Presentation is loading. Please wait.

Presentation is loading. Please wait.

Transforming IT Management

Similar presentations


Presentation on theme: "Transforming IT Management"— Presentation transcript:

1 Transforming IT Management
Karel Schmidtmayer Country Manager May 3, 2007

2 IT Managers Challenge Has Multiple Dimensions
Drivers to Ensure IT Is an Engine Strategy and Planning Application Development Operations Security Defining the CIO Challenge While trying to ensure IT is an engine of growth, the challenges of the CIO can be summarized as follows Support the corporate strategy by aligning its investments with business goals Ensuring it provides high quality services that meet business expectations and the commitments they have made to the business Manage compliance and risk ….all while operating more efficiently to reduce costs This is no easy task in part because it requires that CIO think holistically… from strategy and planning, through service delivery and security This has proved difficulty, because each area has tended to operate as a functional silo; each having own requirements and own approaches to solving its top issues Align IT Investments With Business Goals Improve Service Levels Manage Compliance and Risk Reduce Costs September 21, EITM Overview Copyright © 2007 CA

3 Transforming IT Management Requires a Holistic Integrated Approach
Maximize business value by aligning a portfolio of services with business objectives, balancing cost, resources and business risks. GOVERN Meet business demands by delivering reliable, high-quality services through an automated, optimized IT infrastructure. Transforming IT Management Requires a Holistic Integrated Approach Govern - maximizing business value by aligning a portfolio of services with business objectives, balancing cost, resources and business risk Manage - meeting business demands by delivering reliable, high-quality services through an automated, optimized IT infrastructure. Secure - protecting assets and manage risks by monitoring and enforcing policy-based controls, managing identities and ensuring appropriate access. MANAGE Protect assets and manage risks by monitoring and enforcing policy-based controls, managing identities and ensuring appropriate access. SECURE September 21, EITM Overview Copyright © 2007 CA

4 EITM: Transforming IT Management
Enterprise IT Management (EITM) is CA’s vision for how to unify and simplify IT management to maximize the value to the business. EITM: Transforming IT Management CA has responded to these requirements with a powerful vision for how to transform the management of IT across the enterprise. It’s called Enterprise IT Management, or EITM, and it can help you to unify and simplify IT management to maximize value to the business. To enable the transformation, we deliver solutions that effectively govern, manage and secure IT Govern, Manage and Secure are the pillars of our EITM strategy …Let’s examine the EITM vision in a little more detail…. To transform IT management, CA delivers solutions that effectively govern, manage and secure IT. September 21, EITM Overview Copyright © 2007 CA

5 Managing IT as a Service Business
Is IT doing the right things? BUSINESS Is IT doing things right? Strategy Access EXECS IT USERS Alignment Quality SERVICES Managing IT as a Service Business Let’s look more closely at the EITM vision. IT is really concerned about two fundamental questions: Is IT doing the right things….setting the right course based on the business strategy Is IT doing things right….providing secure access and delivering high quality services Business demand manifests itself in two ways. Strategic and Operational Demand. To satisfy strategic demand senior IT execs need to understand the organization’s business objectives and strategy and set a corresponding IT strategy to support those business goals. By aligning IT investments to balance risk, cost and performance, Senior IT execs can analyze the IT portfolio to select and prioritize investments to define new, modify existing or stop investing in services. To satisfy the day to day operational demand ,IT needs to provide secure access to high-quality information services that users need to conduct business. EITM unifies the left hand strategy side to the right hand execution side through a unified service model to ensure IT is delivering value by ensuring IT is doing the right things and then doing those things right. September 21, EITM Overview Copyright © 2007 CA

6 Transforming IT Management Requires Integration
GOVERN MANAGE SECURE INFRASTRUCTURE OPTIMIZATION Assets & Resources Service Impact BUSINESS SERVICE MANAGEMENT Identity SECURITY MANAGEMENT Service Portfolio IT GOVERNANCE UNIFIED SERVICE MODEL GOVERN MANAGE SECURE INFRASTRUCTURE OPTIMIZATION Assets & Resources Service Impact BUSINESS SERVICE MANAGEMENT Identity SECURITY MANAGEMENT Service Portfolio IT GOVERNANCE UNIFIED SERVICE MODEL Because of CA’s strength and ability to integrate across govern, manage and secure, we are uniquely able to help address our customers’ most pressing concerns. Consider as an example the challenge of ensuring and proving ongoing compliance with industry regulations. CA solutions give organizations holistic visibility into and control of their compliance processes. CA solutions support compliance initiatives by: Establishing and enforcing requirements for information access and record retention Ensuring and certifying the relevance of information Supporting change management processes to protect the long-term integrity of retained information Providing visibility into controls that are in place enterprise-wide to support compliance Automating repeatable compliance processes to lower the cost and risk of assuring and proving compliance As another example, suppose a CIO of a financial institution has been asked to deliver a new online service targeting retail customers. CA solutions assure the new service offering is successfully introduced and supported by: Providing the CIO with insight to facilitate an informed discussion with business executives – so decisions can be made to allocate resources away from existing projects to support the new service offering Managing the people and projects working on the new service offering to ensure on-time, on-target delivery Once the service is introduced, ensuring that customers receive secure access Ensuring that service performance meets agreed upon service levels—and monitoring that performance based on what a customer would experience Managing the entire infrastructure supporting that service. When a problem occurs, indicating that it is impacting a critical business service offering so that is it properly escalated and quickly resolved September 21, EITM Overview Copyright © 2007 CA

7 Security Management Identity Key Challenges Capability Solutions
GOVERN MANAGE SECURE Key Challenges Deliver continuous compliance Protect assets and information Mitigate risks Enable user productivity Identity SECURITY MANAGEMENT Capability Solutions CA Identity & Access Management CA Security Information Management CA Threat Management UNIFIED SERVICE MODEL Security Management Integration with our security management solutions enables you to manage the identity and entitlements of users from a services perspective. You can ensure that any technology asset or IT user involved in supporting a given service has the appropriate, secure access they require. We enable you to proactively manage your entire security environment. We provide efficient, manageable, auditable and secure ways of connecting users, identities or processes to enterprise resources and information. These solutions help you protect assets and information, mitigate risks and enable user productivity. Additionally, CA security management solutions deliver a holistic and standardized approach to risk and compliance, so that processes can be automated and reused irrespective of regulation. In doing so, you will lower both the cost and risk of managing compliance across the enterprise. September 21, EITM Overview Copyright © 2007 CA

8 Security issues Security Issues Continuous Compliance
Negative Security-Related Publicity Help Desk Overload Escalating Administration Costs Ghost User Accounts Accumulating & Inappropriate Privileges Auditors’ Requirements Leverage-able It Infrastructure Security Issues Operating costs are too high: The larger and more complex IT infrastructure becomes, the higher the costs of management are. In many cases, these costs increase exponentially with complexity. The CA Workload Automation solution provides a significant opportunity to realize substantial efficiency gains, and in many cases reduced software costs. September 21, EITM Overview Copyright © 2007 CA

9 Our Vision: A Modular Approach to Integrated IT Management
Govern Manage Secure Incident & Problem Management Application & Performance Management Service Level Management Change & Configuration Management IT Asset & Financial Management Identity & Access Management UNIFIED SERVICE MODEL Security Information Management Project & Portfolio Management EITM Capabilities This slide can be used to lay out the EITM landscape. It details all of CA’s Capability Solutions to Govern, Manage and Secure IT. Present this slide to show your customers “the ideal EITM state” Information Governance Threat Management Service Availability Management Network & Voice Management Database Management Recovery Management Dynamic & Virtual Systems Management Application Performance Management Workload Automation September 21, EITM Overview Copyright © 2007 CA


Download ppt "Transforming IT Management"

Similar presentations


Ads by Google