Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tim Rowe Infrastructure Optimization Lead

Similar presentations


Presentation on theme: "Tim Rowe Infrastructure Optimization Lead"— Presentation transcript:

1 Tim Rowe Infrastructure Optimization Lead timrowe@microsoft.com
4/26/ :25 AM Engage Your Customers On Infrastructure Optimization To Create New Sales Opportunities Tim Rowe Infrastructure Optimization Lead © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Agenda Why – What’s the Problem/Opportunity?
What – What’s the Solution? How – What’s the Engagement Process? Who – What’s the Market? Resources Commitments Microsoft Partners

3 Transforming Infrastructure, Making IT Matter
4/26/ :25 AM Transforming Infrastructure, Making IT Matter We need to harness the power of technology to improve IT infrastructure agility, cost, and quality of service 70% of IT budgets are spent maintaining what we have Speed is a major business differentiator in a connected world IT infrastructure must empower users in a people ready business © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 Enterprise IT Challenges
4/26/ :25 AM Enterprise IT Challenges Growth Customer service Regulatory compliance Device management Varying skill sets Mobility PC maintenance Server sprawl Legacy platforms Deployment and maintenance Identity management Software updates Malicious attacks, viruses, spam, etc. Evolving threats Patch management, VPN, etc. Secure access (employees, partners and customers) © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Meeting The Challenge: Infrastructure Optimization
4/26/ :25 AM Meeting The Challenge: Infrastructure Optimization Application Platform Infrastructure Optimization Model Business Productivity Infrastructure Optimization Model Core Infrastructure Optimization Model Technology sequencing framework Maps IT to business needs Cost reduction, security & efficiency gains Backed by analysts Guidance and best practices Discovery process uncovers opportunities 5 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 5

6 Evolution Of Microsoft’s Business Imperatives
4/26/ :25 AM Evolution Of Microsoft’s Business Imperatives FY07 People Ready Business and Customer Campaigns Build Customer Connections Improve Compliance Drive Business Performance Drive Business Performance Drive Real World Business Processed Find, Use and Share Information Enable Your Mobile workforce Learnings Evolve to Customer Campaigns: Six campaigns target business decision makers and focus on driving business growth. Three campaigns target IT decision makers and focus on reducing cost and infrastructure complexity and risk through infrastructure optimization: Core Infrastructure Business Productivity Infrastructure Application Platform Infrastructure FY06 GTMS Infrastructure Optimization Initiative Learnings FY05 GTMS Desktop Deployment Initiative 6 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 Linking IT to Business Performance
4/26/ :25 AM Linking IT to Business Performance Information technology fuels profitable revenue growth Companies in the top 25% of IT capability grew revenue 6.8% faster per year than their peers in the bottom 25% of IT capability Firms with better IT have more productive employees The firms in the top 25% of IT capability enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability Robust IT infrastructure is a key driver of productivity and growth Isolating the impact of all IT functions on productivity shows that IT Infrastructure is a key determinant of superior productivity Managers in firms that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business Information technology gives managers more insight and control Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 4/26/ :25 AM IT Leaders Make Smart Investments in Architecture and IT Infrastructure “Some people say airlines are powered by jet fuel, but this airline is powered by its IT infrastructure” – President Dave Barger “Accelerated growth could not have been achieved without our state-of-the-art computer systems” – WalMart ISD IT Infrastructure “Highly scaleable infrastructure handles 1.8 billion real-time messages per day and 50K trades per second” – TIBCO Based on Architecture and Infrastructure investments, cut 30% of IT budget, improved interoperability and agility – Gartner © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9 4/26/ :25 AM Why Leaders Reap Benefits from Architecture-driven IT Infrastructure Investments Lower IT Operating Costs Giga: implementing Enterprise Architecture [yields] 20% savings in annual IT operating budget Gartner: Architecture can provide savings of 10% to 20% of infrastructure costs Giga: penalty of 10% of project cost and 25% of project elapsed time with non-standard technology architecture Strategic Agility Gartner: Enterprise IT Architecture gives 30% improvement in ability to deal with changing external drivers MIT: Correlated top performers with high capability IT infrastructure and standards Increased Productivity Forrester: 40% productivity gap between leaders and laggards in IT investment © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

10 Best Practices Drive Down TCO
4/26/ :25 AM Best Practices Drive Down TCO 14 private-industry organizations surveyed on IT labor Costs Costs mapped to Best Practices, technology in use Finding -> IT maturity level can be mapped to 6 key best practices 44% IT Labor Cost benefit comes from 6 key Best Practices (total $226/PC) Best Practice Research Supports Infrastructure Optimization Basic = 0-2 Best Practices Adopted Standardized = 3-4 Best Practices Adopted Rationalized = 5-6 Best Practices Adopted Best Practice Annual Benefit per PC IT Tasks Improved Enabling MS Technology 1: OS Standardization $52 Image Management Desktop Administration Service Desk/Deskside Support Vista WIM Image Management Vista Virtualization 2: Centrally Managed PC Firewall $39 Security & Patching Vista Firewall Active Directory Group Policies 3: Automated Password Reset $29 3rd Party 4: Users Cannot Install Software $50 Application Management Service Desk Vista User Account Protection Active Directory/Group Policies Automated SW Deployment (SMS) 5: Users Cannot Change Settings $30 6: Automated Software Distribution $26 Vista Windows Installer Service Systems Management Server (SMS) © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11 Best Practices That Optimize Infrastructure
4/26/ :25 AM Best Practices That Optimize Infrastructure 4. Identity management = $154/PC Single AD to authenticate/manage all PCs Single Sign-On Automated user provisioning with a meta directory sync’d to all ent-wide directories Automated password reset 3. PC mgmt w/ Standards Compliance = $220/PC Run as standard users Install only IT sanctioned software Change only IT sanctioned settings Have automated software distribution 2. Comprehensive PC security = $155/PC 90+% mobile PCs have Firewall, Network Access Control 90+% mobile & desktops have Antispyware, Antivirus Automated patch management (push) 1. Desktop standardization = $134/PC 3-4 yr plan to maintain hw, sw configurations Standardize on a single OS Deploy latest OS within 18 mos of availability Single corporate image Source: GCR & IDC data analyzed by Microsoft, 2006 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Infrastructure Optimization Improves IT Efficiency
4/26/ :25 AM Infrastructure Optimization Improves IT Efficiency 700 600 500 400 PCs managed per IT FTE 300 200 100 PCs Managed / FTE Cost / PC $774-$1,320 172 $580 442 $230 Note: Wide variability in IT labor/PC for basic customers due to lack of manageability Source: GCR data analyzed by Microsoft; IDC data, 2006 Profiled Organization © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 Why Partners? Scale Capacity Expertise
4/26/ :25 AM Why Partners? Scale MSPP Competencies Core Infrastructure: Information Work Solutions Networking & Advanced Infrastructure Security Solutions Business Productivity Infrastructure: Data Management Solutions Application Platform Infrastructure: Custom Development Solutions Business Process and Integration ISV Solutions Capacity Expertise © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

14 Partner Opportunity Deployment services
4/26/ :25 AM Partner Opportunity Deployment services Worldwide Market Desktop Deployment $179B What does this mean? Substantial growth in desktop services over the next three years fueled by Windows Vista and 2007 Microsoft Office system Windows® and applications deployment growing fast Your customers will be looking for help $160B $143B $33B $150B $28B $23B $83B $100B $81B $78B $50B $63B $52B $42B CY 04 CY 06 CY 08 Windows OS/Apps PC Hardware Desktop Services Source: IDC (“Assessing The Partner Opportunity For Deploying Microsoft Windows XP And Office 2003” January 2005) © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

15 What Does $33 Billion Mean In Your Accounts?
4/26/ :25 AM What Does $33 Billion Mean In Your Accounts? The world has changed Malicious activities and viruses Widespread access to information Increased mobile needs Your customers are dealing with this daily Basic (outdated) infrastructures are challenging Super high costs, unreliable, un-secured Basic infrastructures are everywhere Customers may or may not know they are in this situation – that is your opportunity Partner Deployment Opportunity Ideal timing Y2k refresh is 6-7 years old New desktop focus in the next year (2007 Office system, Windows Vista) Customers will have their own incentives and timing to move Deployment: Lower risk for customers and more lucrative for partners Desktop Deployment Planning Services Tools updates – BDD Accelerator, ORK Early training on 2007 Office system and Windows Vista Continued alignment with core zero-touch Deployment = Great partner opportunity © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 15

16 Growing Enterprise Business Through IO
4/26/ :25 AM Growing Enterprise Business Through IO "The combination of INS' long standing security practice, credentials, expertise, and focus on business enabling security solutions with Microsoft's Infrastructure Optimization Maturity Model represents a unique dynamic that will continue to strengthen our partnership alliance and greatly benefits our combined clientele. We see this as a clear win-win proposition for everyone." - Jim Tiller, CSO International Network Services Inc “IO has been a positive force in engaging with enterprise customers and a great roadmap to follow in migrating them to the next infrastructure maturity level with our joint Citrix-Microsoft solutions”  - Garry Olah Alliance VP, Citrix Corporate Development Avanade has embraced the Microsoft IO framework in our solutions approach and will use it as a basis to help customers address their IT infrastructure to keep their business moving forward." - Larry LeSueur, Vice President, Technology Infrastructure Solutions "Getronics delivers Infrastructure Optimization (IO) solutions, such as RDX, that help our clients automate desktop & server migration and deployment. With RDX, our clients save substantial time and money when migrating their environments from legacy operating platforms to a rationalized and dynamic state of the art technology and maturity. This has opened the door to other optimization projects for Getronics and our pipeline continues to grow as a by-product of IO". - Brad Gleason Global Service Director, Technology Transformation Services © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 Core Infrastructure Optimization
4/26/ :25 AM Core Infrastructure Optimization More Efficient Cost Center Business Enabler Strategic Asset Cost Center Managed and consolidated IT Infrastructure with extensive Automation, knowledge captured and re-used Fully automated management, dynamic resource Usage , business linked SLA’s. Knowledge capture automated and use automated Uncoordinated, manual Infrastructure Knowledge not captured Managed IT Infrastructure with limited automation and knowledge capture © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

18 Core Infrastructure Optimization Model
4/26/ :25 AM Core Infrastructure Optimization Model Identity and Access Management Desktop, Server and Device Management Security and Networking Data Protection and Recovery IT Management & Security Process CROSS-MODEL ENABLERS Identity Presence Rights Mgmt Network Access Microsoft Confidential 18 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 18

19 Business Productivity Infrastructure Optimization
4/26/ :25 AM 4/26/ :25 AM Business Productivity Infrastructure Optimization Cost Center Uncoordinated, manual Infrastructure. Mostly shadow IT More Efficient Cost Center IT standards in place, but limited management and governance of usage. Shadow IT still exists Business Enabler Fully managed and provisioned IT infrastructure to meet business needs. No shadow IT Strategic Asset Business-linked SLAs. User empowerment - with IT in control - to meet the demands for a people-ready business The Infrastructure Optimization Model from Microsoft has been developed using Industry best practices, Microsoft’s own experiences with its enterprise customers, and is based upon Gartner’s Infrastructure Maturity Model and MIT’s Architecture Maturity Model. A key goal for Microsoft in creating the Infrastructure Optimization Model was to develop a simple way to use a maturity framework that is flexible and can easily be used as the benchmark for technical capability and business value. The Infrastructure Optimization Model from Microsoft helps customers understand and subsequently improve the current state of their IT infrastructure and what that means in terms of cost, security risk and operational agility. Dramatic cost savings can be realized by moving from an unmanaged environment towards a dynamic environment. Security improves from highly vulnerable in a Basic infrastructure, to dynamically proactive in a more mature infrastructure. IT Infrastructure Management changes from highly manual and reactive to highly automated and proactive. Microsoft and Partners can provide the technologies, processes and procedures to help customers move up through the Infrastructure Optimization Journey. Process moves from fragmented or non-existent to optimized and repeatable. A customer’s ability to use technology to improve their business agility and deliver business value increases as they move from the Basic state up the continuum toward a Dynamic state empowering information workers, managers and supporting new business opportunities. By working with Microsoft and using this model as a framework, an enterprise can quickly understand the strategic value and business benefits to the organization in moving from a “basic” level of maturity (where the IT infrastructure is generally considered a “cost center”) towards a more “dynamic” use when the business value of the IT infrastructure is clearly understood and the IT infrastructure is viewed as a strategic business asset and business enabler. © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 19 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

20 Business Productivity Infrastructure Optimization Model
4/26/ :25 AM Business Productivity Infrastructure Optimization Model Collaborative Workspaces & Portals Messaging IM/Voice Web Conferencing Communication & Collaboration Enterprise Content Management Document & Records Management Web Content Management Forms Management Search Business Intelligence Performance Management Reporting &Analysis Data Warehousing CROSS-MODEL ENABLERS Messaging Portals Search Forms Microsoft Confidential 20 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

21 Application Platform Infrastructure Optimization
4/26/ :25 AM 4/26/ :25 AM Application Platform Infrastructure Optimization Cost Center Brittle, unconnected applications and platforms More Efficient Cost Center Standards-based, flexible business applications Business Enabler Adaptive application platform driving core applications and business processes Strategic Asset Fully service-oriented, dynamic application platform The Infrastructure Optimization Model from Microsoft has been developed using Industry best practices, Microsoft’s own experiences with its enterprise customers, and is based upon Gartner’s Infrastructure Maturity Model and MIT’s Architecture Maturity Model. A key goal for Microsoft in creating the Infrastructure Optimization Model was to develop a simple way to use a maturity framework that is flexible and can easily be used as the benchmark for technical capability and business value. The Infrastructure Optimization Model from Microsoft helps customers understand and subsequently improve the current state of their IT infrastructure and what that means in terms of cost, security risk and operational agility. Dramatic cost savings can be realized by moving from an unmanaged environment towards a dynamic environment. Security improves from highly vulnerable in a Basic infrastructure, to dynamically proactive in a more mature infrastructure. IT Infrastructure Management changes from highly manual and reactive to highly automated and proactive. Microsoft and Partners can provide the technologies, processes and procedures to help customers move up through the Infrastructure Optimization Journey. Process moves from fragmented or non-existent to optimized and repeatable. A customer’s ability to use technology to improve their business agility and deliver business value increases as they move from the Basic state up the continuum toward a Dynamic state empowering information workers, managers and supporting new business opportunities. By working with Microsoft and using this model as a framework, an enterprise can quickly understand the strategic value and business benefits to the organization in moving from a “basic” level of maturity (where the IT infrastructure is generally considered a “cost center”) towards a more “dynamic” use when the business value of the IT infrastructure is clearly understood and the IT infrastructure is viewed as a strategic business asset and business enabler. © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 21 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

22 Application Platform Infrastructure Optimization Model
4/26/ :25 AM Application Platform Infrastructure Optimization Model User Experience Client Technologies Designer Data Management Custom LOB – Data Infrastructure ISV LOB – Data Infrastructure Relational Data Warehouse SOA and Business Process Arch/Dev Methodology Integration Process B2B Development Development Platform SDLC Custom Applications Data Warehousing Reporting & Analysis Performance Management Business Intelligence Microsoft Confidential 22 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 22

23 Building The Infrastructure For A People-Ready Business
4/26/ :25 AM Building The Infrastructure For A People-Ready Business 23 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 23

24 Core IO: Recommended Execution Process
4/26/ :25 AM Core IO: Recommended Execution Process Step 1: Discovery Step 2: Opportunity Identification Infrastructure Revenue potential Priorities Resource Allocation Account Strategy Relevance Deeper Relationships Customer Satisfaction Step 4: Project Definition & Execution Services Step 3: Customer Briefing Consistent, relevant messaging based on account maturity Clear partner message & opportunity Illustrating MS Value Customer satisfaction © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

25 Field Execution Process
4/26/ :25 AM Field Execution Process STEP 1: ATS conducts discovery STEP 4: ATU – Account plan agreed to with Customer STEP 5: Opportunities created in Siebel and handed off to Specialists… Infrastructure Optimization Models BP – SSP IW AP – SSP AP Core Infra – ATS MS Opportunities STEP 3: ATU reviews list of opportunities with Customer STEP 2: ATU analyzes discovery results and identifies potential opportunities …or directly to Partners or MCS Partners or MCS Opportunities will be around Business Value/Benefit, Strategic/Tactical technology play, competitive, revenue focused. Then, a number of thse would be retained/MS-led and others would go to partner/PTU/PAM. Partner/MCS Opportunity Internal Discussion/ MS View Customer Discussion/View Leverage EPG Ecosystem Relationship Management/Account Planning Opportunity Management/MSSP © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 25

26 Microsoft IO Framework Example – Determining Optimization Roadmap
Security and Networking Anti-virus on desktops Centralized firewall Basic networking Secure remote access Policy- managed firewall on server and desktop Fully automated IT management and mitigation Quarantine solution No standards Central configuration and authentication Information protection infrastructure Centralized administration Federated identity management Identity & Access Mgmt No common identity management model Identity management for user identification Automated software distribution and asset management Application compatibility solution Layered image strategy Secure mobile device provisioning Desktop, Device and Server Management Automated patch management Standard desktop images Mission critical server monitoring Mobile device provisioning No desktop standards, many images, no management standards Capacity analysis solution Application push to mobile devices Fully automated IT management Data Protection and Recovery No formal procedures in place Mission critical server back-up/recovery Back-up/restore on all servers Fully automated IT management IT and Security Process Proactive, accountable Defense-in-depth policy for Web server security Fail safes for attacks are in place Proactive Optimizing cost and quality Efficient Web server security All security processes & policies in place Ad-hoc Lack of standard security policies Reactive, stable IT Formal security policies defined © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 Microsoft IO Framework Example – Plot of Current Optimization State
Security and Networking Anti-virus on desktops Centralized firewall Basic networking Secure remote access Policy- managed firewall on server and desktop Fully automated IT management and mitigation Quarantine solution No standards Central configuration and authentication Information protection infrastructure Centralized administration Federated identity management Identity & Access Mgmt No common identity management model Identity management for user identification Automated software distribution and asset management Application compatibility solution Layered image strategy Secure mobile device provisioning Desktop, Device and Server Management Automated patch management Standard desktop images Mission critical server monitoring Mobile device provisioning No desktop standards, many images, no management standards Capacity analysis solution Application push to mobile devices Fully automated IT management Data Protection and Recovery No formal procedures in place Mission critical server back-up/recovery Back-up/restore on all servers Fully automated IT management IT and Security Process Proactive, accountable Defense-in-depth policy for Web server security Fail safes for attacks are in place Proactive Optimizing cost and quality Efficient Web server security All security processes & policies in place Ad-hoc Lack of standard security policies Reactive, stable IT Formal security policies defined © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 Microsoft IO framework Example – Plot of Future Optimization State
Security and Networking Anti-virus on desktops Centralized firewall Basic networking Secure remote access Policy- managed firewall on server and desktop Fully automated IT management and mitigation Quarantine solution No standards Central configuration and authentication Information protection infrastructure Centralized administration Federated identity management Identity & Access Mgmt No common identity management model Identity management for user identification Automated software distribution and asset management Application compatibility solution Layered image strategy Secure mobile device provisioning Desktop, Device and Server Management Automated patch management Standard desktop images Mission critical server monitoring Mobile device provisioning No desktop standards, many images, no management standards Capacity analysis solution Application push to mobile devices Fully automated IT management Data Protection and Recovery No formal procedures in place Mission critical server back-up/recovery Back-up/restore on all servers Fully automated IT management IT and Security Process Proactive, accountable Defense-in-depth policy for Web server security Fail safes for attacks are in place Proactive Optimizing cost and quality Efficient Web server security All security processes & policies in place Ad-hoc Lack of standard security policies Reactive, stable IT Formal security policies defined © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

29 How To Get Going With IO Version 1.0
4/26/ :25 AM How To Get Going With IO Version 1.0 Identity & Access Management Security & Network Monitoring Desktop Lifecycle Data Protection & Recovery Security Manageable Messaging Organizations run effective, centralized IT depts. IT systems remain complex, incompatible, expensive and run as standalone operations Basic automation is provided by centralized IT, pockets or automated services exist at business units 29 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

30 Moving From Standardized To Rationalized Secure Manageable Messaging
4/26/ :25 AM Moving From Standardized To Rationalized Secure Manageable Messaging Customer Situation Users cannot remotely access their inbox or calendar and complex and costly remote connections (dial-up, VPN) required for message and calendar access No consistent or secure remote or web-based services. Unsolicited (SPAM) drops productivity Management of the Messaging Services is difficult and IT personnel lack of tools to analyze and prevent issues. Benefits of Moving to Next Level Introduce Layered security at both server and client that prevents SPAM, malware and virus attacks. Reduce unsolicited junk messages by filtering inbound messages based on the recipient. Messages that are addressed to users who are not found, or to whom the sender does not have the permissions to send, are rejected. Reduced downtime due to malicious attacks Reduced burden on IT department frees up resources Improved access for remote workers increases productivity of business. Meet business requirements of distributed workforce Improved security and administration results in less downtime and reduce burden on IT resources. Policy provisioning whereby administrators can make supported policies more secure, support for certificate-based authentication, use if S/MME to sign and encrypt mail, and server-based synchronization of Tasks. Integrated Monitoring Capabilities provides an extremely comprehensive view of factors that needs to be taken into consideration to run a healthy Exchange Server 2003 system – resulting in significantly increased availability and to aid in resolving issues detected, the alerts received by the administrator contain knowledge summarizing the condition and enumerating the steps required to investigate and resolve the issue. Recommended Projects for this Level Deploy Exchange Server 2003 SP2 for Microsoft Exchange Intelligence Message Filter and Sender ID, which is an industry-standard framework Deploy Antigen for Exchange Deploy Exchange Server 2003 Management Pack for Microsoft Operations Manager 2000 SP1 Possible Activities Intermediate Presentation on Secure Manageable Messaging Half-Day Intermediate Workshop on Secure Manageable Messaging Full Day Intermediate Workshop on Secure Manageable Messaging Other Resources Understand: How Exchange 2003 Supports Message Security Download and understand: the Microsoft Exchange Server 2003 Security Hardening Guide Review Microsoft Managed Messaging Services Understand FrontBridge Services for Exchange Review the FrontBridge Technology Overview Understand the Antigen family of products for Exchange Review the Exchange Service Management Architecture Understand the Microsoft Operations Manager 2005 SLA Scorecard Exchange Understand the ISA Server 2004+Exchange Server Frequently Asked Questions 30 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

31 What Are The Opportunities? Core Infrastructure Optimization
4/26/ :25 AM What Are The Opportunities? Core Infrastructure Optimization Worldwide Account Profiling Distribution Basic 63% Standardized 34% Rationalized 2% Dynamic 1% Source: MS EPG Profiling as of May 22nd ,989 accounts profiled (All Subsidiaries including US) © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

32 Core Infrastructure Optimization
4/26/ :25 AM Core Infrastructure Optimization Worldwide Account Profiling Distribution Basic Standardized Rationalized Dynamic Source: MS EPG Profiling as of June 2nd , 2006 (8,149 accounts) © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 32

33 Results Of FY06 Account Discovery: Core Infrastructure Optimization
4/26/ :25 AM Results Of FY06 Account Discovery: Core Infrastructure Optimization 47% Backup Solution All Servers Percentage indicates achieving capability 13% Secure Network Connection 58% 35% 17% Standard Images Monitoring Servers Backup Servers & Desktops 80% 54% 12% Basic Networking Services VPN or Terminal Svcs Secure Wireless 86% 41% 23% 14% Secure Domain Isolation Manual Reference Firewall Desktop & Servers Central Firewall 76% 41% 9% 7% Backup Solution Critical Servers Manual App Comp Monitoring Desktop Quarantine 85% 38% 15% 7% Automated Tracking HW & SW Antivirus Desktops Automated App Comp Capacity Analyzer 55% 44% 37% 13% Automated Patch Mgmt Solution Win XP with SP2 Patch Mgmt Servers Automated Reference 72% 57% 19% 21% Active Directory Group Policies Central Provisioning Directory Federation Basic Standardized Rationalized Dynamic Source: MS EPG Profiling:8,685 accounts as of 6/30/2006 (It includes US sub) 33 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 33

34 Microsoft Account Teams, Specialists, and Partner Teams/PAMs
IO Readiness Microsoft Account Teams, Specialists, and Partner Teams/PAMs Partners Primer: IO Essentials Launch Sept  June 2007 Required On-line Launch Aug 1 Winning with IO Recommended 1 Day Workshop Launch Aug 15 Academy Live Sessions and Facilitated Courses Launch throughout H1 Business Value: Winning with IO Recommended 1 Day Workshop Launch Sept  June 2007 Depth Level Courses: IO In-Depth Launch Nov 1  June 2007 Recommended On-line Launch Oct 1 June 2007 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

35 4/26/ :25 AM Introducing The Infrastructure Optimization Partner Kit – Microsoft and Partners download the kit to learn more about IO Use Infrastructure Optimization as a sales tool to grow your business and optimize customers’ infrastructure Work with the Field Rep (BDM/PAM) to gain insight into IO opportunities with Microsoft 35 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

36 Office Deployment Business
4/26/ :25 AM Office Deployment Business Market Opportunity Office Deployment Market Opportunity is approx $33B with 300M customers using Office Customer opportunity to partners is through Desktop Deployment Planning Services (DDPS) program Information Work Competency Simplified entry to the Office Deployment Specialization (IW competent DDPS partners automatically qualify; DDPS certified partners qualify when they achieve IW competency) Specialization provides additional business value: deployment content including case studies, scenarios and customer evidence Partner Value Coupled with Infrastructure Optimization, partners can identify customer pains and develop an effective account plan resulting in productivity gains DDPS gives partners revenue today – and, customer connection for ongoing services © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

37 Windows Vista: Enabling Infrastructure Optimization
4/26/ :25 AM Windows Vista: Enabling Infrastructure Optimization Windows Vista Advancements Standard Images User Account Control Group Policy Secure Networking Windows Vista Firewall Network Access Protection Secure Wireless Management Tool integration Unified Health Model Backup Desktops By implementing SMS and changing to a "Thin" strategy, organizations can save an additional $18/PC Windows Vista will save the average Microsoft customer $15/PC 12 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

38 Desktop Deployment & Mgt Security, Networking & Monitoring
4/26/ :25 AM How Microsoft used Core Infrastructure Optimization to engage with a Customer   Top Themes Current Situation Plan / Status Funding Outcome (Goal) Sponsors 1 Desktop Deployment & Mgt Customer currently faces several major issues with their deployment process and the standard XP image: 8GB large, is recreated 2x annually, has serious Integration & App Compat issues, & requires constant manual intervention. Automated Image Deployment & Management Redesign current Imaging Process Consolidation of images from 7 to 1 Improve SW install & provisioning process, workflow, & ESS Improved App Compat testing SMS as primary image deploy platform (rich usage) Reduce Support Cost (Q3-Q4, FY06) ZTD / BDD PILOT (SP2 or Vista. adapted to customer processes) Names Withheld 2 Identity & Access Mgt Bus App Authentication is built on legacy Management Toolsets. Enterprise User Mgt is based on LDAP x500 (non ADS). AD plays a limited role. Mail services run poorly due to poor identity & process integration. Enterprise User Management o MIIS Role-Based User Provisioning o LDAP & Unix Consolidation o AD-based Password Policy o Single Account per User Federation for extranet, B2B, & Web scenarios (Q2-Q3, FY06) Proof of Concept – PoC (Dir/App Environment & Human Workflow Processes) 3 Security, Networking & Monitoring After a very successful Security engagement we have the challenge to push our security technologies and best practices at this customer. Today we face problems with monitoring, patch management beyond Windows XP, Server Monitoring and Network Separation Security Machine Certificates with MS PKI Patch Management w/ SMS Rights Managmenet Services SP2 FW via SP2 or Vista Monitoring: MOM Deployment & Rollout, Tivoli Migration Networking: VPN Quarantine w/ WinSvrR2 IPSec-based Network Segmentation (based on selected topics) 4 Backup & Restore Central file storage services are based on legacy toolset. Windows-based storage is limited to very small configs with non-critical usage (1GB limit per server). Lack of best practices or enterprise (MSA) approach to Windows Storage. No centralized backup of branch office file servers. Establish and Enterprise Service around Windows-based File Storage Increase Windows File Server Usage w/ FRSv2 & DPM o Branch Office & Central Data Center o As second source to NetApp (Q4, FY06) Arch Design Session MTC © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 38

39 Windows Vista: What Is Available To You Today
4/26/ :25 AM Windows Vista: What Is Available To You Today Marketing Readiness New Online Partner Marketing Readiness Courses Windows Vista Deployment Partner Training Courses New Windows Vista Partner Portal Windows Vista Partner Portal (Enterprise and Midsize Solution Provider) Whitepapers, Case Studies Windows Vista Whitepapers, Case Studies Windows Vista Beta 2 BDD V3, ACT V5 ADDP Windows Vista TAP Technical Readiness NEW! Windows Desktop Deployment Specialization NEW MSPP Specialization, Windows Vista deployment, under Advanced Infrastructure Competency Early “Opt In” process for partners in Q2-Q3FY07, enrollment begins in Q4FY07 Unique engagement opportunity for deployment partners after Windows Vista launch © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

40 4/26/ :25 AM Goals And Commitments Drive IT optimization and advance the customers’ infrastructure through optimization to a dynamic state For Core IO, advance 25% of our enterprise accounts one step in the model For BPIO and APIO, profile accounts Increase Windows XP SP2 (or Vista) and Office 2003 (or Office 12) usage by 12 points of the installed base in the Enterprise Drive growth through winning new deals, accelerated adoption of infrastructure optimization, and deployment of Microsoft software PAM commitments Number of IO related opportunities and partner attach to those opportunities Number of signed IO Partner Solution Plans Attainment on PSP commitments 40 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

41 4/26/ :25 AM Call to Action Become a top IO Partner – align your business & sales with IO Identify your MSPP Gold/Certified Partner competency by model Document your Partner solution offering by capability, by model Execute PSPs with your Microsoft rep Identify where your customers are in the IO Model (use profiling questions) Identify highest impact options and prioritize projects by economic return Quantify individual Best Practices Perform TCO Studies or ROI analysis Build a plan that maps to the customer’s business and their IT priorities Work with your Microsoft rep to engage on IO opportunities, drive joint pipeline activities, and Microsoft campaign offers Develop your own IO pipeline for your customers and grow your business through IO! Enablement Leverage the July 2006 Infrastructure Optimization Partner Kit Customers should visit for profiling assistance © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

42 Questions? Key Contacts
4/26/ :25 AM Questions? Key Contacts Tim Rowe Infrastructure Optimization Lead, Australia Lisa J Downey Global Partner Development Manager Ed Anderson Core Infrastructure Optimization Prashant Ketkar Business Productivity Infrastructure Optimization Nick Abbott Application Platform Infrastructure Optimization Kay Warren IW Desktop Deployment Program Manager Tom Yoritaka Windows Client © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

43 4/26/ :25 AM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

44 Core Infrastructure Optimization
4/26/ :25 AM Core Infrastructure Optimization United States Account Profiling Distribution Source: MS EPG US Profiling as of May 8, accounts profiled © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

45 4/26/ :25 AM Results Of United States Account Discovery: Core Infrastructure Optimization 62% Percentage indicates achieving capability Backup Solution All Servers 20% Secure Network Connection 70% 52% 23% Standard Images Monitoring Servers Backup Servers & Desktops 94% 82% 27% Basic Networking Services VPN or Terminal Svcs Secure Wireless 88% 49% 41% 17% Secure Domain Isolation Manual Reference Firewall Desktop & Servers Central Firewall 87% 54% 20% 15% Backup Solution Critical Servers Manual App Comp Monitoring Desktop Quarantine 91% 55% 37% 27% Automated Tracking HW & SW Antivirus Desktops Automated App Comp Capacity Analyzer 61% 45% 68% 33% Automated Patch Mgmt Solution Win XP with SP2 Patch Mgmt Servers Automated Reference 89% 82% 48% 44% Active Directory Group Policies Central Provisioning Directory Federation Basic Standardized Rationalized Dynamic Source: MS EPG US Profiling as of May 8, accounts profiled 45 © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 45

46 Alignment of Security Efforts to Core Infrastructure
4/26/ :25 AM Alignment of Security Efforts to Core Infrastructure Core IO drives Security engagement Security Image & Satisfaction Constant communication to Security contacts (BDM, TDM, Emergency Response) Consistent Security messaging with IO Briefing Security Readiness all field roles CSO Roundtables, Summits (SA) Growth Security Processes Discovery (‘SRD’) Customer Security Plan part of IO maturity plan Security Assessments / Proactive Engagements (75% success rate for Opportunity generation) Drive customers thru the IO maturity model © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Tim Rowe Infrastructure Optimization Lead"

Similar presentations


Ads by Google