the infrastructure optimization journey mike stone account technology strategist philip duff...
Post on 21-Dec-2015
219 views
TRANSCRIPT
The Infrastructure The Infrastructure Optimization JourneyOptimization Journey
Mike StoneMike Stone
Account Technology StrategistAccount Technology Strategist
Philip DuffPhilip Duff
Technology Specialist - InfrastructureTechnology Specialist - Infrastructure
Microsoft AustraliaMicrosoft Australia
AgendaAgendaWhat is Infrastructure Optimization?What is Infrastructure Optimization?
Why embark on the IO Journey?Why embark on the IO Journey?
Optimizing Core InfrastructureOptimizing Core Infrastructure
Starting the Infrastructure Starting the Infrastructure Optimization JourneyOptimization Journey
What Is Infrastructure What Is Infrastructure Optimization?Optimization?
What is Infrastructure What is Infrastructure Optimization?Optimization?
Based on the Gartner Infrastructure Based on the Gartner Infrastructure Maturity ModelMaturity Model
Co-developed with Gartner for a Microsoft Co-developed with Gartner for a Microsoft environmentenvironment
Split into three broad areasSplit into three broad areasCore IOCore IO
Business Productivity IOBusiness Productivity IO
Application Platform IOApplication Platform IO
Developed to change the focus of IT Developed to change the focus of IT resources from maintenance to delivering resources from maintenance to delivering new servicesnew services
6
Meeting the Challenge:Meeting the Challenge:Infrastructure OptimizationInfrastructure Optimization
• Technology sequencing Technology sequencing framework to build an framework to build an optimized Infrastructureoptimized InfrastructureMaps IT to organisational Maps IT to organisational capabilitiescapabilitiesDrive cost reduction, Drive cost reduction, security & efficiency gainssecurity & efficiency gainsBacked by analystsBacked by analystsProvides guidance and best Provides guidance and best practices for step-by-step practices for step-by-step improvementsimprovements
Models
Technology View of ModelTechnology View of ModelOne ExampleOne Example
No common identity No common identity management modelmanagement model
Identity management Identity management for user identificationfor user identification
Centralized configuration Centralized configuration and authentication, and authentication,
information protection information protection infrastructure infrastructure
Centralized Centralized administration, administration,
Federated Identity Federated Identity ManagementManagement
No server-No server-based based identity or identity or access access managemenmanagement t Users Users operate in operate in admin modeadmin modeLimited or Limited or inconsistent inconsistent use of use of passwords at passwords at the desktopthe desktopMinimal Minimal enterprise enterprise access access standardsstandards
Active Active Directory for Directory for Authentication Authentication and and Authorization Authorization Users have Users have access to access to admin modeadmin modeSecurity Security templates templates applied to applied to standard standard images images Desktops not Desktops not managed by managed by policypolicy
Policy Policy and Security and Security templates templates used to used to manage manage desktops for desktops for security security and settingsand settingsDirectory and Directory and certificate-certificate-based based Information Information Protection Protection InfrastructureInfrastructureCertificate Certificate Provisioning & Provisioning & Authorization Authorization for Mobile for Mobile DevicesDevices
Centrally Centrally manage users manage users provisioning provisioning across across heterogeneouheterogeneous systemss systemsFederated Federated Identity Identity Management Management across across organizational organizational and platform and platform boundariesboundaries
Why embark on the IO Why embark on the IO Journey?Journey?
End User Productivity
Poorly IntegratedSolutions
SecurityThreats
Competition
TechnologyChange
RegulatoryCompliance
CostReduction
Heterogeneity
IT ServiceManagement
The Challenge of The Challenge of TodayToday
Microsoft’s Promises to YouMicrosoft’s Promises to YouEnabling IT Pros & Development Teams Across the IT Enabling IT Pros & Development Teams Across the IT LifecycleLifecycle
Linking Infrastructure to Organisational Linking Infrastructure to Organisational PerformancePerformance
Organisations in the top 25% of IT Organisations in the top 25% of IT capability grew services 6.8% faster per capability grew services 6.8% faster per year than their peers in the bottom 25% year than their peers in the bottom 25% of IT capability. of IT capability.
Those in the top 25% of IT capability Those in the top 25% of IT capability enjoy 23% higher productivity per enjoy 23% higher productivity per employee than their peers in the employee than their peers in the bottom 25% of IT capability.bottom 25% of IT capability.
Isolating the impact of all IT functions Isolating the impact of all IT functions on Productivity shows that IT on Productivity shows that IT Infrastructure is a key determinant of Infrastructure is a key determinant of superior productivity. superior productivity.
Managers that are supported by better Managers that are supported by better information systems have significantly information systems have significantly better insight into, and control over, better insight into, and control over, key dimensions of their organisations. key dimensions of their organisations.
Information Information technology fuels technology fuels growthgrowth
Organisations with Organisations with better IT have more better IT have more productive productive employeesemployees
Robust IT Robust IT infrastructure is a infrastructure is a key driver of key driver of productivity and productivity and growthgrowth
Information Information technology gives technology gives managers more managers more insight and control insight and control
Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration,
Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006
Infrastructure Optimization Infrastructure Optimization Improves IT EfficiencyImproves IT Efficiency
PCs managed per IT FTE
100
200
300
400
700
0
Organization
500
600
76$1,320
172$580
442$230
Avg PC’s per/IT FTEIT Labor/PC
Source: IDC data analyzed by Microsoft 2006
20% 60% 20%
How Can We Help You Build An How Can We Help You Build An Optimized Infrastructure? Optimized Infrastructure? Core Infrastructure Optimization ModelCore Infrastructure Optimization Model
Cost Center Cost Center
Uncoordinated, Uncoordinated, manualmanual
InfrastructureInfrastructureKnowledge not Knowledge not
captured captured
More Efficient More Efficient Cost CenterCost Center
Managed IT Managed IT Infrastructure Infrastructure
with limitedwith limited automation and automation and
knowledge captureknowledge capture
Managed and Managed and consolidated ITconsolidated IT InfrastructureInfrastructurewith extensive with extensive
Automation, Automation, knowledge knowledge
captured and re-captured and re-usedused
Fully automated Fully automated management, management,
dynamic resource dynamic resource Usage , business Usage , business
linked SLA’s. linked SLA’s. Knowledge Knowledge
capture capture automated and automated and use automateduse automated
Business Business EnablerEnabler
Strategic Strategic AssetAsset
Process Culture ViewProcess Culture ViewMicrosoft Operations Framework/ITIL in IOMMicrosoft Operations Framework/ITIL in IOM
ReactiveReactive
Ad hocAd hoc
Problem-Problem-DrivenDriven
““AvoidingAvoidingDowntime”Downtime”
Reactive Reactive
Stable ITStable IT
Request Request DrivenDriven
Change Change Management Management and Planningand Planning
““Keeping ItKeeping ItRunning”Running”
ProactiveProactive
AccountableAccountable
Increased Increased MonitoringMonitoring
Formal Formal ChangeChangeManagementManagement
SLA’sSLA’s
ImprovementImprovement
PredictabilityPredictability
““Quality Quality Driven”Driven”
ProactiveProactive
OptimizingOptimizingCosts and Costs and QualityQuality
AgileAgile
Self AssessingSelf Assessingand and ContinuousContinuousImprovementImprovement
““Taking The Taking The Lead”Lead”
Most effortMost effortspent in:spent in:
Best Practices That Optimize Best Practices That Optimize InfrastructureInfrastructure
Source: GCR & IDC data analyzed by Microsoft, 2006
Multiple Directories• Multiple directories• No PC Management• Many passwords; SDcalls• Manual user provisioning
Single directory for Auth• One authentication directory
$1320/PC Cost
$580/PC Cost
$230/PC Cost
Automated provisioning• Meta directory• Single Sign-on• Auto password reset• Auto user provisioning
None• No PC life cycle strategy• Many hardware configs• Many software config• Many images
Standardization• 3 or 4 yr PC refresh• Few hardware configs• Few software configs• Minimal # of images
Stds Compliance• Compliance auditing • Compliance Enforcement• Automated SW
Distribution
Minimal PC Security• Ant-virus• Reactive security
Limited PC Security• PC firewall• Automated patching
Comprehensive PC Security• Anti Spyware• Network Access Control
Comprehensive PC Security = $160/PC Savings
Standardization & Standards Compliance = $220/PC Savings
Identity Management = $210/PC Savings
100% 44% 17%
Optimizing Your Core Optimizing Your Core Infrastructure Infrastructure
Experiences from the fieldExperiences from the field
Microsoft’s Promises to YouMicrosoft’s Promises to YouEnabling IT Pros & Development Teams Across the IT Enabling IT Pros & Development Teams Across the IT LifecycleLifecycle
FY07 Core Model CapabilitiesFY07 Core Model Capabilities
Manage Complexity, Achieve Agility
Fully Automated IT Management
Lowest TCO and Highest ROI
Efficiency
Protect Information, Control Access
Minimize Security Risk
Enable appropriate access
IT is a Strategic Asset, Competitive Differentiator
Desired State
CROSS-MODEL ENABLERSCROSS-MODEL ENABLERS
Desktop, Server and Device ManagementDesktop, Server and Device Management
Security and NetworkingSecurity and Networking
Identity and Access ManagementIdentity and Access Management
Data Protection and RecoveryData Protection and Recovery
IT and Security ProcessIT and Security Process
Identity Presence Rights Mgmt Network Access
Technology View of ModelTechnology View of ModelOne ExampleOne Example
No common identity No common identity management modelmanagement model
Identity management Identity management for user identificationfor user identification
Centralized configuration Centralized configuration and authentication, and authentication,
information protection information protection infrastructure infrastructure
Centralized Centralized administration, administration,
Federated Identity Federated Identity ManagementManagement
No server-No server-based based identity or identity or access access managemenmanagement t Users Users operate in operate in admin modeadmin modeLimited or Limited or inconsistent inconsistent use of use of passwords at passwords at the desktopthe desktopMinimal Minimal enterprise enterprise access access standardsstandards
Active Active Directory for Directory for Authentication Authentication and and Authorization Authorization Users have Users have access to access to admin modeadmin modeSecurity Security templates templates applied to applied to standard standard images images Desktops not Desktops not managed by managed by policypolicy
Policy Policy and Security and Security templates templates used to used to manage manage desktops for desktops for security security and settingsand settingsDirectory and Directory and certificate-certificate-based based Information Information Protection Protection InfrastructureInfrastructureCertificate Certificate Provisioning & Provisioning & Authorization Authorization for Mobile for Mobile DevicesDevices
Centrally Centrally manage users manage users provisioning provisioning across across heterogeneouheterogeneous systemss systemsFederated Federated Identity Identity Management Management across across organizational organizational and platform and platform boundariesboundaries
Multi-level: Multi-level: operating operating
systems, system systems, system resources, resources,
applicationsapplications
Architect Architect Developer Developer IT IT ProPro
Capture Capture knowledge in knowledge in
modelsmodels
ITIL-basedITIL-based
IT and SecurityProcess
Security &Networking
Desktop, Server& Device Mgmt
Identity &Access Mgmt
Data Protection& Recovery
Knowledge-drivenManagement
VirtualInfrastructure
Design for Operations
How We Help You Get How We Help You Get DynamicDynamic
Starting the Infrastructure Starting the Infrastructure Optimization JourneyOptimization Journey
Identify where you are in the Identify where you are in the Infrastructure Optimization Infrastructure Optimization ModelsModels
Identify highest impact options Identify highest impact options
Identify biggest challengesIdentify biggest challenges
Build a plan that maps to your Build a plan that maps to your business and IT prioritiesbusiness and IT priorities
Work with Microsoft and/or our Work with Microsoft and/or our Partners to help you get startedPartners to help you get started
“Microsoft and it’s partners want to help you plan, build and execute on your journey to Infrastructure
Optimization”Visit www.microsoft.com/io for more details for more details
The Infrastructure Optimisation Seminar is aimed at: The Infrastructure Optimisation Seminar is aimed at: IT ManagersIT Managers Heads of Application DevelopmentHeads of Application Development IT Business Strategists. IT Business Strategists.
Brought to you by industry expertsBrought to you by industry experts
If you are trying to take control of costs, stop fighting fires If you are trying to take control of costs, stop fighting fires and move your IT Infrastructure from being an and move your IT Infrastructure from being an overhead to being a strategic business asset this day is overhead to being a strategic business asset this day is for you.for you.
Venue: Gold Coast Convention CentreVenue: Gold Coast Convention Centre
Date: 7Date: 7thth August 8:30 am to 5:15pm August 8:30 am to 5:15pm
© 2005 Microsoft Corporation. All rights reserved.© 2005 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.