Solution Implementer Guide Agenda Recap Discussions to Date Next Steps Solution Guidance Phase 1 Phase 2 Phase 3 Customize the Capability Requirements Engagement Approach Audience Solution road map ID: 313494
Download Presentation The PPT/PDF document "Optimizing Your Infrastructure for Susta..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Optimizing Your Infrastructure for Sustainability
Solution Implementer GuideSlide2
Agenda
Recap Discussions to Date
Next Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize the Capability RequirementsSlide3
Engagement Approach
Audience
Solution road map
Solution areas
Industry
Horizontal
Business strategy
Integrated Capability Analysis > Projects, architecture, products
Present relevant integrated capabilities
Position the Integrated Capability approach
Business executives
Understand business needs and priorities
Discuss range of potential solution capabilities
IT
executives
Architects IT pro/dev executivesSlide4
Integrated Capability Analysis
Ensure target business capabilities cover process improvement priorities
Translate business capabilities into required infrastructure capabilities
Assess current infrastructure maturity
Determine gaps to target infrastructure
Build a road map for integrated capabilities and solution implementation
Specify required architecture, technologies, and services
Baseline road map for integrated capabilitiesSlide5
Business Driver
Phase 1
Phase 2
Phase 3
REDUCE THE CARBON FOOTPRINT BY MINIMIZING THE ENVIRONMENTAL IMPACT OF TECHNOLOGY
Allow workers to reduce travel by working remotely, sharing ideas, posting questions, and having general discussions via collaborative workspaces with discussion boards and blogs, secure access to email, secure IM, and standardized audio and video conferencing
Promote the Energy Star program and Electronic Product Environmental Assessment Tool (EPEAT), resulting in lower equipment costs, less electrical consumption for server power and cooling, and less physical space for servers via products that are Energy Star and EPEAT compliant; optimization of the deployment and management infrastructure; and group policies for power settings and centralized control
Enable organizations to remotely monitor and maintain IT resources, visualize problems, and take proactive measures to reduce site visit costs via interactive, personalized, and relevant reports
Securely conduct online meetings and training, and enable workers to collaborate in real time regardless of geography to reduce office space requirements and the need for inter-office and customer-related travel via collaboration tools that support offline access to documents; integrated audio and video conferencing to provide a rich online meeting experience for internal and remote users who need secure, instant collaboration; a unified inbox with voice mail, email, and fax; and email and voice mail on a browser or mobile device
Consolidate multiple workloads onto one platform and make data centers more environmentally friendly via server virtualization to provision new servers rapidly and consolidate multiple workloads onto a physical server; and management of virtual machines
Streamline processes to improve tracking and control of old and outdated equipment and to help ensure correct disposal or recycling of equipment and other consumables via scorecards and dashboards within a collaborative portal platform and self-serve reporting and analysis tools
Fully integrate telecommuting into the culture and business practices to reduce automobile and aircraft emissions via collaborative workspaces and portals that provide access from almost any location, presence-enabled line-of-business (LOB) applications, and software-powered voice over Internet Protocol (VoIP)Take advantage of cloud computing to shift and consolidate resources via a cloud-based platformProvision servers for application portfolio management to lower the number of servers by consolidating applications onto fewer servers via application virtualization to automate and simplify the application management life cycle and reduce regression testingDevelop and distribute applications in the cloud with minimal resources on the premises via measurement through a Business Intelligence (BI)-like reporting sensor and load monitoring by rack and row; and a cloud-based platform to build new applications and use interoperable services in the cloudProactively perform preventative maintenance and achieve other equipment improvements through automated alerts that are linked to more details about root causes, effects, and other troubleshooting data via predictive analysis and data mining to explore data, discover patterns, and drill into historical trend reports; and workflows to generate automated alertsNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide6
Business Driver
Phase 1
Phase 2
Phase 3
MEASURE AND TRACK INTERNAL RESOURCES AND ENVIRONMENTAL IMPACT GOALS
Pull the right information and present it to executives and reporting authorities so they can quickly see issues visually and have an idea of the overall status of operations via easy–to-use wizards and advanced data visualization tools that enable insight into large amounts of historical data quickly and summarize analysis results in reports and charts that are integrated with the portal infrastructure
Collaborate on and publish product design objectives, sourcing policies, packaging and transportation processes, disposal guidelines, internal models and calculation of value streams, and product carbon footprints via effective document management with workflow, collaboration, and search capabilities
Allow managers to train and monitor employees to promote and evaluate remote workers’ effectiveness via custom websites and self-serve reporting and analysis tools; conferencing to support training; and social computing to support training and monitoring
Provide rich visualization of resource metrics to help executives and reporting authorities rapidly identify trends and issues for better predictive analysis via interactive and cascaded scorecards and dashboards that are integrated with the portal infrastructure, to analyze and interpret data and to reveal trends and patterns
Provide collaboration portals for suppliers' approvals and receiving submission requirements of carbon footprint and compliance data via portals tied to LOB systems or business applications; and authoring and publishing web content
Allow for analysis and reporting in near real time to gain visibility and insight into and control over productivity across all employees who work from home via web-based self-serve reporting and analysis tools connected to subject-oriented data
Improve alignment with business strategy by maximizing the ways resources are used via strategy-driven, enterprise-wide scorecards and enterprise project managementEnable executives and reporting authorities to take proactive measures when certain trends begin to change to enable analysis and understanding of the root cause and effects, and to share details and best practices via root-cause analysis with real-time alerts that are integrated with the portal infrastructure and that link to more details to enable visualization and exploration of multi-dimensional dataShare and collaborate on product, packaging, storage, and transportation improvement opportunities internally and throughout the supply chain, and in business modeling and simulation tools via automated core business processes; integration across applications to enable internal and federated access to suppliers and partners; and streamlined creation, publication, and life cycle management of web contentDefine performance levels for telecommuters and measure the outcomes in real time via Web Parts with KPIs and personalized performance viewsAssign role-based key performance indicators (KPIs) for key business metrics that can be monitored for productivity via role-based scorecards and KPIsNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide7
Business Driver
Phase 1
Phase 2
Phase 3
SUPPORT CREATION, MANAGEMENT, AND MONITORING OF COMPLIANCE FRAMEWORKS
Pull together relevant regulatory compliance metrics about energy consumption, carbon footprint, and greenhouse gas emissions to identify ways to fund incentives and drive participation via data mart and IT-driven reports with effective content management to integrate and capture auditable data consistently over time, to reduce risk of exposure to potential regulations, taxation, or increases in energy costs
Accelerate collaboration and information exchange to share best practices and learning, to raise awareness for compliance regulations via web-based self-serve reporting; custom websites and multi-threaded online discussion forums; and search technology to share learning across the organization
Proactively monitor compliance metrics, triggered events, and alerts when compliance is compromised, and give prescriptive guidance about how to mitigate future risk via scorecards and dashboards to monitor compliance metrics, and custom workflows to generate alert notifications when exceptions occur
NORMALIZE CORPORATE COMPLIANCE WITH EXTERNAL ENVIRONMENTAL REGULATIONS
Give the compliance and audit team a consolidated view of environmental regulations, policies, and procedures to make critical information more easily available via interactive diagrams with data visualization to represent complex business data sets cleanly and clearly for compliance and auditing purposes; and content management to collect and manage information to create the consolidated views
Introduce consistency into environmentally sustainable or Green initiatives by driving awareness and making processes automated, repeatable, and reliable via workflows that make processes more prescriptive and repeatable, and assure that the same steps are carried out each time and are shared across the organization
Enable compliance awareness and adoption while monitoring compliance and generating alerts to be aware of every non-compliance issue via custom workflows that use external business rules and generate alert notifications when exceptions occur, and dissemination of policies, practices and compliance status; and search technology to support awareness (discoverability of information)Enable business stakeholders to design, interact with, monitor, innovate, and automate compliance processes and drive collaboration across the organization via workflows that are integrated into custom line-of-business applications with near-real-time tracking of in-process workflowsProvide advanced data visualization to make it easier for users to understand and respond to new compliance requirements via scorecards and dashboards that include information relevant to emerging business and technological compliance initiatives, including energy conservation programs or conservation goalsOptimize compliance processes by managing initiatives, monitoring risks, and delivering alerts to appropriate people to raise environmental awareness via custom workflows that use external business rules and generate alert notifications when exceptions occur
Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.
Integrated Capability Support for Priority Business CapabilitiesSlide8
Business Driver
Phase 1
Phase 2
Phase 3
RESPOND TO CONSUMER EXPECTATIONS THAT INDUSTRIES TAKE A HOLISTIC APPROACH TO SUSTAINING THE ENVIRONMENT
Hire and retain next-generation workers by providing a virtual office working environment that has optimized and secure access to critical applications, documents, and data via a virtual private network (VPN), offline and online access to email, collaborative workspaces, secure IM, standardized audio/video conferencing, and the ability to search within content repositories
Increase customer awareness of the "Green code of conduct" the organization enforces in its core operations such as e-commerce, telecommuting, and other activities via custom websites and multi-threaded online discussion forums; and web content management to build awareness by enabling a controlled and broad set of users to contribute and share content
Standardize the methodology for collection and assessment of data about energy consumption, carbon footprint, and greenhouse gas emissions to identify areas for improvement to the strategy to include Green technologies via a data mart to integrate and store data related to energy consumption; and reporting and search to collect and assess carbon footprint and greenhouse gas emissions data
Promote sustainable practices, environmentally preferable offerings, and ecologically efficient strategies to raise customer awareness of corporate involvement in Green initiatives via custom websites and multi-threaded online discussion forums and with web content management
Provide remote workers with the ability to communicate in real time with peers and customers even while on the go via comprehensive pre-authentication; authorization services and single sign on; VPN-based full network access; collaboration tools that support offline access to documents; integrated audio and video conferencing; a unified inbox with voice mail, email, and fax; and email and voice mail on a browser or mobile device
Strengthen the organization's web presence by branding products and services with specific environmentally friendly attributes such as recyclable or biodegradable, or by establishing measurable sustainability baselines and improvements via custom websites with content that supports environmentally friendly branding; and integrated rich media capabilities and reporting on KPIs
Implement environmentally sustainable business policies and practices to align Green initiatives with the brand image via collaboration and user-driven reportingProvide customers the ability to share ideas, give feedback, and suggest improvements to sustainable offerings, including products and services, to keep customers engaged via social computing technologies such as blogs and wikis to share views and opinions, IT-driven reports, and authoring and publishing web contentUpdate the infrastructure for next-generation workers by using the cost-savings gained by enabling remote workers via application virtualization for automated application distribution, collaborative workspaces and portals that provide access from almost any location, presence-enabled LOB applications, and software-powered VoIPSafeguard information when workers access sensitive data from remote locations via rights management and information protectionCollect customer feedback and suggestions for improvement to the organization's environmental initiatives via custom websites that have multi-threaded online discussion forums; social computing technologies such as blogs, wikis, and other people-centric venues that support communication among people with common interests; and streamlined creation, publication, and life cycle management of web contentAnalyze sustainability performance data, plans, and targets to increase performance transparency and mitigate risk via predictive reports linked to an environmental sustainability dashboard that tracks and displays effects of these policies and practicesMeasure and report on metrics related to Green initiatives and identify opportunities to stimulate more sustainable processes to improve customer relationships via reports, scorecards, and dashboards to analyze, monitor, and plan environmental sustainability initiatives; and streamlined creation, publication, and life cycle management of web contentNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide9
Business Driver
Phase 1
Phase 2
Phase 3
PARTICIPATE IN BUSINESS OPPORTUNITIES THAT SUSTAIN THE ENVIRONMENT
Collect employee feedback and knowledge, share best practices, and learn from each other to protect and sustain the environment via a centralized knowledge base and content-centric social computing
Improve access to key operational and resource data across the organization to identify the regulatory, physical, and general risks that climate change poses to the business via a data mart with heterogeneous data support to access data that is shared throughout the organization; desktop analysis; and a collaboration infrastructure and search technology to improve access to data
Easily tap into information about carbon position, footprint, and liability stored in disparate data systems and develop key process indicators to quantify metrics for managing carbon certificate inventory via a data mart to integrate and store data about to carbon use; scorecards with KPIs for managing the carbon certificate inventory; and a collaborative workspace and portals to help workers manage and disseminate relevant information
Make the knowledge base and portal infrastructure available to more people within and outside the organization to improve collaboration via integration of the knowledge base with collaborative workspaces and the portal infrastructure, and forms-driven workflows to route ideas
Provide the ability to analyze metrics related to energy usage, carbon emissions, water inefficiencies, and greenhouse gas emissions to make informed risk assessments via scorecards and dashboards to seamlessly analyze off-target KPIs
Enable workers to monitor key performance indicators that are linked to various systems to help initiate processes such as carbon trading via balanced scorecards that are integrated with the portal infrastructure and that have defined KPIs that draw data from data warehouse, and dashboard content that is optimized for the web
Provide social computing capabilities within and across the enterprise, including suppliers and customers, to collect feedback and gather suggestions for improvement via social computing technologies such as blogs and wikis to share views and opinions, and subscriptions to external newsfeeds to learn about new developmentsEnable ongoing optimization and alignment of processes with corporate sustainability guidelines by analyzing the carbon footprint and environmental impact of suppliers to maintain a resilient and sustainable supply chain via strategy-driven enterprise-wide scorecards to monitor and analyze KPIs in real timeEnable real-time availability of operational information across the organization and provide the ability to compare data with competitors and analyze trends via a centralized and managed data warehouse that helps ensure real-time availability of operational information; and reporting and analysis to identify trends, patterns, and opportunitiesNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide10
Recap Discussions to Date
Next Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize the
Capability
Requirements
AgendaSlide11
MEASURE AND TRACK INTERNAL RESOURCES AND ENVIRONMENTAL IMPACT GOALS
SUPPORT CREATION, MANAGEMENT, AND MONITORING OF COMPLIANCE FRAMEWORKS
NORMALIZE CORPORATE COMPLIANCE WITH EXTERNAL ENVIRONMENTAL REGULATIONS
RESPOND TO CONSUMER EXPECTATIONS THAT INDUSTRIES TAKE A HOLISTIC APPROACH TO SUSTAINING THE ENVIRONMENT
PARTICIPATE IN BUSINESS OPPORTUNITIES THAT SUSTAIN THE ENVIRONMENT
REDUCE THE CARBON FOOTPRINT BY MINIMIZING THE ENVIRONMENTAL IMPACT OF TECHNOLOGY
Sophistication of the Solution
Phase 1
Provides basic support for the most critical elements of the business driver
Phase 2
Provides adequate, typical support for critical and priority elements of the business driver
Phase 3Provides thorough, streamlined support for the business driver that enables differentiated levels of performanceSlide12
Solution Guidance
CONCEPTUAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIES
LOGICAL
ARCHITECTURE
CONCEPTUAL
ARCHITECTURE
MAPPINGPHASE DEFINITION
TECHNOLOGIES
LOGICAL
ARCHITECTURE
Phase Definition
For each business driver, list the business challenges, solution features, and business benefits for this solution phase. Use this information and the “Integrated Capability Support for Priority Business Capabilities” slides to structure the conversation with IT professional(s) for capturing, refining, and baselining business problems and solution functionality priorities.
Mapping
The Optimization mapping indicates the maturity level required for each capability to fully support the features specified in this solution phase. Use the mapping as a starting point to determine appropriate maturity levels for the solution. After mapping the solution, assess the gap between the current and desired infrastructure to:
Understand the scope and sequencing of work required
Organize a deployment road map
Technologies
Use the results of the Optimization mapping to determine the technologies required for the features and supporting capabilities specified in this solution phase.
Conceptual Architecture
Use this high-level, use case diagram to provide the “black box” definition of this solution phase. Customize to your solution definition during the integrated capability analysis.
Logical Architecture
Use this logical, component-level architecture view to show all software components and how they interact to support this solution phase. Tailor to fit your particular solution definition during the integrated capability analysis.
Note: Physical architecture is covered in the Architecture Guide also used during the integrated capability analysis.Slide13
Agenda
Recap Discussions to Date
Next Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize the Capability RequirementsSlide14
Phase 1
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
Business
DriverNeedsBusiness CapabilitiesReduce the carbon footprint by minimizing the environmental impact of technology
Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting
Make data centers more environmentally friendly
Manage utilization of distributed IT resources such as laptops, printers, and other devices
Allow workers to reduce travel by working remotely, sharing ideas, posting questions, and having general discussions
Promote the Energy Star program and Electronic Product Environmental Assessment Tool (EPEAT), resulting in lower equipment costs, less electrical consumption for server power and cooling, and less physical space for servers
Enable organizations to remotely monitor and maintain IT resources, visualize problems, and take proactive measures to reduce site visit costs
Measure and track internal resources and environmental impact goals
Establish resource utility baselines and the means to measure and report improvements
Empower customers to make ecologically friendly choices based on the reported environmental impact of products
Track and measure the impact of teleworking
Pull the right information and present it to executives and reporting authorities so they can quickly see issues visually and have an idea of the overall status of operations
Collaborate on and publish product design objectives, sourcing policies, packaging and transportation processes, disposal guidelines, internal models and calculation of value streams, and product carbon footprints
Allow managers to train and monitor employees to promote and evaluate remote workers’ effectiveness
Support creation, management, and monitoring of compliance frameworks
Give businesses incentives to comply with regulations, reduce carbon, save energy, and have workers commute less frequently
Pull together relevant regulatory compliance metrics about energy consumption, carbon footprint, and greenhouse gas emissions to identify ways to fund incentives and drive participation
Normalize corporate compliance with external environmental regulations
Ensure that organizations are informed and complying with environmental sustainability regulations
Define and convert to environmentally sustainable or Green processes that are agile and adaptable to future regulations
Give the compliance and audit team a consolidated view of environmental regulations, policies, and procedures to make critical information more easily available
Introduce consistency into environmentally sustainable or Green initiatives by driving awareness and making processes automated, repeatable, and reliableSlide15
Phase 1
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
Business
DriverNeedsBusiness CapabilitiesRespond to consumer expectations that industries take a holistic approach to sustaining the environment
Attract, hire, and retain workers in virtual workplaces
Improve the organization's image related to corporate social responsibility (CSR) by supporting measurable improvements in environmental sustainability and Green initiatives
Include Green technologies as a strategy that complements brand imageEmpower customers by providing incentives to be more environmentally aware and choose sustainable offerings
Hire and retain next-generation workers by providing a virtual office working environment that has optimized and secure access to critical applications, documents, and data
Increase customer awareness of the "Green code of conduct" the organization enforces in its core operations such as e-commerce, telecommuting, and other activities
Standardize the methodology for collection and assessment of data about energy consumption, carbon footprint, and greenhouse gas emissions to identify areas for improvement to the strategy to include Green technologies
Promote sustainable practices, environmentally preferable offerings, and ecologically efficient strategies to raise customer awareness of corporate involvement in Green initiatives
Participate in business opportunities that sustain the environment
Capturing the power and passion of employees to learn, share, and re-evaluate opportunities to sustain the environment, so the organization can implement opportunities that have the highest potential for impact and profit first
Address the risk of climate change for the business, supply chain, and target markets
Establish a carbon trading platform to plan and manage the carbon certificate inventory
Collect employee feedback and knowledge, share best practices, and learn from each other to protect and sustain the environment
Improve access to key operational and resource data across the organization to identify the regulatory, physical, and general risks that climate change poses to the business
Easily tap into information about carbon position, footprint, and liability stored in disparate data systems and develop key process indicators to quantify metrics for managing carbon certificate inventorySlide16
Phase 1: Core IO
B
S
R
D
Datacenter Mgt
and Virtualization
Data Center Mgt & Virtualization
A defined software library exists. Automated build with defined deployment and provisioning processes. Physical and virtual hardware, software, and consumption unit assets are reconciled and reported on demand (manual or automated), and tools and data repository are in place to track and audit assets. Capacity management processes are manual and reactive, resource utilization and capacity are monitored periodically. The organization actively uses virtualization to consolidate resources for production workloads. Some Production server resources are virtualized. A virtualized server pool is offered as a service. Performance monitoring of physical and virtual hardware with defined SLAs; health monitoring of applications; supported across heterogeneous environments with manual remediation. IT services are audited for compliance based on documented company and industry-standard policies (HIPAA, SOX, and PCI); reports are generated monthly. Services are available during server failure (e.g. server clustering, hot spares, and/or virtualization recovery solution). Users can only have visibility into specific VMs based on business units but manual security isolation exists between the VMs themselves.
Server Security
Malware protection is centrally managed across server operating systems within organizations, including the host firewall. Protection for select mainstream/non-custom applications and services (such as e-mail, collaboration and portal applications, instant messaging), if available, is centrally managed. Integrated perimeter firewall, IPS, Web security, gateway anti-virus, and URL filtering are deployed with support for server and domain isolation; network security, alerts, and compliance are integrated with all other tools to provide a comprehensive scorecard view and threat assessment across datacenter, application, organization, and cloud boundaries. Remote access is secure, standardized, and available to end users across the organization.
Networking
Redundant Domain Name System servers exist to provide fault tolerance. Dynamic Host Configuration Protocol servers are network-aware and with support for auto configuration. Using IPv6 with IPSec for secure private communication over public network.
Storage
Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite, with fully tested recovery or failover based on service-level agreements.
Device
Deployment and Management
Device Mgt & Virtualization
An image library and deployment process are in place for operating systems and/or applications. The majority of the installed client base has a minimum of one year of mainstream support remaining. Some applications are virtualized, but most are installed as packages or are included in the standard image. Desktop applications and system events are centrally monitored for critical desktop systems. Configurations are standardized; systems are assessed for compliance, and some settings are enforced through group policies. Hardware and software inventory is automated and reporting is centralized; information may not be complete or accurate, and typically is not used for decision-making; inventory is reconciled annually. A solution is in place to configure and update devices.
Device Security
Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall; non-PC devices are managed and protected through a separate process.
Identity
& Security
Services
Identity & Access
To control access, simple provisioning and de-provisioning exists for user accounts, mailboxes, certificates or other multi-factor authentication methods, and machines; access control is role-based. Federation exists for selected applications. For consumer facing applications, federating with public providers (such as Facebook). Password policies are set within a directory service to enable single sign on across boundaries for most applications. Password resets through internal tools or manual processes. There is a centralized group/role based access policy for business resources, managed through internal tools or manual processes. Most applications and services share a common directory for authentication across boundaries. Point-to-point synchronization exists across different directories.
Information Protection & Control
IT Process & Compliance
IT service portfolio aligns with individual business units; the IT service costs, returns, capacity, availability, continuity, and integrity are reported. IT policies are documented for each IT service. Each IT service has a formal definition of reliability. Each IT service has a process to manage bug handling and design changes; IT services are tested according to defined test plans based on specifications. IT service release and deployment processes are formally defined and consistently followed. Each IT service provides service-level and operational-level agreements. Processes to manage incidents are in place for each IT service. Monitoring, reporting, and notifications are centralized for protection against malware, protection of information, and identity and access technologies. Problem management processes are in place for each IT service, with self service access to knowledge base. Each IT service has its own change and configuration management process; standard changes are identified for each IT service. Ownership and accountability are assigned for each IT service. Risk and vulnerability are formally analyzed across IT services; IT compliance objectives and activities are defined and audited for each IT service. Defined orchestration with scripted processes to support manual execution. Location of data is compliant to local regulations.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide17
Phase 1: BPIO
B
S
R
D
Collaboration
Workspaces
Workspaces are managed at the departmental level and are available from individual productivity applications. Teams work on managed versions of content with controls and common space; team workspaces include group calendaring, shared contacts, user online presence, and simple workflows. Self service onboarding, integration with identity systems, training for users is mandatory and enforced.
Portals
Users and groups can publish content directly to some portals; workflow for review and approval is built-in and automated. Users have widgets to customize their views of information; enterprise search is integrated with portals. Portals (enterprise, departmental, and personal) are provisioned by IT and are deployed on a single productivity infrastructure; governance policies are fully in place, including single sign-on supported by uniform directory services.
Social Computing
Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This Content is accessible through multiple mobile devices. Rating, tagging, and bookmarking are used broadly to share opinions about all kinds of content and are available from within productivity applications that are used to create content. Personal profiles are available but cannot be customized; users can publish content on personal shared sites; people can be located based on profile information; the system sorts search results for people by users’ social graphs, which can be refined by using metadata; news feeds are typically delivered through RSS or e-mail alerts.
Project Mgt
Information access
Most unstructured information from intranets, e-mail, and content management repositories is indexed; some structured content from databases, people, and expertise information is indexed.
Interactive experience and navigation
A basic interactive search experience incorporates faceted and filtered information based on common or explicit metadata.
Messaging
The messaging solution (e-mail and calendar) includes basic anti-virus, anti-spam, and anti-phishing protection. Use of high availability technologies enables messaging system continuity at the server and service levels during outages. The e-mail platform supports message encryption (S/MIME) to enable digital signatures. Secure, remote, online and offline access to rich mailbox and calendar functionality exists inside and outside the firewall. IT manages mailbox provisioning by using a single directory. Users have separate discovery tools for live and archived mailbox data and must rely on the IT department to conduct searches.
Unified Communications
IM/Presence
Users have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall; peer-to-peer voice and video communications are based on a single directory. Online presence information (automatically refreshed user availability information based on communications, log-on, and calendar activities) is integrated into the e-mail client.
Conferencing
A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.
Voice
Voice communications are secure, encrypted, extended to remote and mobile workers using different mobile devices and integrated within enterprise productivity and collaboration platforms. Network techniques (quality of service and call admission control) provide preferential treatment for voice traffic within the corporate IP network. Call routing between sites is based on lowest cost.
Content Creation and Management
Information Mgt
Managed workspaces exist at the departmental level and are available from individual productivity applications. Metadata capture is enforced; however, the capture process is manual and labor-intensive. Web sites are built using off-the-shelf Web content management platforms; styles and templates are used consistently; content owners are empowered by technology to publish and manage their own information, but most still rely on Web specialists. The enterprise has inventoried content and put plans, policies, and procedures in place. Notions of information lifecycle management begin to get incorporated.
Process Efficiency
Custom solutions developed by IT are used to deliver and manage key forms electronically; form data and scanned paper-based content are stored in a custom data repository. The organization uses basic workflow tools to process, review, and approve documents; simple workflow routing is part of the collaborative workspace infrastructure.
Compliance
Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including e-mail; reporting occurs manually. Content is stored in a well-managed repository and disposition rules are appropriately applied; content can be rapidly identified and preserved; business relies heavily on outsourcing for review and processing of evidence.
Authoring
Users can intuitively preview, discard, or accept formatting and content; formatting can be saved in templates for reuse.
Multi-Device Support
Rich client, Web, and other applications have a consistent user interface paradigm that is optimized for usability and discoverability. Documents can be delivered or exchanged with high fidelity between all internal and most external users.
Interoperability
User Accessibility
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide18
Phase 1: APO
B
S
R
D
BI and Analytics Platform
Business Intelligence
Self-service reporting and analysis environment and tools established and maintained by IT. Access to data is decentralized but governed by IT with a well-defined process for stewardship and governance. Portals exist for dynamic reporting that supports rich report formats. Reports are generated with group or individual filter parameters and delivered via direct push or subscription and can vary by device. Users have the ability to share alerts and subscriptions with other users via limited collaboration and social networking. A standardized approach is in place for IT to provision data sources for access to users to search across structured and unstructured content. A basic interactive search experience is provided to users that incorporates filter information based on common or explicit metadata. From the BI portal, users are able to connect to internal and external data sources and combine them in a single report or data set for further analysis. Users can do sophisticated analysis and build rich BI applications using Excel or other analysis tools. BI portal has reporting and analysis capabilities that include exception highlighting, guided analysis, and predictive analysis with rich logic. Some level of automation is in place to render data pulled from enterprise systems on dashboards, but is used for only strategic or high profile projects. Dashboards have integrated interfaces to allow users to roll-up and drill-down on live data.
Data Warehouse Management
EDW is refreshed on a near real-time basis so that information is readily available to mission-critical applications, analytics, and reporting systems. A high degree of concurrency exists, with many users running complex queries and interacting with complex analytics tools simultaneously with data loading. Management and maintenance of storage, hardware, and supporting software is manual and ad hoc. Data mart data structures are optimized for local reporting and analysis performance and user understanding, including use of star/snowflake schemas. Data marts feed a centralized data warehouse that effectively relays information across most key areas of the business. Loading of data into data marts and from data marts to the enterprise data warehouse includes automated transformations to reconcile and validate the integrity of the data. Consistency in data warehouse operation and maintenance across distributed data marts is improved through use of common tools, policies, and sharing of best practices, driven by the EDW team. SLAs emerge. Data changes can be planned through standard impact analysis, and effective collaboration occurs across data mart and EDW teams. An IT-managed BI environment is in place and applications at the department level integrate with departmental data marts. IT designs, implements, and manages data schemas that are optimized for localized self-service reporting and analysis tools.
Big Data
Information Services and Marketplaces
Database and LOB Platform
Transaction Processing
Data Management
Key high-value data has associated formal data management policies and processes. Data governance may be recognized on a siloed basis, but not as a corporate discipline. Data and asset inventories and dependency relationships are manually documented periodically. Access policies for data and objects in databases are defined but not centralized, and do not reference data classifications. Administrative tasks are still performed using an over-privileged account. Security management is performed on a server-by-server basis. Systems are in place for retention backup. Organizational/departmental policies exist for how long items are stored and what is stored. Auditing is sparingly used or not used at all. Metrics focus on expiration dates for information, files, and other electronic forms to address known compliance risks.
Application Infrastructure
Custom Development
Internet Applications
User experience is a full part of the site development process, but refinements to the overall process can be made. Up-to-date versions of rich Internet technologies are used, and are often used appropriately, but not always (for example, plug-in based applications may be used to provide site navigation). Limited use of server-side scripting exists. Pages are written with separation of code and styling, and sites may have a variety of overlapping styles. Custom code is needed on-page to reach multiple browsers. Limited video infrastructure exists. One or more Web servers may be dedicated to progressive download or on-demand streaming. The site may use more than one video format and simple embedded players specific to different sections of their site. The site may also use rudimentary workflow for content publishing. Separate corporate communications and departmental video infrastructure exists with a combination of progressive download and streaming.
Component and Service Composition
Enterprise Integration
Development Platform
Standard application frameworks, messaging, and other application services aligned with standard application operating environments are appropriately and consistently employed by application development teams. Tools for major development activities are standardized across the organization, though practices and versions are not.
Application Lifecycle Management
Work-breakdown structures map estimated work to business value. Rudimentary metrics are used to manage project progress. Project managers aggregate data from standard status updates. Effective change management processes are in place. Testing has test harnesses and some automation, formal unit testing with good code coverage, and defined test strategy and processes. Explicit use of code quality tools typically occurs at the end of the development cycle. Processes are defined for debugging production defects and incidents, with a standard set of defect artifacts.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide19
Technology Guidance
Client Technologies
Microsoft
Office 2007 / 2010
Microsoft Office
Outlook 2007 / Microsoft Outlook 2010, Microsoft Office Word 2007 / Microsoft Word 2010, Microsoft Office Excel
2007 / Microsoft Excel 2010, Microsoft Office PowerPoint 2007 / Microsoft PowerPoint 2010
Microsoft Office
InfoPath 2007 / Microsoft InfoPath 2010Microsoft Office Visio
2007 / Microsoft Visio 2010Microsoft Office SharePoint Designer 2007 / Microsoft SharePoint Designer 2010
Microsoft Office Project 2007 / Microsoft Project 2010Microsoft Forefront
Endpoint Protection 2010 / Microsoft System Center 2012 Endpoint ProtectionWindows 7 / 8Microsoft Office Communicator 2007 R2 / Microsoft Lync 2010Microsoft Office Live Meeting 2007 Server TechnologiesMicrosoft Office SharePoint Server 2007 / Microsoft SharePoint Server 2010Windows SharePoint Services 3.0 / Microsoft SharePoint Foundation 2010Microsoft Exchange Server 2007 / 2010Microsoft Office Communications Server 2007 R2 / Microsoft Lync Server 2010Microsoft SQL Server 2008 R2 / 2012Microsoft Server SecurityMicrosoft Forefront Security for Exchange Server / Microsoft Forefront Protection 2010 for Exchange ServerMicrosoft Internet Security and Acceleration Server 2006 / Microsoft Forefront Threat Management Gateway 2010Microsoft Intelligent Application Gateway 2007 / Microsoft Forefront Unified Access Gateway 2010Microsoft Windows Server 2008 R2 / 2012Microsoft System CenterMicrosoft System Center Operations Manager 2007 R2 / Microsoft System Center 2012 Operations ManagerMicrosoft System Center Data Protection Manager 2010 / Microsoft System Center 2012 Data Protection ManagerMicrosoft System Center Configuration Manager 2007 R3 / Microsoft System Center 2012 Configuration Manager
Microsoft System Center Mobile Device Manager 2008 / Microsoft System Center 2012 Mobile Device
ManagerMicrosoft System Center Virtual Machine Manager 2008 R2 / Microsoft System Center 2012 Virtual Machine Manager
Microsoft System Center Service Manager 2010 / Microsoft System Center 2012 Service Manager
Opalis
/ Microsoft System Center 2012 Orchestrator
Microsoft
System Center 2012 App
Controller
Microsoft Desktop Optimization Pack 2011 / 2011
R2
Windows Embedded Device Manager
2011
Microsoft Windows Storage Server 2008 / 2008
R2
Microsoft Hyper-V
Server 2008 / 2008
R2
Microsoft Virtual Desktop Infrastructure
Suite
Microsoft Office Project Server 2007 / Microsoft Project Server
2010
Microsoft Office Project Portfolio Server
2007
Cloud
Technologies
BPOS / Microsoft Office
365
Microsoft Exchange
Online
Microsoft SharePoint
Online
Microsoft Office Communications Online / Microsoft
Lync
Online
Windows
Azure
platform
Windows
Azure
Active Directory Access
Control
Microsoft SQL Azure
Windows
Intune
Microsoft
Office Web
Apps
Microsoft Exchange Hosted
Services
Microsoft Online Backup Service
Development
Tools
Microsoft Visual Studio 2010 Team Foundation Server / Microsoft Visual Studio 11 Team Foundation
Server
Microsoft Visual Studio Team System 2008 / 2010 /
11
Microsoft
Expression
Studio 3 / 4
Tools, Add-ins, Libraries, and Frameworks
Microsoft Assessment and Planning Toolkit 6.0 /
6.5
Microsoft Security Assessment
Tool
Microsoft Software Inventory Analyzer 5.0 /
5.1
Microsoft Deployment Toolkit 2010 /
2012
Windows Automated Installation
Kit
Microsoft Security Compliance Management
Toolkit
Compliance Management Libraries
2.0
Data Classification
Toolkit
IT Governance, Risk and Compliance process management pack
2.0
Microsoft Windows
PowerShell 2.0Slide20
Phase 1: Core IO
B
S
R
D
Datacenter Mgt
and Virtualization
Data Center Mgt & Virtualization
Compliance Management Libraries / 2.0; Data Classification Toolkit; Hyper-V Server 2008 / 2008 R2; Hyper-V Server 2008 (Server Consolidation); Hyper-V Server 2008 R2 (Server Consolidation); Hyper-V Server 2008 / 2008 R2 Standard; IT Governance, Risk and Compliance process management pack; IT Governance, Risk and Compliance process management pack 2.0; Microsoft Assessment and Planning Toolkit 6.0 / 6.5; Microsoft Deployment Toolkit 2010 / 2012; Microsoft Software Inventory Analyzer 5.0 / 5.1; Opalis; Security Compliance Management Toolkit; Security Compliance Manager / 2.x; Software Asset Management; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Windows Automated Installation Kit; Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Hyper-V); Windows Server 2008 R2 (Hyper-V, Clustering, and Network Load Balancing); Windows Server 2008 R2 (Windows Deployment Services); Windows Server 2008 R2 Enterprise / Datacenter (Hyper-V); Windows Server 2008 R2 Standard / Enterprise (Hyper-V)
Server Security
Forefront Endpoint Protection 2010; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Forefront Threat Management Gateway 2010 (Virtual Private Network); Forefront Threat Management Gateway 2010 (Web antivirus/anti-malware protection, Network Inspection System); Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Internet Security and Acceleration Server 2006 (Multi-Networking); Internet Security and Acceleration Server 2006 (Virtual Private Network); System Center 2012 Endpoint Protection; Windows Azure; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Windows Firewall with Advanced Security); Windows Server 2008 R2 Enterprise (Network Policy and Access Services); Windows Server 2012
Networking
Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Dynamic Host Configuration Protocol server)
Storage
Microsoft Online Backup Service; System Center 2012 Data Protection Manager; System Center Data Protection Manager 2010; Windows Server 2008 R2 (Backup and recovery); Windows Server 2012 (Backup/Recovery, Hyper-V Replica); Windows Storage Server 2008 (Backup and recovery); Windows Storage Server 2008 R2 (Backup and recovery)
Device
Deployment and
Management
Device Mgt & Virtualization
Exchange Server 2007 / 2010; Microsoft Deployment Toolkit 2010 / 2012; Microsoft Desktop Optimization Pack 2011 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 (Desktop Error Monitoring); Microsoft Desktop Optimization Pack 2011 R2 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 R2 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 R2 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 R2 (Desktop Error Monitoring); Software Asset Management; System Center 2012 Configuration Manager; System Center 2012 Mobile Device Manager; System Center 2012 Operations Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Mobile Device Manager 2008; Virtual Desktop Infrastructure Suite; Windows 7 / 8; Windows Automated Installation Kit; Windows Azure; Windows Embedded Device Manager 2011; Windows Intune; Windows Intune (applications only); Windows Server 2008 R2 (Remote Desktop Services); Windows Server 2012 (Remote Desktop Services)
Device Security
Forefront Endpoint Protection 2010; System Center 2012 Endpoint Protection; Windows 7 (Firewall); Windows 8; Windows Intune; Windows Server 2008 R2 / 2012
Identity
& Security
Services
Identity & Access
Windows Azure; Windows Azure (Active Directory Access Control); Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2008 R2 (Active Directory Domain Services, Group Policy); Windows Server 2008 R2 Standard (Active Directory Lightweight Directory Services, WS-Federation, WS-Trust); Windows Server 2012
Information Protection & Control
IT Process & Compliance
Compliance Management Libraries / 2.0; Data Classification Toolkit; Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010; Hyper-V Server 2008 / 2008 R2; Internet Security and Acceleration Server 2006; IT Governance, Risk and Compliance process management pack; IT Governance, Risk and Compliance process management pack 2.0; Microsoft Security Assessment Tool; Office Project Portfolio Server 2007 (prioritize and evaluate competing investments); Office Project Professional 2007; Office Project Server 2007; Office SharePoint Server 2007; Opalis; PowerShell 2.0; Project Professional 2010; Project Server 2010; Security Compliance Manager / 2.x; SharePoint Server 2010; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Endpoint Protection; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Windows Azure; Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2012
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide21
Phase 1: BPIO
B
S
R
D
Collaboration
Workspaces
Exchange Server 2007 / 2010; Lync 2010; Lync Server 2010; Office 2007 (client integration with SharePoint); Office 2010 (client integration with SharePoint); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (integrated presence, Outlook Web Access Web Parts, news and announcement Web Parts, out-of-the-box workflow); SharePoint Designer 2007 (Workflows); SharePoint Designer 2010 (Workflows); SharePoint Online (client integration, templates and Web Parts, presence, synch with Outlook, standard workflows); SharePoint Online (document workspaces, client integration); SharePoint Online P1 / P2; SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (document workspaces); SharePoint Server 2010 (integrated presence, Outlook Web Access Web Parts, news and announcement Web Parts, out-of-the-box workflow)
Portals
Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (out-of-the-box workflows, My Sites); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (widgets, search); SharePoint Designer 2007 (out-of-the-box content publishing workflows); SharePoint Designer 2010 (out-of-the-box content publishing workflows); SharePoint Online (My Sites, standard workflows, site search); SharePoint Online (site manager); SharePoint Online (site search); SharePoint Online P1 / P2; SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (out-of-the-box workflows, My Sites); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (widgets, search)
Social Computing
Office 2007; Office 2010 (content tagging within applications); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (My Sites, RSS content syndication, e-mail alerts and notifications); Office SharePoint Server 2007 (wikis, blogs, discussion boards, customized sites); SharePoint Online (e-mail alerts and notifications, RSS content syndication, My Sites); SharePoint Online (surveys, blogs, wikis); SharePoint Online P1 / P2; SharePoint Server 2010 (My Sites, RSS content syndication, e-mail alerts and notifications); SharePoint Server 2010 (rating, tagging, bookmarks, keywords, comments); SharePoint Server 2010 (wikis, blogs, discussion boards, customized sites)
Project Mgt
Information access
Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (out-of-the-box indexing connectors, search filters); SharePoint Online (search across enterprise content sources); SharePoint Online P1 / P2; SharePoint Server 2010 (out-of-the-box indexing connectors, search filters)
Interactive experience and navigation
Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (faceted search, filtering, navigation); SharePoint Online (faceted search, filtering); SharePoint Online P1 / P2; SharePoint Server 2010 (faceted search, filtering, navigation)
Messaging
Exchange Hosted Encryption; Exchange Online; Exchange Online Kiosk; Exchange Online P1 / P2; Exchange Server 2007 / 2010; Office 365 E1 / E2 / E3 / E4 / K1 / K2; Outlook 2007 / 2010; Outlook Web Access 2007; Outlook Web Access 2010
Unified Communications
IM/Presence
Exchange Online; Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Outlook 2007 (integrated presence indicator); Outlook 2010 (integrated presence indicator)
Conferencing
Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office Live Meeting 2007; Outlook 2007 (integrated conferencing); Outlook 2010 (integrated conferencing)
Voice
Lync 2010; Lync Online; Lync Server 2010; Office 365 E4 (Requires On-Prem Infrastructure and Lync Server 2010); Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2
Content Creation and Management
Information Mgt
Office 2007 (document information panel); Office 2010 (Backstage); Office 2010 (Backstage, auto discover document repository); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (metadata capture); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (Web content editor, master pages, page layouts, controls); SharePoint Designer 2007 (SharePoint site customization, intuitive design interface); SharePoint Designer 2010 (SharePoint site customization, intuitive design interface); SharePoint Online (document workspace); SharePoint Online (metadata); SharePoint Online (site manager); SharePoint Online (Web content editor, master pages, page layouts, controls); SharePoint Online P1 / P2; SharePoint Server 2010 (document workspace); SharePoint Server 2010 (metadata capture); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (Web content editor, master pages, page layouts, controls)
Process Efficiency
Office 2007 (InfoPath 2007: form templates); Office 2007 (workflow integration); Office 2010 (InfoPath 2010: form templates); Office 2010 (workflow integration through Backstage); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (form libraries, forms development environment, forms solutions repository); Office SharePoint Server 2007 (out-of-the-box workflows); SharePoint Designer 2007 / 2010; SharePoint Online (form libraries); SharePoint Online (out-of-the-box workflows); SharePoint Online P1 / P2; SharePoint Server 2010 (form libraries, forms development environment, forms solutions repository, form layout templates); SharePoint Server 2010 (out-of-the-box workflows)
Compliance
Office 365 E3 / E4; Office SharePoint Server 2007 (records center); Office SharePoint Server 2007 (records repository); SharePoint Online (records center); SharePoint Online (records repository); SharePoint Server 2010 (records center); SharePoint Server 2010 (records repository)
Authoring
Office 2007; Office 2010 (copy/paste improvements with Live Preview, Office Backstage, paste galleries, insertion of screenshots; Word: document map, photo masking and cropping); Office 365 E3 / E4; Visio 2007 (brainstorming diagram, business templates); Visio 2010 (brainstorming diagram, business templates)
Multi-Device Support
Office 2007; Office 2007 (rendering fidelity investments, encrypted document integrity check); Office 2010 (Fluent UI); Office 2010 (rendering fidelity investments, encrypted document integrity check); Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office SharePoint Server 2007; SharePoint Server 2010 (Fluent UI); Visio 2007; Visio 2010 (rich client, share diagrams with others on the web)
Interoperability
User Accessibility
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide22
Phase 1: APO
B
S
R
D
BI and Analytics Platform
Business Intelligence
Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Professional 2010 (Excel 2010); Office SharePoint Server 2007; PivotViewer; Power View; PowerPivot; Report Builder; SharePoint 2010 Enterprise (Excel Services, PerformancePoint Services, Visio Services); SharePoint 2010 Enterprise (Activity Feeds, Visio Services); SharePoint 2010 Standard; SharePoint Foundation 2010; SharePoint Online; SQL Azure; SQL Azure Reporting; SQL Server 2008 R2 / 2012; SQL Server Analytic Services; SQL Server Reporting Services; Visio 2007 / 2010
Data Warehouse Management
SQL Server 2008 / 2008 R2; SQL Server 2008 R2 Parallel Data Warehouse; SQL Server 2012; Visual Studio 11; Visual Studio 2008 (BI Development Studio); Visual Studio 2010
Big Data
Information Services and Marketplaces
Database and LOB
Platform
Transaction Processing
Data Management
Office Professional 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Server 2005 / 2008 / 2008 R2; SQL Server 2012
Application Infrastructure
Custom Development
Internet Applications
Microsoft .NET Framework; Expression Studio 3 / 4; Expression Web 4; Internet Information Services (IIS) 6 / 7 / 8; Office SharePoint Server 2007; SharePoint 2010; Silverlight; Visual Studio 11; Visual Studio 2008 / 2010; Visual Studio 2010 Premium; Visual Studio 2010 Professional
Component and Service Composition
Enterprise Integration
Development Platform
Visual Studio Team Foundation Server 2010
Application Lifecycle Management
Office Professional 2010; Project 2010; Visual Studio 11; Visual Studio 11 Team Foundation Server; Visual Studio 2008 / 2010; Visual Studio 2010 Premium; Visual Studio Team Foundation Server 2010
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide23
CONCEPTUAL
ARCHITECTURE
Phase 1
MAPPING
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITION
CONCEPTUAL
ARCHITECTURESlide24
Phase 1
LOGICAL
ARCHITECTURE
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
MAPPING
PHASE
DEFINITION
LOGICAL
ARCHITECTURESlide25
Agenda
Recap Discussions to Date
Next Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize the Capability RequirementsSlide26
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
Business
Driver
Needs
Business CapabilitiesReduce the carbon footprint by minimizing the environmental impact of technology
Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting
Make data centers more environmentally friendly
Manage utilization of distributed IT resources such as laptops, printers, and other devices
Securely conduct online meetings and training, and enable workers to collaborate in real time regardless of geography to reduce office space requirements and the need for inter-office and customer-related travel
Consolidate multiple workloads onto one platform and make data centers more environmentally friendly
Streamline processes to improve tracking and control of old and outdated equipment and to help ensure correct disposal or recycling of equipment and other consumables
Measure and track internal resources and environmental impact goals
Establish resource utility baselines and the means to measure and report improvements
Empower customers to make ecologically friendly choices based on the reported environmental impact of products
Track and measure the impact of teleworking
Provide rich visualization of resource metrics to help executives and reporting authorities rapidly identify trends and issues for better predictive analysis
Provide collaboration portals for suppliers' approvals and receiving submission requirements of carbon footprint and compliance data
Allow for analysis and reporting in near real time to gain visibility and insight into and control over productivity across all employees who work from home
Improve alignment with business strategy by maximizing the ways resources are used
Support creation, management, and monitoring of compliance frameworks
Give businesses incentives to comply with regulations, reduce carbon, save energy, and have workers commute less frequently
Accelerate collaboration and information exchange to share best practices and learning, to raise awareness for compliance regulations
Normalize corporate compliance with external environmental regulations
Ensure that organizations are informed and complying with environmental sustainability regulations
Define and convert to environmentally sustainable or Green processes that are agile and adaptable to future regulations
Enable compliance awareness and adoption while monitoring compliance and generating alerts to be aware of every non-compliance issue
Enable business stakeholders to design, interact with, monitor, innovate, and automate compliance processes and drive collaboration across the organization
Phase 2Slide27
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
Business
Driver
Needs
Business CapabilitiesRespond to consumer expectations that industries take a holistic approach to sustaining the environment
Attract, hire, and retain workers in virtual workplaces
Improve the organization's image related to corporate social responsibility (CSR) by supporting measurable improvements in environmental sustainability and Green initiatives
Include Green technologies as a strategy that complements brand imageEmpower customers by providing incentives to be more environmentally aware and choose sustainable offerings
Provide remote workers with the ability to communicate in real time with peers and customers even while on the go
Strengthen the organization's web presence by branding products and services with specific environmentally friendly attributes such as recyclable or biodegradable, or by establishing measurable sustainability baselines and improvements
Implement environmentally sustainable business policies and practices to align Green initiatives with the brand image
Provide customers the ability to share ideas, give feedback, and suggest improvements to sustainable offerings, including products and services, to keep customers engaged
Participate in business opportunities that sustain the environment
Capturing the power and passion of employees to learn, share, and re-evaluate opportunities to sustain the environment, so the organization can implement opportunities that have the highest potential for impact and profit first
Address the risk of climate change for the business, supply chain, and target markets
Establish a carbon trading platform to plan and manage the carbon certificate inventory
Make the knowledge base and portal infrastructure available to more people within and outside the organization to improve collaboration
Provide the ability to analyze metrics related to energy usage, carbon emissions, water inefficiencies, and greenhouse gas emissions to make informed risk assessments
Enable workers to monitor key performance indicators that are linked to various systems to help initiate processes such as carbon trading
Phase 2Slide28
Phase 2: Core IO
B
S
R
D
Datacenter Mgt
and Virtualization
Data Center Mgt & Virtualization
Software and configuration library is maintained at current update levels with version control and auditing on demand. Automated build and deployment with consistent provisioning processes integrated with software and configuration library that includes virtual images; on demand reporting; self service portal for IT or end users to deploy. The IT asset life cycle is automated, and managed using policies, procedures, and tools; management of assets and thresholds are based on automated inventory information. Service capacity and resource utilization are monitored continuously; analysis tools are used to predict the impact of proposed changes (software, hardware, usage, and topology); Workloads can be relocated manually. Chargeback is consumption based. The organization has a consolidated view and a consolidated management process across heterogeneous virtual environments, including branch offices. Performance monitoring of applications as well as physical and virtual hardware pools with enforceable SLAs; Service health monitoring with consistent reporting across heterogeneous environments. Policy enforcement occurs in near real time based on company and industry-standard polices that allow for immediate quarantine of non-compliant systems, and consistent compliance reporting and standards exist across all IT services. There are multiple levels of service availability clustering or load balancing. Virtualization and management is used to dynamically move applications and services when issues arise with datacenter compute, storage and network resources.
Server Security
Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.
Networking
Redundant Domain Name System servers exist on a separate network to provide fault tolerance and isolation, including ability to do zone transfer across boundaries.
Storage
Critical data is backed up by taking snapshots using a centralized, application-aware system.
Device
Deployment and Management
Device Mgt & Virtualization
The majority of the installed client base has a combination of current and recently released operating systems. Desktop applications and system events are centrally monitored and reported, and trends are analyzed and integrated into incident management systems. Mobile device access configuration is automated and is pushed over-the-air. A solution is in place to automatically identify devices to deploy, configure, and update while maintaining device security. Mobile devices are managed by security policy provisioning (such as personal identification numbers) and remote wipe. Installation and inventory of standard corporate applications on mobile devices are manual. All mobile access to internal systems is through a proxy technology (such as a messaging system and/or selective SSL).
Device Security
Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.
Identity
& Security
Services
Identity & Access
Provisioning and de-provisioning of user and super-user accounts, certificates, and/or multi-factor authentication is automated. Centralized IT offering of Federation services. Multiple Federation and trust relations between separate organizations 1 to 1 relationship. Multi-factor and certificate-based authentication are applied in some scenarios, such as remote access across boundaries (such as On Prem and Cloud). Self service password resets supported. A centralized, group/role based access policy is defined for business resources, applications, and information resources, managed through industry accepted processes. A scalable directory that is integrated and automatically synchronizes with all remaining directories across multiple geographies and isolated domains for all applications with connectivity to cloud when applicable.
Information Protection & Control
Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and e-mail); policy templates are used to standardize rights and control access to information. Reporting is predefined for select server and back-office waypoints.
IT Process & Compliance
The IT service portfolio is aligned with the organization; management regularly reviews how the service portfolio and strategy align, and reports costs and returns across IT services. IT policies are integrated across all IT services, enabling or restricting use of resources as appropriate. Definitions of reliability for IT services are integrated across IT services and enforceable. IT service issues and design changes are tracked by using formal processes; testing is automated where possible. IT service release processes are uniform across IT services; deployment is automated and offers self service where possible; management reviews each service for readiness to release before deployment. Service-level and operational-level agreements are integrated for IT services; management reviews operational health regularly; some tasks are automated. Processes to manage incidents are integrated across IT services via self service where appropriate. Monitoring and flexible, tenant/service reporting are aggregated across individual areas for protection against malware, protection of information, and identity and access technologies. Problem management processes are integrated across IT services, with incident management integration. The change and configuration management process is integrated across IT services; standard changes are identified across IT services and automated with self service where possible. Ownership and accountability assignments are integrated across all IT services. Risk and vulnerability analysis is integrated across all IT services; IT compliance objectives and activities are integrated across IT services and automated where possible; management regularly audits to review policy and compliance. Comprehensive service life cycle orchestration that is automated for some workloads.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide29
Phase 2: BPIO
B
S
R
D
Collaboration
Workspaces
Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices; offline synchronization is supported. Team members can simultaneously author, edit, and review content across Clients (including Devices).
Portals
Publishers can direct content to specific audience targets; portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity, role, and device on which content is consumed. Users get targeted information based on their profiles, their roles in the organization, and mobile devices being used. Line-of-business applications are routinely surfaced through the portal and have the capability to write securely to back-end systems and to maintain data integrity; information from multiple applications can be combined in dashboards.
Social Computing
Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This Content is accessible through multiple mobile devices. Rating, tagging, and bookmarking are used broadly to share opinions about all kinds of content and are available from within productivity applications that are used to create content. Personal profiles are available but cannot be customized; users can publish content on personal shared sites; people can be located based on profile information; the system sorts search results for people by users’ social graphs, which can be refined by using metadata; news feeds are typically delivered through RSS or e-mail alerts.
Project Mgt
Teams plan, track, and share tasks in lists by using collaboration tools; multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.
Information access
Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed; indexing processes incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience; structured data is incorporated and exposed in search-driven applications.
Interactive experience and navigation
An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.
Messaging
The messaging solution includes anti-spam, anti-phishing, and multiple-engine anti-virus protection. The e-mail platform supports advanced, policy-driven message controls that include automatic application of rights protection. Secure, policy-driven access to a unified inbox from PCs, phones, and Web browsers exists inside and outside the firewall. Provisioning of user inboxes is driven by business demand, uses a single directory, and provides features based on user needs.
Unified Communications
IM/Presence
Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.
Conferencing
A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.
Voice
Voice mail is part of a unified inbox that features single storage and a unified directory; retention and protection policies are enforced by the organization; messages are available as voice or transcribed text and are accessible from PCs, phones, or Web browsers. There is an intelligent, adaptive media stack on phone and PC endpoints to enable high-quality voice communications even on unmanaged networks (such as the Internet). Call routing within an organization is based on identity and online presence. Redundant call control servers within a cluster or pool provide resilience when failure occurs at a single point.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide30
Phase 2: BPIO Continued
B
S
R
D
Content Creation and Management
Information Mgt
Traditional and new media content types are managed consistently in a single repository that has integrated workflow. Metadata is centrally managed and deployed across the business; metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created, published, and managed by business owners who use appropriate publishing workflows to govern review cycles. Content is managed pervasively throughout the enterprise—albeit in diverse systems. Applicable retention schedules have been applied to all critical electronic content.
Process Efficiency
Users are empowered to create and deploy electronic forms by using visual design tools; data from forms (stored in an open format) and scanned paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications. The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications; people can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time.
Compliance
Policy management is based on content type, location, and document libraries, and includes adherence of content used offline; an integrated solution for electronic discovery of information is in place; retention policies and holds on records are automated. All information is well managed in accordance with government and industry regulations; content can be rapidly identified and preserved, and the in-house aspect of the discovery process is managed by automated workflow; some content resulting from electronic discovery is initially refined in-house to reduce the volume of content given to external council.
Authoring
Content authoring tools support rich formatting and rich media editing, and content can be secured with rights management by users. Content is efficiently reused without loss of context across applications that have different purposes; templates are centrally manageable. Tools are available to capture notes and research gathered by using search.
Multi-Device Support
Application user interfaces are customizable at the user and organizational levels for optimal flexibility in user experience and IT control. Key applications support optimized usage scenarios; for example, Web for reach, rich client for responsiveness, and phone for mobility. Documents can be viewed and edited through optimized modes (such as PC, phone, or browser) without significant formatting or data loss.
Interoperability
User Accessibility
Productivity applications are designed to facilitate use by people who need accessibility features. Core productivity applications offer standards-based tools for users to confirm accessibility of content.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide31
Phase 2: APO
B
S
R
D
BI and Analytics Platform
Business Intelligence
Users search for unstructured documents and structured reports based on metadata and content of reports. Using search on the BI portal allows users to find data, analyses, and reports, and users can launch tools for self service report generation and analysis from the search interface. Dashboards are consistently used to provide operational and strategic views of the business from real time or periodically refreshed data. BI portal experience has rich visualizations, dashboards and scorecards with full data interactivity (slicing, filtering, etc.) consistent with self service reporting and analysis tools. Users have the ability to create unique personal and/or shared views of data that are actually combinations of multiple views (i.e. mashups). IT provisions and provides access to infrastructure, statistical analysis and data mining tools, and common sanctioned data sources to Data Analyst roles to analyze business data and build models to enable future decisions, predict trends, find correlations in business attributes, etc. Data Analysts publish the results of their analyses to business users via reports, spreadsheets, charts, visualizations, etc.
Data Warehouse Management
Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed. Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.
Big Data
Information Services and Marketplaces
Database and LOB Platform
Transaction Processing
Data Management
Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores. Adherence to stringent corporate or government regulatory compliance is a top priority. Reports are easily generated and viewed and greatly facilitate compliance audits for protection of data-at-rest and data-in-transit, and compensating controls are available.
Application Infrastructure
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide32
Phase 2: APO Continued
B
S
R
D
Custom Development
Internet Applications
Pages are dynamic and database-driven, and may use some templates for replication of content across them. Custom coding is needed to work on different browsers. Dedicated media delivery servers and standardized publishing processes are in place with some consolidation around a single media format and may include support for some social networking features. The site may use external vendors to handle delivery of live streaming broadcasts to shareholders. Enterprise portals and possibly CMS are in use to store, manage, and distribute video content. Some workflow processes may be in place and multicast may be enabled. The site may use or integrate third-party solutions.
Component and Service Composition
Along with IT, business units are becoming suppliers of reusable assets and realize that they can empower their users by connecting services and experience, building upon the assets that the central IT team provides and by creating their own. Creation of LOB extension applications can be accomplished without a lot of custom code and through the assembly of existing components. There is a designated tool for the creation of composite LOB extension in addition to the integration with advanced developer tools. However, other tools continue to exist for different functional purposes like workflow, UI creation, etc. The organization overall realizes that services and UI needs to blend, start rationalizing which UI standard they will be driving to, and move to a point where every service has a “face” that is consumable for composing new applications. End users can share their created solutions back to the repository. Mechanisms exist to allow for ranking and rating of solutions and components. A managed central repository of all configuration items, assets, and systems provides dependency maps, reporting, and metrics for development and operations teams across the organization to manage integrations, performance, and scale.
Enterprise Integration
Use of standardized processes for data integration is at the project level and technologies are used to improve back-end integration. The business leverages an integration broker running on-premises to connect to cloud applications using adapters. Reusable integration components are developed for custom development on an ad hoc basis. Project management is centralized for application integrations.
Development Platform
The organization has selected and implemented a common set of frameworks for major application development and operating environment needs. Developer skill and use of standard frameworks is consistent. A central architecture and engineering practices group has formed with the participation of development and operations teams, and provides valuable guidance to development teams. A standard set of tools and common development approaches are used across multiple development teams in the organization. Application customization is performed through customization support offered by the application, on an isolated project basis with no standard approaches or consideration for future maintenance or integration.
Application Lifecycle Management
Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide33
Technology Guidance
Client Technologies
Microsoft
Office 2007 / 2010
Microsoft Office
Outlook 2007 / Microsoft Outlook 2010, Microsoft Office Word 2007 / Microsoft Word 2010, Microsoft Office Excel
2007 / Microsoft Excel 2010, Microsoft Office PowerPoint 2007 / Microsoft PowerPoint 2010
Microsoft Office
InfoPath 2007 / Microsoft InfoPath 2010Microsoft Office Visio
2007 / Microsoft Visio 2010
Microsoft Office Groove 2007 / Microsoft SharePoint Workspace 2010
Microsoft Office SharePoint Designer 2007 / Microsoft SharePoint Designer 2010Microsoft Office Project 2007 / Microsoft Project 2010Windows Phone 7.5 / 8Microsoft Office Mobile 2010Microsoft Forefront Endpoint Protection 2010 / Microsoft System Center 2012 Endpoint ProtectionWindows 7 / 8Microsoft Office Communicator 2007 R2 / Microsoft Lync 2010Microsoft Office Live Meeting 2007 Server TechnologiesMicrosoft Office SharePoint Server 2007 / Microsoft SharePoint Server 2010Microsoft FAST Search Server 2010 for SharePointWindows SharePoint Services 3.0 / Microsoft SharePoint Foundation 2010Microsoft Exchange Server 2007 / 2010Microsoft Office Communications Server 2007 R2 / Microsoft Lync Server 2010Microsoft SQL Server 2008 R2 / 2012
Microsoft Server Security
Microsoft Forefront Security for SharePoint / Microsoft Forefront Protection 2010 for SharePointMicrosoft
Forefront Security for Exchange Server / Microsoft Forefront Protection 2010 for Exchange Server
Microsoft Forefront Security for Office Communications
Server
Microsoft
Internet Security and Acceleration Server 2006 / Microsoft Forefront Threat Management Gateway
2010
Microsoft Intelligent Application Gateway 2007 / Microsoft Forefront Unified Access Gateway
2010
Microsoft Forefront Identity Manager 2010 / 2010 R2
Microsoft Windows Server 2008 R2 /
2012
Microsoft System Center
Microsoft System Center Operations Manager 2007 R2 / Microsoft System Center 2012 Operations Manager
Microsoft System Center Data Protection Manager 2010 / Microsoft System Center 2012 Data Protection Manager
Microsoft System Center Configuration Manager 2007 R3 / Microsoft System Center 2012 Configuration Manager
Microsoft System Center Mobile Device Manager 2008 / Microsoft System Center 2012 Mobile Device
Manager
Microsoft System Center Virtual Machine Manager 2008 R2 / Microsoft System Center 2012 Virtual Machine Manager
Microsoft System Center Service Manager 2010 / Microsoft System Center 2012 Service
Manager
Opalis
/ Microsoft System Center 2012
Orchestrator
Microsoft System Center 2012 App
Controller
Microsoft Desktop Optimization Pack 2011 / 2011
R2
Windows Embedded Device Manager
2011
Microsoft Windows Storage Server 2008 / 2008
R2
Windows Server
AppFabric
Microsoft
Hyper-V
Server 2008 / 2008
R2
Microsoft Virtual Desktop Infrastructure
Suite
Microsoft Office Project Server 2007 / Microsoft Project Server
2010
Microsoft Office Project Portfolio Server
2007
Microsoft
BizTalk
Server 2009 / 2010
Cloud Technologies
BPOS / Microsoft Office
365
Microsoft Exchange
Online
Microsoft SharePoint
Online
Microsoft Office Communications Online / Microsoft
Lync
Online
Microsoft Forefront Online Protection for
Exchange
Windows
Azure platform
Windows
Azure
Active Directory Access
Control
Microsoft SQL Azure
Windows
Intune
Microsoft
Office Web
Apps
Microsoft Exchange Hosted
Services
Microsoft Online Backup Service
Development
Tools
Microsoft .NET
Framework
Microsoft
Visual Studio 2010 Team Foundation Server / Microsoft Visual Studio 11 Team Foundation
Server
Microsoft Visual Studio Team System 2008 / 2010 /
11
Microsoft
Expression
Studio 3 / 4
Tools, Add-ins, Libraries, and Frameworks
Microsoft Assessment and Planning Toolkit 6.0 /
6.5
Microsoft Security Assessment
Tool
Microsoft Software Inventory Analyzer 5.0 /
5.1
Microsoft Deployment Toolkit 2010 /
2012
Windows Automated Installation
Kit
Microsoft Security Compliance Management
Toolkit
Compliance Management Libraries
2.0
Windows SDK
Data Classification
Toolkit
IT Governance, Risk and Compliance process management pack
2.0
Microsoft Windows
PowerShell 2.0
BizTalk ESB
Toolkit
Category Products
Microsoft Dynamics AX 2009 /
2012Slide34
Phase 2: Core IO
B
S
R
D
Datacenter Mgt
and Virtualization
Data Center Mgt & Virtualization
Compliance Management Libraries / 2.0; Data Classification Toolkit; Hyper-V Server 2008 / 2008 R2; Hyper-V Server 2008 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 Enterprise; Hyper-V Server 2008 R2 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 R2 Enterprise; IT Governance, Risk and Compliance process management pack / 2.0; Microsoft Assessment and Planning Toolkit 6.0 / 6.5; Microsoft Deployment Toolkit 2010 / 2012; Opalis; Security Compliance Manager / 2.x; Software Asset Management; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; System Center Virtual Machine Manager 2008 R2 (Offline Virtual Machine Servicing Tool 2.1); Windows Automated Installation Kit; Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Hyper-V); Windows Server 2008 R2 (Hyper-V, Clustering, and Network Load Balancing); Windows Server 2008 R2 (Windows Deployment Services); Windows Server 2008 R2 Enterprise / Datacenter (Hyper-V)
Server Security
Forefront Endpoint Protection 2010; Forefront Protection 2010 for Exchange Server; Forefront Protection 2010 for SharePoint; Forefront Security for Exchange Server; Forefront Security for Office Communications Server; Forefront Security for SharePoint; Forefront Threat Management Gateway 2010 (Virtual Private Network); Forefront Threat Management Gateway 2010 (Web antivirus/anti-malware protection, Network Inspection System); Forefront Unified Access Gateway 2010; Forefront Unified Access Gateway 2010 (Endpoint access controls); Intelligent Application Gateway 2007; Intelligent Application Gateway 2007 (Endpoint and Access Security); Internet Security and Acceleration Server 2006 (Multi-Networking); Internet Security and Acceleration Server 2006 (Virtual Private Network); System Center 2012 Endpoint Protection; Windows Azure; Windows Server 2008 R2 (Windows Firewall with Advanced Security); Windows Server 2008 R2 Enterprise (Network Policy and Access Services); Windows Server 2008 R2 Enterprise (Windows Firewall, Network Policy, and Access Services); Windows Server 2012
Networking
Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Dynamic Host Configuration Protocol server)
Storage
System Center 2012 Data Protection Manager; System Center Data Protection Manager 2010; Windows Server 2012 (Hyper-V Replica)
Device
Deployment and
Management
Device Mgt & Virtualization
Exchange Server 2007 / 2010; Exchange Server 2007 (ActiveSync); Exchange Server 2010 (ActiveSync); Microsoft Deployment Toolkit 2010 / 2012; Microsoft Desktop Optimization Pack 2011 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 (Desktop Error Monitoring); Microsoft Desktop Optimization Pack 2011 R2 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 R2 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 R2 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 R2 (Desktop Error Monitoring); Software Asset Management; System Center 2012 Configuration Manager; System Center 2012 Mobile Device Manager; System Center 2012 Operations Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Mobile Device Manager 2008; System Center Mobile Device Manager 2008 (Enrollment Auto Discovery); System Center Operations Manager 2007 R2; Virtual Desktop Infrastructure Suite; Windows 7 / 8; Windows Automated Installation Kit; Windows Azure; Windows Embedded Device Manager 2011; Windows Intune; Windows Intune (applications only); Windows Intune (Exchange ActiveSync Integration); Windows Intune (Self Service Portal); Windows Phone 7.5 / 8; Windows Server 2008 R2 (Remote Desktop Services); Windows Server 2012 (Remote Desktop Services)
Device Security
Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010 (Network Inspection System); Internet Security and Acceleration Server 2006; System Center 2012 Endpoint Protection; Windows 7 (Firewall); Windows 8; Windows Intune; Windows Intune (not for non-PC devices); Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Network Access Protection)
Identity
& Security
Services
Identity & Access
Forefront Identity Manager 2010 (Credential Management); Forefront Identity Manager 2010 (Policy Management); Forefront Identity Manager 2010 (User Management); Forefront Identity Manager 2010 R2; Hyper-V Server 2008 (Read-Only Domain Controller); Hyper-V Server 2008 R2 (Read-Only Domain Controller); Windows 7 / 8; Windows Azure; Windows Azure (Active Directory Access Control); Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2008 R2 (Active Directory Domain Services, Group Policy); Windows Server 2008 R2 (Active Directory Domain Services, Read-Only Domain Controller); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Certificate Services); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Federation Services); Windows Server 2008 R2 Standard (Active Directory Lightweight Directory Services, WS-Federation, WS-Trust); Windows Server 2012
Information Protection & Control
Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Microsoft SQL Server 2008 R2; SQL Server 2012; Windows Azure; Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012
IT Process & Compliance
Compliance Management Libraries / 2.0; Data Classification Toolkit; Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010; Hyper-V Server 2008 / 2008 R2; Internet Security and Acceleration Server 2006; IT Governance, Risk and Compliance process management pack / 2.0; Microsoft Security Assessment Tool; Office Project Portfolio Server 2007 (prioritize and evaluate competing investments); Office Project Professional 2007; Office Project Server 2007; Office SharePoint 2007 (Lists); Office SharePoint Server 2007; Opalis; PowerShell 2.0; Project Professional 2010; Project Server 2010; Security Compliance Manager / 2.x; SharePoint 2010 (Lists); SharePoint Server 2010; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Endpoint Protection; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Visio Professional 2007 / 2010; Windows Azure; Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2012
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide35
Phase 2: BPIO
B
S
R
D
Collaboration
Workspaces
Exchange Server 2007 / 2010; Lync 2010; Lync Server 2010; Office 2007 / 2010; Office 2007 (Groove 2007: offline collaborative workspaces); Office 2010 (SharePoint Workspace 2010: offline collaborative workspaces); Office 365 Dedicated; Office 365 Dedicated (Dedicated is here for Hybrid); Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (offline collaborative workspaces); SharePoint Designer 2007 / 2010; SharePoint Online; SharePoint Online (access/view documents, client integration, mobile device support); SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (co-authoring); SharePoint Server 2010 (offline collaborative workspaces, Web applications and companions, mobile-device view)
Portals
Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (audience targeting); Office SharePoint Server 2007 (out-of-the-box workflows, My Sites); Office SharePoint Server 2007 (role-based access, audience targeting); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (widgets, search); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (out-of-the-box content publishing workflows); SharePoint Designer 2010 (out-of-the-box content publishing workflows); SharePoint Online (audience targeting); SharePoint Online (custom code support); SharePoint Online (My Sites, standard workflows, site search); SharePoint Online (site manager); SharePoint Online (site search); SharePoint Online P1 / P2; SharePoint Server 2010 (audience targeting); SharePoint Server 2010 (Business Connectivity Services); SharePoint Server 2010 (out-of-the-box workflows, My Sites); SharePoint Server 2010 (role-based access, audience targeting); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (widgets, search)
Social Computing
Office 2007; Office 2010 (content tagging within applications); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (My Sites, RSS content syndication, email alerts and notifications); Office SharePoint Server 2007 (wikis, blogs, discussion boards, customized sites); SharePoint Online (email alerts and notifications, RSS content syndication, My Sites); SharePoint Online (surveys, blogs, wikis); SharePoint Online P1 / P2; SharePoint Server 2010 (My Sites, RSS content syndication, email alerts and notifications); SharePoint Server 2010 (rating, tagging, bookmarks, keywords, comments); SharePoint Server 2010 (wikis, blogs, discussion boards, customized sites)
Project Mgt
Office 365 E1 / E2 / E3 / E4; Project 2007 / 2010; Project Server 2007 (visual reports, resource availability graphs, and budget tracking); Project Server 2010 (schedule management, financial management, time and task management); SharePoint Foundation 2010; SharePoint Online P1 / P2
Information access
FAST Search Server 2010 for SharePoint (federated search, connectors and content ingestion); FAST Search Server 2010 for SharePoint (structured data search); Office 2007; Office 2010 (Outlook: keyword tagging for email); Office 2010 (search across business data); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (federated search connectors, people search); Office SharePoint Server 2007 (federated search connectors, Search-driven applications); Office SharePoint Server 2007 (out-of-the-box indexing connectors, search filters); SharePoint Online (search across enterprise content sources); SharePoint Online (search federations, people search, relevance); SharePoint Online (Structured data search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, federated search connectors, people search); SharePoint Server 2010 (FAST search usage rights, federated search connectors, Search-driven applications); SharePoint Server 2010 (out-of-the-box indexing connectors, search filters)
Interactive experience and navigation
FAST Search Server 2010 for SharePoint (faceted search, personalization, visual search); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (metadata-driven faceted search, unified search, personalization); SharePoint Online (faceted search, unified search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, metadata-driven faceted search, unified search, personalization); Windows 7 (search); Windows 8
Messaging
Exchange Hosted Encryption; Exchange Hosted Filtering; Exchange Online; Exchange Online (connects to on-premises Private Branch Exchange); Exchange Online (Forefront Online Protection for Exchange); Exchange Online (requires on-premises Rights Management Services); Exchange Online (Standard and Deskless); Exchange Online Kiosk; Exchange Online P1 / P2; Exchange Online P1 / P2 (dependency on RMS); Exchange Server 2007 / 2010; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Office 365 E1 / E2 / E3 / E4 / K1 / K2; Outlook 2007 / 2010; Outlook Mobile 2007 / 2010; Outlook Web Access (premium experience); Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012
Unified Communications
IM/Presence
Lync 2010; Lync Online / P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; SharePoint Online; SharePoint Server 2010
Conferencing
Lync 2010; Lync Online / P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office Live Meeting 2007; Outlook 2007 / 2010 (integrated conferencing)
Voice
Exchange Online / P2; Exchange Server 2007 / 2010 (unified inbox); Lync 2010; Lync Online; Lync Server 2010; Office 365 E3 / E4; Office 365 E4 (Requires On-Prem Infrastructure and Lync Server 2010); Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Outlook 2007 / 2010; Windows Phone 7 / 7.5
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide36
Phase 2: BPIO Continued
B
S
R
D
Content Creation and Management
Information Mgt
Office 2007; Office 2007 (document information panel); Office 2007 (integrated workflows); Office 2010 (Backstage); Office 2010 (Backstage, auto discover document repository); Office 2010 (Backstage, location-based metadata defaults, automated population of metadata); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (content authoring and publishing, content staging and deployment, navigation controls, site variations); Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (metadata capture); Office SharePoint Server 2007 (metadata tagging); Office SharePoint Server 2007 (out-of-the-box workflows); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (Web content editor, master pages, page layouts, controls); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (SharePoint site customization, intuitive design interface); SharePoint Designer 2010 (SharePoint site customization, intuitive design interface); SharePoint Online; SharePoint Online (document workspace); SharePoint Online (high-fidelity Web sites with consistent branding); SharePoint Online (metadata); SharePoint Online (out-of-the-box workflows); SharePoint Online (site manager); SharePoint Online (Web content editor, master pages, page layouts, controls); SharePoint Online P1 / P2; SharePoint Server 2010 (content authoring and publishing, content staging and deployment, navigation controls, site variations, high-fidelity Web sites with consistent branding); SharePoint Server 2010 (document workspace); SharePoint Server 2010 (metadata capture); SharePoint Server 2010 (metadata tagging, location-based metadata defaults, automated population of metadata); SharePoint Server 2010 (out-of-the-box workflows); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (Web content editor, master pages, page layouts, controls)
Process Efficiency
Office 2007 (InfoPath 2007: browser-based forms, mobile forms); Office 2007 (InfoPath 2007: form templates); Office 2007 (workflow integration); Office 2010 (InfoPath 2010: form templates); Office 2010 (InfoPath 2010: WCAG compliant browser forms); Office 2010 (workflow integration through Backstage); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (custom workflows); Office SharePoint Server 2007 (form libraries, forms development environment, forms solutions repository); Office SharePoint Server 2007 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control); Office SharePoint Server 2007 (out-of-the-box workflows); SharePoint Designer 2007 / 2010; SharePoint Designer 2010 (visualize workflows); SharePoint Online (browser-based forms); SharePoint Online (custom workflows); SharePoint Online (form libraries); SharePoint Online (out-of-the-box workflows); SharePoint Online P1 / P2; SharePoint Server 2010 (form libraries, forms development environment, forms solutions repository, form layout templates); SharePoint Server 2010 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control, WCAG compliant browser forms); SharePoint Server 2010 (out-of-the-box workflows); SharePoint Server 2010 (reusable workflows); Visio 2007 / 2010
Compliance
Office 365 E3 / E4; Office SharePoint Server 2007 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); Office SharePoint Server 2007 (support for industry standards: Dublin Core, Sarbanes-Oxley); SharePoint Online (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Online (support for industry standards); SharePoint Server 2010 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Server 2010 (support for industry standards: Dublin Core, Sarbanes-Oxley)
Authoring
Office 2007; Office 2010 (contextual UI menu); Office 2010 (PowerPoint: resizing and cropping videos with 3-D effects); Office 2010 (Word: navigation pan, polished find); Office 365 E1 / E2 / E3 / E4 / K2; Office SharePoint Server 2007; SharePoint Server 2010 (document sets); SharePoint Server 2010 (rich media editing, rights management); SharePoint Server 2010 (search); Visio 2007 / 2010 (quick shapes mini toolbar, enhanced dynamic grid, page auto size, automatic alignment and layout adjustment)
Multi-Device Support
Office 2007; Office 2007(rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 2010 (Fluent UI); Office 2010 (PC, phone, and browser, 64-bit Office client deployment and authoring); Office 2010 (rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Mobile 2010 (view and edit documents from a mobile device); Office SharePoint Server 2007; Office Web Apps (store, edit, and share documents online); SharePoint Server 2010; SharePoint Server 2010 (Fluent UI); SharePoint Server 2010 (mobile access enhancements, view and edit documents, spreadsheets, presentations, and notebooks in the browser); Visio 2007; Visio 2010 (rich client, share diagrams with others on the Web)
Interoperability
User Accessibility
Office 2007; Office 2007 / 2010 (accessibility investments); Office 365 E1 / E2 / E3 / E4 / K1 / K2
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide37
Phase 2: APO
B
S
R
D
BI and Analytics Platform
Business Intelligence
Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Professional 2010 (Excel 2010); Office SharePoint Server 2007; PivotViewer; Power View; PowerPivot; Report Builder; SharePoint 2010 Enterprise (Excel Services, PerformancePoint Services, Visio Services); SharePoint 2010 Enterprise (Activity Feeds, Visio Services); SharePoint 2010 Enterprise (Excel Services); SharePoint 2010 Enterprise (Insights, Excel Services, Visio Services, PerformancePoint Services); SharePoint 2010 Standard; SharePoint Foundation 2010; SharePoint Online; SharePoint Online (Insights, Excel Services, Visio Services); SQL Azure; SQL Azure Reporting; SQL Server 2008 R2 / 2012; SQL Server Analytic Services; SQL Server Reporting Services; Visio 2007 / 2010
Data Warehouse Management
SQL Server 2008 R2 Data Center; SQL Server 2008 R2 Enterprise; SQL Server 2008 R2 Enterprise (Fast Track, SQL Server Analysis Services, SQL Server Reporting Services); SQL Server 2008 R2 Parallel Data Warehouse; SQL Server 2012; SQL Server 2012 (SQL Server Analysis Services, SQL Server Reporting Service); Visual Studio 11 / 2010; Visual Studio 2008 (BI Development Studio)
Big Data
Information Services and Marketplaces
Database and LOB Platform
Transaction Processing
Data Management
Office Professional 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Server 2005 / 2008 / 2008 R2 / 2012
Application Infrastructure
Custom Development
Internet Applications
Microsoft .NET Framework; Expression Studio 3 / 4; Expression Web 4; Internet Information Services (IIS) 7 / 8; Office SharePoint Server 2007; SharePoint 2010; Silverlight; SQL Azure; SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008; Visual Studio 2010 Premium; Visual Studio 2010 Professional
Component and Service Composition
BizTalk ESB Toolkit; BizTalk Server 2006 R2 / 2009 / 2010; Office SharePoint Server 2007 (Business Data Catalog); SharePoint 2010 (Business Connectivity Services); SQL Server 2008 R2 / 2012; System Center 2007 / 2012; Windows Server AppFabric
Enterprise Integration
Microsoft.NET Framework; BizTalk Server 2006 R2 / 2009 / 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Azure; SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008; Visual Studio 2010 Professional
Development Platform
Office Professional 2010; SQL Server 2008 R2; Visual Studio 11 / 2008; Visual Studio 2010 Professional; Visual Studio Team Foundation Server 2010; Windows SDK
Application Lifecycle Management
Office Professional 2010; Project 2010; Visual Studio 11; Visual Studio 11 Team Foundation Server; Visual Studio 2008 / 2010; Visual Studio 2010 Premium; Visual Studio 2010 Ultimate; Visual Studio Team Foundation Server 2010
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide38
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIES
Business
Driver
Category ProductReduce the carbon footprint by minimizing the environmental impact of technology
None
Measure and track internal resources and environmental impact goals
None
Support creation, management, and monitoring of compliance frameworks
None
Normalize corporate compliance with external environmental regulations
None
Respond to consumer expectations that industries take a holistic approach to sustaining the environment
Microsoft Dynamics
®
AX 2009/2012:
Use collaboration tools to share and discuss environmentally friendly products, packaging, storage, and transportation improvements to reduce the carbon footprint
Participate in business opportunities that sustain the environment
Dynamics AX 2009/2012:
Use collaboration tools to share and discuss environmentally friendly products, packaging, storage, and transportation improvements to reduce the carbon footprint
Phase 2
Category ProductsSlide39
CONCEPTUAL
ARCHITECTURE
MAPPING
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITION
CONCEPTUAL
ARCHITECTURE
Phase 2Slide40
LOGICAL
ARCHITECTURE
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
MAPPING
PHASE
DEFINITION
LOGICAL
ARCHITECTURE
Phase 2Slide41
Agenda
Recap Discussions to Date
Next Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize the Capability RequirementsSlide42
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
Phase 3
Business
DriverNeedsBusiness CapabilitiesReduce the carbon footprint by minimizing the environmental impact of technology
Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting
Make data centers more environmentally friendly
Manage utilization of distributed IT resources such as laptops, printers, and other devices
Fully integrate telecommuting into the culture and business practices to reduce automobile and aircraft emissions
Take advantage of cloud computing to shift and consolidate resources
Provision servers for application portfolio management to lower the number of servers by consolidating applications onto fewer servers
Develop and distribute applications in the cloud with minimal resources on the premises
Proactively perform preventative maintenance and achieve other equipment improvements through automated alerts that are linked to more details about root causes, effects, and other troubleshooting data
Measure and track internal resources and environmental impact goals
Establish resource utility baselines and the means to measure and report improvements
Empower customers to make ecologically friendly choices based on the reported environmental impact of products
Track and measure the impact of teleworking
Enable executives and reporting authorities to take proactive measures when certain trends begin to change to enable analysis and understanding of the root cause and effects, and to share details and best practices
Share and collaborate on product, packaging, storage, and transportation improvement opportunities internally and throughout the supply chain, and in business modeling and simulation tools
Define performance levels for telecommuters and measure the outcomes in real time
Assign role-based key performance indicators (KPIs) for key business metrics that can be monitored for productivity
Support creation, management, and monitoring of compliance frameworks
Give businesses incentives to comply with regulations, reduce carbon, save energy, and have workers commute less frequently
Proactively monitor compliance metrics, triggered events, and alerts when compliance is compromised, and give prescriptive guidance about how to mitigate future riskSlide43
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
Phase 3
Business
DriverNeedsBusiness CapabilitiesNormalize corporate compliance with external environmental regulations
Ensure that organizations are informed and complying with environmental sustainability regulations
Define and convert to environmentally sustainable or Green processes that are agile and adaptable to future regulations
Provide advanced data visualization to make it easier for users to understand and respond to new compliance requirements
Optimize compliance processes by managing initiatives, monitoring risks, and delivering alerts to appropriate people to raise environmental awareness
Respond to consumer expectations that industries take a holistic approach to sustaining the environment
Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting
Make data centers more environmentally friendly
Manage utilization of distributed IT resources such as laptops, printers, and other devices
Update the infrastructure for next-generation workers by using the cost-savings gained by enabling remote workers
Safeguard information when workers access sensitive data from remote locations
Collect customer feedback and suggestions for improvement to the organization's environmental initiatives
Analyze sustainability performance data, plans, and targets to increase performance transparency and mitigate risk
Measure and report on metrics related to Green initiatives and identify opportunities to stimulate more sustainable processes to improve customer relationships
Participate in business opportunities that sustain the environment
Establish resource utility baselines and the means to measure and report improvements
Empower customers to make ecologically friendly choices based on the reported environmental impact of products
Track and measure the impact of teleworking
Provide social computing capabilities within and across the enterprise, including suppliers and customers, to collect feedback and gather suggestions for improvement
Enable ongoing optimization and alignment of processes with corporate sustainability guidelines by analyzing the carbon footprint and environmental impact of suppliers to maintain a resilient and sustainable supply chain
Enable real-time availability of operational information across the organization and provide the ability to compare data with competitors and analyze trendsSlide44
Phase 3: Core IO
B
S
R
D
Datacenter Mgt
and Virtualization
Data Center Mgt & Virtualization
Resource provisioning and deprovisioning occurs dynamically and is elastic. Workloads are relocated dynamically. Majority of production server resources are virtualized. Resource pooling implementation supports compliance and cost management strategies, such as Auditing and Reporting, Policy Management, Metered Usage, Multi-Tenancy and Process Automation. Service performance monitoring with automated remediation and centralized view across all SLAs; consolidated view across all management tools.
Server Security
Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.
Networking
Redundant Domain Name System servers exist on a separate network to provide fault tolerance and isolation, including ability to do zone transfer across boundaries.
Storage
Critical data is backed up by taking snapshots using a centralized, application-aware system.
Device
Deployment and Management
Device Mgt & Virtualization
Applications are distributed on demand for the majority of traditional desktop environments and productivity applications. Software installed in physical and virtual environments is identified and categorized automatically; there is a single location to track license and contract details and to manage the software allocation; inventory is reconciled quarterly. Certificate provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile phones are used for over-the-air synchronization with e-mail, calendar, and contacts. Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Installation and inventory of standard corporate applications on mobile devices are managed automatically through integrated software distribution tools. Mobile access to internal systems is granted through a virtual private network (IP Security or SSL).
Device Security
Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.
Identity & Security
Services
Identity & Access
Provisioning and de-provisioning of user and super-user accounts, certificates, and/or multi-factor authentication is automated. Centralized IT offering of Federation services. Multiple Federation and trust relations between separate organizations 1 to 1 relationship. Multi-factor and certificate-based authentication are applied in some scenarios, such as remote access across boundaries (such as On Prem and Cloud). Self service password resets supported. A centralized, group/role based access policy is defined for business resources, applications, and information resources, managed through industry accepted processes. A scalable directory that is integrated and automatically synchronizes with all remaining directories across multiple geographies and isolated domains for all applications with connectivity to cloud when applicable.
Information Protection & Control
Persistent information protection helps to enforce policy on sensitive data across boundaries, including data on mobile devices. Reporting for server, back-office, and end-user waypoints; analysis capabilities exist to provide investigation of critical incidents.
IT Process & Compliance
IT policies initiate automated remediation. Incident Management supported by automated remediation. Risks and vulnerabilities are analyzed across all IT services against developed models; compliance objectives and activities are automated, and then updated automatically based on changes to IT policies.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide45
Phase 3: BPIO
B
S
R
D
Collaboration
Workspaces
Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices; offline synchronization is supported. Team members can simultaneously author, edit, and review content across Clients (including Devices).
Portals
Users can publish content to extranet and Internet sites with the same systems, device form-factors, and methods they use to publish content to the intranet; in addition, users can publish content that includes line-of-business data to portals from within business and productivity applications. Portals support collaboration and information sharing across extranet and Internet sites in a hybrid on-premises and Web (cloud)-based infrastructure and through federated relationships with trusted partners.
Social Computing
Social graph data, user behavior, and social feedback are analyzed to recommend people, groups, and assets; third-party social feeds are exposed within enterprise tools such as personal information management clients; news feeds are generated from relevant line-of-business systems; feeds can be filtered and tuned by end users to improve relevance. social networking is integrated into the main experience of the end-user in an enterprise & is seamless across mobile devices.
Project Mgt
Teams plan, track, and share tasks in lists by using collaboration tools; multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.
Information access
Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed; indexing processes incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience; structured data is incorporated and exposed in search-driven applications.
Interactive experience and navigation
An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.
Messaging
Provisioning of user inboxes occurs automatically based on needs of individual users and spans on-premises and off-premises messaging environments.
Unified Communications
IM/Presence
Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.
Conferencing
A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.
Voice
Server pools that are split across data centers or replicated provide resilience to data centers when disaster occurs.
Content Creation and Management
Information Mgt
Centrally managed workspaces support a hybrid on-premises and Web (cloud)-based infrastructure; business content is integrated with automated life-cycle management that includes content creation, discoverability, archiving, and retirement.
Process Efficiency
The organization orchestrates processes with advanced custom workflows, and deploys and integrates line-of-business applications; human and system workflows are integrated for orchestration, exception handling, and automation; people can design workflows by using visual tools, and can reuse workflow patterns in similar scenarios.
Compliance
All information created by the organization is managed throughout the content life cycle; policy and compliance are consistently enforced across traditional content, Web content, e-mail, social content, and semi-structured information and across devices. Content that results from electronic discovery can be quickly refined to produce relevant information for use as evidence in court; automated workflow manages the entire discovery process.
Authoring
Content authoring tools deliver advanced formatting. Rich media can be centrally stored, tagged, managed, and made easily available for use in building content deliverables. Ideas, notes, and research gathered across Web productivity tools and conversations are easy to find and share.
Multi-Device Support
Underlying capabilities such as instant messaging, communications, workflow, collaboration, and content management are available in each delivery mode as appropriate.
Interoperability
User Accessibility
Productivity applications meet guidelines for information and content accessibility in recognized accessibility standards such as Section 508 and Web Content Accessibility Guidelines (WCAG) 2.0 for both PC and web. New sites meet standards guidelines for supporting assistive technologies in the browser.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide46
Phase 3: APO
B
S
R
D
BI and Analytics Platform
Business Intelligence
Data Analysts use powerful data management workbench with integrated access to tools for data preparation, cleansing, multi-variate analysis, and a sophisticated set of data mining algorithms with extensibility and tuning options. Data Analysts can easily publish their findings and data sets for access by business users.
Data Warehouse Management
Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed. Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.
Big Data
Information Services and Marketplaces
Database and LOB Platform
Transaction Processing
Data Management
Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores. Adherence to stringent corporate or government regulatory compliance is a top priority. Reports are easily generated and viewed and greatly facilitate compliance audits for protection of data-at-rest and data-in-transit, and compensating controls are available.
Application Infrastructure
Custom Development
Internet Applications
Site is designed using standards-oriented web technologies (HTML, CSS, JavaScript, etc.) and rich Internet functionality where appropriate. Sites use template-driven dynamic pages, with little to no replication of code, externalized styling and design with master pages and/or CSS that work seamlessly across any browser with little or no custom coding per browser. Content is supplied through a content management system (CMS) and there is provisioning for rich content such as video. Pages are tested against multiple browsers and versions. Pages are checked to verify that keywords are picked up by search engine spiders and other work is done for effective SEO.
Component and Service Composition
Along with IT, business units are becoming suppliers of reusable assets and realize that they can empower their users by connecting services and experience, building upon the assets that the central IT team provides and by creating their own. Creation of LOB extension applications can be accomplished without a lot of custom code and through the assembly of existing components. There is a designated tool for the creation of composite LOB extension in addition to the integration with advanced developer tools. However, other tools continue to exist for different functional purposes like workflow, UI creation, etc. The organization overall realizes that services and UI needs to blend, start rationalizing which UI standard they will be driving to, and move to a point where every service has a “face” that is consumable for composing new applications. End users can share their created solutions back to the repository. Mechanisms exist to allow for ranking and rating of solutions and components. A managed central repository of all configuration items, assets, and systems provides dependency maps, reporting, and metrics for development and operations teams across the organization to manage integrations, performance, and scale.
Enterprise Integration
Applications leverage an application communication infrastructure deployed in operations that is actively managed and has dynamic routing capabilities. Application integrations leverage standard application messaging protocols and infrastructure to connect various applications running on-premises and in the cloud, connecting mission-critical data and transactions across enterprise applications. Centralized data integration strategies and tools are used across the enterprise.
Development Platform
Developed applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems.
Application Lifecycle Management
Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.
MAPPING
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITIONSlide47
Technology Guidance
Client Technologies
Microsoft
Office 2007 / 2010
Microsoft Office
Outlook 2007 / Microsoft Outlook 2010, Microsoft Office Word 2007 / Microsoft Word 2010, Microsoft Office Excel
2007 / Microsoft Excel 2010, Microsoft Office PowerPoint 2007 / Microsoft PowerPoint 2010
Microsoft Office
InfoPath 2007 / Microsoft InfoPath 2010Microsoft Office Visio
2007 / Microsoft Visio 2010
Microsoft Office Groove 2007 / Microsoft SharePoint Workspace 2010
Microsoft Office SharePoint Designer 2007 / Microsoft SharePoint Designer 2010Microsoft Office OneNote 2007 / Microsoft OneNote 2010Microsoft Office Project 2007 / Microsoft Project 2010Windows Phone 7.5 / 8Microsoft Office Mobile 2010Microsoft Forefront Endpoint Protection 2010 / Microsoft System Center 2012 Endpoint ProtectionWindows 7 / 8Microsoft Office Communicator 2007 R2 / Microsoft Lync 2010Microsoft Office Live Meeting 2007 Server TechnologiesMicrosoft Office SharePoint Server 2007 / Microsoft SharePoint Server 2010Microsoft FAST Search Server 2010 for SharePointWindows SharePoint Services 3.0 / Microsoft SharePoint Foundation 2010Microsoft Exchange Server 2007 / 2010Microsoft Office Communications Server 2007 R2 / Microsoft Lync Server 2010Microsoft SQL
Server 2008 R2 / 2012
Microsoft Server Security
Microsoft Forefront Security for SharePoint / Microsoft Forefront Protection 2010 for SharePoint
Microsoft
Forefront Security for Exchange Server / Microsoft Forefront Protection 2010 for Exchange
Server
Microsoft Forefront Security for Office Communications
Server
Microsoft
Internet Security and Acceleration Server 2006 / Microsoft Forefront Threat Management Gateway
2010
Microsoft Intelligent Application Gateway 2007 / Microsoft Forefront Unified Access Gateway
2010
Microsoft Forefront Identity Manager 2010 / 2010 R2
Microsoft Windows Server 2008 R2 /
2012
Microsoft System Center
Microsoft System Center Operations Manager 2007 R2 / Microsoft System Center 2012 Operations Manager
Microsoft System Center Data Protection Manager 2010 / Microsoft System Center 2012 Data Protection Manager
Microsoft System Center Configuration Manager 2007 R3 / Microsoft System Center 2012 Configuration Manager
Microsoft System Center Mobile Device Manager 2008 / Microsoft System Center 2012 Mobile Device
Manager
Microsoft System Center Virtual Machine Manager 2008 R2 / Microsoft System Center 2012 Virtual Machine Manager
Microsoft System Center Service Manager 2010 / Microsoft System Center 2012 Service Manager
Opalis
/ Microsoft System Center 2012
Orchestrator
Microsoft
System Center 2012 App
Controller
Microsoft Desktop Optimization Pack 2011 / 2011
R2
Windows Embedded Device Manager
2011
Microsoft Windows Storage Server 2008 / 2008
R2
Windows Server
AppFabric
Microsoft
Hyper-V
Server 2008 / 2008
R2
Microsoft Virtual Desktop Infrastructure
Suite
Microsoft Office Project Server 2007 / Microsoft Project Server
2010
Microsoft Office Project Portfolio Server
2007
Microsoft
BizTalk
Server 2009 / 2010
Cloud Technologies
BPOS / Microsoft Office
365
Microsoft Exchange
Online
Microsoft SharePoint
Online
Microsoft Office Communications Online / Microsoft
Lync
Online
Microsoft Forefront Online Protection for Exchange
Windows Azure platform
Windows Azure
Windows Azure
AppFabric
Active
Directory Access Control
Microsoft SQL Azure
Windows
Intune
Microsoft
Office Web
Apps
Microsoft Exchange Hosted
Services
Microsoft Online Backup Service
Development
Tools
Microsoft .NET
Framework
Microsoft
Visual Studio 2010 Team Foundation Server / Microsoft Visual Studio 11 Team Foundation
Server
Microsoft Visual Studio Team System 2008 / 2010 /
11
Microsoft
Expression
Studio 3 / 4
Tools, Add-ins, Libraries, and Frameworks
Microsoft Assessment and Planning Toolkit 6.0 /
6.5
Microsoft Security Assessment
Tool
Microsoft Software Inventory Analyzer 5.0 /
5.1
Microsoft Deployment Toolkit 2010 /
2012
Microsoft Application Virtualization 4.5 / 4.6
Windows Automated Installation
Kit
Microsoft Security Compliance Management
Toolkit
Compliance Management Libraries
2.0
Windows SDK
Data Classification
Toolkit
IT Governance, Risk and Compliance process management pack
2.0
Microsoft Windows
PowerShell 2.0
BizTalk ESB
Toolkit
Data Mining Add-ins for Microsoft Office
Category Products
Microsoft Dynamics AX 2009 /
2012
Bing MapsSlide48
Phase 3: Core IO
B
S
R
D
Datacenter Mgt
and Virtualization
Data Center Mgt & Virtualization
Compliance Management Libraries / 2.0; Data Classification Toolkit; Hyper-V Server 2008 / 2008 R2; Hyper-V Server 2008 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 Enterprise; Hyper-V Server 2008 R2 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 R2 Enterprise; IT Governance, Risk and Compliance process management pack / 2.0; Microsoft Assessment and Planning Toolkit 6.0 / 6.5; Microsoft Deployment Toolkit 2010 / 2012; Opalis; Security Compliance Manager / 2.x; Software Asset Management; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; System Center Virtual Machine Manager 2008 R2 (Offline Virtual Machine Servicing Tool 2.1); Windows Automated Installation Kit; Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Hyper-V); Windows Server 2008 R2 (Hyper-V, Clustering, and Network Load Balancing); Windows Server 2008 R2 (Windows Deployment Services); Windows Server 2008 R2 Enterprise / Datacenter; Windows Server 2008 R2 Enterprise / Datacenter (Hyper-V)
Server Security
Forefront Endpoint Protection 2010; Forefront Protection 2010 for Exchange Server; Forefront Protection 2010 for SharePoint; Forefront Security for Exchange Server; Forefront Security for Office Communications Server; Forefront Security for SharePoint; Forefront Threat Management Gateway 2010 (Virtual Private Network); Forefront Threat Management Gateway 2010 (web antivirus/anti-malware protection, Network Inspection System); Forefront Unified Access Gateway 2010; Forefront Unified Access Gateway 2010 (Endpoint access controls); Intelligent Application Gateway 2007; Intelligent Application Gateway 2007 (Endpoint and Access Security); Internet Security and Acceleration Server 2006 (Multi-Networking); Internet Security and Acceleration Server 2006 (Virtual Private Network); System Center 2012 Endpoint Protection; Windows Azure; Windows Server 2008 R2 (Windows Firewall with Advanced Security); Windows Server 2008 R2 Enterprise (Network Policy and Access Services); Windows Server 2008 R2 Enterprise (Windows Firewall, Network Policy, and Access Services); Windows Server 2012
Networking
Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Dynamic Host Configuration Protocol server)
Storage
System Center 2012 Data Protection Manager; System Center Data Protection Manager 2010; Windows Server 2012 (Hyper-V Replica)
Device Deployment and Management
Device Mgt & Virtualization
Application Virtualization 4.5; Application Virtualization 4.6; Exchange Server 2007 / 2010; Exchange Server 2007 / 2010 (ActiveSync); Microsoft Deployment Toolkit 2010 / 2012; Microsoft Desktop Optimization Pack 2011 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 (Desktop Error Monitoring); Microsoft Desktop Optimization Pack 2011 R2 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 R2 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 R2 (Desktop Error Monitoring); Microsoft Enterprise Desktop Virtualization; Software Asset Management; System Center 2012 Configuration Manager; System Center 2012 Configuration Manager (Asset Intelligence); System Center 2012 Mobile Device Manager; System Center 2012 Operations Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Configuration Manager 2007 R3 (Asset Intelligence); System Center Mobile Device Manager 2008; System Center Mobile Device Manager 2008 (Enrollment Auto Discovery); System Center Operations Manager 2007 R2; Virtual Desktop Infrastructure Suite; Windows 7 / 8; Windows Automated Installation Kit; Windows Azure; Windows Embedded Device Manager 2011; Windows Intune; Windows Intune (applications only); Windows Intune (Exchange ActiveSync Integration); Windows Phone 7.5 / 8; Windows Server 2008 R2 (Remote Desktop Services); Windows Server 2008 R2 (Windows Certificate server); Windows Server 2012; Windows Server 2012 (Remote Desktop Services)
Device Security
Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010 (Network Inspection System); Internet Security and Acceleration Server 2006; System Center 2012 Endpoint Protection; Windows 7 (Firewall); Windows 8; Windows Intune; Windows Intune (not for non-PC devices); Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Network Access Protection)
Identity
& Security
Services
Identity & Access
Forefront Identity Manager 2010 (Credential Management); Forefront Identity Manager 2010 (Policy Management); Forefront Identity Manager 2010 (User Management); Forefront Identity Manager 2010 R2; Hyper-V Server 2008 (Read-Only Domain Controller); Hyper-V Server 2008 R2 (Read-Only Domain Controller); Windows 7 / 8; Windows Azure; Windows Azure (Active Directory Access Control); Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2008 R2 (Active Directory Domain Services, Group Policy); Windows Server 2008 R2 (Active Directory Domain Services, Read-Only Domain Controller); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Certificate Services); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Federation Services); Windows Server 2008 R2 Standard (Active Directory Lightweight Directory Services, WS-Federation, WS-Trust); Windows Server 2012
Information Protection & Control
Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Microsoft SQL Server 2008 R2; SQL Server 2012; System Center 2012 Operations Manager; System Center Operations Manager 2007 R2; Windows Phone 7.5 / 8; Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012
IT Process & Compliance
Compliance Management Libraries / 2.0; Data Classification Toolkit; Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010; Hyper-V Server 2008 / 2008 R2; Internet Security and Acceleration Server 2006; IT Governance, Risk and Compliance process management pack; IT Governance, Risk and Compliance process management pack 2.0; Microsoft Security Assessment Tool; Office Project Portfolio Server 2007 (prioritize and evaluate competing investments); Office Project Professional 2007; Office Project Server 2007; Office SharePoint 2007 (Lists); Office SharePoint Server 2007; Opalis; PowerShell 2.0; Project Professional 2010; Project Server 2010; Security Compliance Manager / 2.x; SharePoint 2010 (Lists); SharePoint Server 2010; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Endpoint Protection; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Visio Professional 2007 / 2010; Windows Azure; Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2012
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide49
Phase 3: BPIO
B
S
R
D
Collaboration
Workspaces
Exchange Server 2007 / 2010; Lync 2010; Lync Server 2010; Office 2007 / 2010; Office 2007 (Groove 2007: offline collaborative workspaces); Office 2010 (SharePoint Workspace 2010: offline collaborative workspaces); Office 365 Dedicated; Office 365 Dedicated (Dedicated is here for Hybrid); Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (offline collaborative workspaces); SharePoint Designer 2007 / 2010; SharePoint Online; SharePoint Online (access/view documents, client integration, mobile device support); SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (co-authoring); SharePoint Server 2010 (offline collaborative workspaces, web applications and companions, mobile-device view)
Portals
Office 365 Dedicated; Office 365 Dedicated (LOB Data); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (Active Directory Federation Services integration with SharePoint); Office SharePoint Server 2007 (audience targeting); Office SharePoint Server 2007 (content authoring and publishing); Office SharePoint Server 2007 (out-of-the-box workflows, My Sites); Office SharePoint Server 2007 (role-based access, audience targeting); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (widgets, search); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (out-of-the-box content publishing workflows); SharePoint Designer 2010 (out-of-the-box content publishing workflows); SharePoint Online (audience targeting); SharePoint Online (content authoring and publishing); SharePoint Online (custom code support); SharePoint Online (extranet collaboration); SharePoint Online (My Sites, standard workflows, site search); SharePoint Online (site manager); SharePoint Online (site search); SharePoint Online P1 / P2; SharePoint Server 2010 (Active Directory Federation Services integration with SharePoint); SharePoint Server 2010 (audience targeting); SharePoint Server 2010 (Business Connectivity Services); SharePoint Server 2010 (content authoring and publishing); SharePoint Server 2010 (out-of-the-box workflows, My Sites); SharePoint Server 2010 (role-based access, audience targeting); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (widgets, search)
Social Computing
Office 2007; Office 2010 (content tagging within applications); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (My Sites, RSS content syndication, email alerts and notifications); Office SharePoint Server 2007 (My Sites, RSS content syndication, email alerts and notifications, social networks); Office SharePoint Server 2007 (People Search, Personal Profiles, Dynamically updated profiles using Active Directory Service and LDAP Directories or LOB systems); Office SharePoint Server 2007 (wikis, blogs, discussion boards, customized sites); SharePoint Online (email alerts and notifications, RSS content syndication, My Sites); SharePoint Online (surveys, blogs, wikis); SharePoint Online (User Profile Import, People Search, Social Networking Web); SharePoint Online P1 / P2; SharePoint Server 2010 (My Sites, RSS content syndication, email alerts and notifications); SharePoint Server 2010 (My Sites, RSS content syndication, email alerts and notifications, social networks); SharePoint Server 2010 (People Search, Personal Profiles, Dynamically updated profiles using Active Directory Service and LDAP Directories or LOB systems); SharePoint Server 2010 (rating, tagging, bookmarks, keywords, comments); SharePoint Server 2010 (wikis, blogs, discussion boards, customized sites)
Project Mgt
Office 365 E1 / E2 / E3 / E4; Project 2007 / 2010; Project Server 2007 (visual reports, resource availability graphs, and budget tracking); Project Server 2010 (schedule management, financial management, time and task management); SharePoint Foundation 2010; SharePoint Online P1 / P2
Information access
FAST Search Server 2010 for SharePoint (federated search, connectors and content ingestion); FAST Search Server 2010 for SharePoint (structured data search); Office 2007; Office 2010 (Outlook: keyword tagging for email); Office 2010 (search across business data); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (federated search connectors, people search); Office SharePoint Server 2007 (federated search connectors, Search-driven applications); Office SharePoint Server 2007 (out-of-the-box indexing connectors, search filters); SharePoint Online (search across enterprise content sources); SharePoint Online (search federations, people search, relevance); SharePoint Online (Structured data search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, federated search connectors, people search); SharePoint Server 2010 (FAST search usage rights, federated search connectors, Search-driven applications); SharePoint Server 2010 (out-of-the-box indexing connectors, search filters)
Interactive experience and navigation
FAST Search Server 2010 for SharePoint (faceted search, personalization, visual search); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (metadata-driven faceted search, unified search, personalization); SharePoint Online (faceted search, unified search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, metadata-driven faceted search, unified search, personalization); Windows 7 (search); Windows 8
Messaging
Exchange Hosted Filtering; Exchange Online; Exchange Online (connects to on-premises Private Branch Exchange); Exchange Online (Standard and Deskless); Exchange Online (Forefront Online Protection for Exchange); Exchange Online (requires on-premises Rights Management Services); Exchange Online Kiosk; Exchange Online P1 / P2; Exchange Online P1 / P2 (dependency on RMS); Exchange Server 2007 / 2010; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Office 365 E1 / E2 / E3 / E4 / K1 / K2; Outlook 2007 / 2010; Outlook Mobile 2007 / 2010; Outlook Web Access (premium experience); Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide50
Phase 3: BPIO Continued
B
S
R
D
Unified Communications
IM/Presence
Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; SharePoint Online; SharePoint Server 2010
Conferencing
Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office Live Meeting 2007; Outlook 2007 / 2010 (integrated conferencing)
Voice
Exchange Online / P2; Exchange Server 2007 2010 (unified inbox); Lync 2010; Lync Online; Lync Server 2010; Office 365 E3 / E4; Office 365 E4 (Requires On-Prem Infrastructure and Lync Server 2010); Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Outlook 2007 / 2010; Windows Phone 7 / 7.5
Content Creation and Management
Information Mgt
Office 2007; Office 2007 (document information panel); Office 2007 (integrated workflows); Office 2010 (Backstage); Office 2010 (Backstage, auto discover document repository); Office 2010 (Backstage, location-based metadata defaults, automated population of metadata); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (content authoring and publishing, content staging and deployment, navigation controls, site variations); Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (metadata capture); Office SharePoint Server 2007 (metadata tagging); Office SharePoint Server 2007 (out-of-the-box workflows); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (web content editor, master pages, page layouts, controls); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (SharePoint site customization, intuitive design interface); SharePoint Designer 2010 (SharePoint site customization, intuitive design interface); SharePoint Online; SharePoint Online (document workspace); SharePoint Online (high-fidelity websites with consistent branding); SharePoint Online (hybrid workspaces, automatic life-cycle management); SharePoint Online (metadata); SharePoint Online (out-of-the-box workflows); SharePoint Online (site manager); SharePoint Online (web content editor, master pages, page layouts, controls); SharePoint Online P1 / P2; SharePoint Server 2010; SharePoint Server 2010 (content authoring and publishing, content staging and deployment, navigation controls, site variations, high-fidelity websites with consistent branding); SharePoint Server 2010 (document workspace); SharePoint Server 2010 (metadata capture); SharePoint Server 2010 (metadata tagging, location-based metadata defaults, automated population of metadata); SharePoint Server 2010 (out-of-the-box workflows); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (web content editor, master pages, page layouts, controls)
Process Efficiency
Office 2007 (InfoPath 2007: browser-based forms, mobile forms); Office 2007 (InfoPath 2007: form templates); Office 2007 (workflow integration); Office 2010 (InfoPath 2010: form templates); Office 2010 (InfoPath 2010: WCAG compliant browser forms); Office 2010 (workflow integration through Backstage); Office 365 Dedicated; Office 365 E3 / E4; Office SharePoint Server 2007 (advanced workflows, LOB integration); Office SharePoint Server 2007 (custom workflows); Office SharePoint Server 2007 (form libraries, forms development environment, forms solutions repository); Office SharePoint Server 2007 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control); SharePoint Designer 2007 / 2010; SharePoint Designer 2010 (visualize workflows); SharePoint Online (browser-based forms); SharePoint Online (custom code workflows); SharePoint Online (custom workflows); SharePoint Online (form libraries); SharePoint Online P2; SharePoint Server 2010 (advanced workflows, LOB integration, reusable workflows); SharePoint Server 2010 (form libraries, forms development environment, forms solutions repository, form layout templates); SharePoint Server 2010 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control, WCAG compliant browser forms); SharePoint Server 2010 (reusable workflows); Visio 2007 / 2010; Visual Studio 2008 / 2010
Compliance
Office 2007; Office 2010 (cryptography next-generation (CNG) digitally signed content); Office 365 E3 / E4; Office SharePoint Server 2007 (embedding records management policies into the full document life cycle); Office SharePoint Server 2007 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); Office SharePoint Server 2007 (support for industry standards: Dublin Core, Sarbanes-Oxley); Office SharePoint Server 2007 (support for industry standards: Dublin Core, Sarbanes-Oxley, automated workflows); SharePoint Online (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Online (records management throughout the content life cycle); SharePoint Online (support for industry standards); SharePoint Server 2010 (embedding records management policies into the full document life cycle); SharePoint Server 2010 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Server 2010 (support for industry standards: Dublin Core, Sarbanes-Oxley); SharePoint Server 2010 (support for industry standards: Dublin Core, Sarbanes-Oxley, automated workflows)
Authoring
Office 2007; Office 2010 (contextual UI menu); Office 2010 (OneNote: wiki linking, navigation bar, search; Word: navigation pan, polished find; SharePoint integration); Office 2010 (PowerPoint: resizing and cropping videos with 3-D effects); Office 365 E3 / E4; Office SharePoint Server 2007; SharePoint Server 2010 (digital asset management including thumbnails, metadata, tagging, and ratings for images as well as video streaming); SharePoint Server 2010 (document sets); SharePoint Server 2010 (web publishing); Visio 2007; Visio 2007 / 2010 (quick shapes mini toolbar, enhanced dynamic grid, page auto size, automatic alignment and layout adjustment); Visio 2010 (share diagrams with others on the web)
Multi-Device Support
Exchange Server 2007 / 2010; Lync 2010 (instant messaging); Lync Server 2010 (instant messaging); Office 2007; Office 2007(rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 2010 (Fluent UI); Office 2010 (PC, phone, and browser, 64-bit Office client deployment and authoring); Office 2010 (rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Communications Server 2007 R2 (instant messaging); Office Communicator 2007 R2 (instant messaging); Office Mobile 2010 (view and edit documents from a mobile device); Office SharePoint Server 2007; Office Web Apps (store, edit, and share documents online); SharePoint Server 2010; SharePoint Server 2010 (Fluent UI); SharePoint Server 2010 (mobile access enhancements, view and edit documents, spreadsheets, presentations, and notebooks in the browser); Visio 2007; Visio 2010 (rich client, share diagrams with others on the web)
Interoperability
User Accessibility
Office 2007; Office 2007 / 2010(accessibility investments, section 508 and WCAG 2.0); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; SharePoint Server 2010; SharePoint Server 2010 (WCAG compliant browser forms)
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide51
Phase 3: APO
B
S
R
D
BI and Analytics Platform
Business Intelligence
Data Mining Add-ins for Microsoft Office; Office 365 E1 / E2 / E3 / E4 / K2; Office Professional 2010 (Excel 2010); Office SharePoint Server 2007; PivotViewer; Power View; PowerPivot; Report Builder; SharePoint 2010 Enterprise (Excel Services, PerformancePoint Services, Visio Services); SharePoint 2010 Enterprise (Activity Feeds, Visio Services); SharePoint 2010 Enterprise (Excel Services); SharePoint 2010 Enterprise (Excel Services, Visio Services, PerformancePoint Services); SharePoint 2010 Enterprise (Insights, Excel Services, Visio Services, PerformancePoint Services); SharePoint 2010 Standard; SharePoint Foundation 2010; SharePoint Online (Insights, Excel Services, Visio Services); SQL Azure; SQL Azure Reporting; SQL Server 2008 R2 / 2012; SQL Server Analytic Services; SQL Server Reporting Services; Visio 2007 / 2010
Data Warehouse Management
SQL Server 2008 R2 Data Center; SQL Server 2008 R2 Enterprise; SQL Server 2008 R2 Enterprise (Fast Track, SQL Server Analysis Services, SQL Server Reporting Services); SQL Server 2008 R2 Parallel Data Warehouse; SQL Server 2012; SQL Server 2012 (SQL Server Analysis Services, SQL Server Reporting Service); Visual Studio 11 / 2010; Visual Studio 2008 (BI Development Studio)
Big Data
Information Services and Marketplaces
Database and LOB
Platform
Transaction Processing
Data Management
Office Professional 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Server 2005 / 2008 / 2008 R2 / 2012
Application Infrastructure
Custom Development
Internet Applications
Microsoft .NET Framework; Expression Studio 3 / 4; Expression Web 4; Internet Information Services (IIS) 7 / 8; Office SharePoint Server 2007; SharePoint 2010; Silverlight; SQL Azure; SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008; Visual Studio 2010 Premium; Visual Studio 2010 Professional
Component and Service Composition
BizTalk ESB Toolkit; BizTalk Server 2006 R2 / 2009 / 2010; Office SharePoint Server 2007 (Business Data Catalog); SharePoint 2010 (Business Connectivity Services); SQL Server 2008 R2 / 2012; System Center 2007 / 2012; Windows Server AppFabric
Enterprise Integration
Microsoft .NET Framework; BizTalk ESB Toolkit; BizTalk Server 2009 / 2010; SQL Azure; SQL Server 2008 R2 / 2012; System Center 2012; System Center Operations Manager 2007 R2; Visual Studio 11; Visual Studio 2010 Professional; Windows Azure AppFabric; Windows Server AppFabric
Development Platform
SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008 / 2010; Visual Studio Team Foundation Server 2010; Windows SDK
Application Lifecycle Management
Office Professional 2010; Project 2010; Visual Studio 11 / 2010; Visual Studio 11 Team Foundation Server; Visual Studio 2010 Ultimate; Visual Studio Team Foundation Server 2010
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIESSlide52
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
MAPPING
PHASE
DEFINITION
TECHNOLOGIES
Business
Driver
Category ProductReduce the carbon footprint by minimizing the environmental impact of technology
Dynamics AX 2009/2012:
Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets
Measure and track internal resources and environmental impact goals
Dynamics AX 2009/2012:
Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets
Support creation, management, and monitoring of compliance frameworks
None
Normalize corporate compliance with external environmental regulations
Dynamics AX 2009/2012:
Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets
Microsoft Bing
™
Maps:
Integrate services for a dynamic online experience via maps and geospatial images to report environmental quality issues and status
Respond to consumer expectations that industries take a holistic approach to sustaining the environment
Dynamics AX 2009/2012:
Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets
Participate in business opportunities that sustain the environment
Dynamics AX 2009/2012:
Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets
Phase 3
Category ProductsSlide53
CONCEPTUAL
ARCHITECTURE
MAPPING
TECHNOLOGIES
LOGICAL
ARCHITECTURE
PHASE
DEFINITION
CONCEPTUAL
ARCHITECTURE
Phase 3Slide54
LOGICAL
ARCHITECTURE
CONCEPTUAL
ARCHITECTURE
TECHNOLOGIES
MAPPING
PHASE
DEFINITION
LOGICAL
ARCHITECTURE
Phase 3Slide55
Agenda
Recap Discussions to Date
Next Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize
the Capability RequirementsSlide56
Example: Steps to Customize the Solution
Identify your top-priority business drivers
Identify the business capabilities in the Capability Discussion Guide that match your priorities (see below)
Choose the phase (Phase 1, Phase 2, or Phase 3) that corresponds to your priorities
Add, remove, or adjust capabilities
Customize
the pre-defined solutions
(Phase 1, Phase 2, or Phase 3) by doing the following:
Understand your priorities
Choose a starting point
Adjust the mappingSlide57
Example Solution Area: Phase 1
B
S
R
D
Datacenter
Mgt
and Virtualization
Data Center Mgt & Virtualization
Deployment and management of software updates are tool based. The organization actively uses virtualization to consolidate resources for production workloads. Some production server resources are virtualized. A virtualized server pool is offered as a service. Performance monitoring of physical and virtual hardware with defined SLAs; health monitoring of applications; supported across heterogeneous environments with manual remediation. Services are available during server failure (for example, server clustering, hot spares, and virtualization recovery solution).
Server Security
Protection against malware is centrally managed across server operating systems within organizations, including the host firewall. Protection for select mainstream/non-custom applications and services (such as email, collaboration and portal applications, and instant messaging), if available, is centrally managed. Integrated perimeter firewall, IPS, web security, gateway antivirus, and URL filtering are deployed with support for server and domain isolation; network security, alerts, and compliance are integrated with all other tools to provide a comprehensive scorecard view and threat assessment across data center, application, organization, and cloud boundaries. Remote access is secure, standardized, and available to end users across the organization.
Networking
Redundant Domain Name System servers exist to provide fault tolerance. Dynamic Host Configuration Protocol servers are network-aware and include support for automatic configuration. Network quality of service (basic prioritization of applications and services) is standard, with manual allocation of available bandwidth. IPv4 is present for main transport services, using IPv6 for some transport services (for example, to achieve a larger address range).
Storage
If a single disk or system component fails, no data is lost but data availability may be interrupted. Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite, with fully tested recovery or failover based on service-level agreements.
Device Deployment and Management
Device Mgt & Virtualization
?
Mobile device access configuration is automated and is pushed over-the-air. A solution is in place to configure and update devices. Mobile phones are used for over-the-air synchronization with email, calendar, and contacts.
Device Security
Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall; non-PC devices are managed and protected through a separate process.
Identity
& Security
Services
Identity & Access
?
To control access, simple provisioning and de-provisioning exists for user accounts, mailboxes, certificates or other multi-factor authentication methods and machines; access control is role-based. Password policies are set within a directory service to enable single sign-on across boundaries for most applications. Password resets occur through internal tools or manual processes. There is a centralized group/role based access policy for business resources, managed through internal tools or manual processes. Most applications and services share a common directory for authentication across boundaries. Point-to-point synchronization exists across different directories.
Information Protection & Control
Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and email); policy templates are used to standardize rights and control access to information.
IT Process & Compliance
IT policies are documented for each IT service.
Each IT service has a process to manage bug handling and design changes; IT services are tested according to defined test plans based on specifications. IT service release and deployment processes are formally defined and consistently followed. Each IT service provides service-level and operational-level agreements. Processes to manage incidents are in place for each IT service. Monitoring, reporting, and notifications are centralized for protection against malware, protection of information, and identity and access technologies. Problem management processes are in place for each IT service, with self-service access to knowledge base. Risk and vulnerability are formally analyzed across IT services; IT compliance objectives and activities are defined and audited for each IT service.
Example: Customized Solution RequirementsSlide58
Example: Tips to Customize the Solution
Server Security
helps protect and secure the server infrastructure at the data center from viruses, spam, malware, and other intrusions.
Consider using an alternate maturity level that corresponds to your requirements
Identify, document, and discuss how a capability may be relevant
Keep a capability if you are unsure whether you need itSlide59
Agenda
Recap Discussions to Date
Next
Steps
Solution Guidance
Phase 1
Phase 2
Phase 3
Customize the Capability RequirementsSlide60
Engagement Approach
Audience
Solution road map
Solution areas
Industry
Horizontal
Business strategy
Integrated Capability Analysis > Projects, architecture, products
Present relevant integrated capabilities
Position the Integrated Capability approach
Business executives
Understand business needs and priorities
Discuss range of potential solution capabilities
IT
executives
Architects IT pro/dev executivesSlide61