Presentation is loading. Please wait.

Presentation is loading. Please wait.

Infrastruktuuri optimeerimine Tallinn 28.02.2008.

Similar presentations


Presentation on theme: "Infrastruktuuri optimeerimine Tallinn 28.02.2008."— Presentation transcript:

1 Infrastruktuuri optimeerimine Tallinn 28.02.2008

2 Empowering People in a Changing Workplace Increased pressure and opportunity for IT Meet changing business needs Work across boundaries Digest an overload of information Manage compliance and risk Manage IT cost, complexity Maximize the value of LOB systems Rationalize redundant investments Improve operational efficiency

3 More Pressure Than Ever On IT 30% New 70% Maintenance …with limited resources for advancing capability Business Results & New Value End User ProductivityCustomerConnection Cost Reduction Competition Technology Change Regulatory Compliance Security Keep Business Up & Running

4 Top 5 things in CIO list

5 IT fuels profitable revenue growth Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006 Top 25% of IT capable firms grew revenue 6.8% faster per year Top 25% of IT capable firms realize 23% higher revenue per employee Managers in IT capable firms state they have significantly better insight and control over key dimensions of their business IT gives managers more insight and control Firms with better IT have more productive employees Driving Business Outcomes

6 Purchasing does not mean acquiring a capability RFP or RFQ feature set Years RFP or RFQ feature set RFP or RFQ feature set RFP or RFQ feature set Requested Implemented Trained IntegrationComplexity More people increase complexity More tools also increase complexity $$$

7 Integration complexity is not solved by tools Will newer HW alleviate growth needs? Does backing up mean we are prepared? Will newer versions of the software increase operational efficiency? By adding more people will we be able to get more operational reach? Are we compliant, on which layer… application, network? Will more management tools increase our control? Or our operational quality? Will more security tools decrease our threats ? When we develop an application, does it consume from our existing operational best practices? By having a single network directory do we simplify application access? You can take all of these actions and only increase complexity !!!

8

9 Applied Governance: A Different Approach Is Needed An approach that… –Holistic –Addresses existing complexity –Creates an integrated, uniform environment –Adopts to proven Best Practices –Recognizes Role Based Productivity –Prioritizes and sequences IT projects in a structured, systematic manner

10 Dynamic IT for the People-Ready Business Manage Complexity, Achieve Agility Advance the Business with IT Solutions Amplify the Impact of Your People Protect Information, Control Access

11 IT Infrastructure Optimization Model A new approach for managing IT as a strategic asset. Provides a capability based technology neutral framework upon which you can base an optimized infrastructure Establishes a foundation based on industry analysts, academic and consortium research Provides guidance and best practices for step-by- step implementation Drives cost reduction, security and efficiency gains Enable agility Application Platform Optimization Model Business Productivity Infrastructure Optimization Model Core Infrastructure Optimization Model

12 What Is Dynamic IT? Unified & Virtualized User- Focused Service- Enabled Service- Enabled Process-Led, Model-Driven Separate logical operation from physical hardware More flexible to and streamline change Strengthen business continuity Scale rapidly to meet business demand Separate logical operation from physical hardware More flexible to and streamline change Strengthen business continuity Scale rapidly to meet business demand Captures process, structure and expertise in models Sets rules and tolerances for system health Triggers self-correction when outside tolerance Provides visibility between people and systems Captures process, structure and expertise in models Sets rules and tolerances for system health Triggers self-correction when outside tolerance Provides visibility between people and systems Provides link between internal & external services Extend capability with.NET, XML, ‘web2.0’ services Integrate emerging services without internal dev Strengthen connections with customers, partners Provides link between internal & external services Extend capability with.NET, XML, ‘web2.0’ services Integrate emerging services without internal dev Strengthen connections with customers, partners Connects natural workflow with applications Weave real workflow into application design Enable rich user experiences Integrate familiar interface with powerful apps Connects natural workflow with applications Weave real workflow into application design Enable rich user experiences Integrate familiar interface with powerful apps Dynamic IT is Microsoft’s vision for a new generation of integrated products and technologies that helps customers gain strategic advantage through their IT

13 Dynamic IT and Infrastructure Optimization Unified & Virtualized User- Focused Service- Enabled Service- Enabled Process-Led, Model-Driven BasicStandardizedRationalizedDynamic Uncoordinated,manualinfrastructure Managed IT Infrastructure with limited automation automation Managed and consolidated IT Infrastructure Infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLAs

14 Infrastructure Optimization Infrastructure Optimization is a structured, systematic process of assessing maturity across IT capabilities, then prioritizing projects to progress towards a Dynamic state BasicStandardizedRationalizedDynamic Uncoordinated,manualinfrastructure Managed IT Infrastructure with limited automation automation Managed and consolidated IT Infrastructure Infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLAs People  Process  Technology

15 Infrastructure Optimization - Examples Basic Many ways of achieving the same objective, often in reaction to problems Standardized A standardized, repeatable process Rationalized Managed and consolidated through automation Dynamic Fully automated management, dynamic resource usage, business linked SLAs

16 BasicStandardizedRationalizedDynamic Inconsistent or non-existent policies for security and compliance Inconsistent or non-existent policies for security and compliance Unknown health of services due to the lack of tools and resources Unknown health of services due to the lack of tools and resources No vehicle for sharing accumulated knowledge across IT No vehicle for sharing accumulated knowledge across IT Environments are extremely hard to control Environments are extremely hard to control Very reactive to security threats Very reactive to security threats Software deployments, patches and services are provided through high touch Software deployments, patches and services are provided through high touch Inconsistent or non-existent policies for security and compliance Inconsistent or non-existent policies for security and compliance Unknown health of services due to the lack of tools and resources Unknown health of services due to the lack of tools and resources No vehicle for sharing accumulated knowledge across IT No vehicle for sharing accumulated knowledge across IT Environments are extremely hard to control Environments are extremely hard to control Very reactive to security threats Very reactive to security threats Software deployments, patches and services are provided through high touch Software deployments, patches and services are provided through high touch Unstructured and lacking central control, infrastructure based on manual processes, ad hoc security and disparate resources

17 BasicStandardizedRationalizedDynamic Standards and policies to manage desktops, mobile devices, and servers introduce controls and operational consistency Active Directory is used to manage resources, security policies and network access Active Directory is used to manage resources, security policies and network access The value of basic standards and policies are recognized but not yet implemented broadly The value of basic standards and policies are recognized but not yet implemented broadly Deployments, patches and desktop services are provided at medium touch Deployments, patches and desktop services are provided at medium touch Inventory of hardware and software assets are maintained and license use managed Inventory of hardware and software assets are maintained and license use managed Security is improved with a locked down perimeter, though internal security may still be a risk Security is improved with a locked down perimeter, though internal security may still be a risk Active Directory is used to manage resources, security policies and network access Active Directory is used to manage resources, security policies and network access The value of basic standards and policies are recognized but not yet implemented broadly The value of basic standards and policies are recognized but not yet implemented broadly Deployments, patches and desktop services are provided at medium touch Deployments, patches and desktop services are provided at medium touch Inventory of hardware and software assets are maintained and license use managed Inventory of hardware and software assets are maintained and license use managed Security is improved with a locked down perimeter, though internal security may still be a risk Security is improved with a locked down perimeter, though internal security may still be a risk

18 BasicStandardizedRationalizedDynamic Security is proactive and response to threats is rapid and controlled Security is proactive and response to threats is rapid and controlled The use of zero-touch deployment helps minimize cost and time The use of zero-touch deployment helps minimize cost and time Minimal number of desktop images and low-touch management Minimal number of desktop images and low-touch management Hardware and software inventory is managed, with optimal license use Hardware and software inventory is managed, with optimal license use Security measures involve strict policies and control Security measures involve strict policies and control Security is proactive and response to threats is rapid and controlled Security is proactive and response to threats is rapid and controlled The use of zero-touch deployment helps minimize cost and time The use of zero-touch deployment helps minimize cost and time Minimal number of desktop images and low-touch management Minimal number of desktop images and low-touch management Hardware and software inventory is managed, with optimal license use Hardware and software inventory is managed, with optimal license use Security measures involve strict policies and control Security measures involve strict policies and control Costs involved in managing desktops and servers are at their lowest, with integrated IT management policies, tools, and processes

19 BasicStandardizedRationalizedDynamic Costs are fully controlled Costs are fully controlled Integration between users and data, desktops, and servers; collaboration is pervasive Integration between users and data, desktops, and servers; collaboration is pervasive Mobile users have nearly on-site levels of service and capabilities Mobile users have nearly on-site levels of service and capabilities Processes are fully automated, often incorporated into the technology itself Processes are fully automated, often incorporated into the technology itself Additional investments in technology yield specific, rapid and measurable benefits Additional investments in technology yield specific, rapid and measurable benefits Self-provisioning software and quarantine-like systems allow automated processes Self-provisioning software and quarantine-like systems allow automated processes Costs are fully controlled Costs are fully controlled Integration between users and data, desktops, and servers; collaboration is pervasive Integration between users and data, desktops, and servers; collaboration is pervasive Mobile users have nearly on-site levels of service and capabilities Mobile users have nearly on-site levels of service and capabilities Processes are fully automated, often incorporated into the technology itself Processes are fully automated, often incorporated into the technology itself Additional investments in technology yield specific, rapid and measurable benefits Additional investments in technology yield specific, rapid and measurable benefits Self-provisioning software and quarantine-like systems allow automated processes Self-provisioning software and quarantine-like systems allow automated processes Highly responsive and efficient IT infrastructure; automated processes and flexible resources drive business agility and competitive advantage

20 DynamicStandardizedRationalizedBasic Helping CIOs Show Leadership And Value Freeing Resources The IO Journey frees resources and provides the foundation for organizational agility Cost Center Uncoordinated, manual infrastructure; knowledge not captured More Efficient Cost Center Managed IT infrastructure with limited automation and knowledge capture Managed and consolidated IT infrastructure with extensive automation; knowledge captured and re-used Fully automated management; dynamic resource usage; business- linked service level agreements (SLAs); knowledge capture and use automated Business Enabler Strategic Asset

21 Core IO Progression to Dynamic IT Cost CenterEfficient Cost Center Business Enabler Strategic Asset Uncoordinated, manual Infrastructure Managed IT infrastructure with limited automation and knowledge capture Managed and consolidated IT infrastructure with extensive automation; knowledge captured and reused Fully automated management dynamic resource usage, business linked SLAs; knowledge capture automated BasicStandardizedRationalizedDynamic Identity and Access Management Manage Identities and Access to Resources * Protect Identities Data Protection and Recovery Provide Backup * Protect Information * Recover Data Quickly Desktop, Device, and Server Management Manage Desktops and Mobile Devices * Deploy Applications Security and Networking Protect Information * Protect Infrastructure * Provide Access to Resources

22

23 Infrastructure Optimization Improves IT Efficiency PCs managed per IT FTE 100 200 300 400 700 0 Organization 500 600 76 $1,320 172 $580 442 $230 Avg PC’s per/IT FTE IT Labor/PC Source:IDC data analyzed by Microsoft 2007 20%60%20%

24 BasicStandardizedRationalizedDynamic Benefits of Desktop Optimization Gains in service levels and agility are significant

25 Benefits of Desktop Optimization Labor efficiencies with optimized desktop infrastructure

26 World Wide IO Analysis 12,034 Customers Analyzed (>500 Employees)

27 EMEA IO Analysis 3,342 Customers Analyzed (>500 Employees)

28 Control Cost Simplify, automate and centralize IT operations to optimize resource utilization Improve Service Levels Integrate management and security tools to maximize system uptime Drive Agility Adapt the IT infrastructure rapidly according to business needs Cost Agility Infrastructure Maturity Service Levels

29 Kuidas alustada? Andke endale ise hinnang: www.microsoft.com/peopleready/coreinfra www.microsoft.com/peopleready/coreinfra Kontakteeruge Microsofti partneriga, et läbi viia põhjalikum analüüs ja saada soovitused jätkamiseks! Partnerid Eestis: – GT Tarkvara – Uptime Systems – IT Grupp – MarkIT – MicroLink Eesti – PC Expert

30 Identity and Access Management Standardized to Rationalized Projects Architecture S to RS to R BACK Difficult to manage user and resource settings and configurations Users have multiple identities across heterogeneous systems No solution to protect user data from unauthorized access Concern over unauthorized access to sensitive information No solution to allow users to protect content for being copied, printed, distributed without proper rights/permissions Identities are stored in different application directories IT Enable potential for rapid change and configuration Provide consistent user experience across computers based on business roles Protect user data Mitigate risk associated with unauthorized access Safeguard digital information from unauthorized use—both online and offline Reduce operations and desktop support costs IT Fundamental Deploy a solution to synchronize identity stores with non-Windows application directories Advanced Deploy a metadirectory solution for identity synchronization, and deploy a smartcard and certificate management solution Deploy full-drive encryption and persistent data protection technologies Deploy a federated trust- based authentication system for external applications, and Enable personal information card access for non-federated users Deploy a multi-factor authentication solution for access control to high-risk systems, and deploy certificate-based authenticationChallengesProjectsBenefitsBUSINESSBUSINESS

31 Projects Fundamental Implement Active Directory forest with one instance of trust in the organizationResources Identity and Access Management Standardized to Rationalized Projects Architecture S to RS to R BACK Windows 2003 Active Directory Introduction Windows 2003 Active Directory Introduction Designing and Deploying Active Directory Best Practice Guide for Securing Active Directory Installations Best Practice Guide for Securing Active Directory Installations Active Directory Web Casts Series Training Simulation (AD, ADMT) V-Labs Fundamental Deploy a solution to synchronize identity stores with non-Windows application directories Deploy a metadirectory solution for identity synchronization, and deploy a smartcard and certificate management solution Microsoft Identity Lifecycle Manager 2007 Product OverviewMicrosoft Identity Lifecycle Manager 2007 Product Overview Identity Lifecycle Manager 2007 (ILM 2007) Technical LibraryIdentity Lifecycle Manager 2007 (ILM 2007) Technical Library Microsoft Certificate Lifecycle Manager 2007 (CLM 2007)Microsoft Certificate Lifecycle Manager 2007 (CLM 2007) Microsoft Identity Integration Server 2003 (MIIS 2003) Technical LibraryMicrosoft Identity Integration Server 2003 (MIIS 2003) Technical Library Case Studies: MIIS MIIS Walkthrough Scenarios MIIS Virtual Labs

32 Projects Advanced Deploy a federated trust-based authentication system for external applications, and Enable personal information card access for non- federated usersResources Overview of Active Directory Federation Services (ADFS) in Windows Server 2003 R2Overview of Active Directory Federation Services (ADFS) in Windows Server 2003 R2 ADFS Concepts ADFS Design Guide ADFS Deployment Guide Identity and Access Management Standardized to Rationalized Projects Architecture S to RS to R BACK Deploy a multi-factor authentication solution for access control to high-risk systems, and deploy certificate-based authentication Implementing Multifactor Authentication Using Smart CardsImplementing Multifactor Authentication Using Smart Cards Public Key Infrastructure for Windows Server 2003 Active Directory Certificate Services Designing a Public Key Infrastructure Microsoft Certificate Lifecycle Manager Overview ILM Certificate management

33 ArchitectureProjects BACK Identity and Access Management Standardized to Rationalized Technologies Active Directory Group Policy Objects (GPO)Active Directory Group Policy Objects (GPO) Microsoft Identity Lifecycle Manager 2007Microsoft Identity Lifecycle Manager 2007 Active Directory Lightweight Directory Services (ADLDS)Active Directory Lightweight Directory Services (ADLDS) Windows Vista - EFS Rights Management Services Windows Vista Enterprise (For Bitlocker)Windows Vista Enterprise (For Bitlocker) Windows Mobile 6 IRM enabled Pocket Office and Pocket InboxWindows Mobile 6 IRM enabled Pocket Office and Pocket Inbox Microsoft Identity Lifecycle Manager 2007 - Smart Card Lifecycle ManagementMicrosoft Identity Lifecycle Manager 2007 - Smart Card Lifecycle Management Windows Certificate Services Resources S to RS to R Windows Server 2003 R2 Helps Simplify Identity and Access Management Windows Server 2003 R2 Helps Simplify Identity and Access Management Network Architecture Blueprint Microsoft's Vision for an Identity Metasystem Microsoft's Vision for an Identity Metasystem

34 Küsimused?

35 Tänan!


Download ppt "Infrastruktuuri optimeerimine Tallinn 28.02.2008."

Similar presentations


Ads by Google