2 Reduce Costs, Simplify IT, and increase Your Value to the Business Damir Bersinic Senior IT Pro Advisor, Microsoft Canada

Slides:



Advertisements
Similar presentations
What is Infrastructure Optimisation and Why should you care?
Advertisements

The System Center Family Microsoft. Mobile Device Manager 2008.
Building an Optimized Infrastructure
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
Project Portfolio Management:
Microsoft Operations Management Suite
Business Results & New Value End User Productivity CustomerConnection Keep Business Up & Running Security More Pressure Than Ever on IT Competition Technology.
Software Asset Management
Enterprise Project Management (EPM) Solution Overview Keshav Puttaswamy Group Program Manager Microsoft Corporation.
Microsoft Business Intelligence Gustavo Santade Business Intelligence Project Manager Improving Business Insight Building a cube using Analysis Services.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Security and Infrastructure Optimisation Security Considerations NameBarry Hughes TitleSenior Consultant - MCS Microsoft Corporation.
Ronnie Dockery Client BG Lead | Microsoft Ireland | Dublin, 23 rd Oct 2008 Delivering Business Value through Deployment.
Private Cloud: Application Transformation Business Priorities Presentation.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Microsoft Office Project Portfolio Server
What is Infrastructure Optimization and Why do I Care?
Identity and Access Management Business Ready Security Solutions.
Product Manager, Windows Client Robert Geller. Need to differentiate from competitors Customer complexity driving cost Need new growth strategies Difficult.
MICROSOFT CONFIDENTIAL – INTERNAL ONLY
Private Cloud: Manage Data Center Services Business Priorities Presentation.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
SMALL BUSINESS SERVER 2011 TRAINING WEBINAR. Agenda 1. Market2. Product Overview3. Customer Value Proposition4. SKU Descriptions and Licensing.
Project Portfolio Management Business Priorities Presentation.
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
Infrastruktuuri optimeerimine Tallinn
Optimizing IT Operations Lessons From the Field A practical guide for maturing your IT Infrastructure Presenter’s name IT Architecture & Planning Microsoft.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Nick Umney Lead Technology Specialist (Health & Education) Microsoft Ltd Infrastructure Optimisation in the NHS.
Introducing Windows Intune
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
1. You Are Making A Difference World Finance: Companies Cope with Declining Dollar Feb 13 th, 2008 Australia Braces For Rate Increases To Curb Inflation.
Steven Adler Enterprise Technology Strategist Microsoft EMEA.
Microsoft Forefront and System Center Driving to Dynamic IT with System Center and Forefront Eric Berg Director of Product Management Server & Tools.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Compete strategically in the enterprise—sell Microsoft Application Platform. Help grow revenue and accelerate adoption and Software Assurance attach. Microsoft.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Planning Engagement Kickoff
Azure Stack Foundation
Information Technology The Benefits of Infrastructure Optimization
Office 365 FastTrack Planning Engagement Kickoff
Information Technology The Benefits of Infrastructure Optimization
Hybrid Management and Security
Владимир Гусаров Директор R&D, Dell Visual Studio ALM MVP ALM Ranger
8/1/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Configuration Management with Azure Automation DSC
Information Technology The Benefits of Infrastructure Optimization
Windows Embedded Design Review
Information Technology The Benefits of Infrastructure Optimization
Microsoft Virtual Academy
Management of Virtual Environments
Information Technology The Benefits of Infrastructure Optimization
Microsoft Virtual Academy
Information Technology The Benefits of Infrastructure Optimization
Microsoft Virtual Academy
2/25/2019.
The People Ready Vision for Business in the Enterprise
System Center Marketing
Microsoft Virtual Academy
Microsoft Data Insights Summit
Managing your infrastructure with System Center
Microsoft Virtual Academy
What's new in Project Pro for Office365 and Sync to SharePoint Online
Presentation transcript:

2 Reduce Costs, Simplify IT, and increase Your Value to the Business Damir Bersinic Senior IT Pro Advisor, Microsoft Canada

1 of 20 Industry Trends Macro TrendsCurrent Indicators #1 CIO priority in 2008 (up from #17) Virtualization Acceleration Compliance IT Service Management Anywhere Access Software as a Service CIOs expect 10% of IT budget to be dedicated to compliance CIOs expect 10% of IT budget to be dedicated to compliance IT orgs can currently only correlate 30% of IT alerts to business problems IT orgs can currently only correlate 30% of IT alerts to business problems Converged mobile phones (Smartphones) growing two times faster than mobile PCs Converged mobile phones (Smartphones) growing two times faster than mobile PCs >1/3 of Technical Decision Makers interested in using SaaS to support customer-facing business processes >1/3 of Technical Decision Makers interested in using SaaS to support customer-facing business processes Data Center Build Outs 74% of enterprises mandate all servers 74% of enterprises mandate all servers must reside in the data center 78% Maintenance 22% New ImplicationImplication 78% of IT budgets spent on maintenance activities, trends increase pressure 78% of IT budgets spent on maintenance activities, trends increase pressure

Technology Acquisition RFP or RFQ feature set Time RFP or RFQ feature set RFP or RFQ feature set RFP or RFQ feature set Requested Implemented Trained More people increase complexity More tools also increase complexity Complexity $$$

A Different Approach Is Needed An approach that… –Holistic –Addresses existing complexity –Creates an integrated, uniform environment –Adopts to proven Best Practices –Recognizes Role Based Productivity –Prioritizes and sequences IT projects in a structured, systematic manner

Agenda What is Infrastructure Optimization and why is it important? How do you implement Infrastructure Optimization - Best Practices Using Virtualization to optimize your IT operations

Infrastructure Optimization Provides capability framework to help you build an optimized infrastructure (not Microsoft-specific) Establishes a foundation based on industry analyst, academic, and consortium research Provides guidance and best practices for step-by- step implementation Drives cost reduction, security and efficiency gains Enables agility Model-Based Approach

What is Optimized IT? Basic Uncoordinated, manual infrastructure Objective Ability to Change Resource Utilization Processes & Automation Business Alignment React Standardized Centrally Managed IT Infrastructure with some automation Rationalized Managed and consolidated IT Infrastructure Dynamic Fully automated IT management dynamic resource usage and business linked SLA's Slow weeks/ months Unknown Ad hoc No SLAs Manage Weeks Known, poor Defined Arbitrary SLAs Reduce complexity Days Optimized Mature Class of Service SLAs Agility Minutes High, As needed Policy-based Business SLAs Role of IT Cost Center Efficient Cost Center Business Enabler Strategic Asset

Core Infrastructure Optimization The World Canada

The goal of any IT organization is to provide value services to the business UsersUsers InfrastructureInfrastructure Sales Mobile Finance CorporateUser Logistics CorporateUser Partners Restricted Service Catalogue Intra /Internet CommunicationCollaborationBusinessIntelligence LOB Apps CustomAppsPerformanceManagementBusinessIntelligence Network & Basic Infrastructure IT AND SECURITY PROCESS SECURITY MANAGEMENT BASIC INFRASTRUCTURE SERVICES SERVICE & DELIVERY MANAGEMENT REMOTE INFRASTRUCTURE MANAGEMENT

IT Governance Model enables for service delivery ITIL 3.0 / MOF Services Strategy Service Catalogue Service Portfolio Financial Management Service Design Availability Management Continuity Management Capacity Management Security Management Service Transition Change Management Release Management Configuration Management Knowledge Management Service Operation Incident Management Problem Management Request fulfillment Continual Service Improvement Service Reporting Service Measurement Service Level Management

Core Infrastructure: 5 capabilities DynamicStandardizedRationalizedBasic IT and Security Process Best-practice guidance on cost-effective solution design, development, operation, and support Desktop, Device, and Server Management Software distribution, Patch management, Mobility, Imaging, Virtualization Data Protection and Recovery Backup, Restore, Storage management Security and Networking Policy, Antimalware, Firewall, Access control, Network protection, Quarantine Identity and Access Management Directory services, User provisioning, Directory-based authentication

Core Infrastructure maturity BasicStandardizedRationalizedDynamic Policies for security and compliance are inconsistent or nonexistent Policies for security and compliance are inconsistent or nonexistent Health of services is unknown due to the lack of tools and resources Health of services is unknown due to the lack of tools and resources There is no vehicle for sharing accumulated knowledge across IT There is no vehicle for sharing accumulated knowledge across IT Environments are extremely hard to control Environments are extremely hard to control Organization is very reactive to security threats Organization is very reactive to security threats Software deployments, security updates, and services are provided through high touch Software deployments, security updates, and services are provided through high touch Policies for security and compliance are inconsistent or nonexistent Policies for security and compliance are inconsistent or nonexistent Health of services is unknown due to the lack of tools and resources Health of services is unknown due to the lack of tools and resources There is no vehicle for sharing accumulated knowledge across IT There is no vehicle for sharing accumulated knowledge across IT Environments are extremely hard to control Environments are extremely hard to control Organization is very reactive to security threats Organization is very reactive to security threats Software deployments, security updates, and services are provided through high touch Software deployments, security updates, and services are provided through high touch Unstructured and lacking central control, infrastructure based on manual processes, ad hoc security, and disparate resources

Core IO – Service Delivery Capabilities ITIL 3.0 / MOF Basic Services Strategy Service Design Limited Security Accountability Service Transition Ad Hoc Change Management Service Operation Ad Hoc Incident Management Ad Hoc Problem Management Continual Service Improvement

Core Infrastructure maturity level BasicStandardizedRationalizedDynamic Standards and policies to manage desktops, mobile devices, and servers introduce controls and operational consistency Microsoft ® Active Directory ® is used to manage resources, security policies, and network access Microsoft ® Active Directory ® is used to manage resources, security policies, and network access The value of basic standards and policies is recognized but not yet implemented broadly The value of basic standards and policies is recognized but not yet implemented broadly Deployments, security updates, and desktop services are provided at medium touch Deployments, security updates, and desktop services are provided at medium touch Inventory of hardware and software assets is maintained, and license use is managed Inventory of hardware and software assets is maintained, and license use is managed Security is improved with a locked-down perimeter, though internal security may still be at risk Security is improved with a locked-down perimeter, though internal security may still be at risk Microsoft ® Active Directory ® is used to manage resources, security policies, and network access Microsoft ® Active Directory ® is used to manage resources, security policies, and network access The value of basic standards and policies is recognized but not yet implemented broadly The value of basic standards and policies is recognized but not yet implemented broadly Deployments, security updates, and desktop services are provided at medium touch Deployments, security updates, and desktop services are provided at medium touch Inventory of hardware and software assets is maintained, and license use is managed Inventory of hardware and software assets is maintained, and license use is managed Security is improved with a locked-down perimeter, though internal security may still be at risk Security is improved with a locked-down perimeter, though internal security may still be at risk

Core IO – Service Delivery Capabilities ITIL 3.0 / MOF Standardized Services Strategy Ad Hoc Financial Management Service Design Ad Hoc Continuity Management Defined Security Management Service Transition Limited Change Management Limited Configuration Management Service Operation Defined Incident Management Limited Problem Management Request fulfillment Continual Service Improvement

Core Infrastructure maturity level BasicStandardizedRationalizedDynamic Security is proactive and response to threats is rapid and controlled Security is proactive and response to threats is rapid and controlled The use of zero-touch deployment helps minimize cost and time The use of zero-touch deployment helps minimize cost and time Minimal number of desktop images and low-touch management Minimal number of desktop images and low-touch management Hardware and software inventory is managed, with optimal license use Hardware and software inventory is managed, with optimal license use Security measures involve strict policies and control Security measures involve strict policies and control Security is proactive and response to threats is rapid and controlled Security is proactive and response to threats is rapid and controlled The use of zero-touch deployment helps minimize cost and time The use of zero-touch deployment helps minimize cost and time Minimal number of desktop images and low-touch management Minimal number of desktop images and low-touch management Hardware and software inventory is managed, with optimal license use Hardware and software inventory is managed, with optimal license use Security measures involve strict policies and control Security measures involve strict policies and control Costs involved in managing desktops and servers are at their lowest, with integrated IT management policies, tools, and processes

Core IO – Service Delivery Capabilities ITIL 3.0 / MOF Rationalized Services Strategy Service Catalogue Financial Management Service Design Continuity Management Capacity Management Security Management Service Transition Change Management Release Management Configuration Management Knowledge Management Service Operation Incident Management Problem Management Request fulfillment Continual Service Improvement Service Reporting Service Level Management

Policy-Based Management Rationalized Identity and Access

Core Infrastructure maturity BasicStandardizedRationalizedDynamic Costs are fully controlled Costs are fully controlled Collaboration is pervasive; integration exists between users and data, desktops and servers Collaboration is pervasive; integration exists between users and data, desktops and servers Mobile users have nearly on-site levels of service and capabilities Mobile users have nearly on-site levels of service and capabilities Processes are fully automated, often incorporated into the technology itself Processes are fully automated, often incorporated into the technology itself Additional investments in technology yield specific, rapid, and measurable benefits Additional investments in technology yield specific, rapid, and measurable benefits Self-provisioning software and quarantine-like systems allow automated processes Self-provisioning software and quarantine-like systems allow automated processes Costs are fully controlled Costs are fully controlled Collaboration is pervasive; integration exists between users and data, desktops and servers Collaboration is pervasive; integration exists between users and data, desktops and servers Mobile users have nearly on-site levels of service and capabilities Mobile users have nearly on-site levels of service and capabilities Processes are fully automated, often incorporated into the technology itself Processes are fully automated, often incorporated into the technology itself Additional investments in technology yield specific, rapid, and measurable benefits Additional investments in technology yield specific, rapid, and measurable benefits Self-provisioning software and quarantine-like systems allow automated processes Self-provisioning software and quarantine-like systems allow automated processes Highly responsive and efficient IT infrastructure; automated processes and flexible resources drive business agility and competitive advantage

Core IO – Service Delivery Capabilities ITIL 3.0 / MOF Dynamic Services Strategy Service Catalogue Service Portfolio Financial Management Service Design Availability Management Continuity Management Capacity Management Security Management Service Transition Change Management Release Management Configuration Management Knowledge Management Service Operation Incident Management Problem Management Request fulfillment Continual Service Improvement Service Reporting Service Measurement Service Level Management

Load-Based Resourcing Dynamic Server Onboarding

Infrastructure Optimization Model Stages and capabilities Fully automated management, dynamic resource usage, business linked SLAs

Who’s using the IO Model?

Desjardins group is the largest integrated cooperative financial group in Canada. The Quebec-based financial institution was struggling with bandwidth limitations at some of its more remote service points. Solution Desjardins began looking for a solution that would provide data compression and traffic prioritization at an affordable cost. The financial institution decided that Microsoft ISA Server 2004 SP2 was the product best suited to its needs. Benefits Optimized bandwidth utilization Improved budget expenditures Enhanced growth opportunities

Based in Toronto, Cineplex Entertainment LP owns, leases or has a joint-venture interest in 132 movie theatres across Canada. Business Situation With widely dispersed operations, Cineplex Entertainment wanted to consolidate information silos and better position itself to handle rapid growth. Solution Cineplex Entertainment upgraded to the 2007 Office system, including Office SharePoint Server Benefits Searching made easy Streamlined workflow Enhanced productivity

Best Practices Drive Down IT Cost b698-3f55f6a079e4/PC_TCO_Best%20Practices.pdf

1 of 20 Industry Trends Macro TrendsCurrent Indicators #1 CIO priority in 2008 (up from #17) Virtualization Acceleration Compliance IT Service Management Anywhere Access Software as a Service CIOs expect 10% of IT budget to be dedicated to compliance CIOs expect 10% of IT budget to be dedicated to compliance IT orgs can currently only correlate 30% of IT alerts to business problems IT orgs can currently only correlate 30% of IT alerts to business problems Converged mobile phones (Smartphones) growing two times faster than mobile PCs Converged mobile phones (Smartphones) growing two times faster than mobile PCs >1/3 of Technical Decision Makers interested in using SaaS to support customer-facing business processes >1/3 of Technical Decision Makers interested in using SaaS to support customer-facing business processes Data Center Build Outs 74% of enterprises mandate all servers 74% of enterprises mandate all servers must reside in the data center 78% Maintenance 22% New ImplicationImplication 78% of IT budgets spent on maintenance activities, trends increase pressure 78% of IT budgets spent on maintenance activities, trends increase pressure

Benefits Of An Optimized Core Infrastructure Cost Service Levels Agility Infrastructure Maturity Control Costs Simplify, automate, and centralize IT operations to optimize resource utilization Improve Service Levels Integrate management and security tools to maximize system uptime Drive Agility Adapt the IT infrastructure rapidly according to business needs

Next Steps

Resources Infrastructure Optimization TechCenter IO Self Assessment Microsoft Operations Framework

© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.