Download presentation
Presentation is loading. Please wait.
Published byOscar Shelton Modified over 9 years ago
1
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 1 Paul Jeffery Head of Services IMUK Managed & Professional Services Solutions Delivering “Best in Class” Services Value for the New Channel
2
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 2 Agenda 14:15 Introduction to Professional & Managed Services – Paul Jeffery 14:45Ingram Micro Services Partners: Orderwork – Kai Miller CCE- Matt Allaway HP Services- Kim Brashares 15:45Break 16:10Symantec as a Managed Service (ExSP) – Jay Epton 16:40PrintSense & how it works EKM and Gemma Glen Kyocera Managed Print Solutions –Anup Rai 17:30Close
3
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 3 ■ VDI > 7000 ■ Flash arrays ■ More web apps ■ SaaS ■ More mobile devices Death of the Desktop as we knew it?
4
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 4 ■ 60% use personal devices at work. (Forrester) BYOD explosion
5
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 5 ■ MS Lync ■ Sangoma ■ Webex ■ Shoretel ■ Many more. Unified comms
6
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 6 ■ The office is changing. ■ More external connectivity ■ Outside the firewall Greater mobility
7
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 7 ■ “Real threats to mobile devices are active in the wild, pushing mobile security top of mind for enterprises and consumers looking to manage and protect the data and applications on their mobile devices,” notes Jeff Wilson, principal analyst for security at Infonetics Research.Jeff Wilson ■ “Over the next 5 years, we anticipate that over 7 billion new smartphones and tablets will ship worldwide, ratcheting up hackers’ interest in mobile devices,” continues Wilson, “And as a result, we expect sales of mobile device security client software to soar, reaching $2.9 billion by 2017.”Wilson Mobile security
8
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 8 ■ iBoards ■ Wireless ■ BYOD ■ Office 385 ■ Google Docs ■ Security Schools revolution
9
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 9 Greater collaboration can bring complexity
10
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 10 ■ The cloud solution. ■ Private, public, SaaS Cloudy and Bright!
11
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 11 Racks Servers I/O cards Components Storage Core Network Management Software Fire Suppression Physical Security UPS Power Conditioning Power Generator Cooling Cabling SPLM Software Surveillance Professional Services Managed Services Offsite Backup and DR Threat Security Operating Software Application s Data Analytics
12
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 12 BIG HILL TO CLIMB? PEOPLE Dedicated Services team EDUCATION BOOT CAMPS & ON-LINE PORTALS VENDORS A strong portfolio EVENTS Featuring experts SERVICE PARTNER NETWORK With complementary Technology providers TOOLS That make it easy Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
13
121202_ 13 Connecting Ingram Micro, partners and end users to build the next iteration of Technology solutions. Reseller Partner Vendor Partner End Customer IM Enablement Services
14
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 14 Services Portfolio P lan R equisition I mplement M anage Determine the optimal solution for the customer. Requisition the technologies and services that suit the customer requirements. Rollout and integrate the solution to the end customer. Provide support to the running environment. E nable Train people to sell and support new technology areas. “TransVARmation” Discovery Assessment Workshop Capacity Plan Design Assist Detailed Design Compatibility Config Validation Procurement Order Management Scheduling Financing Rollout Logistics Integrate Commission Configure Migrate Maintain Monitor Manage Improve Upgrade Dispose of Train & Educate Advise Cloud transformation Channel Devt. Marketing
15
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 15 Our Team 365i Netcrowd AAP3 Nuage Amsys CCE Orderwork Empowered Service Delivery Approach Wider range
16
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 121202_ 16 Professional Services Portfolio
17
000000_ 17
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.