SlideShare a Scribd company logo
1 of 11
STANDARDIZED BASIC RATIONALIZED DYNAMIC Taking the Core Infrastructure Optimization Journey Identity & Access Management Desktop, Device & Server Management Security & Networking Jessie L. Anderson III  Strategic Engagement Manager Microsoft Corporation Data Protection & Recovery 1
Enterprise Challenges of Today TechnologyChange RegulatoryCompliance Competition Security Threats Poorly Integrated Solutions IT Service Management Heterogeneity End User  Productivity CostReduction
Linking Your Infrastructure to the Business Information technology fuelsprofitable revenue growth Companies in the top 25% of IT capability grew revenue 6.8% faster per year than their peers in the bottom 25% of IT capability. The firms in the top 25% of IT capability enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability. Isolating the impact of all IT functions on Productivity shows that IT Infrastructure is a key determinant of superior productivity. Managers in firms that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business. Firms with better IT havemore productive employees Robust IT infrastructure is akey driver of productivityand growth Information technologygives managers more insightand control  Source:  Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006
Application Platform Optimization Model Optimization Capabilities User Experience Business Intelligence STANDARDIZED BASIC ADVANCED DYNAMIC SOA and Business Process Data Management Development Key  Enablers  Business Productivity Infrastructure Optimization Model Unified Communications IT and Security Process Collaboration STANDARDIZED BASIC RATIONALIZED DYNAMIC Enterprise Content Management Enterprise Search ,[object Object]
Search
Messaging
FormsBusiness Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt STANDARDIZED BASIC RATIONALIZED DYNAMIC Security and Networking Data Protection and Recovery ,[object Object]
Identity
Presence
Rights Management,[object Object]
Core Infrastructure Optimization ModelThe journey to enhance IT’s impact on the business Identity and Access Management Manage Identities and Access to Resources * Protect Identities Desktop, Device, and Server Management Manage Desktops and  Mobile Devices * Deploy Applications Data Protection and Recovery Provide Backup * Protect Information * Recover Data Quickly Security and Networking Protect Information * Protect Infrastructure * Provide Access to Resources

More Related Content

What's hot

Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information GovernanceJohn Newton
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...Enterprise Management Associates
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
 
Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization Sarfraz Soomro
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveRob Gerbrandt CD, PMP
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Businessat MicroFocus Italy ❖✔
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3Waseem Saeed
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT StrategyJan Wong
 

What's hot (19)

Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
 
Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework Perspective
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
Dit yvol2iss37
Dit yvol2iss37Dit yvol2iss37
Dit yvol2iss37
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT Strategy
 

Similar to Microsoft Core Infrastructure Overview

Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Ginney McAdams
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentationesbosman
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
management information-system
management information-systemmanagement information-system
management information-systemShahi Raz Akhtar
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
The Backbone of Business Success.pdf
The Backbone of Business Success.pdfThe Backbone of Business Success.pdf
The Backbone of Business Success.pdfjasonuchiha2
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Enterprise Management Associates
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
Managed Initial Presentation Bni
Managed Initial Presentation BniManaged Initial Presentation Bni
Managed Initial Presentation BniFunkmaster
 

Similar to Microsoft Core Infrastructure Overview (20)

Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
Chrome Summary
Chrome SummaryChrome Summary
Chrome Summary
 
HMSC_Core IO
HMSC_Core IOHMSC_Core IO
HMSC_Core IO
 
Why MIS
Why MISWhy MIS
Why MIS
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
management information-system
management information-systemmanagement information-system
management information-system
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
The Backbone of Business Success.pdf
The Backbone of Business Success.pdfThe Backbone of Business Success.pdf
The Backbone of Business Success.pdf
 
Information security
Information securityInformation security
Information security
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
Managed Initial Presentation Bni
Managed Initial Presentation BniManaged Initial Presentation Bni
Managed Initial Presentation Bni
 

More from jessiethe3rd

Comparison for Office Versions
Comparison for Office VersionsComparison for Office Versions
Comparison for Office Versionsjessiethe3rd
 
Blackberry now free with BPOS/Office 365
Blackberry now free with BPOS/Office 365Blackberry now free with BPOS/Office 365
Blackberry now free with BPOS/Office 365jessiethe3rd
 
Cloud Accelerate & Cloud Essential Partner Faq
Cloud Accelerate & Cloud Essential Partner FaqCloud Accelerate & Cloud Essential Partner Faq
Cloud Accelerate & Cloud Essential Partner Faqjessiethe3rd
 
Perkins Analysis on US Patriot
Perkins Analysis on US PatriotPerkins Analysis on US Patriot
Perkins Analysis on US Patriotjessiethe3rd
 
The Economics Of The Cloud
The Economics Of The CloudThe Economics Of The Cloud
The Economics Of The Cloudjessiethe3rd
 
Partner Overview of Office 365 (BPOS v2.0)
Partner Overview of Office 365 (BPOS v2.0)Partner Overview of Office 365 (BPOS v2.0)
Partner Overview of Office 365 (BPOS v2.0)jessiethe3rd
 
Microsoft Online Services Partner Core Deck
Microsoft Online Services Partner Core DeckMicrosoft Online Services Partner Core Deck
Microsoft Online Services Partner Core Deckjessiethe3rd
 
Desktop Enterprise Agreement Business Value for the BDM
Desktop Enterprise Agreement Business Value for the BDMDesktop Enterprise Agreement Business Value for the BDM
Desktop Enterprise Agreement Business Value for the BDMjessiethe3rd
 

More from jessiethe3rd (9)

BPOS for the MSP
BPOS for the MSPBPOS for the MSP
BPOS for the MSP
 
Comparison for Office Versions
Comparison for Office VersionsComparison for Office Versions
Comparison for Office Versions
 
Blackberry now free with BPOS/Office 365
Blackberry now free with BPOS/Office 365Blackberry now free with BPOS/Office 365
Blackberry now free with BPOS/Office 365
 
Cloud Accelerate & Cloud Essential Partner Faq
Cloud Accelerate & Cloud Essential Partner FaqCloud Accelerate & Cloud Essential Partner Faq
Cloud Accelerate & Cloud Essential Partner Faq
 
Perkins Analysis on US Patriot
Perkins Analysis on US PatriotPerkins Analysis on US Patriot
Perkins Analysis on US Patriot
 
The Economics Of The Cloud
The Economics Of The CloudThe Economics Of The Cloud
The Economics Of The Cloud
 
Partner Overview of Office 365 (BPOS v2.0)
Partner Overview of Office 365 (BPOS v2.0)Partner Overview of Office 365 (BPOS v2.0)
Partner Overview of Office 365 (BPOS v2.0)
 
Microsoft Online Services Partner Core Deck
Microsoft Online Services Partner Core DeckMicrosoft Online Services Partner Core Deck
Microsoft Online Services Partner Core Deck
 
Desktop Enterprise Agreement Business Value for the BDM
Desktop Enterprise Agreement Business Value for the BDMDesktop Enterprise Agreement Business Value for the BDM
Desktop Enterprise Agreement Business Value for the BDM
 

Microsoft Core Infrastructure Overview

  • 1. STANDARDIZED BASIC RATIONALIZED DYNAMIC Taking the Core Infrastructure Optimization Journey Identity & Access Management Desktop, Device & Server Management Security & Networking Jessie L. Anderson III Strategic Engagement Manager Microsoft Corporation Data Protection & Recovery 1
  • 2. Enterprise Challenges of Today TechnologyChange RegulatoryCompliance Competition Security Threats Poorly Integrated Solutions IT Service Management Heterogeneity End User Productivity CostReduction
  • 3. Linking Your Infrastructure to the Business Information technology fuelsprofitable revenue growth Companies in the top 25% of IT capability grew revenue 6.8% faster per year than their peers in the bottom 25% of IT capability. The firms in the top 25% of IT capability enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability. Isolating the impact of all IT functions on Productivity shows that IT Infrastructure is a key determinant of superior productivity. Managers in firms that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business. Firms with better IT havemore productive employees Robust IT infrastructure is akey driver of productivityand growth Information technologygives managers more insightand control Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006
  • 4.
  • 7.
  • 10.
  • 11. Core Infrastructure Optimization ModelThe journey to enhance IT’s impact on the business Identity and Access Management Manage Identities and Access to Resources * Protect Identities Desktop, Device, and Server Management Manage Desktops and Mobile Devices * Deploy Applications Data Protection and Recovery Provide Backup * Protect Information * Recover Data Quickly Security and Networking Protect Information * Protect Infrastructure * Provide Access to Resources
  • 12. Uncoordinated, Manual Infrastructure Managed & Consolidated IT Infrastructure Fully Automated Management Managed IT Infrastructure Limited Knowledge Capture Extensive Knowledge Capture & Use Automated Knowledge Capture & Use Knowledge Not Captured Limited Automation Extensive Automation Dynamic Resource Usage Security Risk Business-linked SLAs Inefficient Infrastructure Optimization Model
  • 13. Best Practice Benefits: Cost Savings PC Configuration and Standardization $300 Savings: $110 Savings: $190 Identity & Access Management $170 Savings: $120 Savings: $50 PC Security $130 Savings: $130 Systems Management $230 Savings: $110 Savings: $120
  • 14. Average PCs Managed per IT FTE 76 172 442 Best Practice Benefits: IT Efficiency PCs 600 500 400 300 200 100 0
  • 15. SP2 Analysis of Business Value of Windows Vista Standardized Standardized Rationalized $470/PC $507/PC $200/PC $37/PC $277/PC Improved image management and deployment tools Improved security Improved reliability Improved diagnostics Advanced Group Policy Advanced data protection Better event viewing, tracking Standard Desktop Strategy Centrally Managed PC Settings and Configuration Comprehensive PC Security
  • 16. © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes

  1. 70% of IT budgets (in the broad sense) go to reactive stuff and maintenance activities. Only 30% are addressing the Challenges of Today. There’s a systems problem, there’s a server down, my mail’s out of space, a virus is running rampant and buried IT resources, I can’t access the billing system. Then, the top executives, board and shareholders are concerned about a smarter business-intelligence and way of viewing all that data you have in the database,They want you to do more with less, (a/k/a cost-reduction and efficiency) AND, they’re concerned about compliance and risk mitigation.
  2. This image lists the basic requirements for each capability to advance through the optimization levels.
  3. Next slide: being able to evaluate the cost savings of the environment, that we’ve gone through and helped them understand the move from one pillar to the next what the potential financial impact would be. Next slide: a results (form) that describes the outcome of the IO assessment. The main point is to connect the products with the capabilities that they are wanting to improve.