Presentation on theme: "Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses."— Presentation transcript:
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses
How to use this deck This deck was designed to provide the world- wide field with a customer-ready TDM level presentation. Use this presentation as is or customize it to meet your needs. This deck can also be “partnerized” if you wish to leverage it as a through-partner resource. If you choose to “partnerize” it please be sure to follow world wide partner branded guidelines.
Agenda IT Challenges Core IO Technology Solutions Customer Scenarios
Microsoft’s Promises to IT: Enabling IT Pros and Development Teams Across the IT Lifecycle
Linking IT to Performance Companies in the top 25% of IT capability grew revenue 6.8% faster per year than their peers in the bottom 25% of IT capability. The firms in the top 25% of IT capability enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability. Isolating the impact of all IT functions on productivity shows that IT Infrastructure is a key determinant of superior productivity. Managers in firms that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business. Sources: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006 Information technology fuels profitable revenue growth Firms with better IT have more productive employees Robust IT infrastructure is a key driver of productivity and growth Information technology gives managers more insight and control
IT as a Strategic Asset Align IT with the business; control complexity IT Goals Establish a Responsive Infrastructure Proactively leverage IT investments to meet business needs Eliminate Unnecessary Complexity Manage IT resources efficiently by eliminating unnecessary redundancy, reducing manual tasks and lowering costs Ensure Your Business Is Always Running Use IT as a trusted partner in meeting business goals Move from complexity to efficiency
Management – The Manual Reality People intensive nature drives costs Those people are spending their time on manual tasks 53%24%23% 54%17%29% 56%17%28% 58%18%24% 60%16%24% 62%14%25% Percent of Reponses Degree of Automation ManualScripts Automated Tools Source: IDC 2002, Microsoft Primary Quantitative Research. 400, 30 min phone surveys of IT professionals in data centers with 25 or more servers Over 60% of TCO over a 5 year period driven by people costs
Does Your Infrastructure Look Like This? Pieced together No end-to-end architecture Requires lots of manual intervention Not sure if it’s secure
A More Secure and Well Managed Infrastructure for Midsized Businesses Printer Workstations WAP PDA Home Office Branch/Remote Office Network Srv Windows Server 2003 R2 Core Services AD/GPO IAS DNS, DHCP, WINS IIS CertService File/Print Messaging Srv Windows Server 2003 R2 Core Services AD/GPO IAS DNS, DHCP, WINS IIS Exchange OWA Management Srv Windows Server 2003 R2 Core Services SC Essentials WSS R2 RIS
How Do You Get There? Cost Center Uncoordinated, manual Infrastructure Knowledge not captured More Efficient Cost Center Managed IT Infrastructure with limited automation and knowledge capture Managed and consolidated IT Infrastructure with extensive Automation, knowledge captured and re- used Fully automated management, dynamic resource Usage, business linked SLA’s. Knowledge capture automated and use automated Business Enabler Strategic Asset Infrastructure Optimization Model
Key Drivers People, Process and Technology Desktop, Server and Device Management Security and Networking Identity and Access Management Data Protection and Recovery IT Process and Policy
Technology View of Model One Example No server- based identity or access management Users operate in admin mode Limited or inconsistent use of passwords at the desktop Minimal enterprise access standards Active Directory for Authentication and Authorization Users have access to admin mode Security templates applied to standard images Desktops not controlled by group policy Active Directory group policy and security templates used to manage desktops for security and settings Desktops are tightly managed Centrally manage users provisioning across heterogeneous systems
Reactive Ad hoc Problem- Driven “Avoiding Downtime” Reactive Stable IT Request Driven Change Management and Planning “Keeping It Running” Proactive Accountable Increased Monitoring Formal Change Management SLA’s Improvement Predictability “Quality Driven” Proactive Optimizing Costs and Quality Agile Self Assessing and Continuous Improvement “Taking The Lead” Most effort spent in: Process Culture View Operations Framework/ITIL in IOM
Cost Reduction Uncoordinated, manual infrastructure Managed IT Infrastructure with limited automation Managed and consolidated IT Infrastructure with maximum automation Fully automated management, dynamic resource Usage, business linked SLA’s IT Labor Costs $774$542 $261 Basic to Rationalized: IT Labor Costs reduced $513 (66%) $232 (30%) $281 (52%) IT Labor Infrastructure Optimization Model
Best Practices Lower IT Costs Best Practice Research Supports IT Maturity Basic = 0-2 Best Practices Adopted Standardized = 3-4 Best Practices Adopted Rationalized = 5-6 Best Practices Adopted Best Practice Annual Benefit per PC IT Tasks ImprovedEnabling MS Technology 1: OS Standardization$52 Image Management Image Management Desktop Administration Desktop Administration Service Desk/Deskside Support Service Desk/Deskside Support Vista WIM Image Management Vista WIM Image Management Vista Virtualization Vista Virtualization 2: Centrally Managed PC Firewall $39 Security & Patching Security & Patching Desktop Administration Desktop Administration Service Desk/Deskside Support Service Desk/Deskside Support Vista Firewall Vista Firewall Active Directory Active Directory Group Policies Group Policies 3: Automated Password Reset$29 Service Desk/Deskside Support Service Desk/Deskside Support 3 rd Party 3 rd Party 4: Users Cannot Install Software $50 Application Management Application Management Desktop Administration Desktop Administration Service Desk Service Desk Vista User Account Protection Vista User Account Protection Active Directory/Group Policies Active Directory/Group Policies Automated SW Deployment (SMS) Automated SW Deployment (SMS) 5: Users Cannot Change Settings $30 Application Management Application Management Desktop Administration Desktop Administration Service Desk/Deskside Support Service Desk/Deskside Support Vista User Account Protection Vista User Account Protection Active Directory Active Directory Group Policies Group Policies 6: Automated Software Distribution $26 Application Management Application Management Desktop Administration Desktop Administration Security & Patching Security & Patching Active Directory/Group Policies Active Directory/Group Policies Vista Windows Installer Service Vista Windows Installer Service Systems Management Server (SMS) Systems Management Server (SMS)
The Foundation for Midsize Businesses to A More Secure and Well Managed Infrastructure
Technology Solutions Identity and Access Management
Identity and Access Management Challenges No centralized management of user identity Users have multiple digital identities User name Password
Active Directory The Solution – Active Directory Provide single sign-on Enforce password security Implement scalable centralized management Robust replication Application- friendly Policy Driven Security Simplified administration Scalable infrastructure
Identity and Access Management Single sign-on Centralized accounting Application Integration Standardized Security Policies controlled and enforced Access control through security polices Delegation of administration as necessary Rationalized Single sign-on Centralized accounting Application Integration Dynamic Automated User Provisioning
Reducing Cost and Complexity of Infrastructure Reduce administration costs Consolidating domains and application directories on Windows Server 2003 and Active Directory. Realizing problem resolution with System Center Essentials. Using group policy and software tools to easily make one-to-many changes, drastically reducing the manual effort and cost of security administration. (Active Directory, WSUS, GPMC). Reducing the possibility that users will make configuration changes or install unauthorized software that decreases the security of your infrastructure by locking down user desktops (Active Directory, Group Policy). Minimizing local administration & local back-up (Branch). Reducing the cost of desktop support and decreasing the cost of keeping systems updated with Windows Vista. Increase efficiency Drastically reducing the manual effort of security administration using group policy and software tools to easily make one-to-many changes,. (Active Directory®, WSUS, GPMC). Minimizing local administration & local back-up (Branch). Proactively reducing time to diagnose, troubleshoot, and repair unauthorized configuration changes or software installations.
Technology Solutions Security and Networking
Security Threats and Challenges Messaging Challenges Network Challenges Protection from attacks Threat alerts Secure Remote Access to the network Security connectivity to Remote Offices Secure Publishing of Applications External viruses Internal viruses SPAM Access for Remote / Mobile Users
Solution - Powerful Tools Built on Proven Technology Comprehensive Control & protection of: Operating systems Servers Server applications Network “edge” Content Current & emerging threats 24/7 research & response Heterogeneity through partner ecosystem Integrated Cross-product integration MSFT security products MSFT server apps Integrates with existing Microsoft IT infrastructure Integration with ecosystem partners Simplified Centralized management Unified state view & analytics Simplified deployment Integrates into existing IT infrastructure Choice of form factors Prescriptive guidance
ISA Server 2006 Firewall Secure NAT and Web high performance Web caching VPN Connectivity (inbound and site-to-site) Secure Application Publishing Integrates with Active Directory Integrates with ForeFront Security (SPAM) Integrates with Exchange (SPAM and OWA) Familiar, easy to use, MMC interface Centralized console Alerting and monitoring built in Comprehensive Integrated Simplified
Forefront Security for Exchange Manage up to eight scan engines Eliminate single point of failure Minimize window of exposure during outbreaks Quarantine Antigen for Exchange Scan Engine 1 Scan Engine 4 Scan Engine 2 Scan Engine 3
Branch and Remote Office Security Headquarters Remote Office Site-to- site VPN Integrated security Application filtering, BITS caching Fast, secure access HTTP compression, traffic prioritization Efficient management Easy deployment, fast propagation of policies
Security and Networking Multi-layer defense Servers and Server protected from viruses protected from SPAM Centralized management of Anti-virus software Centralized updates to Antivirus Software Access controlled through firewall policies Standardized Rationalized Dynamic
Technology Solutions Desktop and Server Management
Management Challenges ….. “Keeping OS and applications updated with the latest patches wastes my time” “Server outages are the biggest risk to my organization. I need watchdog features to reboot servers or monitor whether they are running” “I need better support for remote management for all my customers” “End-user troubleshooting is manual for us – telephone, , and remote desktop in XP” “Right now our hardware and software inventory is in spreadsheets, and it’s hard to pull it all together”
Solution Simplified infrastructure management Security management Updated and automated security features are built right in, so your IT staff can help secure vital business information without taking unknown risks. Emergency management Advanced management tools enable your IT staff to configure and manage desktops and servers to minimize disruption so people can get the information they need, when they need it. Operations management Your IT staff can more easily keep the IT environment available to authorized users to enable a higher level of productivity.
Group Policy for Desktop Control Manage user and computer environments Enforce IT policies Simplify administrative tasks Implement security settings
Announcing… Single console designed with simplicity Easily secure, update, monitor and track your entire IT environment More effectively service and support users Support for management services An integrated management solution designed for medium sized businesses with ~ PCs
Key capabilities Simple Installation 10 click installation for easy setup Getting started wizards Out of the box wizards to configure SCE Unified management console A single easy to use console to manage your environment Reporting Report on health, availability, compliance and IT assets Notifications and health reports Be notified of problems via , page or SMS text message when not at your desk
Management and Control Attributes Standardized Operating System Automatic updates enabled Users can’t install their own software User not allowed to configure their desktops Centralized monitoring of critical servers Fully automated software distribution Centralized monitoring of server and workstations Standardized Rationalized Dynamic
Technology Solutions Data Protection and Recovery
Backup and Recovery Backup and Recovery in place for critical servers Backup and Recovery in place for all servers Fully automated backup and recovery Standardized Rationalized Dynamic
Improved security Technology-Savvy Law Firm Gains Easier Remote Access from Any Computer Situation Security, connectivity, and support issues for remote users Solution Deploy a clientless remote access solution using Microsoft technologies that provides lawyers secure, improved, remote access to corporate network resources from virtually anywhere in the world Benefits Increased security Simplified management Easy-to-use remote access to all network resources “ISA Server improves security for us in several areas. It eliminates local files from being stored on the remote computer, helps prevent suspect PCs from connecting to our network, and exposes a small surface area to the Internet.” —Robert Musial, Director of Information Systems, Kirkpatrick & Lockhart Nicholson Graham LLP
Reduce Costs and Complexity Professional services organization with 4 remote branch locations realizes increased employee productivity with the ability to access and share centrally stored files and documents plus increased up-time with central IT management Situation Branch office staff needs to access centrally published documents for proposal development, project planning, and knowledge transfer, and collaborate with each other, including those in different branches. With no on-site IT administrator, they also need to make sure their systems can be centrally monitored and updated for increased security and availability. Solution Deploy Windows Server 2003 R2 in each branch office enabling staff to access files and collaborate. Install System Center Essentials 2007 at the main office to centrally monitor and updated branch clients, servers and applications. Benefits Enhanced employee productivity with better connectivity and reliability Decreased TCO – Up to 50% WAN traffic reduction Increased Security Simplified Management from central office
Enhance Productivity Situation Over the years, the company’s messaging system has become an indispensable part of its business. APA is looking at new ways to use technology to support communication and collaboration. Solution APA migrated its employees to Microsoft® Exchange Server 2007 and is using it as a foundation for providing its users with advanced unified messaging and mobility solutions. Benefit Seeking new ways of using technology to improve its processes and keep its employees connected, APA deployed Microsoft® Exchange Server The simplified administrator interface enables the network administrator to perform large management tasks in seconds. Local Continuous Replication helps to protect the system against disk failure or data corruption. APA is currently deploying unified messaging and mobility features to give APA employees access to their , calendar, and contacts even when an Internet connection isn’t available. “When I told our executives that they could listen to their along with their voic messages within Exchange Server 2007, they were thrilled.” Steve Gould, Network Administrator, APA Trade association improves administrator and end-user productivity with anywhere access to next-generation messaging system
Simplified Infrastructure Management On-line sales company realizes increased system reliability and lower TCO of IT infrastructure with a unified IT management solution Situation On-line sales company depends directly on the reliability of their IT systems to generate sales and revenue. Any web server downtime can lead to lost sales. The more proactively and efficiently their IT staff can manage their infrastructure, the more reliable their systems and the healthier their sales. Solution Deploy System Center Essentials 2007 as the unified IT management solution, and deploy Windows Server 2003 R2 for web servers. Benefits Increased IT system uptime Unified IT management console Quicker IT problem resolution Improved security of clients and servers System Center Essentials 2007 is easy to deploy and maintain, helping simplify complex management tasks for increased IT efficiency.
IT Capability Predicts Profitable Growth The Enterprise IT Capability Study demonstrates that: Better information technology (IT) makes a quantifiable, positive difference in business performance. More productive employees. The firms in the top 25 percent of IT capability enjoy 23 percent higher revenue per employee than their peers in the bottom 25 percent of IT capability. Isolating the impact of all IT functions on productivity shows that IT infrastructure is the key determinant of achieving superior productivity. Information technology makes managers more effective. Keystone Strategy, Inc., conducted under the direction of Professor Marco Iansiti of the Harvard Business School 2005 Information Technology Fuels Revenue Growth. Companies in the top 25 percent of IT capability grew revenue 6.8 percent faster per year than their peers in the bottom 25 percent of IT capability.
Your Call To Action This slide should be customized for each subsidiaries specific CTAs.