Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is Infrastructure Optimization and Why do I Care?

Similar presentations


Presentation on theme: "What is Infrastructure Optimization and Why do I Care?"— Presentation transcript:

1 What is Infrastructure Optimization and Why do I Care?
Slide Title: Title Slide Keywords: Title Key Message: Title Slide Builds: 0 Slide Script: Hello and Welcome to this Microsoft TechNet session on Infrastructure Optimization. My name is {insert name}. During this session we will look at the Infrastructure Optimization Model. Slide Transition: We’ll talk about what the Infrastructure Optimization initiative is, what its goals are, and how the IO model is used. Slide Comment: Additional Information: Howard Chow Microsoft MVP 1

2 What Will We Cover? Infrastructure Optimization – 3 models
Focus Today: Core Infrastructure Optimization Model Infrastructure Challenges Levels of the Core IO Model – Where You Fit Benefits of the Core IO Model Slide Title: What we will Cover Keywords: what we will cover Key Message: what we will cover Slide Builds: 5 Slide Script: The IO Model encompasses three perspectives: Core Infrastructure, which encompasses the IT infrastructure; Business Productivity, which covers the management and control of content, data, and processes; and Application Platform, which concerns the delivery and execution of applications. [BUILD1] This series of sessions concerns itself with the Core Infrastructure and how to improve the IT processes within the organization. [BUILD2] To start the discussion, we’ll look at some common infrastructure challenges and concentrate on the issues surrounding value. The concern here is that organizations often have many services, applications, and systems in place that are capable of managing and monitoring their infrastructure, but they simply aren’t being used. So in many cases we aren’t talking about buying something new, but about using what you already have. [BUILD3] Once we’ve discussed that, we’ll look at the four levels of the IO model and classify each level so that you can see where your organization fits on the continuum. You’ll also see the key improvements that should take place in order to move up levels in the IO model. [BUILD4] This, naturally, leads to a discussion of benefits. What both the organization and the IT department will get from implementing the features, services, and policies necessary will be classified at a higher level in the IO model. We’ll see how these higher levels of service reflect on the IT department and help the organization as a whole be more productive. Finally, we’ll talk about how you get there -– how you go from one level to another. Slide Transition: As with most TechNet sessions, some prior experience of Microsoft technologies or similar technologies is always helpful, the next slide provides a brief overview of what would be helpful, but not essential, for this session. Slide Comment: Additional Information:

3 Helpful Experience Level 200
Experience Administering Windows Desktops and servers Network Administration Experience Active Directory Experience Slide Title: Helpful Experience Keywords: helpful experience Key Message: helpful experience Slide Builds: 2 Slide Script: As we go through today's session, you will hear various Microsoft acronyms and terminology. While we will explain all new terms related to today's session, there are some general terms from the industry or from other versions of Microsoft products that we may not spend time on. To help you out, we have listed the areas that it may be helpful to be familiar with, either prior to this session or to reference afterwards. To get the most out of this session, it’s helpful if you’ve had experience administering Windows desktops and servers, because that’s what will be managed by the features and services described in the IO Model. [BUILD1] It’s also helpful if you’ve managed networks and network devices previously, because IO Model covers features and services designed to secure networks while allowing access to approved users. [BUILD2] Finally, it’s helpful if you’ve had experience administering Active Directory. Slide Transition: To cover the topics mentioned on the earlier slide and keep the session flow going, we have divided the session up into the follow agenda. Slide Comment: Additional Information: Level 200

4 Agenda Reviewing IT Challenges
Examining the Core Infrastructure Optimization Model Enhancing the Process with MOF and ITIL Using Scenarios Slide Title: Agenda: Reviewing IT Challenges Keywords: agenda Key Message: agenda Slide Builds: 3 Slide Script: First we’ll look at IT Challenges -- specifically, how organizations tend to grow and add services. We’ll talk about how it’s easy to end up with an ad-hoc environment where services aren’t fully utilized or standardized. [BUILD1] Then we’ll examine in detail the IO model and look at how the IT infrastructure is classified at each level. This will help you classify your own level and also show you what results need to be in place to move to the next level. [BUILD2] Next, we’ll talk about the Microsoft Operations Framework (MOF) and the IT Infrastructure Library (ITIL). We’ll talk about what they are, how they relate to each other, and, most importantly, how they can be used to provide guidance and value to IT Deployments -- in other words, how they can help you move up levels in the IO Model. [BUILD3] Finally, we’ll look at some scenarios where the IO Model is applied and see the challenges, growth, and benefits. Slide Transition: Let’s look at the cost and complexity of IT Infrastructure. Slide Comment: Additional Information:

5 4/20/ :40 AM What we hear from you… How do I spend more time on important vs. urgent tasks? How do I reduce costs? Am I ready for Vista, LH, and Office 12? Are my systems vulnerable? How do I keep them safe? How do I rapidly provision systems? When we planned SCCM v4 these are some of the top questions and challenges that we heard from you. How do I accurately track our assets and licenses? How do I know if my systems are compliant? How do I manage my branch offices and resources outside the corporate firewall? © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

6 IT Complexity And Cost Slide Title: IT Complexity and Cost
Keywords: IT Complexity, Cost, Costs Key Message: IT Complexity creates costs to the extent that 70 percent of IT budgets go to maintenance. Slide Builds: 1 Slide Script: As companies grow, their IT infrastructures grow along with them. But, more often that not, the pace of that growth is uneven, driven as much by the conditions under which they operate as the model they aspire to. You add an application here, you add functionality there, you add people across the board. Yet the more variables you add to your infrastructure, the harder it can be to manage and, more importantly, to secure. [BUILD1] According to analysts, more than 70 percent of a typical IT budget is spent on infrastructure such as servers, operating systems, storage, and networking. Add to this the need to refresh and manage desktop and mobile devices, and you have a unique set of challenges for IT infrastructure to face. So even as the costs for hardware and software are tracking downward, the costs of managing and supporting your infrastructure are increasing. When businesses achieve critical mass, the demands placed on their IT infrastructures vary widely. It’s critical that you plan for a future that encourages healthy and continuous growth, unencumbered by processes that may slow you down and applications that may hold you back. Slide Transition: Let’s examine the challenges faced by IT. Slide Comment: Additional Information:

7 Enterprise IT Challenges
Growth Customer service Regulatory compliance Device management Varying skill sets Mobility PC maintenance Server sprawl Legacy platforms Deployment and maintenance Identity management Software updates Prevent attacks, viruses, spam, etc. Address evolving threats Patch management Provide secure access Slide Title: Enterprise IT Challenges Keywords: Simplify Infrastructure and Management, Reduce costs and complexity, improve security Key Message: Enterprise IT Challenges include simplifying infrastructure and management, reducing costs and improving security. Slide Builds: 2 Slide Script: Enterprises are challenged to simplify infrastructure and management. It’s a simple equation -- as the infrastructure grows by necessity, more is added to the infrastructure, which results in more to manage. This creates problems: it’s costly to upgrade to the latest operating system, client software, and applications. The IT department has to become a more efficient, strategic asset for the business. It has to help solve problems proactively, not simply be reactive. In addition, companies must rely on IT to help provide regulatory compliance for things like HIPAA and SOX. [BUILD1] Enterprise IT departments are also trying to reduce costs and complexity. In many IT environments, server sprawl has led to increased operations and support costs. Labor-intensive legacy platforms have led to increased administration and support costs. At the same time, deployment and maintenance of IT systems remain costly and consume too much time and effort. IT staffs are also charged with taking on new efforts, such as managing system security and user identity information across enterprise systems, and building redundancy and disaster recovery into IT Services. These types of projects often go uncompleted or strain the IT staff to the point where other functions and services suffer. All the while, IT departments are under pressure to reduce the cost of managing users and computers. [BUILD2] Finally, IT departments must always strive to improve security. Organizations face an increasing number of malicious attacks and threats that are constantly evolving. They need to keep software up to date to address the latest security threats and, at the same time, need to provide secure access to information for employees, business partners, and customers. Moreover, collaboration and software must be secured and controlled. Collaboration and servers continue to be the primary means by which viruses are introduced into their environment, and IT departments are constantly trying to reduce the amount of spam that gets through. Slide Transition: So how do you address these challenges? Slide Comment: Additional Information:

8 Meeting Challenges with IO
Infrastructure Optimization Slide Title: Meeting Challenges with IO Keywords: Meeting Challenges Key Message: IOM will help IT departments secure their networks, desktops and servers and reduce costs, and the overall benefit to end-users will be increase productivity. Slide Builds: 3 Slide Script: From an IT perspective, there are three key areas in which IO will positively impact organizations. [BUILD1] First, it will enhance network, desktop, and server security. It will provide standards-based security practices and policies that can be easily applied throughout an organization. [BUILD2] Second, it will reduce IT costs through standardization, a reduction in ad-hoc support. [BUILD3] Achieving higher levels of the IO will allow information workers to be more productive and will allow IT to be a proactive partner, providing technical solutions quickly to address needs, not simply reacting to problems as they appear. Slide Transition: It’s time to look at the Infrastructure Optimization Model. Slide Comment: Additional Information:

9 Infrastructure Optimization Model
Key Enablers Portals Search Messaging Forms Access Identity Presence Rights Mgmt IT & Security Process Development Application Platform Model Data Management Slide Title: Infrastructure Optimization Model Keywords: IO, Business Process, Core, Application Key Message: An overview of the entire IO Model. Slide Builds: 4 Slide Script: The vision of Infrastructure Optimization, or IO, is to help customers realize the value of their IT infrastructure, to make the IT infrastructure a strategic asset that enables agility within their organization, and, ultimately, to help them create an infrastructure for a “people-ready business.” This is the All Up view of the Optimization model. [BUILD1] The Application Platform Model describes those processes involved in delivering applications. Included in the scope of the Application Platform is data management, business process, and business intelligence. Data management is defined as the ability to access and process data. Business Process includes the concept of Service Oriented Architecture (SOA). This describes how businesses can manage their processes, integrate applications and legacy systems, and connect to trading partners and customers through process automation, optimization through process management, and real-time visibility. Business Intelligence is a set of technologies required to provide easy-to-use information directly where individuals work, collaborate, and make decisions. [BUILD2] Business Intelligence also plays a role in the Business Productivity Model. This model is a set of technologies that helps streamline the management and control of content, data, and processes across all areas of a customer’s business. It helps simplify how people work together, makes processes and content management more efficient, and improves the quality of business insight while enabling IT to increase responsiveness and have a strategic impact on the business. In addition to Business Intelligence, Business Productivity encompasses Enterprise Content Management and the Communication/Collaboration infrastructure. [BUILD3] Finally, the Core Infrastructure Model involves the underlying IT roles of Security, Networking, identity and access management, device management, and data protection/recovery. [BUILD4] Key enablers are the linkages between the models that are necessary to drive actualization of the cross-model capabilities. Transcending all the models are IT, as well as Security Processes and, where applicable, development strategies. Slide Transition: This series will focus in closely on the Core IO model. Slide Comment: Additional Information: SOA and Business Process Business Productivity Model Business Intelligence Enterprise Content Management Communication and Collaboration Core Infrastructure Model Security & Networking Identity & Access Management Desktop, Device & Server Management Data Protection & Recovery 9 9

10 Core IO Model Identity and Access Management
Desktop, Server and Device Management Slide Title: Core IO Model Keywords: IO, security and networking Key Message: A discussion of the IO and how it pertains to where Contoso is today and where they are going. Slide Builds: 4 Slide Script: We will act as consultants for the fictional firm Contoso. We are basing our solutions on the concepts presented in the core IO to help Contoso move from a basic infrastructure to a dynamic one. [BUILD1] First, we will address Contoso’s identity and access management challenges. [BUILD2] Then we will present solutions for desktop, server, and device management. [BUILD3] Following that, we will examine the security issues at Contoso and develop a proactive security strategy. [BUILD4] Finally, we will look at data protection and recovery at Contoso. By systematically dealing with these categories of technology at Contoso, we can show value in the organization by lowering the TCO and increasing the usefulness of the organization’s IT investment. Slide Transition: With that in mind, let’s look at where Contoso is today. Slide Comment: Additional Information: Security and Networking Data Protection and Recovery CROSS-MODEL ENABLERS Identity Presence Rights Mgmt Network Access 10

11 Agenda Reviewing IT Challenges
Examining the Core Infrastructure Optimization Model Enhancing the Process with MOF and ITIL Using Scenarios Slide Title: Agenda: Examining the Core Infrastructure Optimization Model Keywords: agenda Key Message: agenda Slide Builds: 0 Slide Script: Now we’ll examine in detail the IO model, and look at how the IT infrastructure is classified at each level. This will help you classify your own level, and also show you what results need to be in place to move to the next level. Slide Transition: Let’s take a broad look at the Infrastructure Optimization model. Slide Comment: Additional Information:

12 Infrastructure Optimization Model
Slide Title: Infrastructure Optimization Model Keywords: Infrastructure Optimization Model, IO Key Message: Infrastructure Optimization Model overview Slide Builds: 3 Slide Script: The Infrastructure Optimization Model (IO) has been developed using industry best practices and Microsoft’s own experiences with its enterprise customers, and is based upon Gartner’s Infrastructure Maturity Model and MIT’s Architecture Maturity Model. A key goal for Microsoft in creating the Infrastructure Optimization Model was to develop a simple way to use a maturity framework that is flexible and that can easily be used as the benchmark for technical capability and business value. [BUILD1] The Infrastructure Optimization Model from Microsoft helps customers understand and subsequently improve the current state of their IT infrastructure and what that means in terms of cost, security risk, and operational agility. Dramatic cost savings can be realized by moving from an unmanaged environment towards a dynamic environment. Security improves from highly vulnerable, in a basic infrastructure, to dynamically proactive, in a more mature infrastructure. [BUILD2] IT infrastructure management changes from highly manual and reactive to highly automated and proactive. Microsoft and its partners can provide the technologies, processes, and procedures to help customers move up through the infrastructure optimization journey. The process moves from fragmented or nonexistent to optimized and repeatable. [BUILD3] IO frees up resources and provides a foundation for organizational agility. Customers’ ability to use technology to improve business agility and to deliver business value increases as they move from the basic state up the continuum toward a dynamic state, empowering information workers and managers and supporting new business opportunities. By working with Microsoft and using this model as a framework, an enterprise can quickly understand the strategic value and business benefits to the organization in moving from a “basic” level of maturity, where the IT infrastructure is generally considered a “cost center,” towards a more “dynamic” use, in which the business value of the IT infrastructure is clearly understood and the infrastructure is viewed as a strategic business asset and business enabler. Managed and consolidated IT infrastructure with maximum automation Fully automated management, dynamic resource usage , business linked SLAs Managed IT infrastructure with limited automation Uncoordinated, manual infrastructure More Efficient Cost Center Business Enabler Strategic Asset Cost Center

13 Infrastructure Optimization - Notes
Slide Transition: Let’s look at the IO Model in action. Slide Comment: Additional Information: download.microsoft.com/download/e/ 5/2/e522fbf3-837c-412b-a1f0-f097e4ad68a8/PartnerDec.ppt Managed and consolidated IT infrastructure with maximum automation Fully automated management, dynamic resource usage , business linked SLAs Managed IT infrastructure with limited automation Uncoordinated, manual infrastructure More Efficient Cost Center Business Enabler Strategic Asset Cost Center

14 Core IO Model in Action Manual Decentralized No Policies No Standards
No Monitoring IT Reactive Standards Desktop and Server Policies Security Policies Perimeter lockdown Internal security may be vulnerable Highly Integrated Environment Fully Automated Self-Provisioning Infrastructure is a competitive advantage Management costs low Security is pro-active Zero-Touch Deployments Slide Title: Core IO Model in Action Keywords: Infrastructure Optimization Model, IO Key Message: Infrastructure Optimization Model – In Action Slide Builds: 3 Slide Script: The Basic IT infrastructure is characterized by manual, localized processes; minimal central control; nonexistent or unenforced IT policies and standards regarding security, backup, image management and deployment; compliance; and other common IT standards. There is a general lack of knowledge regarding the details of the infrastructure that is currently in place or which tactics will have the greatest impact to improve upon it. Overall health of applications and services is unknown due to a lack of tools and resources. There is no vehicle for sharing accumulated knowledge across IT. Customers with a basic infrastructure find their environments extremely hard to control, have very high desktop and server management costs, are generally very reactive to security threats, and have very little positive impact on the ability of the business to benefit from IT. Generally, all patches, software deployments, and services are provided high-touch and high-cost. Customers benefit substantially by moving from this type of Basic Infrastructure to a Standardized Infrastructure, which helps them to dramatically reduce costs through developing standards, policies, and controls with an enforcement strategy, mitigating security risks by developing a “defense in depth” posture -- a layered approach to security at the perimeter, server, desktop and application levels, automating many manual and time-consuming tasks, adopting “best practices” (ITIL, SANS, and so on), and aspiring to make IT a strategic asset rather than a burden. [BUILD1] The Standardized infrastructure introduces controls through the use of standards and policies to manage desktops and servers, how computers are introduced to the network, the use of Active Directory to manage resources, security policies, and access control. Customers in a Standardized state have realized the value of basic standards and some policies, yet are still quite reactive. Generally, all patches, software deployments, and desktop service are provided through medium touch with medium to high cost. However, they have a reasonable inventory of hardware and software and are beginning to manage licenses. Security measures are improved with a locked-down perimeter; however, internal security may still be a risk. Customers benefit by moving from this Standardized state to a Rationalized state with their infrastructure by gaining substantial control over the infrastructure and having proactive policies and processes that prepare them for the spectrum of circumstances, from opportunity to catastrophe. Service Management is a concept, and the organization is taking steps to recognize where to implement it. Technology is also beginning to play a much larger role, moving toward a Rationalized infrastructure by becoming a business asset and ally rather than a burden.

15 Core IO Model in Action - Notes
Manual Decentralized No Policies No Standards No Monitoring IT Reactive Standards Desktop and Server Policies Security Policies Perimeter lockdown Internal security may be vulnerable Highly Integrated Environment Fully Automated Self-Provisioning Infrastructure is a competitive advantage Management costs low Security is pro-active Zero-Touch Deployments [BUILD2] The Rationalized infrastructure is where the costs involved in managing desktops and servers are at their lowest, and processes and policies have matured to begin playing a large role in supporting and expanding the business. Security is proactive, and responding to threats and challenges is rapid and controlled. The use of zero touch deployment minimizes cost, time to deploy, and technical challenges. The number of images is minimal, and the process for managing desktops is very low touch. They have a clear inventory of hardware and software, and only purchase those licenses and computers they need. Security is extremely proactive, with strict policies and control from desktop to server to firewall to extranet. Customers benefit on a business level by moving from this Rationalized state to a Dynamic state. The benefits of implementing new or alternative technologies to take on a business challenge or opportunity far outweigh the incremental cost. Service Management is implemented for a few services with the organization, taking steps to implement more broadly across IT. Customers contemplating the value of the Dynamic state generally are looking for their IT infrastructure to provide a business advantage. [BUILD3] Customers with a Dynamic infrastructure are fully aware of the strategic value their infrastructure provides in helping them run their business efficiently and staying ahead of competitors. Costs are fully controlled, and integration between users and data, desktops and servers, and collaboration between users and departments is pervasive. Mobile users have nearly on-site levels of service and capabilities, regardless of location. Processes are fully automated, often incorporated into the technology itself, allowing IT to be aligned and managed according to the business needs. Additional investments in technology yield specific, rapid, measurable benefits for the business. The use of self-provisioning software and quarantine-like systems for ensuring patch management and compliance with established security policies allows the dynamic organization to automate processes, thus improving reliability, lowering costs, and increasing service levels. Customers benefit from increasing the percentage of their infrastructure that is Dynamic by providing heightened levels of service, competitive and comparative advantage, and taking on bigger business challenges. Service Management is implemented for all critical services, with service level agreements and operational reviews established. Slide Transition: So now you’ve seen the model, and we’ve explained what it looks like in action. So where are customers now? Slide Comment: Additional Information:

16 Where Customers Are Today
64% Slide Title: Where Customers Are Today Keywords: Customers, Today, IO Model Today Key Message: Today most of are customers are basic, and about one-third are standardized. Slide Builds: 0 Slide Script: Most customers today are at the basic state. About one-third are in a standardized state. Only about 5 percent are in a rationalized or dynamic state. Slide Transition: Let’s look at how this will help save costs. Slide Comment: Additional Information: Managed and consolidated IT Infrastructure with maximum automation Fully automated management, dynamic resource Usage , business linked SLA’s Managed IT Infrastructure with limited automation Uncoordinated, manual infrastructure 31% More efficient Cost Center Business Enabler Strategic Asset Cost Center 3% 2%

17 End User Productivity & Downtime (Indirect Cost)
Desktop Cost Savings $1,354 $774 $428 $2,556 $2,952 $5,508 Hardware / Software $1,333 $542 $426 $2,301 $2,265 $4,566 $1,246 $261 $424 $1,931 $1,217 $3,148 Operations 30% 52% Slide Title: Desktop Cost Savings Keywords: Desktop, Cost, Savings Key Message: The biggest desktop TCO Savings are when moving from Standardized to Rationalized, the lowest TCO is at Rationalized while the highest ROI is at Dynamic. Slide Builds: 0 Slide Script: This data was taken directly from Gartner’s DECM tool using the Unmanaged, Managed, Typically Managed, and Well Managed default settings, and is within 10 percent of the cost metrics that appear in Gartner’s biannual research notes. Microsoft’s IT Maturity model is based on Gartner’s server model. Within Gartner, separate IT Maturity models are used for the server and the desktop. The data presented here is a blend of Gartner’s desktop model and Microsoft’s model. The desktop model has three levels: Unmanaged (10%), Typically Managed (70%), and Well Managed (20%). During the overlay process, Unmanaged was mapped to Basic, Typically Managed to Standard, and Well Managed to Rationalized. The largest desktop TCO savings comes from moving from Standardized to Rationalized, and is driven primarily by a mandatory desktop lockdown. Getting to desktop lockdown requires that organizations are able to run users as “Standard User” instead of “Administrator,” and then implementing policies to prevent users from installing their own software or changing settings. Getting all users to “Standard User” will require that all applications that require administrative rights are replaced or that third-party software is adopted to remedy the situation. Windows Vista will match the third-party software’s ability to deal with these applications through “User Account Protection” and registry virtualization. The savings from Basic to Standard comes from a number of drivers primarily focused on the establishment of IT policies and basic levels of centralization. The Dynamic state is not represented in this model, since Gartner’s desktop model only has three levels and tops out with TCO optimization at Rationalized (Well Managed). At the Dynamic level, TCO is no longer the primary driver and, in fact, will like go up by 5% or more compared to Rationalized. In the Dynamic State, organizations are willing to sacrifice TCO in order to improve Service Levels and Business Agility. For example, having a service desk that guarantees to resolve all user desktop issues in 1 hour is more expensive to operate than a service desktop that guarantees resolution within 24 hours. An example of business agility might be the partial decentralization of IT in order to put IT decisions into the hands of local business units so that they can more quickly respond to business opportunities. The decentralization causes a TCO hit, while the increased agility is mapped to increased revenue (not tracked in this model). Administration 16% 10% Total Direct Costs End User Productivity & Downtime (Indirect Cost) 17% 31% Total TCO

18 End User Productivity & Downtime (Indirect Cost)
Desktop Cost Savings - Notes $1,354 $774 $428 $2,556 $2,952 $5,508 Hardware / Software $1,333 $542 $426 $2,301 $2,265 $4,566 $1,246 $261 $424 $1,931 $1,217 $3,148 Operations 30% 52% When looking at this model, organizations should estimate where they are today and where their end goal is (Dynamic may not be for everyone). The next step is to do a gap analysis on IT capabilities/processes and to rank them by impact to TCO, service levels, and agility. Microsoft technologies should then be mapped into the desired IT capabilities/processes. Because of an organization’s ability to absorb change, organizations should move to the next level above their level. Slide Transition: Let’s talk more about what the destination should be. Slide Comment: Additional Information: Gartner has a TCO simulation tool based on Michael Silver’s (at Gartner) ongoing research, the Decision Engine for Cost Management (DECM, pronounced “Deck-em”). The data for the desktop model and the DECM tool come from Michael Silver at Gartner. He publishes TCO research notes twice a year on the different versions of the Windows and he defines the cost metrics for Unmanaged, Typically Managed and Well Managed organizations. The DECM tool allows Microsoft to start with scenarios defined by Michael Silver and make changes to the environment to reflect the incorporation of Microsoft products. The DECM tool also receives more frequent updates than the bi-annual research notes. In order to generate the TCO metrics, Gartner has created a hypothetical 2,500 user organization based on survey research, Gartner consulting engagements and a few judgment calls and estimates from Michael Silver. Within Gartner’s model, there are six best practice categories with about 25 inputs per category. Some of the categories are heavily dependent on technology and some are technology agnostic. For example, the largest driver in the model is desktop lockdown and can be directly tied to using Active Directory and Group Policies to prevent users from installing software and changing configurations. Other best practices are purely process focused and center on things like procurement and service level policy. The dollar savings in the model represent process improvements that in roughly half the situations have a dependency on technology. Independent research for the 2500 desktop (no notebooks), shows that Gartner’s estimates are within +-15 of actual numbers for 80% of organizations for this size. For organizations above 2,500 but below 10,000 PCs, IT operations costs decline as outline in the following equation y= *#PCs. No data is currently available for organizations above 10,000 PCs. Administration 16% 10% Total Direct Costs End User Productivity & Downtime (Indirect Cost) 17% 31% Total TCO

19 What is the Destination?
Dynamic Systems will result in reduced costs, improved reliability, and increased responsiveness across the entire IT life cycle Slide Title: What is the Destination? Keywords: Dynamic, Destination, Result Key Message: Getting to the dynamic level means that the infrastructure is a genuine strategic asset, helping the organization run efficiently and stay ahead of competitors. Slide Builds: 0 Slide Script: Why is the IO model structured the way that it is? We understand the challenges you face at each step in the life cycle and between the steps. Complexity is at the root of your challenges, causing key issues. By dividing up the Infrastructure Optimization journey into schedulable steps, we can help you reach the Dynamic destination. Customers with a Dynamic infrastructure are fully aware of the strategic value their infrastructure provides in helping them run their business efficiently and in staying ahead of competitors. Costs are fully controlled, integration between users and data and desktops and servers, and collaboration between users and departments is pervasive. Mobile users have nearly on-site levels of service and capabilities, regardless of location. Processes are fully automated, often incorporated into the technology itself, allowing IT to be aligned and managed according to the business needs. Additional investments in technology yield specific, rapid, measurable benefits for the business. The use of self-provisioning software and quarantine-like systems for ensuring patch management and compliance with established security policies allows the dynamic organization to automate processes, thus improving reliability, lowering costs, and increasing service levels. Customers benefit from increasing the percentage of their infrastructure that is Dynamic by providing heightened levels of service, competitive and comparative advantage, and taking on bigger business challenges. Service Management is implemented for all critical services, with service-level agreements and operational reviews established. Slide Transition: One thing to make clear at this point is the benefit of automation. Slide Comment: Additional Information: Faster, more efficient development resulting in IT systems that are Designed for Operations Responsive, policy-driven IT systems that are self managing, reliable and cost effective SLAs that are met or exceeded resulting in satisfied business units and productive end users

20 Deployment Costs Have Declined
Costs per Desktop Costs experienced in prior upgrade of software Costs for current upgrade anticipated to be the same Significant drop in actual costs manual upgrade Slide Title: Deployment Costs have Declined Keywords: Deployment, costs, automation Key Message: A look at how automating deployment reduces deployment costs. Slide Builds: 0 Slide Script: Automating deployment significantly reduces deployment cost. Automation, good tools, and support can reduce the cost of deployments. While cost of deployment per desktop has been high in past rollouts (for example, with Microsoft Windows and Microsoft Office 2000, customers report above $1,000), for current versions, the cost has been reduced dramatically. With Office 2003, Microsoft has released guidance and tools that address key challenges for software distribution and file conversion, application compatibility, and end-user education. These tools have reduced deployment cost per desktop to around $300. Slide Transition: Customers that have AD deployed and use SMS and the Business Desktop Deployment tools (BDD)(including image management) experience deployment cost per desktop of under $ 100. Slide Comment: Additional Information: Relative cost reductions shown reflect actual costs per seat, as reported by various Microsoft deployment partners. Individual customer experiences may vary depending on level of automation and testing Actual current cost of manual upgrade Actual current cost of automated upgrade Previous Upgrade Next Upgrade

21 Business Desktop Deployment
Enables Low Cost Deployment Manual Deployment $500 - $1,000 per PC Modern Desktop: Windows Vista Windows XP Office USMT, ACT, WinPE, RIS, PQDI, Ghost Light Touch Deployment ~ $350 per PC Slide Title: Business Desktop Deployment Keywords: Deployment, Business Desktop, Zero Touch, Prescriptive Guidance Key Message: Utilizing the tools, and guidance that Microsoft provides will allow your organization to move to the desired level of the IO model more easily. Slide Builds: 0 Slide Script: One of the most important Microsoft Solution Accelerators is the Business Desktop Deployment solution accelerator. Using its methodology and tools significantly reduces desktop deployment costs. Microsoft provides a lot of tools, guidance, and help that will allow you to get to a state that is much more automated and much easier to deploy -- a state that is much closer to dynamic, rather than basic. The IO Model is broken into steps, and there are tools and guidance for each step. The cost savings that can be achieved as you move from basic to dynamic are significant. Slide Transition: Let’s take it a step further and see how moving to a rationalized level with automation can save money across the company. Slide Comment: Additional Information: Deployment automation with Zero Touch (SMS, MOM) Zero Touch Based Deployment less than $100< per PC Free prescriptive guidance and tools collection for Windows and Office Client deployment

22 Rationalized Level – Predictions
Investment Cost Saving Slide Title: Rationalized Level-Predictions Keywords: Benefits, Rationalized, Predictions Key Message: In the rationalized level, organizations will save with through staff reductions. Slide Builds: 2 Slide Script: Let’s consider a sample assessment done by one of our partners for a company with 1,000 servers and 10,000 desktops. They decided to go even more granular with their assessment, but each of the areas they assessed matches up with the core areas we have described for the model. These estimates represent labor savings over and above an assumed 20% reduction in staffing levels due to the current transformation program. [BUILD1] Total estimated benefits are $6.7 million, comprising 10,000 desktops and 1,050 servers, from labor benefits arising from server consolidation, reduction in desktop support overstaffing levels (reducing on-site support), and improving processes/technology – that is, moving to the Rationalized level on the IO. [BUILD2] Now the people who were doing this activity can be used on the higher-level business IT tasks, thus showing how the value of moving is not only saving costs, but it also drives better business alignment from a resourcing standpoint. Slide Transition: Now let’s move to the next agenda item. Slide Comment: Additional Information: Benefits

23 Agenda Reviewing IT Challenges
Examining the Core Infrastructure Optimization Model Enhancing the Process with MOF and ITIL Using Scenarios Slide Title: Agenda: Enhancing the process with MOF and ITIL Keywords: agenda Key Message: agenda Slide Builds: 0 Slide Script: Now we’ll talk about the Microsoft Operations Framework (MOF) and the IT Infrastructure Library (ITIL). We’ll talk about what they are, how they relate to each other, and, most importantly, how they can be used to provide guidance and value to IT Deployments -- in other words, how they can help you move up levels in the IO Model. Slide Transition: First, let’s look at the Microsoft Operations Framework and the IT Infrastructure Library. Slide Comment: Additional Information:

24 MOF and ITIL ITIL® Microsoft through MOF defined many ITIL principles
MOF is a foundation to comply with SarbOx, HIPPA, ISO, and other regulations Microsoft through MOF defined many ITIL principles MOF makes Microsoft ITIL-Compliant Slide Title: MOF and ITIL Keywords: MOF, ITIL Key Message: Microsoft Operations Framework (MOF) is a collection of best practices, principles, and models that offers guidance to IT organizations for managing their IT services. Slide Builds: 0 Slide Script: Microsoft Operations Framework (MOF) is a collection of best practices, principles, and models that offers guidance to IT organizations for managing their IT services. Built on the IT Infrastructure Library (ITIL) from the Office of Government Commerce in the United Kingdom, MOF is a framework for managing the operations and support of IT systems, making adjustments due to changing business needs, and optimizing processes for greater efficiency. MOF simplifies IT processes using a model illustrated with clear, easily understood diagrams that divide IT services into four quadrants: the Supporting Quadrant, the Changing Quadrant, the Operating Quadrant, and the Optimizing Quadrant. The goal of MOF is to help IT organizations achieve reliability, availability, supportability, and manageability in their mission-critical systems. Because MOF practices are easy to incorporate, either selectively or comprehensively, operations staff can realize tangible benefits by following the model. Applying the principles of ITIL to the Microsoft technology platform, MOF provides a foundation to help IT organizations meet the challenges described previously and support the goal of continuous improvement. ITIL is a great set of descriptive, reference guidance, but often leaves people saying, “So how do I do it?” MOF adapting ITIL makes it actionable to help our customers best leverage the Microsoft platform. MOF retains common terminology, and adapts it to broaden the focus in terms of breadth through continuous improvement and depth through extra considerations, such as user roles, supporting function, such as administration and monitoring function (and hence a relationship to the capability of the Microsoft management products and technologies. Slide Transition: Let’s look at how MOF and ITIL map to the IO model. Slide Comment: Additional Information: MOF and ITIL provide common IT Service Management taxonomy MOF applies ITIL to Microsoft products MOF makes ITIL actionable on the Microsoft Platform ITIL®

25 MOF and ITIL in IO Detailed View Reactive Ad hoc Problem-Driven
“Avoiding Downtime” Reactive Stable IT Request Driven Change Management and Planning “Keeping It Running” Proactive Accountable Increased Monitoring Formal Change Management SLA’s Predictability “Quality Driven” Proactive Optimizing Costs and Quality Agile Self Assessing Continuous Improvement “Taking The Lead” Slide Title: MOF and ITIL in IO Keywords: MOF, ITIL Key Message: This is how the MOF quadrants related to the IO Model levels Slide Builds: 0 Slide Script: First, if you look at how the segments of MOF map to the IO levels, you’ll see that Basic, the starting point, maps to the Supporting quadrant. IT is reactive, problem-driven, and basically trying to respond to and avoid downtime. As you move on to standardized, the environment is changing. It’s still largely reactive, but it’s stable and request-driven as opposed to fire-drill driven. Change management and planning processes are in place and used for some things (such as server upgrades), although not everywhere. Things are running and the goal is to keep it running. Once you move to rationalized, IT is proactive rather than reactive. IT is also accountable. Systems are monitored, and there are formal change management processes in place, as well as Service Level Agreements. The infrastructure is predicable and quality-driven. Dynamic is when this is fully optimized. Infrastructure is proactive and optimizes both costs and quality. It’s agile. The systems are not only monitored, but are self-assessing. There are continuous improvements, and the infrastructure is a critical advantage in company processes and operations, not a cog or an impediment. Slide Transition: Now lets go to the last agenda item. Slide Comment: Additional Information: Detailed View

26 Agenda Reviewing IT Challenges
Examining the Core Infrastructure Optimization Model Enhancing the Process with MOF and ITIL Using Scenarios Slide Title: Agenda: Using Scenarios Keywords: agenda Key Message: agenda Slide Builds: 0 Slide Script: We’ll look at some scenarios where the IO Model is applied and see the challenges, growth, and benefits. Slide Transition: We’ve separated the journey from basic to dynamic into some discrete areas. Slide Comment: Additional Information:

27 Technology View of the IO Model
Slide Title: A Technology View of the IO Model Keywords: IO Model Technologies Key Message: These are the technology areas that the journey from basic to dynamic are broken into. Slide Builds: 0 Slide Script: At Microsoft, we have divided the journey to infrastructure maturity into four technology views: First, identity and access management. Second, managing the desktop life cycle. Third, how you implement and manage security, networking, and monitoring of your IT infrastructure. Fourth, your policies and procedures for data protection and recovery. Slide Transition: Next we’ll review a scenario that shows how you progress from basic to dynamic through a technology area. Slide Comment: Additional Information:

28 Scenario No server based identity management
No password standards, users as admins Slide Title: Scenario Keywords: Identity, Access Management, Scenario Key Message: Here is an example of one of the Technology views, how you implement and manage identity and access Management of your IT infrastructure. Slide Builds: 4 Slide Script: Here is an example of one of the technology views, how you implement and manage identity and access management of your IT infrastructure. [BUILD1] At the basic level, there is no centralized, server-based identity or access management (such as Active Directory). Users operate in administrative mode. There is limited or inconsistent use of passwords at the desktop and minimal enterprise access standards or identity policies. [BUILD2] At the standardized level, Active Directory is in use for authentication and authorization. At this level, users still have access to administrative mode. Security templates are applied to standard images, but desktops are not controlled by Group Policy. [BUILD3] At the rationalized level, Active Directory Group Policy and security templates are used to manage desktops for security and settings. Desktops are tightly managed. [BUILD4] At the dynamic level, centrally managed user provisioning occurs across heterogeneous systems. Slide Transition: Next, let’s look at a scenario around the Desktop Lifecycle technology area. Slide Comment: Additional Information: Active Directory central authentication Security templates but no GPOs Group Policy deployed and enforced Security templates manage systems Centrally manage user provisioning across heterogeneous systems

29 Scenario Many desktop images Multiple versions of OS and Office
No management Standards Standardized desktop images Single OS and Office Mission Critical Server Monitoring Slide Title: Scenario Keywords: Desktop Lifecycle, Scenario Key Message: Here is an example of one of the Technology views; desktop, server, and device lifecycle. Slide Builds: 4 Slide Script: Here is an example of how you implement and manage the desktop life cycle of your IT infrastructure. In a later session, we will give you a detailed look at how to do this. [BUILD1] At the basic level, there are a multitude of desktop images, more than two versions of Windows or Office, and those versions are two versions or more back. By that we mean if Windows XP is current, Windows NT 4.0 or Windows 98 are both two versions back. The productivity software, Microsoft Office, is similarly diverse. The organization has no management standards or service level agreements for their implementation. [BUILD2] At the standardized level, there are standardized desktop images and no more than two versions of Windows or Office. Versions of Windows or Office are either the current version or only one version back. Important servers are monitored using a tool like Microsoft Operations Manager. [BUILD3] At the rationalized level, there are standardized modern desktop images. Versions of Windows or Office are either the current version or only one version back. Operating Systems and Software are deployed in an efficient, automated manner. The organization has implemented an application compatibility program to test and approve new software. [BUILD4] At the dynamic level, there are standardized modern desktop images. The version of Windows or Office is the currently released version. IT Management is fully automated. The desktop and server infrastructure is seen by management, IT, and information workers as the key portal for business integration. Slide Transition: Next, let’s look at a scenario around the security, networking and monitoring technology area. Slide Comment: Additional Information: Standardized modern desktop images Automated Software Distribution Application Compatibility Solution Current version of OS and Office Desktop is part of business integration Fully Automated IT management

30 Scenario Limited, ad-hoc, lack of standardization
Limited or no monitoring Slide Title: Scenario Keywords: Security, Networking, Monitoring, Scenario Key Message: Here is an example of one of the Technology views, how you implement and manage security, networking and monitoring of your IT infrastructure. Slide Builds: 4 Slide Script: Here is an example of how you implement and manage security, networking, and monitoring of your IT infrastructure. [BUILD1] At the basic level, infrastructure is limited. There is a lack of standardized security measures. Ad-hoc management of system configuration is the norm, and there is limited to no monitoring of infrastructure. [BUILD2] At the standardized level, automated patch management (Windows Update, Update Services, SMS) has been deployed. Security is improved with an edge firewall that has a lock-down configuration. There is also a standardized antivirus solution in place. Firewall is enabled on laptops. New systems are limited to those supported by IT, and there is a defined set of standard basic images -- although they might not be in use everywhere. [BUILD3] At the rationalized level, defense-in-depth security measures are widely deployed. Anti-malware protection (that is, spyware, bots, rootkits, and so on) is deployed. Firewall is enabled on desktops, laptops, and servers. Wireless networks are secured. There is service-level monitoring on desktops and servers, and IPSec is used to isolate critical systems. [BUILD4] At the dynamic level, there is automated, centralized management of security updates for both clients and servers, application compatibility testing, client and server firewall mitigations, application and image deployment, and server operations. There is a reference image system. There is even security event correlation. Slide Transition: Next, let’s look at a scenario around the data protection and recovery technology area. Slide Comment: Additional Information: Some automation and standardization Antivirus, Firewall, standard images Defense-in-depth widely deployed Networks secured, services monitored Automated, central management Security updates, images - everything

31 Scenario User data not centrally stored or archived
Decentralized backup, untested recovery Slide Title: Scenario Keywords: Data Protection, Recovery, Scenario Key Message: Here is an example of one of the Technology views, how you implement and manage data protection and recovery of your IT infrastructure. Slide Builds: 4 Slide Script: Here is an example of how you implement and manage data protection and recovery of your IT infrastructure. [BUILD1] At the basic level, local user data is stored randomly and not backed up to a network. Any backup that does happen, happens locally -- users are responsible for that. There is no user state migration available for deployment. Recovery of backed up data is untested, and each server is backed up to tape. [BUILD2] At the standardized level, there are standards for local storage in “My Documents,” but that folder is not redirected to servers or backed up. Any backup happens at the workgroup level. There is backup and restore on critical servers. There is some automation of user state migration available for deployment. Recovery of backed up data has been tested on mission-critical systems. [BUILD3] At the rationalized level, users store data to “My Documents” and that folder is synchronized to the server. Backup is managed at company level, and there is backup and restore of all servers. There are Service Level Agreements in place. User state is preserved and restored for deployment. Recovery is tested for mission-critical and application data. All backups are LAN-based. [BUILD4] At the dynamic level, backup and restore are self-managed for all server and desktop data. SLAs are in place. Backups are SAN-based with snapshots and use D2D technology. Slide Transition: There are some solution accelerators from Microsoft that can make stages of this journey easier. Slide Comment: Additional Information: Standardized network storage (MyDocs) Server backup, tested server recovery User data stored and synced to server Company level backup and recovery Self-managed backup and recovery of all data

32 Microsoft’s System Center
IT Service Management Performance and Availability Monitoring Operations Manager Software Update and Deployment Systems Management Server Data Storage and Recovery Data Protection Manager Problem Management ‘Service Desk’ Capacity Management Capacity Planner Reporting Manager IT Reporting Operations Management Operations Manager Enabler for Microsoft’s Best Practices Microsoft Operations Framework Infrastructure Optimization

33 Sample Solutions Accelerators
Business Desktop Deployment 2007 Solution Accelerator Application Compatibility and Active Directory Migration Toolkits Slide Title: Sample Solutions Accelerators Keywords: Solution Accelerators Key Message: These solution accelerators can help you upgrade your infrastructure Slide Builds: 0 Slide Script: First, to simplify deployment, the Microsoft BDD Solution v2.5. Business Desktop Deployment consists of two solutions: Standard Edition, using Lite Touch methods for organizations without SMS-managed client networks, and Enterprise Edition, using Zero Touch methods as a fully automated solution for SMS-managed environments. Second, to improve application compatibility, there is the Application Compatibility Toolkit v4.0 Third, there are tested and proven Infrastructure deployment and Migration Solution Accelerators. This includes solution accelerators for software updates, service monitoring, upgrading and consolidating server workloads, security, and interoperability. Please see for a comprehensive list. Fourth, the Microsoft and Partner Infrastructure Optimization Services Portfolio. Fifth, the Microsoft Operations Framework service and delivery solutions. Slide Transition: Now lets review what we’ve covered in this session. Slide Comment: Additional Information: Microsoft Infrastructure deployment and migration Solution Accelerators Microsoft & partners infrastructure optimization services Microsoft Operations Framework service delivery solutions

34 Microsoft’s Promises To You Enabling IT pros and development teams across the IT lifecycle
Promise: Manage Complexity, Achieve Agility Abstract: Today’s business is faced every day with the challenges of managing costs while improving flexibility and agility to drive new business opportunity – all this amidst an increasingly complex IT landscape.  The Dynamic Systems Initiative (DSI) is Microsoft's long term strategy to dramatically reduce the complexity and TCO of developing, deploying, and managing applications so an IT staff can focus on delivering new business value.  DSI provides a model-driven approach together with a complete, integrated set of technology solutions that put IT in control over their environment. The Goal is to enable Self-Managing Dynamic Systems Supporting Talking Points: 1. Knowledge-driven management IT Lifecycle Automation Platform instantiated in Windows System Center = Management solution 2. Design for Operations Capture knowledge in models Design for operations; transfer through IT Lifecycle Models encapsulate policy and best practices System Definition Model / WS-Management 3. Virtual Infrastructure Multi-level: OS, system resource, application Enables dynamic resource allocation and consumption Foundation for job distribution and role migration Broad implications: hardware utilization, software licensing, management tools Core Products: Windows Server Virtual Server / Windows Hypervisor System Center Microsoft Operations Manager (MOM) System Management Server (SMS) Visual Studio 2005 / Visual Studio Team System Windows Server System (WSS) & Common Engineering Criteria (CEC) Microsoft Operations Framework (MOF) Pains IT Complexity (resulting in) IT Management is expensive and prone to problems Security vulnerabilities IT governance and compliance issues Decreased ability to respond to changing business requirements (business agility) Inefficient use of IT resources Where to make IT investments to gain the most benefit Pillars Be more manageable Employ management best practices Size and plan deployments Design applications to be self-managing Ease management burdens through automation Interoperate with using standards Reduce costs Eliminate IT complexities Make efficient use of existing resources Use standards Employ self-managing dynamic systems Improve security Use directory services to manage identity information Manage identities across different identity systems Use identity information for authentication and authorization Enforce IT governance and compliance policies Be more agile Respond to changing business conditions Enable systems to manage themselves Break the tight link between hardware resources and computing workloads Improve reliability, availability, and serviceability of IT systems Use management tools to configure, deploy, monitor, correct, and report Enable self-healing and self-management of IT systems

35 Session Summary Identify where you are in the Core IO Model
Identify the biggest challenges Create a plan that uses solutions Slide Title: Summary Keywords: summary Key Message: summary Slide Builds: 2 Slide Script: First, identify your level of IT infrastructure maturity and discover how to move to the next phase that enables cost reductions, improved automated operations, increased security, and improved delivery of critical business services. [BUILD1] From there, identify the biggest challenges you foresee in moving from basic to standardized, standardized to rationalized, and finally to dynamic. [BUILD2] Then create a plan, and make sure that plan takes advantage of the solutions and solutions accelerators that are available from Microsoft. Slide Transition: To get more information on the products and technologies we have covered today, we have some online resources available that can help Slide Comment: Additional Information:

36 For More Information www.microsoft.com/technet/hot-10
Visit TechNet at Visit the url below for additional information Slide Title: More Information Keywords: Key Message: Slide Builds: 0 Slide Script: For the most comprehensive technical information on Microsoft products visit the main TechNet Web site at Additionally visit for more information on books, courses, certifications and other community resources that related directly to this particular session. Slide Transition: There is also an assessment program available that can help you test you knowledge. Slide Comment: Additional Information:


Download ppt "What is Infrastructure Optimization and Why do I Care?"

Similar presentations


Ads by Google