INFRASTRUCTURE OPTIMISATION

28
Interoperability INFRASTRUCTURE OPTIMISATION

description

INFRASTRUCTURE OPTIMISATION. What Customers ask for:. What this means for IT:. Growth Customer service Regulatory compliance Device management Varying skill sets Mobility. PC maintenance Server sprawl Legacy platforms Deployment and maintenance Identity management Software updates. - PowerPoint PPT Presentation

Transcript of INFRASTRUCTURE OPTIMISATION

Page 1: INFRASTRUCTURE OPTIMISATION

Interoperability

INFRASTRUCTURE OPTIMISATION

Page 2: INFRASTRUCTURE OPTIMISATION

What Customers ask for:

New ideas and

Innovation

Expertise & Best Practice

Support in realising

Business Value from increased

use of purchased assets

An understanding of their business

Page 3: INFRASTRUCTURE OPTIMISATION

What this means for IT:

GrowthCustomer serviceRegulatory complianceDevice managementVarying skill setsMobility

PC maintenanceServer sprawlLegacy platformsDeployment and maintenanceIdentity managementSoftware updates

Malicious attacks, viruses, spam, etc.Evolving threatsPatch management, VPN, etc.Secure access (employees, partners and customers)

Page 4: INFRASTRUCTURE OPTIMISATION

BUSINESS STRATEGY Business Decisions Objectives & Direction Change

IS/IT STRATEGY Business Based Demand Orientated Application Focused

Infrastructure Activity Based Supply Orientated Technology Focused

Where is the business going and Why

What is required

How it canbe delivered

Infrastructureand services

Needs andpriorities

Supportsbusiness

Direction forbusiness

Global and Economic factors,

Industry Sector trends, Market trends,

the IS/IT Industry, Business and

Organisational impact, and, Organisational

potential

Indeed it’s an age-old truth….

Page 5: INFRASTRUCTURE OPTIMISATION

How do we begin the journey?

Cost Center

Uncoordinated, manual

infrastructure

More Efficient Cost Center

Managed IT Infrastructure

with limited automation

Managed and consolidated IT Infrastructure

with maximum automation

Fully automated management,

dynamic resource Usage , business

linked SLA’s

Business Enabler

Strategic Asset

Infrastructure Optimisation Modelling

Page 6: INFRASTRUCTURE OPTIMISATION

Capability sequencing framework to help you identify/build an optimized infrastructure

(not Microsoft-specific)

Grounded in industry analyst and academic work.

Provides guidance and best practices for step-by-step implementation

Drives cost reduction, security and efficiency gains as well as enabling agility

A Model-based Approach

Page 7: INFRASTRUCTURE OPTIMISATION

Integrated CommunicationAccess to InformationBusiness Intelligence Enterprise Content Management

Collaboration Infrastructure Optimization

Desktop LifecycleIdentity & Access ManagementSecurity, Networking & MonitoringData Protection & Recovery

Core Infrastructure Optimization

User ExperienceApplication & ProcessData Development

Application Platform Infrastructure Optimization

Each element of the model is also layered….

Page 8: INFRASTRUCTURE OPTIMISATION

Core IO  Basic Standardized Rationalized Dynamic

Identity & Access Management

● No common identity management model

Uses Active Directory for authenticating 80% or more of the usersHas a directory based tool to centrally define and enforce configuration standards and security on 80% or more of the desktops Uses a directory-based tool to enable authenticated access to external customers and business partnersHas a solution for user identity validation and data protection – if lost - for Mobile devicesHas a secured and guaranteed way to verify secure communications between the corporate network and mobile devices Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systemsDoes not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions

● Centralized configuration and authentication, information protection infrastructure

● Centralized administration, Federated Identity Management

The model output

Page 9: INFRASTRUCTURE OPTIMISATION

Core IO  Basic Standardized Rationalized Dynamic

Identity & Access Management

Does not have a central tool to automate user account provisioning across 80% or more of the heterogeneous systems

Does not use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions

Implement Group Policy through Active Directory

Deploy a solution to synchronize identity stores with non-Windows application directories

Deploy a metadirectory solution for identity synchronization

Deploy a smartcard and certificate management solution

Deploy full drive encryption and persistent data protection technologies

Deploy a federated trust-based authentication system for external applications

Enable personal information card access for non-federated users

Deploy a multi-factor authentication solution for access control to high-risk systems and deploy certificate based authentication

Does this organization use Active Directory for authenticating 80% or more of their users? YesDoes this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)?

Yes

Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems?

No

Does this organization use a directory-based tool to enable authenticated access to external customers and business partners? YesDoes this organization use a directory-based solution to allows user to protect content for being copied, printed, distributed without proper rights/permissions?

No

Does this organization have a solution for user identity validation and data protection – if lost - for their Mobile devices? YesDoes this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (certificates)?

Yes

Reaching consensus

Page 10: INFRASTRUCTURE OPTIMISATION

Page 10

Maturity Model Output – Core IO

CORE IO  Basic Standardized Rationalized Dynamic

Identity & Access Management

Security & Networking

Data Protection & Recovery

Desktop, Device & Server Management

Security Process

ITIL/COBIT-based Management Process

Identity and Access Management is at Basic because of a lack of mature use of directory-based tools to enable authenticated access to external customers and/or partners, or, allowing users to protect content for being copied, printed, distributed without proper rights/permissions.Security and Networking is at Rationalised in terms of capability, but there are questions surrounding common Practice. Data Protection and Recovery is at Standardised because virtualisation is not used as an enabling tool for backup and/or disaster recovery.Within Desktop Device and Server Management, the tracking, management and updating of Mobile devices is a key mover from Basic to Standardised.Security Processes are solid as are the ITIL/COBIT-based Management Processes

Page 11: INFRASTRUCTURE OPTIMISATION

Page 11

Maturity Model Output - BPIO

BPIO  Basic Standardized Rationalized Dynamic

Collaboration Workspaces

& Portals

Unified Communications

Enterprise Content

Management

Enterprise Search

Business Intelligence

Collaboration Workspaces and Portals is at Basic because although much technology is in place, it is not in widespread use throughout the Enterprise.Unified Communications also falls short of the mark in terms of common use and the integration of elements of UC.Although Enterprise Content Management is at Standardised, web and rich client based forms are not used, amongst other issues.Enterprise Search is not unified. There is no single way, for example, to access all information in the organisation.Whilst Business Intelligence has much technology in place this is diverse and nearer to the ‘islands-of-data’ approach. LOB data cannot be seen in the shared working environment.

Page 12: INFRASTRUCTURE OPTIMISATION

Page 12

Maturity Model Output - APIO

APIO Basic Standardized Rationalized Dynamic

User Experience

SOA & Business Process

Data Management

Development

User Experience, SOA and Business Process and data management are all at the Basic level of maturity, whilst Development is at rationalised.Most applications (it is thought) are COTS with, at best, some tailoring done. There are a few legacy applications which from time to time require new functionality.Within this context, User Experience is not considered from the outset of the development and is often an afterthought. Whilst much thought and work has gone in to SOA it is not widespread through the organisation.Within Data Management, there are multiple Database Standards, disconnected silos of data, and only standard database management tools and techniques are leveraged

Page 13: INFRASTRUCTURE OPTIMISATION

Myths

Page 13

There is no ‘right ‘and ‘wrong’ level of maturity

…there is no ‘good’ and ‘bad’…

……..if the level of maturity is adequate for the needs of the business at that time…..then there is nothing wrong with it.

……..only when the current level of maturity impedes a key business imperative need it change.

Business Productivity Infrastructure Core Infrastructure Application Platform Infrastructure

Page 14: INFRASTRUCTURE OPTIMISATION

Priorities used to be based on ‘projects’ Improve Collaboration Between Regional Offices

Unified Communication & Collaboration

Enterprise Content Management

Business Intelligence

Workspaces & PortalsMessagingPresence

Doc & Records Mgmt

Forms Mgmt

Search

Reporting & Analysis

Page 15: INFRASTRUCTURE OPTIMISATION

Now, we need to see the bigger picture

We need to have a good idea of business imperatives and how IT initiatives within the business underpin those business priorities

Page 16: INFRASTRUCTURE OPTIMISATION

We have a vision with respect to the IT infrastructure…..

Page 17: INFRASTRUCTURE OPTIMISATION

IO modelling even tells us how mature our IT infrastructure is…..

Page 18: INFRASTRUCTURE OPTIMISATION

Now, we need to pull it all together.

Create an advanced and

agile supporting IT Infrastructure

At best we link the IT ‘stuff’ to just one of the business priorities

Page 19: INFRASTRUCTURE OPTIMISATION

We should link the current maturity levels to our infrastructure goals….

Page 20: INFRASTRUCTURE OPTIMISATION

But then we should link IT to the business imperatives….

Page 21: INFRASTRUCTURE OPTIMISATION

Now we have a compelling story

If you don’t improve the maturity of this bit of the infrastructure, this business imperative will be impacted.

Page 22: INFRASTRUCTURE OPTIMISATION

And again….

Page 23: INFRASTRUCTURE OPTIMISATION

Here an Application Platform example

Page 24: INFRASTRUCTURE OPTIMISATION

Another….

Page 25: INFRASTRUCTURE OPTIMISATION

And the affects of doing nothing

Page 26: INFRASTRUCTURE OPTIMISATION

Support the British Economy

Support British Nationals Abroad

Support Managed Migration for

Britain

A Flexible Global Network Serving the

Whole of British Government

Countering Terrorism, Weapons Proliferation & Their

Causes

Prevent & Resolve Conflict

Promote a Low Carbon, High

Growth, Global Economy

Develop Effective International

Institutions, Above All the UN and EU

Knowledge Sharing Capability

for all Staff

Flexible Systems to Support

Mobile Working

Swift, Secure & Reliable

Communications

Fast, Reliable Access to Corporate and

Public Information

Secure Data Transmission

with OGDs

Timely & Accurate Management Information

The Provision of a Secure Stable & Scalable IT

Platform is Fundamental to I&TDs Aims

Operate as a Single Enterprise, when it comes

to IT, One-Size does not necessarily fit all

All I&TD Investment decisions must be made in clear support of the delivery of the DSOs

Information is key to the ability to

function effectively

SharePoint Dynamics CRM

iRecords Enhancements

Online Corporate Info

Services

Data Protection & Recovery

Desktop, Device &

Server Management

Security Process

ITIL/COBIT-based

Management Process

Security & Networking

Identity & Access

Management

Collaboration Workspaces &

Portals

Unified Comms

Enterprise Content

Management

Enterprise Search

Business Intelligence

DSOs

IT Strategies

I&TDPrinciples

Collaboration Mobility

Projects

Maturity Model

Capabilities

Page 27: INFRASTRUCTURE OPTIMISATION

2010

2011

2012

Desktop hardware

Desktop OSDesktop Productivity

Web collaboration

Unclas Web Conference

Unified comms

Echo Network Refresh

WAN acceleration

Remote access

Virtualization

IM and Presence

Desktop Video Conferencing

Government Cloud

SharePoint eTeams

Capabilities Roadmap

Page 28: INFRASTRUCTURE OPTIMISATION