1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

23
1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting

Transcript of 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

Page 1: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

1

EMEA Partner Led ConsultingService Offerings

EMEA Partner Led Consulting

Page 2: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

2

EMEA Symantec Partner Led Consultingengagement model

EMEA Partner Led Consulting

Impl

emen

tatio

n Ty

peSt

rate

gic/

Co

mpl

exM

ediu

mSt

raig

htfor

war

d

Page 3: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

EMEA Partner Led Consulting 3

Advisory Services

Page 4: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

Information Management

Storage and Availability

Security and Compliance

Assessment Service Catalogue

4

DLP Risk Assessment

De-duplication Assessment

Archiving Assessment

Security Architecture Review

Malicious Activity Assessment

Vulnerability Ass. & Pen Test

Mobile Security Assessment

ITDR ProgramNext Gen. Data Prot. Ass.

SOC Assessment and Design

Cloud Readiness AssessmentINFORM Risk Assessment

Future State Architecture

Storage Supply Chain Analysis

Baseline IT Continuity Ass.

Information Storage Assessment

EMEA Partner Led Consulting

Page 5: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

5

Gap analysis of the customers Security Operations Center VS our best practice guidelines

Define the posture of the actual SOC’s Security Services levels, evaluating the technological and the organizational aspects

Evaluating the actual requirements/controls, in order to measure the current level of security according to the CMM (Capability Maturity Model)

Execute a Gap Analysis against Symantec SOC MS model

Define a Security Roadmap to improve the SOC Services and to prioritize the security Investments

Provide a executive summary representation useful for Top Management

Security Operations Center Assessment and Design

-

0.50

1.00

1.50

2.00

2.50

3.00

3.50

4.00

Real Time Device Monitoring

Vulnerability Assessment

Penetration Test

Security Audit

Security Intelligence

Technology Watch

Alerting & WarningTechnical reporting

Security Device Configuration

Security Device Maintenance

Policy Management

Policy Enforcement

Patch Management

Events Data Retention

Endpoint Security

Hardening

Proactive Security Services Maturity Level

Self AssessmentFuture State

EMEA Partner Led Consulting

CMM Level Description

Not Available (A) (D) (M)(I) (O)(A) (D) (M)(I) (O)

The service is not implemented

Initial (I) (A) (O)(D) (M)(I) (A) (O)(D) (M)

The service is inadeguate to be

delivered from the SOC

Aware (A) (O)(D) (M)(I) (A) (O)(D) (M)(I)

The service has an poor maturità

level. Automation and processes

are just sufficient

Defined (A) (O)(D) (M)(I) (A) (O)(D) (M)(I)

The service has an average

maturity level with automation

and processes to improve

Managed (A) (O)(D) (M)(I) (A) (O)(D) (M)(I)

The service has an high level of

maturity, using well define

processes and adeguate

technologies

Optimized (A) (O)(D) (M)(I) (A) (O)(D) (M)(I)

The service is excellent and

continuously improved

Page 6: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

6

The assessment measures the maturity of the current service in terms of quality of delivery, technical architecture, best practice configuration and on-going management and support. It will identify areas for improvement and potential cost savings.

The review is conducted using a combination of key stakeholder workshops and data gathering tools, resulting in a final presentation of findings and recommendations.

Next Gen Data Protection Assessment

EMEA Partner Led Consulting

The assessment provides a clear insight into the effectiveness of an existing backup and recovery service. Being based on qualitative and quantitative information, it delivers a broad and balanced view, from both process and technology perspectives.

Page 7: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

7

Gap analysis of the customers understanding of IT changes to meet IT continuity requirements

High-level designs for each IT recovery class, high-level recommendations on IT process/IT organization improvements

Selection from three alternative strategies

High-level quantified business case for every strategy to justify selecting the right strategy

Roadmap for IT transformation for selected strategy

ITDR Program

Дорожная карта "максимальной" стратегии

Мера Активность/Проект Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4CM1. Распределение КТС по разным площадкам Проектирование ЦОД 25 25 25

Проведение строительных работ (включая разработку ИРД и ПСД), ввод в эксплуатацию

75 75 75

Организация аренды каналов 75 75

Закупка и установка серверного и прочего оборудования

75 75 75

CM2. Кластеризация между площадкамиРазработка (уточнение) требований, закупка и внедрение ПО

25 25 75 75

CM3. Репликация данных между площадкамиРазработка (уточнение) требований, закупка и внедрение оборудования и/или ПО

25 75 75

CM4. Резервное копирование данныхМодернизация и развитие существующей системы резервного копирования

25 25 75 75

CM5. Архивное хранение данныхРазработка регламента и заключение контракта с поставщиком

75

CM6. План по восстановлениюРазработка и внедрение плана обеспечения непрерывности и восстановления деятельности

25 25 25 25 25 25 75 75 75 75 75 75 75

PM1. Включение в систему мониторинга 25 25 25 75 75 75 75 75 75 75

PM4. Процесс управления ИТ-рисками 25 25 75 75 75 75

PM5. Объединённый процесс управления инцидентами

Разработка и внедрение объединённого процесса управления инцидентами

25 25 25 75 75 75

Модернизация и упрощение процедуры эскалациии инцидентов

25

Интеграция со справочниками CMDB 25 25 75

Ежегодный пересмотр процесса управления инцидентами и процедур эскалации

75 75 75 75 75

PM6. Процесс управления непрерывностьюРазработка и внедрение процесса управления непрерывностью

25 25 75 75 75 75

Проведение семинаров и обучение 75 75 75 75

Дополнение каталога ИТ-сервисов стоимостью простоя

25 25 75 75

PM7. Процесс управления мощностямиПроектирование системы и внедрение ПО управления мощностями

25 25 75 75 75

Разработка спецификации процесса и вндрение процесса управления мощностями

25 25 75 75

Проведение семинаров по обучению 75 75 75

PM8. Документирование (процесса или конфигурации)

Разработка системы и внедрение ПО моделирования уровня предприятия

25 25 75

Создание группы технологического аудита 25 75

Актуализация плана конфигураций 25 25

Обучение, постановка методологии (ITSM, ИБ, аудит)

75 75 75 75

Проведение повторных аудитов 75 75 75 75

Разработка методики документирования процессов

25 25 75 75

Разработка базы знаний по процессам 25 25 75 75 75 75 75 75 75 75 75 75 75 75 75 75 75 75

PM9. Дублирование резервных копий на другой площадке или в удалённом хранилище

Внедрение ПО создания дубликатов резервных копий

25 75

Промежуточные итоги 0% 0% 2% 0% 1% 5% 28% 8% 17% 18% 0% 1% 10% 10% 0% 0% 0% 0% 0% 0%0% 0% 2% 2% 3% 8% 36% 44% 61% 79% 79% 80% 90% 100% 100% 100% 100% 100% 100% 100%

Уровень готовности по годам

2012 2013 2014 2015 2016

100%2% 44% 80% 100%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4

2012 2013 2014 2015 2016

Оглавление

Легенда

Проектирование или разработкаВнедрениеРеализация выгод от внедрения

EMEA Partner Led Consulting

Page 8: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

8

Gap analysis of the customer’s enterprise security deployment VS our best practice guidelines

The Enterprise Security Architecture Review (ESAR) has been designed as a service engagement that will rapidly enable clients to determine whether their current Security Architecture, Risk Management, product portfolio, Security team make-up and supporting processes

It will also determine whether clients have correctly provisioned their security infrastructure with the clients existing solutions and to highlight any weaknesses or gaps in the client’s infrastructure.

The Symantec consultant will assist with providing qualitative data to determine how effective the products are from the Vendor, while mitigating the risks of unplanned downtime

Security Architecture Review

EMEA Partner Led Consulting

Page 9: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

9

Assess volume of malicious activity in the network and the impact to the organization. Provides the data needed to assess risk exposure and identify areas for improved protection

Provides detection capabilities that give you early warnings and details on emerging and potential threats including target and attacker IPs.

Gives you the ability to inspect for botnets—both dormant and active—and take rapid remediation action on infected clients that may be participating in botnet activities.

Allows you to detect compromised endpoints on your network with behavioral modeling and fingerprinting.

Provides detailed reports giving you the data needed to assess risk exposure and identify areas for improved protection.

Malicious Activity Assessment

EMEA Partner Led Consulting

Page 10: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

10

Gap analysis of the customers existing VA processes and tools VS our best practice guidelines

The Vulnerability Assessment Service (VA) has been designed as an entry level, low cost service engagement that will rapidly enable clients to determine whether their current VA methodology and threat modeling support processes correctly determine the relevance (using CVVS or NVD scoring), criticality and deployment capability of vendor released security patches.

Vulnerability Assessment and Penetration Testing

EMEA Partner Led Consulting

Page 11: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

11

• Holistic approach covering 3 perspectives• Governance

• Intelligence

• Infrastructure

• Across 15 core elements

• Provides a 360o view of your mobile security capabilities

Identify security issues within application source code through automated and manual review

Focused on identifying issues with authentication and authorization, data validation, session management, encryption, auditing and logging, and business logic

Can be performed in conjunction with a penetration assessment to provide a deeper view of potential vulnerabilities

Usually conducted during the development or testing phases of the software lifecycle

Mobile Security Assessment

EMEA Partner Led Consulting

Page 12: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

12

Risk Assessment that allows organizations to quantify and qualify their risk of data loss

The Symantec Data Loss Prevention Risk Assessment identifies areas of Very High, High, Medium, and Low risk of data across endpoint, network, and storage systems by data type, based on your evaluation of potential severity and your actual frequency of data loss. It will also determine whether clients have correctly provisioned their security infrastructure with the clients existing solutions and to highlight any weaknesses or gaps in the client’s infrastructure.

Our consultants team helps to create and implement data security policies to discover, monitor, and protect confidential data wherever it is stored or used

DLP Risk Assessment

EMEA Partner Led Consulting

Page 13: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

13

Reviews an existing backup environment to assess the potential impact of introducing deduplication technology.

De-duplication Assessment

EMEA Partner Led Consulting

Staring from an initial review of the hardware and software infrastructure along with the customer data profile, a value based assessment of deduplication will be performed.

This will include:

• Assessing all solution options (client, media server and target based deduplication)

•Defining a preliminary deduplication based solution.

•Quantifying potential cost savings .

•Assessing impact on existing Server, Storage, LAN, SAN and WAN infrastructures.

•Defining a potential migration plan.

•Final Presentation of Recommendations and Findings.

Page 14: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

14

Determines the projected benefits of introducing archiving and eDiscovery as part of the information lifecycle management

• The assessment utilizes a field-proven methodology developed by Symantec to uncover gaps relating to information lifecycle management, including (but not limited to):

– demonstrating and quantifying the benefits & costs of the Symantec solutions for archiving, eDiscovery & retention management

– reviewing litigation and compliance risk around email, and comparing current practices to industry best practices.

– discussing the data lifecycle and policy enforcement, followed by eDiscovery preparation, and finally by costs of unrestricted data growth.

– assessing your business needs, and helping you get your archiving and eDiscovery project up and running.

• The assessment is conducted using tools to collect specific data inputs from Customer environment, including (but not limited to) Exchange Mailbox Analyzer, File System Analyzer, Sharepoint Analyzer, etc.

Archiving & eDiscoveryAssessment

EMEA Partner Led Consulting

Without a tool to control the lifecycle of your

data, you end up with perpetual data growth

and no control. Regardless of your corporate

culture, this always equates cost. Symantec

IIG product suite is at it’s heart a policy engine.

Use it to enforce your safe harbor and data

control policies. Reduce costs and clean up

the environment.

Page 15: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

15

Which servers are consuming data from which arrays?

Which users are creating and using which files?

– A comprehensive assessment service covering block-based and file-based data stores.

– Enables better-informed information lifecycle policy decisions

– Facilitates implementation of chargeback models

– Makes users accountable for the storage they consume

Information Storage Assessment

File Servers Clients

Collectors

Indexers

Active DirectoryManagement Console

Over-provisioned

Misused

EffectivelyUtilized

Un-provisioned

Overhead

Physical

Un-claimed

Logical

Un-consumed

Claimed

Host Usage App

Usage

Consumed

Storage Team

Storage Team

ServerTeam

DB / App Admins

End Users

ServerTeam

EMEA Partner Led Consulting

Page 16: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

16

Baseline IT Continuity Assessment Leverages the standard DRA

POC combined with Operational Risk assessment workshop to determine technical and operational risks to successful DR .

Rapid workshop/ interview and tool-based review of the current IT Continuity (ITC) Capabilities.

Will rapidly enable clients to determine whether their current HA and DR technology and supporting processes will operate as designed in the event of a failure. It will also determine whether clients have over provisioned recovery infrastructure and provide quantitative and qualitative data to determine how cost and effort may be taken out of the existing HA and DR infrastructure while still mitigating the risks of unplanned downtime.

EMEA Partner Led Consulting

Page 17: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

17

Leverages CCS combined with operational assessment workshops to identify opportunities to optimize clients storage and data protection infrastructure.

Symantec helps clients to transform storage processes and operations in to a more efficient and cost effective service.

To understand the client's storage service requirements, Symantec consultants start by reviewing the organization's current storage architecture, software tools, and operational model.

With this information, they can help identify any gaps between the current capability and best practices, and thus help define a strategy that will more closely align storage services with business and IT requirements, while optimizing the delivery of those services.

Using Symantec storage management solutions as tools, (Command Cental Storage, VOM Advanced, Data Insight for Storage), this assessment service provides an insight view into the storage in SAN, NAS, and DAS storage and provides to the IT organization with the information about what applications are connected to what storage arrays and how much of the storage the application is using so organizations can make informed decisions about how their existing storage assets are being utilized.

Storage Supply Chain Analysis

EMEA Partner Led Consulting

Page 18: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

18

Gap analysis of the customers current architectures VS the customers strategic vision

Structured services engagement that determines a Clients Data Centre “Future State” requirements and vision

Reviews and analyses the clients current (tactical) and future (strategic) business requirements

Captures the current state Data Centre architecture and delivers a future state vision

Delivers a supporting roadmap to achieve the vision.

Based on a proven Company I methodology

Two service offerings – FSA Lite and full FSAA

Future State Architecture

"Максимальная" стратегия - общая стоимость

Капитальные расходы, включая установку

"День 1"2012

2013

2014

2015

2016Всего, за 5 лет

Распределение по годам (2012 - 1)

CM1. Распределение КТС по разным площадкам

48 000$

682 463

$

1 001 826

$

397 660

$

-

$

-

$

2 081 949

$ *

CM2. Кластеризация между площадками

-$

-

$ 524 480

$

-

$

-

$

-

$

524 480

$ *

CM3. Репликация данных между площадками

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

CM4. Резервное копирование данных

-$

-

$ 395 344

$

-

$

-

$

-

$

395 344

$ *

CM5. Архивное хранение данных

-$

-

$

-

$

-

$

-

$

-

$

-

$ *

CM6. План по восстановлению

-$

63 500

$

-

$

-

$

-

$

-

$

63 500

$ *

CM7. Контракты с поставщиками (аутсорсинг, ship-in)

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

CM8. Запас мощности оборудования на каждой из площадок

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

CM9. Наличие комплекта ЗиП

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

PM1. Включение в систему мониторинга

-$

894 450

$

80 000

$

40 000

$

-

$

-

$

1 014 450

$ *

PM2. Отказоустойчивая конфигурация оборудования

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

PM3. Кластеризация в рамках одной площадки

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

PM4. Процесс управления ИТ-рисками

-$

-

$

-

$

-

$

-

$

-

$

-

$ *

PM5. Объединённый процесс управления инцидентами

-$

-

$

-

$

-

$

-

$

-

$

-

$ *

PM6. Процесс управления непрерывностью

-$

-

$

-

$

-

$

-

$

-

$

-

$ *

PM7. Процесс управления мощностями

-$

-

$ 50 668

$

-

$

-

$

-

$

50 668

$ *

PM8. Документирование (процесса или конфигурации)

21 000$

27 500

$

56 500

$

10 000

$

-

$

-

$

94 000

$ *

PM9. Дублирование резервных копий на другой площадке или в

удалённом хранилище

-$

-

$ 20 000

$

-

$

-

$

-

$

20 000

$ *

Итого

69 000$

1 667 913

$

2 128 818

$

447 660

$

-

$

-

$

4 244 391

$

Операционные расходы

"День 1"2012

2013

2014

2015

2016Всего, за 5 лет

Итоговое распределение (по итогам 5 лет)

CM1. Распределение КТС по разным площадкам

-$

62 100

$

670 468

$

842 529

$

873 218

$

905 441

$

3 353 755

$ *

CM2. Кластеризация между площадками

-$

-

$ 179 417

$

163 193

$

144 057

$

146 016

$

632 682

$ *

CM3. Репликация данных между площадками

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

CM4. Резервное копирование данных

-$

-

$ 163 830

$

141 248

$

128 787

$

131 453

$

565 318

$ *

CM5. Архивное хранение данных

-$

-

$ 20 845

$

21 887

$

22 982

$

24 131

$

89 845

$ *

CM6. План по восстановлению

24 000$

88 539

$

126 052

$

106 520

$

111 211

$

116 136

$

548 458

$ *

CM7. Контракты с поставщиками (аутсорсинг, ship-in)

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

CM8. Запас мощности оборудования на каждой из площадок

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

CM9. Наличие комплекта ЗиП

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

PM1. Включение в систему мониторинга

-$

162 890

$

207 890

$

162 890

$

162 890

$

162 890

$

859 450

$ *

PM2. Отказоустойчивая конфигурация оборудования

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

PM3. Кластеризация в рамках одной площадки

-$

-

$

-

$

-

$

-

$

-

$

-

$ o

PM4. Процесс управления ИТ-рисками

20 000$

54 967

$

56 215

$

37 526

$

28 903

$

30 348

$

207 959

$ *

PM5. Объединённый процесс управления инцидентами

-$

43 597

$

59 103

$

42 530

$

41 703

$

43 789

$

230 722

$ *

PM6. Процесс управления непрерывностью

-$

40 891

$

65 865

$

43 959

$

40 631

$

42 388

$

233 734

$ *

PM7. Процесс управления мощностями

-$

18 750

$

90 055

$

58 928

$

65 568

$

63 930

$

297 231

$ *

PM8. Документирование (процесса или конфигурации)

51 000$

114 590

$

133 683

$

113 768

$

103 404

$

108 034

$

573 479

$ *

PM9. Дублирование резервных копий на другой площадке или в

удалённом хранилище

-$

-

$ 10 045

$

10 347

$

10 665

$

10 998

$

42 055

$ *

Итого

95 000$

586 324

$

1 783 468

$

1 745 325

$

1 734 019

$

1 785 553

$

7 634 689

$

Распределение по статьям расходов

"День 1"2012

2013

2014

2015

2016Всего, за 5 лет

Оборудование и техническое обеспечение (ОиТО)

22 500

$

696 808

$

558 004

$

-

$

-

$

1 277 312

$

Лицензии (Л)

867 950

$

685 980

$

217 000

$

-

$

-

$

1 770 930

$

Работы внешнего подряда (РВП)

602 837

$

361 950

$

189 713

$

53 470

$

35 709

$

1 243 678

$

Фонд оплаты труда (ФОТ)

148 030

$

543 789

$

618 960

$

644 896

$

677 141

$

2 632 816

$

Сервисное и гарантийное обслуживание (СиГО)

177 290

$

454 648

$

609 648

$

609 648

$

609 648

$

2 460 883

$

Прочие расходы

383 530

$

255 686

$

-

$

-

$

-

$

639 216

$

Телекоммуникации и Инфраструктура (ТиИ)

62 100

$

333 407

$

416 544

$

437 372

$

459 240

$

1 708 663

$

Затраты на проект

$2 254 237$3 912 287

$2 192 985$1 734 019

$1 785 553

Условная выгода от реализации проекта

$116 144$2 555 167

$5 807 197$5 807 197

$5 807 197

Условный ежегодный денежный поток

($2 138 093)($1 357 120)

$3 614 212$4 073 178

$4 021 644

Условный денежный поток за весь период

($2 138 093)($3 495 213)

$118 999$4 192 177

$8 213 821

Условный дисконтированный денежный поток

($2 138 093)($3 243 817)

$102 496$3 351 103

$6 093 631

Условный дисконтированный накопленный за период денежный

поток

($2 138 093)($5 381 910)

($5 279 413)($1 928 310)

$4 165 320

NPV за 5 лет (считая с первого года)

$4 165 320

Срок окупаемости, лет

4,32

Распределение затрат по процессамПроцесс

2012

2013

2014

2015

2016Всего, за 5 лет

ИТ-пр.: упр. непрерывностью (DS4)

116 730

$

179 217

$

137 778

$

139 142

$

145 824

$

718 692

$

ИТ-пр.: упр. ИТ-рисками (PO9)

38 265

$

39 178

$

20 137

$

21 144

$

22 201

$

140 923

$

ИТ-пр.: упр. инцидентами (DS8)

27 000

$

44 250

$

5 934

$

3 278

$

3 441

$

83 903

$

ИТ-пр.: упр. мощностями (DS3)

98 750

$

159 921

$

88 795

$

55 435

$

53 796

$

456 697

$

ИТ-пр.: упр. конфигурациями (DS9)

217 890

$

216 772

$

151 802

$

91 380

$

95 949

$

773 794

$

$-

$100 000

$200 000

$300 000

$400 000

$500 000

$600 000

$700 000

$800 000

$900 000

$1 000 000

12

34

5

Оборудование и техническое

обеспечение (ОиТО)Лицензии (Л)

Работы внешнего подряда (РВП)Фонд оплаты труда (ФОТ)Сервисное и гарантийное

обслуживание (СиГО)Прочие расходыТелекоммуникации и

Инфраструктура (ТиИ)

Оборудование и техническое обеспечение (ОиТО)11%

Лицензии (Л)15%

Работы внешнего подряда (РВП)11%

Фонд оплаты труда (ФОТ)22%

Сервисное и гарантийное обслуживание (СиГО)21%

Прочие расходы5%

Телекоммуникации и Инфраструктура (ТиИ)

15%

($8 000 000)

($6 000 000)

($4 000 000)

($2 000 000)

$0

$2 000 000

$4 000 000

$6 000 000

20122013

20142015

2016Затраты на проект

Условный дисконтированный

накопленный за период денежный поток

ИТ-пр.: упр. непрерывностью (DS4);

$718 692 ; 33%

ИТ-пр.: упр. ИТ-рисками (PO9); $140 923 ; 6%ИТ-пр.: упр. инцидентами

(DS8); $83 903 ; 4%

ИТ-пр.: упр. мощностями (DS3); $456 697 ; 21%

ИТ-пр.: упр. конфигурациями (DS9);

$773 794 ; 36%

Оглавление

EMEA Partner Led Consulting

Page 19: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

19

Gap analysis of the customers current architectures VS the customers cloud based strategic vision

The current state of cloud-relevant technology, as well as lack of definition or standardization in the areas of IT operations and IT governance, suggest that cloud computing is not an enterprise-grade choice for all workloads or use cases. It is therefore critical to segment or tier workloads based on their requirements.

Cloud Readiness Assessment

EMEA Partner Led Consulting

Page 20: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

20

INFORM is an information assurance cost/risk planning program that can assist customers in their business planning process

An intelligent application based on• 1,272 Surveys from Fortune 1000

organizations• Primary and third party research• Expert logic

Analyzes your unique Business Drivers and IT Risks

Develops a Solution Roadmap to best meet your needs

Relates the results to currently accepted IT Management and Security Standards

INFORM Risk Assessment

EMEA Partner Led Consulting

Page 21: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

EMEA Partner Led Consulting 21

Residency Services

Page 22: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

EMEA Partner Led Consulting 22

Consulting Residency ServicesResidency Types

•Manage the technology stack

•Demonstrate domain expertise

Technology Resident•Take

unique Symantec Intelligence and provide to client

•Out-task area of expertise

Expert Resident

•Ensure value realization of Symantec Investment

•Lead the full deployment of portfolio wide solutions

Strategic Resident

Page 23: 1 EMEA Partner Led Consulting Service Offerings EMEA Partner Led Consulting.

23

CustomerRequirements

CTAPResponse

Access to cyber intelligence

Subject Matter Expertise

Comprehensive Toolset

Access to Symantec’s Infrastructure

Threat identification

Intelligence gathering and validation

Assess nature of the threat

Create and implement action

CTAP

Residency ExampleCyber Threat Analysis Program (CTAP)

EMEA Partner Led Consulting