jeff putt head of voip strategy aapt. phil osborne senior consultant, enterprise business unit,...
Post on 19-Dec-2015
214 views
TRANSCRIPT
Phil OsborneSenior ConsultantEnterprise Business UnitCitrix Systems, Asia-Pacific
Phil OsborneSenior ConsultantEnterprise Business UnitCitrix Systems, Asia-Pacific
The Case for Implementing an Access Strategy to become an OnDemand Enterprise
The Case for Implementing an Access Strategy to become an OnDemand Enterprise
4
10%10%
30%30%
60%60%
Today
OPERATION
Committed projects
INNOVATION
3 years from now
40%
20 - 25%
35 - 40%
Moving from Run to Grow
INNOVATION“Grow the business”
Committed Projects
OPERATION“Run the business”
40%
5
CIOs Are Changing Their Focus
Reduce the costs of the businessrunning
growingto invest more in the business.Grow
Run
12
Building Blocks ofAccess Infrastructure Strategy
Desktop, or Server, Web, Services-basedApplication Infrastructure
Deliver
Protect
Organize
Display
Manage
Trusted & Untrusted Devices
UserAccess
Scenarios
On-DemandEnterprise
13
Citrix Solutions/Product Set
applications e-mail
web
files
help deskoffice PC
home PC
passwords/authentication
@
@ web
files
applications
14
Citrix Solutions/Product Set
applications e-mail
web
files
help deskoffice PC
home PC
@
@
files
applications
GoToAssist
GoToMyPC
MetaFramePresentation Server
web
MetaFrameSecure Access Manager
passwords/authentication
MetaFramePassword Manager
MetaFrameConferencing
Manager
GoToMeeting
15
JP Morgan Chase – Citrix largest customer and growing
0
25,000
50,000
75,000
100,000
1995 1999 2003
Initial Deployment
Expansion
Standardization
16
SUMMARY – Top Level Business Benefitsarising from implementation of an Access Strategy
• Develop a World Class Access Strategy that has THREE top level imperatives:
1. Substantially lower TCO of IT operations through transition to an On Demand utility model.
2. Provide very fast ROI by transparently & universally providing ubiquitous on-time availability of both back office and front office business functionality across disparate networks, O/S’s and hardware.
3. Substantially reduce RISK of new business based IT initiatives and deliveries while boosting overall security of entire enterprise infrastructure