SlideShare a Scribd company logo
1 of 15
Delivered by MindShare Services Pvt. Ltd. Prepared for PR - RAJESH BANSAL
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Infrastructure Optimization Building a People-Ready Business ,[object Object],[object Object],[object Object],[object Object],[object Object],Model-Based Approach- Frame Work-Microsoft , Gartner, IDC, MIT
[object Object],[object Object],[object Object],[object Object],[object Object],Infrastructure Optimization Model Stage Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Basic Standardized Rationalized Dynamic
Core Infrastructure   Optimization Model Data Protection and Recovery Identity and Access Management Security and Networking IT and Security Process Desktop, Device, and Server Management Basic Standardized Rationalized Dynamic
Interpreting the Results •   Basic: "We Fight Fires" The Basic IT infrastructure is characterized by manual, localized processes and minimal central control, as well as nonexistent or un‑enforced IT policies and standards for security, backup, image management, and deployment, compliance, and other common IT practices. •   Standardized: "We're Gaining Control" The Standardized infrastructure introduces controls through the use of standards and policies to manage desktops and servers; how machines are introduced to the network; and the use of Active Directory services to manage resources, security policies, and access control. •   Rationalized: "We Enable Business" The Rationalized infrastructure exists where the costs involved in managing desktops and servers are at their lowest, and processes and policies have matured to play a large role in supporting and expanding the business. Security is proactive with rapid response to threats. •   Dynamic: "We're a Strategic Asset" The Dynamic infrastructure provides strategic value that helps the organization run its business efficiently and competitively. Costs are fully controlled. Integration and collaboration between users is pervasive, and mobile users have high levels of service and capabilities.
PR Core IO Assessment  ,[object Object],[object Object]
Organized by the technology capability areas for Core IO, the results show that PR Holdings Pvt. Ltd’s Core Infrastructure has been currently assessed as follows: The results show that PR Holdings Pvt. Ltd’s Core IT Infrastructure has been categorized as basic. PR Holdings Pvt. Ltd's Current Score ,[object Object],[object Object],Basic Standardized Rationalized Dynamic Identity and Access Management √ Desktop, Device, and Server Management √ Security and Networking √ Data Protection and Recovery √ IT and Security Process √
Comparing PR Holdings Pvt. Ltd's to Peers Comparing PR Holdings Pvt. Ltd to similar organizations within Retail industry, located in Asia,   and 40-99 PCs in size, PR Holdings Pvt. Ltd's Application Platform compares to peers as follows:  Core Infrastructure Optimization - Comparison
The Value of Improving PR Holdings Pvt. Ltd was analyzed using per user total cost of ownership (TCO) to estimate the current IT costs, and project the value of improving from basic to the next highest level of standardized. The value estimates are based on IDC, Wi Pro and Alinean research of 600+ worldwide companies as to the benefits they received from core infrastructure optimization. Total savings opportunity per user: Rs10,821.70 Total annual savings for 70 users: Rs757,509.43
Identity and Access Management - Responses PR Holdings Pvt. Ltd's Responses for Identity and Access Management Question Response Does this organization use Active Directory for authenticating 80% or more of their users? Yes Does this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)? No Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems? No Does this organization use a directory-based tool to enable authenticated access to external customers and business partners? No Does this organization use a directory-based solution to allow users to protect content from being copied, printed, or distributed without proper rights or permissions? No Does this organization have a solution for user identity validation and data protection (if lost) for their mobile devices? No Does this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (e.g., certificates)? No What the Identity and Access Management Results Means to PR Holdings Pvt. Ltd Your organization probably has either no common directory service in place or multiple, disconnected user directories resulting in inefficiencies in user experience and authentication. This kind of inefficiency can be reduced by deploying tools to unify user and group identities, access directories, and by giving users visibility across the different directories.
Desktop, Device & Server Management - Responses Question Response Is this organization using virtualization to dynamically manage resource allocation for workloads including moving workloads from server to server based on resource need or business rules? No Does this organization have a desktop image strategy for managing desktop images that includes OS, drivers, anti-virus, management tools, productivity tools (like Office) as well as line of business (LOB) applications? No Does this organization have a layered or thin image strategy for deploying desktop images? No Does this organization have a plan to manage a maximum of two OS versions (not including x64/x86 platform or hardware abstraction layer (HAL)-related multipliers) for 80% of their Desktops? No Does this organization have monitoring for 80% or more of their critical servers for ensuring consistent and reliable user experiences (e.g. ensuring that email is always available)? Yes Does this organization have a service level agreement (SLA)-defined and centralized monitoring solution for 80% or more of their servers with availability reporting capabilities? No Does this organization have model-enabled service level monitoring of desktops, applications and servers? No Is this organization's remote infrastructure managed from a central location? No
Planet Planet Road Map- CONFIDENTIAL
[object Object]

More Related Content

What's hot

IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
baselsss
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
papdev
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
Hitachi ID Systems, Inc.
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
WSO2
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
Shiv Koppad
 

What's hot (20)

KS2 Technologies - Managed Services
KS2 Technologies - Managed ServicesKS2 Technologies - Managed Services
KS2 Technologies - Managed Services
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement Management
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Prolifics Managed Services Offering
Prolifics Managed Services OfferingProlifics Managed Services Offering
Prolifics Managed Services Offering
 
How to Choose an Agency Management System
How to Choose an Agency Management SystemHow to Choose an Agency Management System
How to Choose an Agency Management System
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software Capabilities
 
Are you ready for the transformation
Are you ready for the transformationAre you ready for the transformation
Are you ready for the transformation
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
 
ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
 
NSI Net Factor Advantage
NSI Net Factor AdvantageNSI Net Factor Advantage
NSI Net Factor Advantage
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Services
 
Teradata Customer Services
Teradata Customer ServicesTeradata Customer Services
Teradata Customer Services
 

Similar to Core optimization methodology_benefit ver 1.1

EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
Anita Amelia
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
Smart ERP Solutions, Inc.
 
Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)
Deatra Lopez
 

Similar to Core optimization methodology_benefit ver 1.1 (20)

Core Assesment For Sample Scientific
Core Assesment For Sample ScientificCore Assesment For Sample Scientific
Core Assesment For Sample Scientific
 
Business Intelligenze Corporate
Business Intelligenze CorporateBusiness Intelligenze Corporate
Business Intelligenze Corporate
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf
 
Webinar_CloudOps final.pptx
Webinar_CloudOps final.pptxWebinar_CloudOps final.pptx
Webinar_CloudOps final.pptx
 
MAnish Kumar-G
MAnish Kumar-GMAnish Kumar-G
MAnish Kumar-G
 
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentIntroducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Gayathri Rajaraman
Gayathri RajaramanGayathri Rajaraman
Gayathri Rajaraman
 
Inventory System
Inventory System Inventory System
Inventory System
 
Reduce Costs and Boost Productivity with Infrastructure Automation
Reduce Costs and Boost Productivity with Infrastructure AutomationReduce Costs and Boost Productivity with Infrastructure Automation
Reduce Costs and Boost Productivity with Infrastructure Automation
 
Performance Analytics for IT Operations Management
Performance Analytics for  IT Operations ManagementPerformance Analytics for  IT Operations Management
Performance Analytics for IT Operations Management
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
 
Introducing Express Software Manager
Introducing Express Software ManagerIntroducing Express Software Manager
Introducing Express Software Manager
 
Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentation
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM Checklist
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Core optimization methodology_benefit ver 1.1

  • 1. Delivered by MindShare Services Pvt. Ltd. Prepared for PR - RAJESH BANSAL
  • 2.
  • 3.  
  • 4.
  • 5.
  • 6. Core Infrastructure Optimization Model Data Protection and Recovery Identity and Access Management Security and Networking IT and Security Process Desktop, Device, and Server Management Basic Standardized Rationalized Dynamic
  • 7. Interpreting the Results • Basic: "We Fight Fires" The Basic IT infrastructure is characterized by manual, localized processes and minimal central control, as well as nonexistent or un‑enforced IT policies and standards for security, backup, image management, and deployment, compliance, and other common IT practices. • Standardized: "We're Gaining Control" The Standardized infrastructure introduces controls through the use of standards and policies to manage desktops and servers; how machines are introduced to the network; and the use of Active Directory services to manage resources, security policies, and access control. • Rationalized: "We Enable Business" The Rationalized infrastructure exists where the costs involved in managing desktops and servers are at their lowest, and processes and policies have matured to play a large role in supporting and expanding the business. Security is proactive with rapid response to threats. • Dynamic: "We're a Strategic Asset" The Dynamic infrastructure provides strategic value that helps the organization run its business efficiently and competitively. Costs are fully controlled. Integration and collaboration between users is pervasive, and mobile users have high levels of service and capabilities.
  • 8.
  • 9.
  • 10. Comparing PR Holdings Pvt. Ltd's to Peers Comparing PR Holdings Pvt. Ltd to similar organizations within Retail industry, located in Asia, and 40-99 PCs in size, PR Holdings Pvt. Ltd's Application Platform compares to peers as follows: Core Infrastructure Optimization - Comparison
  • 11. The Value of Improving PR Holdings Pvt. Ltd was analyzed using per user total cost of ownership (TCO) to estimate the current IT costs, and project the value of improving from basic to the next highest level of standardized. The value estimates are based on IDC, Wi Pro and Alinean research of 600+ worldwide companies as to the benefits they received from core infrastructure optimization. Total savings opportunity per user: Rs10,821.70 Total annual savings for 70 users: Rs757,509.43
  • 12. Identity and Access Management - Responses PR Holdings Pvt. Ltd's Responses for Identity and Access Management Question Response Does this organization use Active Directory for authenticating 80% or more of their users? Yes Does this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)? No Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems? No Does this organization use a directory-based tool to enable authenticated access to external customers and business partners? No Does this organization use a directory-based solution to allow users to protect content from being copied, printed, or distributed without proper rights or permissions? No Does this organization have a solution for user identity validation and data protection (if lost) for their mobile devices? No Does this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (e.g., certificates)? No What the Identity and Access Management Results Means to PR Holdings Pvt. Ltd Your organization probably has either no common directory service in place or multiple, disconnected user directories resulting in inefficiencies in user experience and authentication. This kind of inefficiency can be reduced by deploying tools to unify user and group identities, access directories, and by giving users visibility across the different directories.
  • 13. Desktop, Device & Server Management - Responses Question Response Is this organization using virtualization to dynamically manage resource allocation for workloads including moving workloads from server to server based on resource need or business rules? No Does this organization have a desktop image strategy for managing desktop images that includes OS, drivers, anti-virus, management tools, productivity tools (like Office) as well as line of business (LOB) applications? No Does this organization have a layered or thin image strategy for deploying desktop images? No Does this organization have a plan to manage a maximum of two OS versions (not including x64/x86 platform or hardware abstraction layer (HAL)-related multipliers) for 80% of their Desktops? No Does this organization have monitoring for 80% or more of their critical servers for ensuring consistent and reliable user experiences (e.g. ensuring that email is always available)? Yes Does this organization have a service level agreement (SLA)-defined and centralized monitoring solution for 80% or more of their servers with availability reporting capabilities? No Does this organization have model-enabled service level monitoring of desktops, applications and servers? No Is this organization's remote infrastructure managed from a central location? No
  • 14. Planet Planet Road Map- CONFIDENTIAL
  • 15.

Editor's Notes

  1. 02/23/11 01:24 ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.