INFRASTRUCTURE OPTIMISATION
description
Transcript of INFRASTRUCTURE OPTIMISATION
Interoperability
INFRASTRUCTURE OPTIMISATION
What Customers ask for:
New ideas and
Innovation
Expertise & Best Practice
Support in realising
Business Value from increased
use of purchased assets
An understanding of their business
What this means for IT:
GrowthCustomer serviceRegulatory complianceDevice managementVarying skill setsMobility
PC maintenanceServer sprawlLegacy platformsDeployment and maintenanceIdentity managementSoftware updates
Malicious attacks, viruses, spam, etc.Evolving threatsPatch management, VPN, etc.Secure access (employees, partners and customers)
BUSINESS STRATEGY Business Decisions Objectives & Direction Change
IS/IT STRATEGY Business Based Demand Orientated Application Focused
Infrastructure Activity Based Supply Orientated Technology Focused
Where is the business going and Why
What is required
How it canbe delivered
Infrastructureand services
Needs andpriorities
Supportsbusiness
Direction forbusiness
Global and Economic factors,
Industry Sector trends, Market trends,
the IS/IT Industry, Business and
Organisational impact, and, Organisational
potential
Indeed it’s an age-old truth….
How do we begin the journey?
Cost Center
Uncoordinated, manual
infrastructure
More Efficient Cost Center
Managed IT Infrastructure
with limited automation
Managed and consolidated IT Infrastructure
with maximum automation
Fully automated management,
dynamic resource Usage , business
linked SLA’s
Business Enabler
Strategic Asset
Infrastructure Optimisation Modelling
Capability sequencing framework to help you identify/build an optimized infrastructure
(not Microsoft-specific)
Grounded in industry analyst and academic work.
Provides guidance and best practices for step-by-step implementation
Drives cost reduction, security and efficiency gains as well as enabling agility
A Model-based Approach
Integrated CommunicationAccess to InformationBusiness Intelligence Enterprise Content Management
Collaboration Infrastructure Optimization
Desktop LifecycleIdentity & Access ManagementSecurity, Networking & MonitoringData Protection & Recovery
Core Infrastructure Optimization
User ExperienceApplication & ProcessData Development
Application Platform Infrastructure Optimization
Each element of the model is also layered….
Core IO Basic Standardized Rationalized Dynamic
Identity & Access Management
● No common identity management model
Uses Active Directory for authenticating 80% or more of the usersHas a directory based tool to centrally define and enforce configuration standards and security on 80% or more of the desktops Uses a directory-based tool to enable authenticated access to external customers and business partnersHas a solution for user identity validation and data protection – if lost - for Mobile devicesHas a secured and guaranteed way to verify secure communications between the corporate network and mobile devices Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systemsDoes not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions
● Centralized configuration and authentication, information protection infrastructure
● Centralized administration, Federated Identity Management
The model output
Core IO Basic Standardized Rationalized Dynamic
Identity & Access Management
Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systems
Does not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions
Implement Group Policy through Active Directory
Deploy a solution to synchronize identity stores with non-Windows application directories
Deploy a metadirectory solution for identity synchronization
Deploy a smartcard and certificate management solution
Deploy full drive encryption and persistent data protection technologies
Deploy a federated trust-based authentication system for external applications
Enable personal information card access for non-federated users
Deploy a multi-factor authentication solution for access control to high-risk systems and deploy certificate based authentication
Does this organization use Active Directory for authenticating 80% or more of their users? YesDoes this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)?
Yes
Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems?
No
Does this organization use a directory-based tool to enable authenticated access to external customers and business partners? YesDoes this organization use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions?
No
Does this organization have a solution for user identity validation and data protection – if lost - for their Mobile devices? YesDoes this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (certificates)?
Yes
Reaching consensus
Page 10
Maturity Model Output – Core IO
CORE IO Basic Standardized Rationalized Dynamic
Identity & Access Management
Security & Networking
Data Protection & Recovery
Desktop, Device & Server Management
Security Process
ITIL/COBIT-based Management Process
Identity and Access Management is at Basic because of a lack of mature use of directory-based tools to enable authenticated access to external customers and/or partners, or, allowing users to protect content for being copied, printed, distributed without proper rights/permissions.Security and Networking is at Rationalised in terms of capability, but there are questions surrounding common Practice. Data Protection and Recovery is at Standardised because virtualisation is not used as an enabling tool for backup and/or disaster recovery.Within Desktop Device and Server Management, the tracking, management and updating of Mobile devices is a key mover from Basic to Standardised.Security Processes are solid as are the ITIL/COBIT-based Management Processes
Page 11
Maturity Model Output - BPIO
BPIO Basic Standardized Rationalized Dynamic
Collaboration Workspaces
& Portals
Unified Communications
Enterprise Content
Management
Enterprise Search
Business Intelligence
Collaboration Workspaces and Portals is at Basic because although much technology is in place, it is not in widespread use throughout the Enterprise.Unified Communications also falls short of the mark in terms of common use and the integration of elements of UC.Although Enterprise Content Management is at Standardised, web and rich client based forms are not used, amongst other issues.Enterprise Search is not unified. There is no single way, for example, to access all information in the organisation.Whilst Business Intelligence has much technology in place this is diverse and nearer to the ‘islands-of-data’ approach. LOB data cannot be seen in the shared working environment.
Page 12
Maturity Model Output - APIO
APIO Basic Standardized Rationalized Dynamic
User Experience
SOA & Business Process
Data Management
Development
User Experience, SOA and Business Process and data management are all at the Basic level of maturity, whilst Development is at rationalised.Most applications (it is thought) are COTS with, at best, some tailoring done. There are a few legacy applications which from time to time require new functionality.Within this context, User Experience is not considered from the outset of the development and is often an afterthought. Whilst much thought and work has gone in to SOA it is not widespread through the organisation.Within Data Management, there are multiple Database Standards, disconnected silos of data, and only standard database management tools and techniques are leveraged
Myths
Page 13
There is no ‘right ‘and ‘wrong’ level of maturity
…there is no ‘good’ and ‘bad’…
……..if the level of maturity is adequate for the needs of the business at that time…..then there is nothing wrong with it.
……..only when the current level of maturity impedes a key business imperative need it change.
Business Productivity Infrastructure Core Infrastructure Application Platform Infrastructure
Priorities used to be based on ‘projects’ Improve Collaboration Between Regional Offices
Unified Communication & Collaboration
Enterprise Content Management
Business Intelligence
Workspaces & PortalsMessagingPresence
Doc & Records Mgmt
Forms Mgmt
Search
Reporting & Analysis
Now, we need to see the bigger picture
We need to have a good idea of business imperatives and how IT initiatives within the business underpin those business priorities
We have a vision with respect to the IT infrastructure…..
IO modelling even tells us how mature our IT infrastructure is…..
Now, we need to pull it all together.
Create an advanced and
agile supporting IT Infrastructure
At best we link the IT ‘stuff’ to just one of the business priorities
We should link the current maturity levels to our infrastructure goals….
But then we should link IT to the business imperatives….
Now we have a compelling story
If you don’t improve the maturity of this bit of the infrastructure, this business imperative will be impacted.
And again….
Here an Application Platform example
Another….
And the affects of doing nothing
Support the British Economy
Support British Nationals Abroad
Support Managed Migration for
Britain
A Flexible Global Network Serving the
Whole of British Government
Countering Terrorism, Weapons Proliferation & Their
Causes
Prevent & Resolve Conflict
Promote a Low Carbon, High
Growth, Global Economy
Develop Effective International
Institutions, Above All the UN and EU
Knowledge Sharing Capability
for all Staff
Flexible Systems to Support
Mobile Working
Swift, Secure & Reliable
Communications
Fast, Reliable Access to Corporate and
Public Information
Secure Data Transmission
with OGDs
Timely & Accurate Management Information
The Provision of a Secure Stable & Scalable IT
Platform is Fundamental to I&TDs Aims
Operate as a Single Enterprise, when it comes
to IT, One-Size does not necessarily fit all
All I&TD Investment decisions must be made in clear support of the delivery of the DSOs
Information is key to the ability to
function effectively
SharePoint Dynamics CRM
iRecords Enhancements
Online Corporate Info
Services
Data Protection & Recovery
Desktop, Device &
Server Management
Security Process
ITIL/COBIT-based
Management Process
Security & Networking
Identity & Access
Management
Collaboration Workspaces &
Portals
Unified Comms
Enterprise Content
Management
Enterprise Search
Business Intelligence
DSOs
IT Strategies
I&TDPrinciples
Collaboration Mobility
Projects
Maturity Model
Capabilities
2010
2011
2012
Desktop hardware
Desktop OSDesktop Productivity
Web collaboration
Unclas Web Conference
Unified comms
Echo Network Refresh
WAN acceleration
Remote access
Virtualization
IM and Presence
Desktop Video Conferencing
Government Cloud
SharePoint eTeams
Capabilities Roadmap