Date post: | 05-Jan-2016 |
Category: |
Documents |
Upload: | christina-holt |
View: | 214 times |
Download: | 1 times |
// 1
Infrastructure Optimization @ SEAT PG
Segrate, 24 Marzo 2006
Umberto Casalone ( [email protected] )
Project Leader - Infrastructure Manager
Fabio Spina ( [email protected] )
Manager
// 2
I.I. Company Company profilesSEAT PG SEAT PG
Cluster REPLY Cluster REPLY
II.II. Introducing Infrastructure OptimizationIntroducing Infrastructure OptimizationInfrastructure Optimization Model Infrastructure Optimization Model
StStages,, Workloads, Requirements
III.III. SEAT PG : Maturity RoadmapSEAT PG : Maturity RoadmapYear by Year SnapshotSnapshotStep by Step Management “Ability”
IV.IV. Rapid Economic JustificationBusiness Case (Seat Pagine Gialle)Business Case (Gruppo Bancario)
V. Conclusions
I.I. Company Company profilesSEAT PG SEAT PG
Cluster REPLY Cluster REPLY
II.II. Introducing Infrastructure OptimizationIntroducing Infrastructure OptimizationInfrastructure Optimization Model Infrastructure Optimization Model
StStages,, Workloads, Requirements
III.III. SEAT PG : Maturity RoadmapSEAT PG : Maturity RoadmapYear by Year SnapshotSnapshotStep by Step Management “Ability”
IV.IV. Rapid Economic JustificationBusiness Case (Seat Pagine Gialle)Business Case (Gruppo Bancario)
V. Conclusions
AgendaAgenda
// 3
Company ProfileCompany Profile
// 4
IT Infrastructure FiguresIT Infrastructure Figures
3863 Desktop ( 70% Notebook )20 Intel Infrastructure Server3500 Authenticated user100 Windows Mobile devices2000 Mobile users3500 Mailboxes
// 5
Company ProfileCompany Profile
// 6
Company ProfileCompany Profile
Cluster REPLY is part of REPLY group [Rey.MI]
Solutions Portfolio on Microsoft TechnologyBusiness Solution (ERP,CRM)Advanced Applications ( Enterpise Portal, Collaboration, E.A.I., S.O.A., B.I., Mobile)Advanced Infrastructure (next slide)
– Cluster Reply Employees >200 (95% graduated, certified)
Operational Sites TO, MI, Silea(TV), ROMA
// 7
Advanced Infrastructure competenciesAdvanced Infrastructure competencies
Rapid Economic Justification StudiesArchitectural and Migration StudiesInfrastructure Optimization Advisory
Network Infrastructure SolutionsIdentity & Access Mgmt
Real Time Collaboration SolutionsSecure and Mobile Messaging
Business Desktop Mgmt Health Monitoring Solutions
Infrastructure Security
Operations Support Services
Ad
vis
ory
Ad
vis
ory
So
luti
on
sS
olu
tio
ns
// 8
Infrastructure Optimization ModelStagesInfrastructure Optimization ModelStages
Cost Center
More Efficient
Cost Center
Business Enabler
Strategic Asset
// 9
Infrastructure Optimization ModelTechnological Workloads
Infrastructure Optimization ModelTechnological Workloads
// 10
Proactive monitoringSecure for mobile dev.
Basic email services Email authenticationAV/SPAM blockingHealth monitoring
https email access
B/R all critical servers B/R all servers B/R all servers+desktops
Limited infrastructureLimited or no IT policiesNo standards desktops
Aut. patch mgm Standard images
Current OSAut. sw distributionApp. compatibility testingReference image system
Aut. patch mgm serversAut. app compatibility Aut. reference image sys
AD authentic/authoriz GPO config/security Identity Integration
AV desktopsCentral FWDNS and DHCP
RAS (VPN-TS)IPSec /CertMonitoring srv
FW srv & desktopsSecure wireless SLA monitor desktops
Security, Networking, & Monitoring
Security, Networking, & Monitoring
Identity & Access Mgmt
Identity & Access Mgmt
Desktop EngineeringDesktop Engineering
Secured Messaging Infrastructure
Secured Messaging Infrastructure
Disaster RecoveryDisaster Recovery
Infrastructure Optimization ModelPass-through Requirements
Infrastructure Optimization ModelPass-through Requirements
// 11
Infrastructure Optimization Roadmap
// 12
Proactive monitoringSecure for mobile dev.
Basic email services Email authenticationAV/SPAM blockingHealth monitoring
https email access
B/R all critical servers B/R all servers B/R all servers+desktops
Limited infrastructureLimited or no IT policiesNo standards desktops
Aut. patch mgm Standard images
Current OSAut. sw distributionApp. compatibility testingReference image system
Aut. patch mgm serversAut. app compatibility Aut. reference image sys
AD authentic/authoriz GPO config/security Identity Integration
AV desktopsCentral FWDNS and DHCP
RAS (VPN-TS)IPSec /CertMonitoring srv
FW srv & desktopsSecure wireless SLA monitor desktopsSecurity,
Networking, & Monitoring
Security, Networking, & Monitoring
Identity & Access Mgmt
Identity & Access Mgmt
Desktop EngineeringDesktop Engineering
Secured Messaging Infrastructure
Secured Messaging Infrastructure
Disaster RecoveryDisaster Recovery
Infrastructure Optimization ModelSEAT PG : Year 2000 (Baseline)Infrastructure Optimization ModelSEAT PG : Year 2000 (Baseline)
// 13
Proactive monitoringSecure for mobile dev.
Basic email services Email authenticationAV/SPAM blockingHealth monitoring
https email access
B/R all critical servers B/R all servers B/R all servers+desktops
Limited infrastructureLimited or no IT policiesNo standards desktops
Aut. patch mgm Standard images
Current OSAut. sw distributionApp. compatibility testingReference image system
Aut. patch mgm serversAut. app compatibility Aut. reference image sys
AD authentic/authoriz GPO config/security Identity Integration
AV desktopsCentral FWDNS and DHCP
RAS (VPN-TS)IPSec /CertMonitoring srv
FW srv & desktopsSecure wireless SLA monitor desktopsSecurity,
Networking, & Monitoring
Security, Networking, & Monitoring
Identity & Access Mgmt
Identity & Access Mgmt
Desktop EngineeringDesktop Engineering
Secured Messaging Infrastructure
Secured Messaging Infrastructure
Disaster RecoveryDisaster Recovery
Infrastructure Optimization ModelSEAT PG : Year 2002Infrastructure Optimization ModelSEAT PG : Year 2002
Active Directory.GPO
SMS,Img
// 14
Desktop Desktop EngineeringEngineering
Basic to Basic to RationalizedRationalized
R
Identity & Access Identity & Access ManagementManagement
Basic to Basic to StandardizedStandardized
S
Architectural SolutionArchitectural Solution
// 15
ChallengeChallenge
Identity & Access Identity & Access ManagementManagement
Bu
sin
es
s A
gil
ity
Bu
sin
es
s A
gil
ity
Se
rvic
e L
ev
els
Se
rvic
e L
ev
els
Co
sts
Co
sts
BenefitsBenefits
Ca
pa
bil
itie
sC
ap
ab
ilit
ies
En
ab
lin
g T
ec
hn
olo
gy
En
ab
lin
g T
ec
hn
olo
gy
SolutionSolutionCreate a computing Create a computing environment that:environment that:
CCentralized, controlled entralized, controlled accessaccess to resources and to resources and applicationsapplicationsCentrally Centrally manages and manages and controls policiescontrols policies for different for different types of users types of users Quickly Quickly adapts to new and adapts to new and changing user requirementschanging user requirements
Centralized user Centralized user authenticationauthenticationManaged user access to Managed user access to resources and applicationsresources and applicationsCentrally administered Centrally administered users and groups users and groups Custom-configured end-Custom-configured end-user experienceuser experienceApply and enforce security Apply and enforce security policiespolicies
Identity & Access ManagementMoving from Basic to RationalizedIdentity & Access ManagementMoving from Basic to Rationalized
Centralized user accounts mgmt Centralized user accounts mgmt
Rapid resolution of authentication Rapid resolution of authentication requests (users, HR, etc.)requests (users, HR, etc.)
Increased productivity by providing Increased productivity by providing access to right resourcesaccess to right resources based on based on business roles and reducing time business roles and reducing time required to support organizational required to support organizational changeschanges
• Reduced Reduced time to market for new time to market for new applicationsapplications and services (unified and services (unified authentication)authentication)
• Directory services Directory services ((Active DirectoryActive Directory) for ) for authentication and authentication and authorization authorization
• Directory tools for Directory tools for central administration of central administration of configurations and configurations and security (security (Group PolicyGroup Policy))
Lower operations costLower operations cost (client (client services, service desk)services, service desk)Lower end-user operations costLower end-user operations cost
Order of magnitude TCO Impact*: $50-$100Order of magnitude TCO Impact*: $50-$100Order of magnitude TCO Impact*: $50-$100Order of magnitude TCO Impact*: $50-$100
* Source: Microsoft, based on Gartner TCO model* Source: Microsoft, based on Gartner TCO model
// 16
Desktop Desktop EngineeringEngineering
Bu
sin
es
s A
gil
ity
Bu
sin
es
s A
gil
ity
Se
rvic
e L
ev
els
Se
rvic
e L
ev
els
Co
sts
Co
sts
BenefitsBenefits
ChallengeChallenge
Ca
pa
bil
itie
sC
ap
ab
ilit
ies
En
ab
lin
g T
ec
hn
olo
gy
En
ab
lin
g T
ec
hn
olo
gy
SolutionSolutionCreate a capable IT Create a capable IT organization that:organization that:
Provides Provides users with stable, users with stable, up-to-date corporate up-to-date corporate softwaresoftwareEncourages standards on the Encourages standards on the desktopsdesktopsManages Manages desktop desktop deployments with more deployments with more efficiencyefficiency
Automated patch Automated patch management for management for desktopsdesktopsDefined set of standard Defined set of standard basic imagesbasic imagesLight-touch desktop Light-touch desktop deployment (minimum IT deployment (minimum IT involvement required)involvement required)
Desktop EngineeringMoving from Basic to StandardizedDesktop EngineeringMoving from Basic to Standardized
* Source: Microsoft, based on Gartner TCO modelShow allShow all
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Minimum business disruption during Minimum business disruption during deployments (data and settings deployments (data and settings migration)migration)Ensure broader compatibility across Ensure broader compatibility across user baseuser baseReduce time at risk with proactive Reduce time at risk with proactive patch management strategypatch management strategy
Business continuityBusiness continuityIncreased productivityIncreased productivityEvolve PC standards to support Evolve PC standards to support changing business needschanging business needs
Automated Automated patch patch management SWmanagement SWDefined set of Defined set of standard standard basic imagesbasic imagesImage based Image based deployment technologydeployment technology Lower software and hardware costsLower software and hardware costs
(standardization)(standardization)Lower operations costLower operations cost (client (client services, service desk, upgrade)services, service desk, upgrade)Lower downtime costLower downtime cost
Order of magnitude TCO Impact*: $50-$100Order of magnitude TCO Impact*: $50-$100Order of magnitude TCO Impact*: $50-$100Order of magnitude TCO Impact*: $50-$100
// 17
Proactive monitoringSecure for mobile dev.
Basic email services Email authenticationAV/SPAM blockingHealth monitoring
https email access
B/R all critical servers B/R all servers B/R all servers+desktops
Limited infrastructureLimited or no IT policiesNo standards desktops
Aut. patch mgm Standard images
Current OSAut. sw distributionApp. compatibility testingReference image system
Aut. patch mgm serversAut. app compatibility Aut. reference image sys
AD authentic/authoriz GPO config/security Identity Integration
AV desktopsCentral FWDNS and DHCP
RAS (VPN-TS)IPSec /CertMonitoring srv
FW srv & desktopsSecure wireless SLA monitor desktopsSecurity,
Networking, & Monitoring
Security, Networking, & Monitoring
Identity & Access Mgmt
Identity & Access Mgmt
Desktop EngineeringDesktop Engineering
Secured Messaging Infrastructure
Secured Messaging Infrastructure
Disaster RecoveryDisaster Recovery
Infrastructure Optimization ModelSEAT PG : Year 2004Infrastructure Optimization ModelSEAT PG : Year 2004
Migrating Notes to Exchange
// 18
Architectural SolutionArchitectural Solution
Secured Messaging Secured Messaging InfrastructureInfrastructure
Basic to Basic to RationalizedRationalized
R
// 19
Secured Messaging Secured Messaging InfrastructureInfrastructure
Bu
sin
es
s A
gil
ity
Bu
sin
es
s A
gil
ity
Se
rvic
e L
ev
els
Se
rvic
e L
ev
els
Co
sts
Co
sts
BenefitsBenefits
ChallengeChallenge
Ca
pa
bil
itie
sC
ap
ab
ilit
ies
En
ab
lin
g T
ec
hn
olo
gy
En
ab
lin
g T
ec
hn
olo
gy
SolutionSolution
Secured Messaging InfrastructureMoving from Basic to RationalizedSecured Messaging InfrastructureMoving from Basic to Rationalized
Create a messaging Create a messaging environment that:environment that:
Is reliable and free from Is reliable and free from viruses and SPAMviruses and SPAMProvides simple access to the Provides simple access to the entire organizationentire organizationProvides Provides mobile employeesmobile employees with a real-time alternative to with a real-time alternative to in-office messagingin-office messagingProtects messaging Protects messaging infrastructureinfrastructure from harmful from harmful technologies and attackstechnologies and attacks
Unified directoryUnified directory infrastructure for access infrastructure for access and messagingand messagingSPAM blockedSPAM blocked at at gateway and mailbox storegateway and mailbox storeServer antivirusServer antivirusMonitoring of messaging Monitoring of messaging server healthserver health and and performanceperformanceSimple backup and Simple backup and restorerestore of messaging of messaging itemsitems
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Show allShow all
Ensure end-users can trust corporate Ensure end-users can trust corporate email platform to filter out potentially email platform to filter out potentially harmful virus and SPAMharmful virus and SPAMEnhance business continuity via Enhance business continuity via reduction of harmful technologiesreduction of harmful technologies24x7 planned availability24x7 planned availability
Improve productivity through Improve productivity through problem-free messaging problem-free messaging communicationcommunicationIncrease business responsiveness Increase business responsiveness by providing secured and near by providing secured and near real-time remote access to emailreal-time remote access to email
Lower service costs via:Lower service costs via:Reduced help desk supportReduced help desk support for for harmful technologiesharmful technologiesReduced resources to restore Reduced resources to restore usersusersEfficient use of storageEfficient use of storage with with minimum duplication of minimum duplication of attachmentsattachments
Exchange ServerExchange Server and and security technology to security technology to enable mobile solutionsenable mobile solutions
// 20
Proactive monitoringSecure for mobile dev.
Basic email services Email authenticationAV/SPAM blockingHealth monitoring
https email access
B/R all critical servers B/R all servers B/R all servers+desktops
Limited infrastructureLimited or no IT policiesNo standards desktops
Aut. patch mgm Standard images
Current OSAut. sw distributionApp. compatibility testingReference image system
Aut. patch mgm serversAut. app compatibility Aut. reference image sys
AD authentic/authoriz GPO config/security Identity Integration
AV desktopsCentral FWDNS and DHCP
RAS (VPN-TS)IPSec /CertMonitoring srv
FW srv & desktopsSecure wireless SLA monitor desktopsSecurity,
Networking, & Monitoring
Security, Networking, & Monitoring
Identity & Access Mgmt
Identity & Access Mgmt
Desktop EngineeringDesktop Engineering
Secured Messaging Infrastructure
Secured Messaging Infrastructure
Disaster RecoveryDisaster Recovery
Infrastructure Optimization ModelSEAT PG : March 2006 (Today)Infrastructure Optimization ModelSEAT PG : March 2006 (Today)
SMS,Image
RTC,MobileDev
MOM,VPN,PKI,FWclient
Provisioning
// 21
Basic to Basic to RationalizedRationalized
R
Architectural Solution (MOM, VPN, PKI, FWClient)Architectural Solution (MOM, VPN, PKI, FWClient)Security, Networking, Security, Networking,
and Monitoringand Monitoring
// 22
Bu
sin
es
s A
gil
ity
Bu
sin
es
s A
gil
ity
Se
rvic
e L
ev
els
Se
rvic
e L
ev
els
Co
sts
Co
sts
BenefitsBenefits
ChallengeChallenge
Create a computing Create a computing environment that:environment that:
Provides Provides state-of-the-art state-of-the-art securitysecurityProtects and monitors Protects and monitors critical servercritical server assets assets against harmful technologiesagainst harmful technologiesOptimizes asset utilization to Optimizes asset utilization to maximize business agilitymaximize business agility
Ca
pa
bil
itie
sC
ap
ab
ilit
ies
En
ab
lin
g T
ec
hn
olo
gy
En
ab
lin
g T
ec
hn
olo
gy
SolutionSolution
Security, Networking, & MonitoringMoving from Basic to Rationalized
Secure, reliable Secure, reliable connectivity solution connectivity solution for mobile workforcefor mobile workforce inside/outside corporate inside/outside corporate Protect network trafficProtect network trafficProactive SLA mgmtProactive SLA mgmt In-depth protection with In-depth protection with real-time security and real-time security and firewall mgmt on clients firewall mgmt on clients and serversand servers
* Source: Microsoft, based on Gartner TCO model
Show allShow all
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Security, Networking, Security, Networking, and Monitoringand Monitoring
Access to information Access to information Proactive response to issuesProactive response to issuesReduce downtime through Reduce downtime through improved system reliabilityimproved system reliabilitySecurity plan for maximum Security plan for maximum business continuitybusiness continuity
Improve productivity of distributed Improve productivity of distributed workforceworkforceBusiness continuityBusiness continuityEnsure complianceEnsure complianceMaximize productivity of PC usersMaximize productivity of PC users
VPN Remote accessVPN Remote accessSecure wireless Secure wireless IPSec server isolationIPSec server isolationMonitoring of servers via Monitoring of servers via systems mgmt softwaresystems mgmt softwareFirewall on server and Firewall on server and desktopsdesktops
Lower operations costLower operations costMinimize end-user operations and Minimize end-user operations and downtime costdowntime costImprove SLAs to meet business Improve SLAs to meet business requirements vs. minimize costrequirements vs. minimize cost
Order of magnitude TCO Impact*: $70-$250Order of magnitude TCO Impact*: $70-$250Order of magnitude TCO Impact*: $70-$250Order of magnitude TCO Impact*: $70-$250
// 23
Architectural Solution (Real Time Collaboration)Architectural Solution (Real Time Collaboration)
Rationalized Rationalized to Dynamicto Dynamic
D
Secured Messaging Secured Messaging InfrastructureInfrastructure
// 24
Bu
sin
es
s A
gil
ity
Bu
sin
es
s A
gil
ity
Se
rvic
e L
ev
els
Se
rvic
e L
ev
els
Co
sts
Co
sts
BenefitsBenefits
ChallengeChallenge
Ca
pa
bil
itie
sC
ap
ab
ilit
ies
En
ab
lin
g T
ec
hn
olo
gy
En
ab
lin
g T
ec
hn
olo
gy
SolutionSolution
Secured Messaging InfrastructureMoving from Rationalized to DynamicSecured Messaging InfrastructureMoving from Rationalized to Dynamic
Create a messaging Create a messaging environment that:environment that:
Provides real-time Provides real-time messaging for remote usersmessaging for remote usersIntegrates with mobile Integrates with mobile devicesdevicesProactively manages Proactively manages messaging capabilitiesmessaging capabilitiesAllows for message based Allows for message based instant communicationinstant communication
Security of mobile Security of mobile devices, devices, including remote including remote reset and remote wipereset and remote wipeDetection and advance Detection and advance alerts of potential service alerts of potential service outagesoutagesLive dialog and chatLive dialog and chat
Exchange ServerExchange Server
IT spend optimized to provide remote IT spend optimized to provide remote management of mobile messaging management of mobile messaging devices, proactive service, and instant devices, proactive service, and instant communication capabilitiescommunication capabilities
Enhance business continuity via Enhance business continuity via systems reliabilitysystems reliabilityPotentially 24x7 accessibility with Potentially 24x7 accessibility with instant responseinstant response
Increase productivity via access to Increase productivity via access to network by “qualified” mobile network by “qualified” mobile devices for real-time devices for real-time communicationcommunicationIncrease productivity via quick Increase productivity via quick and immediate accessibility to and immediate accessibility to individuals that can address individuals that can address concernsconcerns
Live Communication Live Communication ServerServer
Potentially 24x7 accessibility with Potentially 24x7 accessibility with instant responseinstant response
Increase productivity via access to Increase productivity via access to network by “qualified” mobile network by “qualified” mobile devices for real-time devices for real-time communicationcommunication
Exchange ServerExchange ServerLive Communication Live Communication ServerServer
IT spend optimized to provide remote IT spend optimized to provide remote management of mobile messaging management of mobile messaging devices, proactive service, and instant devices, proactive service, and instant communication capabilitiescommunication capabilities
Enhance business continuity via Enhance business continuity via systems reliabilitysystems reliabilityPotentially 24x7 accessibility with Potentially 24x7 accessibility with instant responseinstant response
Increase productivity via access to Increase productivity via access to network by “qualified” mobile network by “qualified” mobile devices for real-time devices for real-time communicationcommunicationIncrease productivity via quick Increase productivity via quick and immediate accessibility to and immediate accessibility to individuals that can address individuals that can address concernsconcerns
Show allShow all
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Rationalized Rationalized to Dynamicto Dynamic
D
Secured Messaging Secured Messaging InfrastructureInfrastructure
// 25
Architectural Solution (Provisioning)Architectural Solution (Provisioning)
Rationalized Rationalized to Dynamicto Dynamic
D
Identity & Access Identity & Access ManagementManagement
// 26
Bu
sin
es
s A
gil
ity
Bu
sin
es
s A
gil
ity
Se
rvic
e L
ev
els
Se
rvic
e L
ev
els
Co
sts
Co
sts
BenefitsBenefits
ChallengeChallenge
Ca
pa
bil
itie
sC
ap
ab
ilit
ies
En
ab
lin
g T
ec
hn
olo
gy
En
ab
lin
g T
ec
hn
olo
gy
SolutionSolution
Identity & Access ManagementMoving from Rationalized to Dynamic
Create a computing Create a computing environment that:environment that:
Enables central provisioning Enables central provisioning of users and services across of users and services across all systems in the enterpriseall systems in the enterprise
Centrally administered Centrally administered users and groups across users and groups across the enterprise the enterprise Custom-configured end-Custom-configured end-user experienceuser experience
Ben
efits
Ben
efits
Ben
efits
Ben
efits
Show allShow all
Add/remove users from all systems Add/remove users from all systems within seconds (AD, HR, Sales, etc.)within seconds (AD, HR, Sales, etc.)Dynamically change organization Dynamically change organization charts with all IT services provisioned charts with all IT services provisioned automaticallyautomatically
Access to information across all IT Access to information across all IT systemssystemsRegulatory compliance enforcement Regulatory compliance enforcement (replication)(replication)Reduced time to market for Reduced time to market for applications requiring enterprise applications requiring enterprise identity and role management identity and role management capabilities (e.g. HR portals)capabilities (e.g. HR portals)
Lower IT operations cost to Lower IT operations cost to facilitate dynamic organization facilitate dynamic organization changeschanges
Centrally manage users Centrally manage users provisioning across provisioning across heterogeneous system heterogeneous system with Meta Directorywith Meta Directory
Add/remove users from all systems Add/remove users from all systems within seconds (AD, HR, Sales, etc.)within seconds (AD, HR, Sales, etc.)Dynamically change organization Dynamically change organization charts with all IT services provisioned charts with all IT services provisioned automaticallyautomatically
Access to information across all IT Access to information across all IT systemssystemsRegulatory compliance enforcement Regulatory compliance enforcement (replication)(replication)Reduced time to market for Reduced time to market for applications requiring enterprise applications requiring enterprise identity and role management identity and role management capabilities (e.g. HR portals)capabilities (e.g. HR portals)
Lower IT operations cost to Lower IT operations cost to facilitate dynamic organization facilitate dynamic organization changeschanges
Centrally manage users Centrally manage users provisioning across provisioning across heterogeneous system heterogeneous system with Meta Directorywith Meta Directory
Rationalized Rationalized to Dynamicto Dynamic
D
Identity & Access Identity & Access ManagementManagement
// 27
Proactive monitoringSecure for mobile dev.
Basic email services Email authenticationAV/SPAM blockingHealth monitoring
https email access
B/R all critical servers B/R all servers B/R all servers+desktops
Limited infrastructureLimited or no IT policiesNo standards desktops
Aut. patch mgm Standard images
Current OSAut. sw distributionApp. compatibility testingReference image system
Aut. patch mgm serversAut. app compatibility Aut. reference image sys
AD authentic/authoriz GPO config/security Identity Integration
AV desktopsCentral FWDNS and DHCP
RAS (VPN-TS)IPSec /CertMonitoring srv
FW srv & desktopsSecure wireless SLA monitor desktopsSecurity,
Networking, & Monitoring
Security, Networking, & Monitoring
Identity & Access Mgmt
Identity & Access Mgmt
Desktop EngineeringDesktop Engineering
Secured Messaging Infrastructure
Secured Messaging Infrastructure
Disaster RecoveryDisaster Recovery
Infrastructure Optimization ModelSEAT PG : Dic 2006 (Work in Progress)Infrastructure Optimization ModelSEAT PG : Dic 2006 (Work in Progress)
OSD,BDD
Windows VistaWindows Vista
// 28
Solution AcceleratorSolution Accelerator
Desktop Desktop EngineeringEngineering
// 29
CostsCosts
ProductivityProductivityService LevelService Level
// 30
Rapid Economic Justification Seat Pagine GialleRapid Economic Justification Seat Pagine Gialle
Anno 2001 2002 2003 2004 2005N° PdL 4000 4100 4000 3900 3800
Fleet Mangement 1.368.443€ 1.122.181€ 687.054€ 607.442€ 777.414€ Staging 60.147€ 312.415€ 105.000€ 85.920€ 101.023€ Totale 1.428.590€ 1.434.596€ 792.054€ 693.361€ 878.437€
Rispetto al 2001 0,0% 0,4% -44,6% -51,5% -38,5%€/PdL 357,1€ 349,9€ 198,0€ 177,8€ 231,2€
€ -
€ 200.000
€ 400.000
€ 600.000
€ 800.000
€ 1.000.000
€ 1.200.000
€ 1.400.000
€ 1.600.000
2001 2002 2003 2004 2005
// 32
Manual Deployment Manual Deployment $500 - $1,000 per PC $500 - $1,000 per PC
USMT, ACT, WinPE, RIS, USMT, ACT, WinPE, RIS, PQDI, GhostPQDI, Ghost
Light Touch DeploymentLight Touch Deployment~ $350 per PC~ $350 per PC
Deployment automation with Deployment automation with Zero Touch (SMS, MOM)Zero Touch (SMS, MOM)
Zero Touch Based DeploymentZero Touch Based Deploymentless than $100< per PCless than $100< per PC
Free prescriptive guidance and tools collection for Windows and Office Client deployment
Deployment SavingsDeployment Savings
// 33
Rapid Ecomonic JustificationWhat isRapid Ecomonic JustificationWhat is
Rapid Economic Justification study (TCO calculation, pay back time analisys, ROI) builds a bridge (made of common terms) between IT and business executives to demonstrate how investments in IT benefit the business. It ensures that the IT projects are aligned with the specific business strategies and priorities and all stakeholders (business and IT) are committed to both the process and the final results.
// 34
Assess theBusiness
EstimateBenefits & Costs
SolutionDefinition
Identify theRisks
CalculateFinancial Metrics
Rapid Economic Justification MethodologyRapid Economic Justification Methodology
// 35
Rapid Economic Justification Gruppo BancarioRapid Economic Justification Gruppo Bancario
// 36
Rapid Economic Justification Gruppo BancarioRapid Economic Justification Gruppo Bancario
// 37
Rapid Economic Justification Gruppo BancarioRapid Economic Justification Gruppo Bancario
// 38
- 93,60%
Rapid Economic Justification BDDGruppo BancarioRapid Economic Justification BDDGruppo Bancario
Desktop Desktop EngineeringEngineering
// 39
Conclusions
// 40
Next StepsNext Steps
Assess where you are in the maturity model
Analize high-impact options
Build a plan aligned with your business and IT priorities
Follow IOI Steps
// 41
OpportunityOpportunity
1 IOI Advisory day for you (see in the feedback form)