/
INFRASTRUCTURE OPTIMISATION INFRASTRUCTURE OPTIMISATION

INFRASTRUCTURE OPTIMISATION - PowerPoint Presentation

min-jolicoeur
min-jolicoeur . @min-jolicoeur
Follow
393 views
Uploaded On 2016-09-07

INFRASTRUCTURE OPTIMISATION - PPT Presentation

What Customers ask for What this means for IT Growth Customer service Regulatory compliance Device management Varying skill sets Mobility PC maintenance Server sprawl Legacy platforms Deployment and maintenance ID: 462392

amp business based management business amp management based infrastructure access user data directory maturity content identity security solution tool protection model desktop

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "INFRASTRUCTURE OPTIMISATION" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

INFRASTRUCTURE OPTIMISATIONSlide2

What Customers ask for:Slide3

What this means for IT:

Growth

Customer service

Regulatory compliance

Device management

Varying skill sets

Mobility

PC maintenance

Server sprawl

Legacy platforms

Deployment and maintenanceIdentity managementSoftware updates

Malicious attacks, viruses, spam, etc.Evolving threatsPatch management, VPN, etc.Secure access (employees, partners and customers)Slide4

BUSINESS STRATEGY

Business Decisions

Objectives & Direction

Change

IS/IT STRATEGY

Business Based

Demand Orientated

Application Focused

Infrastructure

Activity Based

Supply Orientated Technology FocusedWhere is the business going and Why

What is requiredHow it canbe delivered

Infrastructure

and services

Needs and

priorities

Supports

business

Direction for

business

Global and

Economic factors,

Industry Sector trends,

Market

trends,

the IS/IT Industry,

Business and

Organisational impact,

and, Organisational

potential

Indeed it’s an age-old truth….Slide5

How do we begin the journey?

Cost Center

Uncoordinated, manual

infrastructure

More Efficient Cost Center

Managed IT

Infrastructure

with limited

automation

Managed and

consolidated IT

Infrastructure

with maximum

automation

Fully automated

management,

dynamic resource

Usage , business

linked SLA’s

Business Enabler

Strategic Asset

Infrastructure Optimisation ModellingSlide6

6

Capability sequencing framework to help you

identify/build

an optimized infrastructure

(

not Microsoft-specific

)

Grounded in industry analyst and  academic

work.

Provides guidance and best practices for step-by-step implementationDrives cost reduction, security and efficiency gains as well as enabling agilityA Model-based ApproachSlide7

Integrated Communication

Access to Information

Business Intelligence

Enterprise Content Management

Collaboration Infrastructure Optimization

Desktop Lifecycle

Identity & Access Management

Security, Networking & Monitoring

Data Protection & Recovery

Core Infrastructure Optimization

User Experience

Application & Process

Data

Development

Application Platform Infrastructure Optimization

Each element of the model is also layered….Slide8

Core IO 

Basic

Standardized

Rationalized

Dynamic

Identity &

Access Management

● No common identity management model

Uses Active Directory for authenticating 80% or more of the users

Has a directory based tool to centrally define and enforce configuration standards and security on 80% or more of the desktops

Uses a directory-based tool to enable authenticated access to external customers and business partners

Has a solution for user identity validation and data protection – if lost - for Mobile devices

Has a secured and guaranteed way to verify secure communications between the corporate network and mobile devices

Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systems

Does not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions

● Centralized configuration and authentication, information protection infrastructure

● Centralized administration, Federated Identity Management

The model outputSlide9

Core IO 

Basic

Standardized

Rationalized

Dynamic

Identity &

Access Management

Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systems

Does not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions

Implement Group Policy through Active Directory

Deploy a solution to synchronize identity stores with non-Windows application directories

Deploy a metadirectory solution for identity synchronization

Deploy a smartcard and certificate management solution

Deploy full drive encryption and persistent data protection technologies

Deploy a federated trust-based authentication system for external applications

Enable personal information card access for non-federated users

Deploy a multi-factor authentication solution for access control to high-risk systems and deploy certificate based authentication

Does this organization use Active Directory for authenticating 80% or more of their users?

Yes

Does this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)?

Yes

Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems?

No

Does this organization use a directory-based tool to enable authenticated access to external customers and business partners?

Yes

Does this organization use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions?

No

Does this organization have a solution for user identity validation and data protection – if lost - for their Mobile devices?

Yes

Does this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (certificates)?

Yes

Reaching consensusSlide10

Page

10

Maturity Model Output – Core IO

CORE IO 

Basic

Standardized

Rationalized

Dynamic

Identity &

Access Management

Security & Networking

Data Protection & Recovery

Desktop, Device &

Server Management

Security Process

ITIL/COBIT-based Management Process

Identity and Access Management is at Basic because of a lack of mature use of directory-based tools to enable authenticated access to external customers and/or partners, or, allowing users to protect content for being copied, printed, distributed without proper rights/permissions.

Security and Networking is at Rationalised in terms of capability, but there are questions surrounding common Practice.

Data Protection and Recovery is at Standardised because virtualisation is not used as an enabling tool for backup and/or disaster recovery.

Within Desktop Device and Server Management, the tracking, management and updating of Mobile devices is a key mover from Basic to Standardised.

Security Processes are solid as are the ITIL/COBIT-based Management ProcessesSlide11

Page

11

Maturity Model Output - BPIO

BPIO 

Basic

Standardized

Rationalized

Dynamic

Collaboration Workspaces

& Portals

Unified Communications

Enterprise Content Management

Enterprise Search

Business Intelligence

Collaboration Workspaces and Portals is at Basic because although much technology is in place, it is not in widespread use throughout the Enterprise.

Unified Communications also falls short of the mark in terms of common use and the integration of elements of UC.

Although Enterprise Content Management is at Standardised, web and rich client based forms are not used, amongst other issues.

Enterprise Search is not unified. There is no single way, for example, to access all information in the organisation.

Whilst Business Intelligence has much technology in place this is diverse and nearer to the ‘islands-of-data’ approach. LOB data cannot be seen in the shared working environment.Slide12

Page

12

Maturity Model Output - APIO

APIO 

Basic

Standardized

Rationalized

Dynamic

User Experience

SOA & Business Process

Data Management

Development

User Experience, SOA and Business Process and data management are all at the Basic level of maturity, whilst Development is at rationalised.

Most applications (it is thought) are COTS with, at best, some tailoring done. There are a few legacy applications which from time to time require new functionality.

Within this context, User Experience is not considered from the outset of the development and is often an afterthought.

Whilst much thought and work has gone in to SOA it is not widespread through the organisation.

Within Data Management, there are multiple Database Standards, disconnected silos of data, and only standard database management tools and techniques are leveragedSlide13

Myths

Page

13

There is no ‘right ‘and ‘wrong’ level of maturity

…there is no ‘good’ and ‘bad’…

……..if the level of maturity is adequate for the needs of the business at that time…..then there is nothing wrong with it.

……..only when the current level of maturity impedes a key business imperative need it change.

Business Productivity Infrastructure

Core Infrastructure

Application Platform InfrastructureSlide14

Priorities used to be based on ‘projects’

Improve Collaboration Between Regional Offices

Unified Communication & Collaboration

Enterprise Content Management

Business Intelligence

Workspaces & Portals

Messaging

Presence

Doc & Records

Mgmt

Forms

Mgmt

Search

Reporting &

AnalysisSlide15

Now, we need to see the bigger picture

We need to have

a good idea of business imperatives and how IT initiatives within

the

business

underpin those business prioritiesSlide16

We have a vision with respect to the IT infrastructure…..Slide17

IO modelling even tells us how mature our IT infrastructure is…..Slide18

Now, we need to pull it all together.

At best we link the

IT

‘stuff’ to just one

of

the business

prioritiesSlide19

We should link the current maturity levels to our infrastructure goals….Slide20

But then we should link IT to the business imperatives….Slide21

Now we have a compelling story

If

you don’t improve the maturity of this bit of the infrastructure,

this

business imperative will be impacted

.Slide22

And again….Slide23

Here an Application Platform exampleSlide24

Another….Slide25

And the affects of doing nothingSlide26

Support the British Economy

Support British Nationals Abroad

Support Managed Migration for Britain

A Flexible Global Network Serving the Whole of British Government

Countering Terrorism, Weapons Proliferation & Their Causes

Prevent & Resolve Conflict

Promote a Low Carbon, High Growth, Global Economy

Develop Effective International Institutions, Above All the UN and EU

Data Protection & Recovery

Desktop, Device &

Server

ManagementSecurity ProcessITIL/COBIT-based Management Process

Security & Networking

Identity & Access Management

Collaboration Workspaces & Portals

Unified Comms

Enterprise Content Management

Enterprise Search

Business Intelligence

DSOs

IT Strategies

I&TD

Principles

Projects

Maturity Model

CapabilitiesSlide27

2010

2011

2012

Desktop hardware

Desktop OS

Desktop Productivity

Web collaboration

Unclas Web Conference

Unified comms

Echo Network Refresh

WAN acceleration

Remote access

Virtualization

IM and Presence

Desktop Video Conferencing

Government Cloud

SharePoint eTeams

Capabilities RoadmapSlide28