1 / 35

Infrastruktuuri optimeerimine

Infrastruktuuri optimeerimine. Tallinn 28.02.2008. Empowering People in a Changing Workplace Increased pressure and opportunity for IT. Technology Change. Regulatory Compliance. Competition. Security. Cost Reduction. Keep Business Up & Running. Customer Connection. End User

jeri
Télécharger la présentation

Infrastruktuuri optimeerimine

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Infrastruktuuri optimeerimine Tallinn 28.02.2008

  2. Empowering People in a Changing WorkplaceIncreased pressure and opportunity for IT

  3. TechnologyChange RegulatoryCompliance Competition Security CostReduction Keep BusinessUp & Running Customer Connection End User Productivity Business Results& New Value More Pressure Than Ever On IT 30%New 70%Maintenance …with limited resources for advancing capability

  4. Top 5 things in CIO list

  5. Driving Business Outcomes IT fuels profitable revenue growth Top 25% of IT capable firms grew revenue 6.8% faster per year Firms with better IT have more productive employees Top 25% of IT capable firms realize 23% higher revenue per employee Managers in IT capable firms state they have significantly better insight and control over key dimensions of their business IT gives managers more insight and control Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006

  6. Purchasing does not mean acquiring a capability Integration Complexity Requested feature set More tools also increase complexity More people increase complexity RFP or RFQ feature set Trained feature set $$$ RFP or RFQ feature set Implemented feature set RFP or RFQ feature set RFP or RFQ feature set Years

  7. Integration complexity is not solved by tools You can take all of these actions and only increase complexity !!! Will newer HW alleviate growth needs? Does backing up mean we are prepared? Will newer versions of the software increase operational efficiency? By adding more people will we be able to get more operational reach? Are we compliant, on which layer… application, network? Will more management tools increase our control? Or our operational quality? Will more security tools decrease our threats ? When we develop an application, does it consume from our existing operational best practices? By having a single network directory do we simplify application access?

  8. "Insanity: doing the same thing over and over again and expecting different results.“ Albert Einstein

  9. Applied Governance: A Different Approach Is Needed An approach that… • Holistic • Addresses existing complexity • Creates an integrated, uniform environment • Adopts to proven Best Practices • Recognizes Role Based Productivity • Prioritizes and sequences IT projects in a structured, systematic manner People Process Technology Operational habits are what deliver results

  10. Dynamic IT for the People-Ready Business Dynamic IT infrastructure: • Easily adapts IT services to changing business needs • Empowers people with access to information, when they need it • Automates processes and reduces complexity • Keeps security and compliance under control • Optimizes for cost, service levels and agility Manage Complexity, Achieve Agility Amplifythe Impactof YourPeople ProtectInformation,ControlAccess Advance the Businesswith IT Solutions Governing Principles

  11. IT Infrastructure Optimization ModelA new approach for managing IT as a strategic asset. • Provides a capability based technology neutral framework upon which you can base an optimized infrastructure • Establishes a foundation based on industry analysts, academic and consortium research • Provides guidance and best practices for step-by-step implementation • Drives cost reduction, security and efficiency gains • Enable agility Application Platform Optimization Model Business Productivity Infrastructure Optimization Model Core Infrastructure Optimization Model

  12. What Is Dynamic IT? Dynamic IT is Microsoft’s vision for a new generation of integrated products and technologies that helps customers gain strategic advantage through their IT • Separate logical operation from physical hardware • More flexible to and streamline change • Strengthen business continuity • Scale rapidly to meet business demand Unified & Virtualized • Captures process, structure and expertise in models • Sets rules and tolerances for system health • Triggers self-correction when outside tolerance • Provides visibility between people and systems Process-Led,Model-Driven • Provides link between internal & external services • Extend capability with.NET, XML, ‘web2.0’ services • Integrate emerging services without internal dev • Strengthen connections with customers, partners Service-Enabled • Connects natural workflow with applications • Weave real workflow into application design • Enable rich user experiences • Integrate familiar interface with powerful apps User-Focused

  13. Dynamic IT and Infrastructure Optimization Dynamic IT is the destination Infrastructure Optimization guides the journey Unified & Virtualized Basic Standardized Rationalized Dynamic Process-Led,Model-Driven Managed and consolidated IT Infrastructure with maximum automation Fully automated management, dynamic resource usage , business linked SLAs Service-Enabled Managed IT Infrastructure with limited automation Uncoordinated, manual infrastructure User-Focused

  14. Infrastructure Optimization Infrastructure Optimization is a structured, systematic process of assessing maturity across IT capabilities, then prioritizing projects to progress towards a Dynamic state Basic Standardized Rationalized Dynamic People  Process  Technology Managed and consolidated IT Infrastructure with maximum automation Fully automated management, dynamic resource usage , business linked SLAs Managed IT Infrastructure with limited automation Uncoordinated, manual infrastructure

  15. Infrastructure Optimization - Examples Basic Standardized Rationalized Dynamic Many ways of achieving the same objective, often in reaction to problems A standardized, repeatable process Managed and consolidated through automation Fully automated management, dynamic resource usage , business linked SLAs

  16. Core Infrastructure Maturity Level—Basic Basic Standardized Rationalized Dynamic Unstructured and lacking central control, infrastructure based on manual processes, ad hoc security and disparate resources • Inconsistent or non-existent policies for security and compliance • Unknown health of services due to the lack of tools and resources • No vehicle for sharing accumulated knowledge across IT • Environments are extremely hard to control • Very reactive to security threats • Software deployments, patches and services are provided through high touch

  17. Core Infrastructure Maturity Level—Standardized Basic Standardized Rationalized Dynamic Standards and policies to manage desktops, mobile devices, and servers introduce controls and operational consistency • Active Directory is used to manage resources, security policies and network access • The value of basic standards and policies are recognized but not yet implemented broadly • Deployments, patches and desktop services are provided at medium touch • Inventory of hardware and software assets are maintained and license use managed • Security is improved with a locked down perimeter, though internal security may still be a risk

  18. Core Infrastructure Maturity Level—Rationalized Basic Standardized Rationalized Dynamic Costs involved in managing desktops and servers are at their lowest, with integrated IT management policies, tools, and processes • Security is proactive and response to threats is rapid and controlled • The use of zero-touch deployment helps minimize cost and time • Minimal number of desktop images and low-touch management • Hardware and software inventory is managed, with optimal license use • Security measures involve strict policies and control

  19. Core Infrastructure Maturity Level—Dynamic Basic Standardized Rationalized Dynamic Highly responsive and efficient IT infrastructure; automated processes and flexible resources drive business agility and competitive advantage • Costs are fully controlled • Integration between users and data, desktops, and servers; collaboration is pervasive • Mobile users have nearly on-site levels of service and capabilities • Processes are fully automated, often incorporated into the technology itself • Additional investments in technology yield specific, rapid and measurable benefits • Self-provisioning software and quarantine-like systems allow automated processes

  20. Helping CIOs Show Leadership And ValueFreeing Resources Basic Standardized Rationalized Dynamic Managed andconsolidated ITinfrastructurewith extensiveautomation; knowledge captured and re-used Uncoordinated,manualinfrastructure;knowledge not captured Fully automatedmanagement;dynamic resourceusage; business-linked servicelevel agreements (SLAs); knowledge capture and useautomated Managed ITinfrastructurewith limitedautomation and knowledge capture More Efficient Cost Center Business Enabler Strategic Asset Cost Center

  21. Core IOProgression to Dynamic IT Basic Standardized Rationalized Dynamic Identity and Access Management Manage Identities and Access to Resources * Protect Identities Desktop, Device, and Server Management Manage Desktops and Mobile Devices * Deploy Applications Data Protection and Recovery Provide Backup * Protect Information * Recover Data Quickly Managed andconsolidated IT infrastructure with extensiveautomation; knowledge captured and reused Fully automated management dynamic resource usage, business linked SLAs; knowledge capture automated Security and Networking • Protect Information * Protect Infrastructure * Provide Access to Resources Uncoordinated, manual Infrastructure Managed IT infrastructure with limited automation and knowledge capture Strategic Asset Cost Center Efficient Cost Center Business Enabler

  22. “However beautiful the strategy, you should occasionally look at the results.“ Sir Winston Churchill (1874 - 1965)

  23. Infrastructure Optimization Improves IT Efficiency Organization 700 PCs managed per IT FTE 600 500 400 300 200 100 20% 60% 20% 0 76 $1,320 172 $580 442 $230 Avg PC’s per/IT FTE IT Labor/PC Source: IDC data analyzed by Microsoft 2007

  24. Benefits of Desktop OptimizationGains in service levels and agility are significant Basic Standardized Rationalized Dynamic IT Labor Costs $1320 $580 $230 Not Available Service levels* (# Svc desk calls) 8.4 8.5 7.7 Not Available Business Agility (# weeks/deploy app) 5.4 5.2 4.3 Not Available Source: IDC Core Infrastructure Optimization Research, Survey of Findings, June 2007 *Service levels intended as an indicator for end-user productivity **Sample data not yet available to determine full benefits of “Dynamic” desktop maturity level

  25. Benefits of Desktop OptimizationLabor efficiencies with optimized desktop infrastructure Total TCO ($4600-$5000/year) Total TCO($3200-$3300/year) End-user A leading industry analyst found over 90% of the TCO reductions from best practices for desktop management result from increased labor efficiency for IT workers and End-users (US$ /desktop/year) IT HW/SW “Basic” “Rationalized” Source: Leading Analyst firm, December 2005 Note: Excludes server & network costs for centrally manages services

  26. World Wide IO Analysis 12,034 Customers Analyzed (>500 Employees)

  27. EMEA IO Analysis 3,342 Customers Analyzed (>500 Employees)

  28. Benefits of Optimized Core Infrastructure Control Cost Improve Service Levels Drive Agility Simplify, automate and centralize IT operations to optimize resource utilization Integrate management and security tools to maximize system uptime Adapt the IT infrastructure rapidly according to business needs Service Levels Cost Agility Infrastructure Maturity

  29. Kuidas alustada? • Andke endale ise hinnang: www.microsoft.com/peopleready/coreinfra • Kontakteeruge Microsofti partneriga, et läbi viia põhjalikum analüüs ja saada soovitused jätkamiseks! • Partnerid Eestis: • GT Tarkvara • Uptime Systems • IT Grupp • MarkIT • MicroLink Eesti • PC Expert

  30. S to R Identity and Access ManagementStandardized to Rationalized Challenges Projects Benefits BUSINESS BUSINESS • Fundamental • Deploy a solution to synchronize identity stores with non-Windows application directories • Advanced • Deploy a metadirectory solution for identity synchronization, and deploy a smartcard and certificate management solution • Deploy full-drive encryption and persistent data protection technologies • Deploy a federated trust-based authentication system for external applications, and Enable personal information card access for non-federated users • Deploy a multi-factor authentication solution for access control to high-risk systems, and deploy certificate-based authentication • Difficult to manage user and resource settings and configurations • Users have multiple identities across heterogeneous systems • No solution to protect user data from unauthorized access • Concern over unauthorized access to sensitive information • Enable potential for rapid change and configuration • Provide consistent user experience across computers based on business roles • Protect user data • Mitigate risk associated with unauthorized access IT IT • Safeguard digital information from unauthorized use—both online and offline • Reduce operations and desktop support costs • No solution to allow users to protect content for being copied, printed, distributed without proper rights/permissions • Identities are stored in different application directories Architecture Projects BACK

  31. S to R Identity and Access ManagementStandardized to Rationalized Projects Resources • Windows 2003 Active Directory Introduction • Designing and Deploying Active Directory • Best Practice Guide for Securing Active Directory Installations • Active Directory Web Casts Series • Training Simulation (AD, ADMT) V-Labs • Fundamental • Implement Active Directory forest with one instance of trust in the organization • Fundamental • Deploy a solution to synchronize identity stores with non-Windows application directories • Deploy a metadirectory solution for identity synchronization, and deploy a smartcard and certificate management solution • Microsoft Identity Lifecycle Manager 2007 Product Overview • Identity Lifecycle Manager 2007 (ILM 2007) Technical Library • Microsoft Certificate Lifecycle Manager 2007 (CLM 2007) • Microsoft Identity Integration Server 2003 (MIIS 2003) Technical Library • Case Studies: MIIS • MIIS Walkthrough Scenarios • MIIS Virtual Labs Architecture Projects BACK

  32. S to R Identity and Access ManagementStandardized to Rationalized Projects Resources • Advanced • Deploy a federated trust-based authentication system for external applications, and Enable personal information card access for non-federated users • Overview of Active Directory Federation Services (ADFS) in Windows Server 2003 R2 • ADFS Concepts • ADFS Design Guide • ADFS Deployment Guide • Deploy a multi-factor authentication solution for access control to high-risk systems, and deploy certificate-based authentication • Implementing Multifactor Authentication Using Smart Cards • Public Key Infrastructure for Windows Server 2003 • Active Directory Certificate Services • Designing a Public Key Infrastructure • Microsoft Certificate Lifecycle Manager Overview • ILM Certificate management Architecture Projects BACK

  33. S to R Identity and Access Management Standardized to Rationalized Technologies • Active Directory Group Policy Objects (GPO) • Microsoft Identity Lifecycle Manager 2007 • Active Directory Lightweight Directory Services (ADLDS) • Windows Vista - EFS • Rights Management Services • Windows Vista Enterprise (For Bitlocker) • Windows Mobile 6 IRM enabled Pocket Office and Pocket Inbox • Microsoft Identity Lifecycle Manager 2007 - Smart Card Lifecycle Management • Windows Certificate Services Resources • Windows Server 2003 R2 Helps Simplify Identity and Access Management • Network Architecture Blueprint • Microsoft's Vision for an Identity Metasystem Projects Architecture BACK

  34. Küsimused?

  35. Tänan!

More Related