2. TechnologyChange RegulatoryCompliance Competition Security CostReduction Keep BusinessUp & Running End-User Productivity Customer Connection Business Results& New Value More Pressure Than Ever on IT Budgets 20%New 80%Maintenance … with limited resources for advancing capability
4. Infrastructure Optimization 4 User Experience Application Platform Optimization Model Development STANDARDIZED BASIC ADVANCED DYNAMIC SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process EnterpriseContent Management STANDARDIZED BASIC RATIONALIZED DYNAMIC Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt STANDARDIZED BASIC RATIONALIZED DYNAMIC Securityand Networking DataProtection and Recovery
24. Benefits of Infrastructure Optimization Control costs Greater automation helps drive down maintenance costs Increase agility Improve IT’s ability to respond to and enable business changes Improve security and availability Improve security and ensure availability and data protection
Notes de l'éditeur
Key Message:Amidst all these trends, there’s more pressure than ever on IT. The bulk of IT budgets today is spent just “treading water” rather than adding new business value. Microsoft is focused on trying to help your IT department flip that equation.Talking Points: There are “good” and “bad” pressures on IT. The green arrows represent the good pressure: pressure to add new business value by increasing productivity, driving customer connections, etc. The red arrows represent the “bad” pressures: the necessary, day-to-day pressures that require lots of time, resources, and effort to address but that don’t necessarily push the business ahead. It’s these pressures that consume 80 percent of most IT budgets today, according to analysts; that’s a lot of investment spent on “standing still” when you’d rather be spending resources that add new business value and take the business further. As companies grow, their IT infrastructures grow along with them. But more often that not, the pace of that growth is uneven, driven as much by the conditions under which the infrastructures operate as by the models they aspire to. You add an application here. You add functionality there. You add people across the board. Yet the more variables you add to your infrastructure, the harder it can be to manage and, more importantly, to keep secure. So even as the costs for hardware and software are going down, the costs of managing and supporting your infrastructure are increasing. $140B is spent on management and support—yet software is only 6 percent of it. Software is an enabler…
Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
Begin today to build your roadmap for using IT as an enabler of business growth--Analyze your infrastructure and platform with the Optimization Self-Assessment Tool. The assessment tool provides a personalized and private Optimization score, peer comparison, and value assessment for your organization. The tool generates a comprehensive report that can serve as an actionable roadmap and incentive for optimizing your IT infrastructure and platform. Get answers to questions like: Where does my organization rank on the Optimization model? How do we compare to the competition? What roadmap should we follow? What is the quantifiable value of improving?
Infrastructure Optimization BenefitsCore IO from Microsoft is designed to help control IT costs, improve security and availability, and increase agility to enable customers like you to spend less time and money on maintenance and devote more time to creating and facilitating new capabilities and services to advance the business. Benefits of optimizing your core infrastructure include:Control Costs Higher levels of IT maturity can result in savings of up to 80 percent in IT labor costs. Improve Security and AvailabilityAn optimized core infrastructure can lead to greater business continuity, enhanced compliance, and better, more secure access to network resources. Increase AgilityOrganizations can achieve notable improvements in the ability to provide faster, more responsive IT service and increase agility. The Core Infrastructure Optimization (Core IO) methodology is a comprehensive, proven, and efficient methodology to reduce cost and risk while increasing the security, availability, and agility of the systems in your infrastructure. Core IO is supported with a model, enabling technologies, services, and tools and guidance:ModelThe Core IO model provides a way to think about the challenges that you face, prioritize the areas you want to focus on improving, and organize your activities to pursue those priorities. The model outlines a progression through four levels of optimization and illustrates the strategic value and business benefits of moving from a “basic” level of optimization, where the infrastructure is generally considered a “cost center,” toward a “dynamic” infrastructure, where the business value of the infrastructure is clearly understood and is viewed as a strategic asset.Enabling TechnologiesSupporting each of the Infrastructure Optimization Models are technologies that have been designed to facilitate your progression from a basic level of optimization through to a dynamic level.ServicesTogether, Microsoft Services and an extensive network of Microsoft technology partners provide industry-leading expertise to assist you with your optimization efforts. Microsoft Services has developed a number of Core IO service offerings based on industry best practices, plus Microsoft has established criteria and associated competencies in the Microsoft Partner Program to enable partners to certify that they have the required expertise in delivering advanced-infrastructure solutions.Tools and GuidanceMicrosoft has built an extensive set of resources that fit within the context of Core IO to help you deploy and manage solutions more effectively. These tools and solution guides are free and increase the likelihood of a successful implementation.