT professionals in control of their environment. New Microsoft Client Protection offers a integrated management console to protect business desktops, laptops, and servers. Microsoft will help your organization eliminate costly downtime by providing your IT department with unified malware protection that is easier to manage and control for desktops, laptops and server OS’s. With unified protection, simplified administration, and greater visibility and control, Microsoft makes it easier to manage, configure and maintain the systems that support your workforce. Transition: What are the benefits? © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 24

25 4/6/ :37 AM ISA Server 2006 Firewall Secure NAT and Web high performance Web caching VPN Connectivity (inbound and site-to-site) Secure Application Publishing Comprehensive Objective: Introduce ISA Server 2006 Talking Points: ISA Server is the Comprehensive, Integrated and Simplified Network Edge solution for mid-market companies. One of the roles that ISA Server 2006 can play is that of a network firewall. Network firewalls enable companies to strictly control what type of information moves through the firewall, which users can move that information, and when users can move that information. The firewall can also log and report all information crossing the firewall, including the name of the user who accessed the information and applications users used to get the information. For remote or wireless users, ISA Server 2006 provides secure Virtual Private Networking (VPN) access to the company’s data and applications located within the network. Security Application Publishing with ISA Server 2006 enabled greater control over intranet resources, yet provided increased productivity by making them available to remote users. [Build1] As with all Forefront security solutions, ISA Server 2006 was designed to tightly integrate with existing applications and services, including Active Directory. Forefront Security for Exchange integrates with exchange to protect and filter the company’s . [Build2] The familiar Microsoft Management Console interface simplifies the management process, saving time and reducing IT requirements. ISA Server 2006 can simplify IT management by midsize organizations by providing the administrator with a simplified centralized management console, reducing the complexity of managing security and remote access. Administrators need to know when potential attacks start so that they can respond quickly. To meet this goal, ISA Server 2006 can detect possible attacks and immediately inform the network administrators. Integrates with Active Directory Integrates with ForeFront Security (SPAM) Integrates with Exchange (SPAM and OWA) Integrated Familiar, easy to use, MMC interface Centralized console Alerting and monitoring built in Simplified 25 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

26 Forefront Security for Exchange
4/6/ :37 AM Forefront Security for Exchange Antigen for Exchange Scan Engine 1 Scan Engine 4 Scan Engine 2 Scan Engine 3 Quarantine Manage up to eight scan engines Eliminate single point of failure Minimize window of exposure during outbreaks Objective: Introduce Forefront Security for Exchange Talking Points: With a layered, multiple scan engine approach, the Forefront server application products help stop the latest threats before they affect businesses and users. With Forefront Security for Exchange, you can stop viruses at the network edge of ISA server and SMTP gateways. And you can reduce spam on ISA Server, Exchange, and Windows SMTP servers using the Advanced Spam Manager option. Content and file filtering technologies ensure that organizations can control compliance with corporate content policies, eliminating inappropriate language and dangerous attachments from internal and external communications. [BUILD1] The Forefront Security of Exchange antivirus solution can manage up to eight different scan engines—four are included out-of-the-box, and four more are available for an additional fee. In a single engine environment, you are vulnerable to a bad engine or an engine crashing. Such events are rare, but they do occur. If you were dependent on a single engine and that engine had, for example, problems detecting viruses, your entire organization would be vulnerable. Using multiple scan engines, and receiving overlapping updates from multiple antivirus vendors, reduces the window of exposure for emerging threats. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

27 Branch and Remote Office Security
4/6/ :37 AM Integrated security Application filtering, BITS caching Fast, secure access HTTP compression, traffic prioritization Efficient management Easy deployment, fast propagation of policies Headquarters Remote Office Site-to-site VPN Objective: Remote access for branch offices and remote workers Talking Points: Remote Office Connectivity and Security: In a typical branch office deployment for a small or midsize business, there is a single main site and one or more small branches that need to access the central network or hub. There is typically no local IT support at these remote locations, and no local firewall protection. ISA Server 2006 provides secure VPN access for these remote locations and workers who need to be connected to the central company network to access data and software applications. [BUILD1] Integrated Security: The remote office is made more secure by application-level filtering at the local site, as well as being protected from attacks from the Internet, or even worms originating from other sites. By using the new BITS (Background Intelligent Transfer Service) caching technology, ISA helps keep branch office workstations up-to-date without using all of the network bandwidth to download patches [BUILD2] Fast, Secure Access: Significant performance increases can be realized by reducing network traffic using HTTP compression, BITS caching, and traffic prioritization using DiffServ. Windows Server 2003 R2 with remote differential compression can help reduce the amount of data that needs to be transferred and reduce bandwidth requirements. [BUILD3] Efficient Management: The management of remote offices has been made more efficient with new ISA Server 2006 features that allow for easy central management and speedy deployment of company-wide policies. 27 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

28 Security and Networking
4/6/ :37 AM Security and Networking Multi-layer defense Servers and Server protected from viruses protected from SPAM Standardized Objective: Security standards for Infrastructure Optimization Model Talking Points: Standardized Level: A multi-layer defense solution will be in place. Servers and the company server will be protected from viruses will be protected with SPAM filtering. Rationalized Level: Management of the anti-virus solution will be centralized. Anti-virus software will be updated centrally for all machines in the network. Dynamic Level: At this level, all access is controlled through firewall policies. Centralized management of Anti-virus software Centralized updates to Antivirus Software Rationalized Access controlled through firewall policies Dynamic 28 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

29 Technology Solutions Desktop and Server Management
4/6/ :37 AM Technology Solutions Desktop and Server Management We will walk through the Windows Server solution for midsize business, and show you how this integrated solution can help midsize businesses to Reduce Costs and complexity, enhance productivity, improve security, and simplify infrastructure management. Through the Windows Server System Common Engineering Criteria, Windows Server System products deliver unmatched integration and manageability as well as best-of-breed functionality to provide the most consistent and predictable user experience that enables: Reduced IT complexity Lower TCO More secure and reliable IT infrastructure This means IT professionals can confidently meet IT project objectives on schedule and within budget, leaving more time to focus on other priorities that are important to them and their organization. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

30 Management Challenges …..
4/6/ :37 AM Management Challenges ….. “Server outages are the biggest risk to my organization. I need watchdog features to reboot servers or monitor whether they are running” “I need better support for remote management for all my customers” “Keeping OS and applications updated with the latest patches wastes my time” “End-user troubleshooting is manual for us –telephone, , and remote desktop in XP” “Right now our hardware and software inventory is in spreadsheets, and it’s hard to pull it all together” Objective: Addressing the management challenges Talking Points: Get and stay secure: Update management for operating system and applications Keep the environment up and running: Complete monitoring of servers, desktops, network devices and hardware Serve and support end users: Diagnostic tasks, reporting and deployment of end user software Tracking network assets and resources: Hardware and software asset inventory and reporting Service provider support Native support for secure remote management © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

31 Solution Simplified infrastructure management
4/6/ :37 AM Solution Simplified infrastructure management Security management Updated and automated security features are built right in, so your IT staff can help secure vital business information without taking unknown risks. Emergency management Advanced management tools enable your IT staff to configure and manage desktops and servers to minimize disruption so people can get the information they need, when they need it. Operations management Your IT staff can more easily keep the IT environment available to authorized users to enable a higher level of productivity. Objective Explain how Microsoft will help the IT staff be more efficient at managing a multi-server environment to maximize their time and productivity. Talking points: Microsoft delivers familiar, easy to use programs and tools with new enhancements that enable your IT staff to work more efficiently while providing a safe, reliable IT environment. Simplified security management Automated security updates to servers and desktops and proactive monitoring saves IT administration deployment and diagnostic time. Active Directory uses single sign-on technology to help ensure your company data and resources are protected from unauthorized access. Simplified emergency management In the event that conflicts arise from the daily routine of adding and modifying user accounts, your IT administration can automatically reconnect accounts and recover mailboxes so your people experience minimal disruption. To help ensure your branch offices remain connected if one of its servers fails, Windows Server automatically connects users to a designated failover server minimizing any disruption, automatically reconnecting when the branch server is up and running. Simplified operations management Your people can work productively whether they access information on their hard drive, a server, or from a branch office. System Center Essentials (SCE) monitors application and system health proactively to minimize the risk of downtime. Transition: What are the benefits? © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 31

32 Group Policy for Desktop Control
4/6/ :37 AM Group Policy for Desktop Control Objective: Windows Server 2003 and Group Policy for desktop control Talking Points: Introduced in Windows® Server, Group Policy provides directory-based desktop-configuration management. With Group Policy, you can specify settings for registry-based policies, security, software installations, scripts, folder redirection, Remote Installation Services, and Internet Explorer maintenance. The Windows Server 2003 family of operating systems extends Group Policy in a number of ways, which we’ll talk about in this session. In short, Group Policy allows you to manage computers centrally through Active Directory, which in turn leads to some significant benefits in operational management, such as: [BUILD1] Using Group Policy to deliver managed computing environments allows you to work more efficiently because of the centralized, one-to-many management it enables. For example, with Group Policy, you can show or hide Start menu options and desktop icons; configure Windows software, such as Internet Explorer and Netmeeting; deploy software; and configure security settings. This saves administration time because you don't have to visit every workstation or write complex scripts to configure these settings. You configure and deploy it centrally, and it’s consistent across the company. [BUILD2] You can enforce configurations on desktop clients, preventing users from circumventing company usage policies by making configuration changes. Policy settings are refreshed at a logon or startup or at defined time intervals. Group Policy can be used to define user-related policies as well as security, networking, and other policies applied at the computer level. Group Policy enables management of domain controllers and member servers as well as desktop user computers. [BUILD3] You can simplify administrative tasks, such as system updates and application installations, with Group Policy, as well as deploy client software to targeted users easily and in a timeline that suits your business requirements. [BUILD4] With Group Policy, you can consistently implement security settings across your enterprise. For example, you can deploy security-based policy settings that enforce password requirements, prevent users from sharing folders, or even running certain programs. Manage user and computer environments Enforce IT policies Simplify administrative tasks Implement security settings © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

33 Announcing… Single console designed with simplicity
4/6/ :37 AM An integrated management solution designed for medium sized businesses with ~ PCs Single console designed with simplicity Easily secure, update, monitor and track your entire IT environment More effectively service and support users Support for management services Objective: Introduce the key message points for System Center Essentials Talking Points: Unified Experience: Microsoft System Center Essentials 2007 provides a unified solution to help optimize the experience of performing a broad set of tasks across your entire IT environment. You also get a single console from which you can view and manage your servers, clients, hardware, software, and IT services. Proactive Management: Essentials 2007 accelerates troubleshooting and problem resolution. It’s a self-managing solution that notifies you as soon as a problem occurs, then helps you proactively diagnose and fix it, accelerating problem resolution. Essentials 2007 also automates system updates and data collection for your IT environment, so it’s more secure and up-to-date. Increased Efficiency: Essentials 2007 simplifies complex management tasks like packaging and deploying software, adding Web site monitoring, and creating and configuring Group Policy. Essentials 2007 wizards also help you quickly and easily configure security settings, deploy updates, and discover assets. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

34 Key capabilities Simple Installation
4/6/ :37 AM Key capabilities Simple Installation 10 click installation for easy setup Getting started wizards Out of the box wizards to configure SCE Unified management console A single easy to use console to manage your environment Reporting Report on health, availability, compliance and IT assets Notifications and health reports Be notified of problems via , page or SMS text message when not at your desk Objective: Introduce the key capabilities of Systems Essentials Talking Points: Simple Installation: 10 click installation for easy setup [Build1] Getting started wizards: Out of the box wizards to configure SCE for your environment [Build2] Unified management console: A single easy to use console to manage your environment [Build3] Reporting: Report on health, availability, compliance and IT assets [Build4] Notifications and health reports: Be notified of problems via , page or SMS text message when not at your desk © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

35 Management and Control Attributes
4/6/ :37 AM Management and Control Attributes Standardized Operating System Automatic updates enabled Users can’t install their own software Standardized Objective: Management and control attributes of IO Model levels Talking Points: Standardized: The IT infrastructure is standardized on one operating system Updates are automatically enabled and managed. Users aren’t allowed to install their own software Rationalized: Users are not able to configure their own desktops Centralized monitoring of critical servers is in place Dynamic: All software distribution is fully automated Centralized monitoring of servers and workstations User not allowed to configure their desktops Centralized monitoring of critical servers Rationalized Fully automated software distribution Centralized monitoring of server and workstations Dynamic 35 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

36 Technology Solutions Data Protection and Recovery
4/6/ :37 AM Technology Solutions Data Protection and Recovery We will walk through the Windows Server solution for midsize business, and show you how this integrated solution can help midsize businesses to Reduce Costs and complexity, enhance productivity, improve security, and simplify infrastructure management. Through the Windows Server System Common Engineering Criteria, Windows Server System products deliver unmatched integration and manageability as well as best-of-breed functionality to provide the most consistent and predictable user experience that enables: Reduced IT complexity Lower TCO More secure and reliable IT infrastructure This means IT professionals can confidently meet IT project objectives on schedule and within budget, leaving more time to focus on other priorities that are important to them and their organization. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

37 Backup and Recovery Backup and Recovery in place for critical servers
4/6/ :37 AM Backup and Recovery Backup and Recovery in place for critical servers Standardized Objective: Backup and recovery status at the ID Model levels Talking Points At the standardized level, backup and recovery services are in place for all critical servers. [Build1] At the rationalized level, the organization will have backup and recovery in place for all servers. [Build2] At the “dynamic” level, backup and recovery are both fully automated. Backup and Recovery in place for all servers Rationalized Fully automated backup and recovery Dynamic 37 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

38 Customer Scenarios 4/6/2017 11:37 AM
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

39 4/6/ :37 AM 4/6/ :37 AM Improved security Technology-Savvy Law Firm Gains Easier Remote Access from Any Computer Situation Security, connectivity, and support issues for remote users Solution Deploy a clientless remote access solution using Microsoft technologies that provides lawyers secure, improved, remote access to corporate network resources from virtually anywhere in the world Objective: Present customer evidence for improved security Talking points: (Walk through situation, solution, and benefits on slide.) Company: Kirkpatrick & Lockhart Nicholson Graham Kirkpatrick & Lockhart Nicholson Graham (K&LNG) wanted to provide an improved remote access solution for its lawyers that required no client software on remote computers. Such a solution would improve security and allow its lawyers to access network resources without having to carry a portable computer. After evaluating Linux-based security appliances and a solution based on Microsoft® Internet Security and Acceleration (ISA) Server 2004, K&LNG chose the ISA Server solution because it provides truly clientless access to all network resources. As a result, K&LNG lawyers can securely access the network and their desktop resources from any PC, anywhere. And because ISA Server 2004 can be managed within the firm’s current Windows Server System™ environment, it required little administrator training and nominal additional administration time. Secondary quote: “The ISA Server solution is great for the technical IT staff because it didn’t require learning a whole new archi­tecture. This is just an extension of what they already work with, which makes it easy to support and helped us avoid additional training and administration costs.”--Robert Musial, Director of Information Systems, Kirkpatrick & Lockhart Nicholson Graham LLP Region: N. America Industry: Professional Services, Legal Software: Microsoft Internet Security and Acceleration Server 2004 Microsoft Windows Server 2003 Terminal Services Transition: Benefits Increased security Simplified management Easy-to-use remote access to all network resources “ISA Server improves security for us in several areas. It eliminates local files from being stored on the remote computer, helps prevent suspect PCs from connecting to our network, and exposes a small surface area to the Internet.” —Robert Musial, Director of Information Systems, Kirkpatrick & Lockhart Nicholson Graham LLP 39 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

40 Reduce Costs and Complexity
4/6/ :37 AM 4/6/ :37 AM Reduce Costs and Complexity Professional services organization with 4 remote branch locations realizes increased employee productivity with the ability to access and share centrally stored files and documents plus increased up-time with central IT management Situation Branch office staff needs to access centrally published documents for proposal development, project planning, and knowledge transfer, and collaborate with each other, including those in different branches. With no on-site IT administrator, they also need to make sure their systems can be centrally monitored and updated for increased security and availability. Solution Deploy Windows Server 2003 R2 in each branch office enabling staff to access files and collaborate. Install System Center Essentials 2007 at the main office to centrally monitor and updated branch clients, servers and applications. Benefits Enhanced employee productivity with better connectivity and reliability Decreased TCO – Up to 50% WAN traffic reduction Increased Security Simplified Management from central office Objective: Present customer challenges when there are remote branch locations Talking points: (Walk through situation and challenges (biz and technical) solution, and benefits on slide.) 75% of midsize businesses have branch offices Wide-Area Network (WAN) WAN costs can be significant WAN latency issues Management costs Lack of network admins on site in branch offices Tape backup expensive, unreliable Tools need to scale to large number of branches Policy Delegation UI 40 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

41 Steve Gould, Network Administrator, APA
4/6/ :37 AM 4/6/ :37 AM Enhance Productivity Trade association improves administrator and end-user productivity with anywhere access to next-generation messaging system Situation Over the years, the company’s messaging system has become an indispensable part of its business. APA is looking at new ways to use technology to support communication and collaboration. Solution APA migrated its employees to Microsoft® Exchange Server 2007 and is using it as a foundation for providing its users with advanced unified messaging and mobility solutions. Benefit Seeking new ways of using technology to improve its processes and keep its employees connected, APA deployed Microsoft® Exchange Server The simplified administrator interface enables the network administrator to perform large management tasks in seconds. Local Continuous Replication helps to protect the system against disk failure or data corruption. APA is currently deploying unified messaging and mobility features to give APA employees access to their , calendar, and contacts even when an Internet connection isn’t available. “When I told our executives that they could listen to their along with their voic messages within Exchange Server 2007, they were thrilled.” Steve Gould, Network Administrator, APA 41 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

42 Simplified Infrastructure Management
4/6/ :37 AM 4/6/ :37 AM Simplified Infrastructure Management On-line sales company realizes increased system reliability and lower TCO of IT infrastructure with a unified IT management solution Situation On-line sales company depends directly on the reliability of their IT systems to generate sales and revenue. Any web server downtime can lead to lost sales. The more proactively and efficiently their IT staff can manage their infrastructure, the more reliable their systems and the healthier their sales. Solution Deploy System Center Essentials 2007 as the unified IT management solution, and deploy Windows Server 2003 R2 for web servers. Benefits Increased IT system uptime Unified IT management console Quicker IT problem resolution Improved security of clients and servers Objective: Present customer evidence for improved security Talking points: (Walk through situation, solution, and benefits on slide.) Company: Kirkpatrick & Lockhart Nicholson Graham Kirkpatrick & Lockhart Nicholson Graham (K&LNG) wanted to provide an improved remote access solution for its lawyers that required no client software on remote computers. Such a solution would improve security and allow its lawyers to access network resources without having to carry a portable computer. After evaluating Linux-based security appliances and a solution based on Microsoft® Internet Security and Acceleration (ISA) Server 2004, K&LNG chose the ISA Server solution because it provides truly clientless access to all network resources. As a result, K&LNG lawyers can securely access the network and their desktop resources from any PC, anywhere. And because ISA Server 2004 can be managed within the firm’s current Windows Server System™ environment, it required little administrator training and nominal additional administration time. Secondary quote: “The ISA Server solution is great for the technical IT staff because it didn’t require learning a whole new archi­tecture. This is just an extension of what they already work with, which makes it easy to support and helped us avoid additional training and administration costs.”--Robert Musial, Director of Information Systems, Kirkpatrick & Lockhart Nicholson Graham LLP Region: N. America Industry: Professional Services, Legal Software: Microsoft Internet Security and Acceleration Server 2004 Microsoft Windows Server 2003 Terminal Services Transition: Now, let’s take a look at how Microsoft infrastructure solutions can be customized for your organization. System Center Essentials 2007 is easy to deploy and maintain, helping simplify complex management tasks for increased IT efficiency. 42 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

43 IT Capability Predicts Profitable Growth
4/6/ :37 AM 4/6/ :37 AM IT Capability Predicts Profitable Growth The Enterprise IT Capability Study demonstrates that: Better information technology (IT) makes a quantifiable, positive difference in business performance. • More productive employees. The firms in the top 25 percent of IT capability enjoy 23 percent higher revenue per employee than their peers in the bottom 25 percent of IT capability. • Isolating the impact of all IT functions on productivity shows that IT infrastructure is the key determinant of achieving superior productivity. • Information technology makes managers more effective. Keystone Strategy, Inc., conducted under the direction of Professor Marco Iansiti of the Harvard Business School 2005 Information Technology Fuels Revenue Growth. Companies in the top 25 percent of IT capability grew revenue 6.8 percent faster per year than their peers in the bottom 25 percent of IT capability. Objective: IT Capability Fuels Revenue Growth Talking Points: It is important to evolve your because IT capability predicts profitable growth. Isolating the impact of all IT functions on productivity shows that IT infrastructure is the key determinant of achieving superior productivity. Companies in the top 25 percent of IT capability grew revenue 6.8 percent faster per year than their peers in the bottom 25 percent of IT capability. More productive employees. The firms in the top 25 percent of IT capability enjoy 23 percent higher revenue per employee than their peers in the bottom 25 percent of IT capability. 43 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

44 4/6/ :37 AM Your Call To Action This slide should be customized for each subsidiaries specific CTAs. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

45 Closing/Summary Placeholder
4/6/ :37 AM Closing/Summary Placeholder So what is the role of Microsoft? We understand that there are many choices when it comes to IT and software. So what should you look for when you are making a choice about technology for your company? Why Microsoft? Microsoft Software is FAMILIAR and EASY TO USE. With over 500 million users of our software, Microsoft is the most used and respected software in the world. Microsoft Software is INNOVATIVE – works with what you have and provides a platform to take advantage of new developments and innovation in the industry. Microsoft Software is WIDELY USED AND SUPPORTED by millions of partners and developers world-wide. Our vast ecosystem of solution providers, software vendors, and support organizations ensure that you will be able match the right solution with your business needs. Microsoft Software is EASIER TO CONNECT AND INTEGRATE with other software and devices. Based on industry standards, Microsoft products work across boundaries and provide a platform for a seamless experience. The Microsoft platform is the only software platform that is designed end-to-end to enable individuals regardless of their role: tools for the developer, servers and applications for the IT department, desktop tools and partner solutions for the line-of-business manager, productivity tools for the individual and the mobile employee, Mobility for the distributed workforce On-line experiences for business customers and consumers, and Ultimately services for to the customer. We invest over $5B per year to develop software that connects information, systems, and people. In addition, our partners create tailored solutions around business scenarios like: GUIDANCE: Industry: Include industry relevant topics and partner solutions Audience: Make this section more technical or less technical depending on make up of the audience. Business people are less likely to be familiar with all our products – IT will be very familiar with our products © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.


Download ppt "Optimize and Secure Your Core Infrastructure for Midsize Businesses"

Similar presentations


Ads by Google