What Customers ask for What this means for IT Growth Customer service Regulatory compliance Device management Varying skill sets Mobility PC maintenance Server sprawl Legacy platforms Deployment and maintenance ID: 462392
Download Presentation The PPT/PDF document "INFRASTRUCTURE OPTIMISATION" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
INFRASTRUCTURE OPTIMISATIONSlide2
What Customers ask for:Slide3
What this means for IT:
Growth
Customer service
Regulatory compliance
Device management
Varying skill sets
Mobility
PC maintenance
Server sprawl
Legacy platforms
Deployment and maintenanceIdentity managementSoftware updates
Malicious attacks, viruses, spam, etc.Evolving threatsPatch management, VPN, etc.Secure access (employees, partners and customers)Slide4
BUSINESS STRATEGY
Business Decisions
Objectives & Direction
Change
IS/IT STRATEGY
Business Based
Demand Orientated
Application Focused
Infrastructure
Activity Based
Supply Orientated Technology FocusedWhere is the business going and Why
What is requiredHow it canbe delivered
Infrastructure
and services
Needs and
priorities
Supports
business
Direction for
business
Global and
Economic factors,
Industry Sector trends,
Market
trends,
the IS/IT Industry,
Business and
Organisational impact,
and, Organisational
potential
Indeed it’s an age-old truth….Slide5
How do we begin the journey?
Cost Center
Uncoordinated, manual
infrastructure
More Efficient Cost Center
Managed IT
Infrastructure
with limited
automation
Managed and
consolidated IT
Infrastructure
with maximum
automation
Fully automated
management,
dynamic resource
Usage , business
linked SLA’s
Business Enabler
Strategic Asset
Infrastructure Optimisation ModellingSlide6
6
Capability sequencing framework to help you
identify/build
an optimized infrastructure
(
not Microsoft-specific
)
Grounded in industry analyst and academic
work.
Provides guidance and best practices for step-by-step implementationDrives cost reduction, security and efficiency gains as well as enabling agilityA Model-based ApproachSlide7
Integrated Communication
Access to Information
Business Intelligence
Enterprise Content Management
Collaboration Infrastructure Optimization
Desktop Lifecycle
Identity & Access Management
Security, Networking & Monitoring
Data Protection & Recovery
Core Infrastructure Optimization
User Experience
Application & Process
Data
Development
Application Platform Infrastructure Optimization
Each element of the model is also layered….Slide8
Core IO
Basic
Standardized
Rationalized
Dynamic
Identity &
Access Management
● No common identity management model
Uses Active Directory for authenticating 80% or more of the users
Has a directory based tool to centrally define and enforce configuration standards and security on 80% or more of the desktops
Uses a directory-based tool to enable authenticated access to external customers and business partners
Has a solution for user identity validation and data protection – if lost - for Mobile devices
Has a secured and guaranteed way to verify secure communications between the corporate network and mobile devices
Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systems
Does not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions
● Centralized configuration and authentication, information protection infrastructure
● Centralized administration, Federated Identity Management
The model outputSlide9
Core IO
Basic
Standardized
Rationalized
Dynamic
Identity &
Access Management
Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systems
Does not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions
Implement Group Policy through Active Directory
Deploy a solution to synchronize identity stores with non-Windows application directories
Deploy a metadirectory solution for identity synchronization
Deploy a smartcard and certificate management solution
Deploy full drive encryption and persistent data protection technologies
Deploy a federated trust-based authentication system for external applications
Enable personal information card access for non-federated users
Deploy a multi-factor authentication solution for access control to high-risk systems and deploy certificate based authentication
Does this organization use Active Directory for authenticating 80% or more of their users?
Yes
Does this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)?
Yes
Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems?
No
Does this organization use a directory-based tool to enable authenticated access to external customers and business partners?
Yes
Does this organization use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions?
No
Does this organization have a solution for user identity validation and data protection – if lost - for their Mobile devices?
Yes
Does this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (certificates)?
Yes
Reaching consensusSlide10
Page
10
Maturity Model Output – Core IO
CORE IO
Basic
Standardized
Rationalized
Dynamic
Identity &
Access Management
Security & Networking
Data Protection & Recovery
Desktop, Device &
Server Management
Security Process
ITIL/COBIT-based Management Process
Identity and Access Management is at Basic because of a lack of mature use of directory-based tools to enable authenticated access to external customers and/or partners, or, allowing users to protect content for being copied, printed, distributed without proper rights/permissions.
Security and Networking is at Rationalised in terms of capability, but there are questions surrounding common Practice.
Data Protection and Recovery is at Standardised because virtualisation is not used as an enabling tool for backup and/or disaster recovery.
Within Desktop Device and Server Management, the tracking, management and updating of Mobile devices is a key mover from Basic to Standardised.
Security Processes are solid as are the ITIL/COBIT-based Management ProcessesSlide11
Page
11
Maturity Model Output - BPIO
BPIO
Basic
Standardized
Rationalized
Dynamic
Collaboration Workspaces
& Portals
Unified Communications
Enterprise Content Management
Enterprise Search
Business Intelligence
Collaboration Workspaces and Portals is at Basic because although much technology is in place, it is not in widespread use throughout the Enterprise.
Unified Communications also falls short of the mark in terms of common use and the integration of elements of UC.
Although Enterprise Content Management is at Standardised, web and rich client based forms are not used, amongst other issues.
Enterprise Search is not unified. There is no single way, for example, to access all information in the organisation.
Whilst Business Intelligence has much technology in place this is diverse and nearer to the ‘islands-of-data’ approach. LOB data cannot be seen in the shared working environment.Slide12
Page
12
Maturity Model Output - APIO
APIO
Basic
Standardized
Rationalized
Dynamic
User Experience
SOA & Business Process
Data Management
Development
User Experience, SOA and Business Process and data management are all at the Basic level of maturity, whilst Development is at rationalised.
Most applications (it is thought) are COTS with, at best, some tailoring done. There are a few legacy applications which from time to time require new functionality.
Within this context, User Experience is not considered from the outset of the development and is often an afterthought.
Whilst much thought and work has gone in to SOA it is not widespread through the organisation.
Within Data Management, there are multiple Database Standards, disconnected silos of data, and only standard database management tools and techniques are leveragedSlide13
Myths
Page
13
There is no ‘right ‘and ‘wrong’ level of maturity
…there is no ‘good’ and ‘bad’…
……..if the level of maturity is adequate for the needs of the business at that time…..then there is nothing wrong with it.
……..only when the current level of maturity impedes a key business imperative need it change.
Business Productivity Infrastructure
Core Infrastructure
Application Platform InfrastructureSlide14
Priorities used to be based on ‘projects’
Improve Collaboration Between Regional Offices
Unified Communication & Collaboration
Enterprise Content Management
Business Intelligence
Workspaces & Portals
Messaging
Presence
Doc & Records
Mgmt
Forms
Mgmt
Search
Reporting &
AnalysisSlide15
Now, we need to see the bigger picture
We need to have
a good idea of business imperatives and how IT initiatives within
the
business
underpin those business prioritiesSlide16
We have a vision with respect to the IT infrastructure…..Slide17
IO modelling even tells us how mature our IT infrastructure is…..Slide18
Now, we need to pull it all together.
At best we link the
IT
‘stuff’ to just one
of
the business
prioritiesSlide19
We should link the current maturity levels to our infrastructure goals….Slide20
But then we should link IT to the business imperatives….Slide21
Now we have a compelling story
If
you don’t improve the maturity of this bit of the infrastructure,
this
business imperative will be impacted
.Slide22
And again….Slide23
Here an Application Platform exampleSlide24
Another….Slide25
And the affects of doing nothingSlide26
Support the British Economy
Support British Nationals Abroad
Support Managed Migration for Britain
A Flexible Global Network Serving the Whole of British Government
Countering Terrorism, Weapons Proliferation & Their Causes
Prevent & Resolve Conflict
Promote a Low Carbon, High Growth, Global Economy
Develop Effective International Institutions, Above All the UN and EU
Data Protection & Recovery
Desktop, Device &
Server
ManagementSecurity ProcessITIL/COBIT-based Management Process
Security & Networking
Identity & Access Management
Collaboration Workspaces & Portals
Unified Comms
Enterprise Content Management
Enterprise Search
Business Intelligence
DSOs
IT Strategies
I&TD
Principles
Projects
Maturity Model
CapabilitiesSlide27
2010
2011
2012
Desktop hardware
Desktop OS
Desktop Productivity
Web collaboration
Unclas Web Conference
Unified comms
Echo Network Refresh
WAN acceleration
Remote access
Virtualization
IM and Presence
Desktop Video Conferencing
Government Cloud
SharePoint eTeams
Capabilities RoadmapSlide28