SlideShare a Scribd company logo
1 of 35
Download to read offline
Linux Infrastructure
Maturity Assessment
Maturing Your Linux
LIMA Objective
Linux Infrastructure
Maturity Assessment

To provide a Linux operating environment
that is fully aligned to your technical and
business requirements, dramatically reduce
deployment time, simplify maintenance,
increase stability, and reduce support and
management costs.
Structure
Linux Infrastructure
Maturity Assessment

01. Linux – The State of Play
02. Linux - The Current Challenge?
03. What is Required to Mitigate Risk?
04. The Proven Fast Track - LIMA
Structure
Linux Infrastructure
Maturity Assessment

01.

Linux – The State of Play
Linux Adoption Trends
Linux Infrastructure
Maturity Assessment

Linux
80%

2010 2011 2012
60% 69% 73%

Windows
20%
5 year plan for
increased OS
investments

Increasing
80%

Decreasing
1%
Enterprises increasing
use of Linux for mission
critical workloads

The results of this survey were based on responses from
355 IT professionals from organizations with £250 million
or more per year in revenues and/or 500+ employees.

Maintaining or
increasing Linux to
support cloud
Linux Is Being Used Everywhere
Linux Infrastructure
Maturity Assessment

Stock Exchange use Linux
New York

Movies are made on Linux

The automotive trade
uses Linux

Banks use Linux

International Space
Station uses Linux

London

Singapore
Why Linux?
Linux Infrastructure
Maturity Assessment

What our customers tell us motivates them to adopt more
Open Architectures*

01. Technical agility

04. End-users

07. Reduced costs

02. Cost agility

05. Customers

08. Innovation

03. Cloud

06. Collaboration

09. Quality
*Source: LinuxIT Survey (February 2013)
What Are The Market Forces Behind Linux
Adoption Trends
Preferred OS for
Tier-1
Applications

Preferred OS for
Cloud

Preferred OS for
Big Data

Linux Infrastructure
Maturity Assessment

Preferred OS
Certification for
CV’s

93% of employers
plan to hire a
Linux pro in the
next 12 months
The results of this survey were based on responses from 850 hiring managers from
corporations, small and medium businesses (SMBs), government organizations, and
staffing agencies.
Structure
Linux Infrastructure
Maturity Assessment

02.

Linux – The Current Challenge
Current Challenges For Linux
Linux Infrastructure
Maturity Assessment

OSS empowers organisations to increase innovation,
efficiency and competitiveness.
As OSS becomes more pervasive, the need for governance increases
exponentially. Open source governance should be embedded in broader
governance to insure IT supports the business goals, and appropriately
manages IT-related risks and opportunities.
As the use of OSS is growing and maturing, the need for governance has
become an integral part of mainstream IT management. OSS is ubiquitous
and unavoidable - having a policy against it is impractical and may place
you at a competitive disadvantage and more.
Current Challenges For Linux
Linux Infrastructure
Maturity Assessment

50% of Global 2000 organisations will experience
technology cost and security challenges due to
lack of Open Source governance
By 2014

Source: Gartner

Through 2015

Less than 50% of IT organisations
will have effective Open Source
governance programs in place

Poor governance can expose organisations to potential quality and business risks,
putting organisations in a vulnerable position.
Current Challenges For Linux
Linux Infrastructure
Maturity Assessment

Slashed IT budgets are forcing organisations to look at
cost effective alternatives like OSS whilst delivering quality and
innovation. However, lack of knowledge and information has driven
organisations to act outside normal governance when adopting Linux
and OSS.
Mike Curtis, Executive Director at LinuxIT

However, the very nature of OSS and historically the way in which
it has proliferated outside of corporate governance filters now means
it suffers from a lack of quality and adherence to governance policies.
This makes it appear inferior and riskier than governed IT estates,
explains Curtis.
Current Challenges For Linux
Linux Infrastructure
Maturity Assessment

Why your organisation will benefit from best practice
Linux architectures and systems management
The common issues
•	 Linux often entered into the organisation
via the backdoor many years ago and has
proliferated organically, rather than against a
strategy or plan.
•	 It has not, therefore, been subject to the same
rigorus standards or ROI assessments applied
across the UNIX and Microsoft estates.
•	 This very often leads to multiple,
undocumented builds of variable standards
across numerous Linux distributions.
Current Challenges For Linux
Linux Infrastructure
Maturity Assessment

•	 Some of these distributions do not carry the
enterprise assurances demanded of a mission
critical environment.
•	 They are often not optimised for the application in
terms of performance or security.
•	 Without a standardised architecture design and
documentation, there is a great deal of risk through
dependency on the engineer that built the servers.
•	 Servers are not built with operational efficiencies in
mind, so scaling up capacity is complex, expensive
and does not benefit from any economies of scale.
•	 It also often means they are not regularly updated
with security patches and fixes which can introduce
risk into the organisation.
Current Challenges For Linux
Linux Infrastructure
Maturity Assessment

•	 Because they have not been built against best
practice, there is often no facility to detect, isolate
and correct problems before they impact on the
business.
•	 Very often, security has not been considered to the
extent that it should have been when building these
servers, particularly in terms of identity management,
activity monitoring and virus/malware management.
•	 Ultimately poor practice around Linux causes an
increase in failure rates, security risk and costs while
decreasing productivity, operational efficiencies and
the value your organisation is able to deliver.
•	 Customers may not return if they’ve suffered from
a bad experience - for example, on an e-commerce
or m-commerce website, leading to lost sales
opportunities.
Structure
Linux Infrastructure
Maturity Assessment

03.

What is Required to Mitigate Risk?
Audit Linux Significance
Linux Infrastructure
Maturity Assessment

Perform a thorough audit of your
current Linux environments
Including what varieties of distributions,
versions and configurations exist and where,
why and how they are deployed and managed.
This includes all instances of Linux existing
and planned, the hardware it sits on and
applications it underpins, and how it integrates
into the environment. Be sure to document.
Audit Linux Competencies
Linux Infrastructure
Maturity Assessment

Undertake a skills assessment
To establish whether the necessary
competencies exist in-house or indeed with
your service provider.
Beware, there are very few service providers
that have these competencies themselves and
contractors simply cannot offer the integrated
services approach.
Implement Best Practice
Linux Infrastructure
Maturity Assessment

•	 Manage your systems in such a way that you
are aware of problems before your customers
are - implement fault management systems
that are designed specifically to provide a
greater return on investment in your Linux
estate.
•	 Secure your Linux infrastructure with best
practice Linux security management that
addresses access controls, user activity, data
privacy, viruses and malware and denial of
service attacks.
•	 Adopt best practice Linux as the foundation
for value recognition further up the stack.
Structure
Linux Infrastructure
Maturity Assessment

04.

The Proven Fast Track- LIMA
Evaluate Maturity
Linux Infrastructure
Maturity Assessment

Define

Assess

Envision

Transform
Linux Infrastructure Maturity Model
Linux Infrastructure
Maturity Assessment

Optimised

Standardised

Controlled

or none has been identified in the
infrastructure

Ad-hoc

No Linux

U

U

L

R

L

N

N

E

B

C

S

N

L

B

S

0

1

2

3

4

S

B
Linux Infrastructure Maturity Model
Linux Infrastructure
Maturity Assessment

Lack of capability
Reactive

Optimised

Unpredictable, Uncoordinated

Standardised

Undocumented strategy

Controlled

No Linux

Ad-hoc

2

3

4

Lack of reporting or MI
No/low budget
No Backups or DR

0

1
Linux Infrastructure Maturity Model
Linux Infrastructure
Maturity Assessment

Basic documentation
Coordinated plans
Some systems integration
No configuration management

Optimised

Emergent Linux strategy

Standardised

Ad-hoc

No Linux

Controlled

3

4

Less reactive
Basic management processes
Some cost control
Some monitoring & reporting
Backups and some DR exists

0

1

2
Linux Infrastructure Maturity Model
Linux Infrastructure
Maturity Assessment

Mature Strategy Configurations managed
systems integrated
Effective monitoring & reporting with
detailed MI Proactive management focus

Optimised

Controlled

Ad-hoc

No Linux

Standardised

Consolidated and rationalised
Details SLA’s
Effective backup policy
Effective DR (manual intervention required)
Budget and costs managed
Most risk identified
Capability to deploy new resources in days
and hours

0

1

2

3

4
Linux Infrastructure Maturity Model
Linux Infrastructure
Maturity Assessment

Standardised

Controlled

Ad-hoc

No Linux

Optimised
Dynamic & flexible strategy
Scalability to accommodate new
requirements (deployable in minutes and
seconds)
Lean & agile processes
highly integrated
Real time MI fed into KPI’s, Businessbased SLA’s (reflects availability & capacity
requirements)
Automated systems management
Highest levels of auditability and security
Full BCP and DR systems in place,
regularly tested
Fully identifiable cost and risks
Proactively focused on improvement

0

1

2

3

4
LIMA Process
Linux Infrastructure
Maturity Assessment

Scope

Phases

Analysis
Discovery

Current State

Strategy
Consulting

Analysis

Assessment
Presentation
& Discussion

Transformation

Reporting

Enablement Program

Future State
Vision
Assess Maturity
Linux Infrastructure
Maturity Assessment

Groundbreaking Assessment Toolkit

Integrated and
Holistic Conceptual
Framework
Envision Appropriate Level of Maturity
Linux Infrastructure
Maturity Assessment

Identify Appropriate Future State of
Maturity

Mature Strategy Configurations managed
systems integrated
Effective monitoring & reporting with
detailed MI Proactive management focus

Optimised

Controlled

Ad-hoc

No Linux

Standardised

Consolidated and rationalised
Details SLA’s
Effective backup policy
Effective DR (manual intervention required)
Budget and costs managed
Most risk identified
Capability to deploy new resources in days
and hours

0

1

2

3

4

...informed by technology and business
requirements and strategy

Pragmatically
Designed by Qualified
Consultants
Transformation
Linux Infrastructure
Maturity Assessment

Ambitious but Achievable
balances costs, scope, pace, capabilities, benefits and timing

Gap Analysis

Prioritise
Requirements
to Bridge
Gap

Reassess
Maturity

Design
Transformation
Enablement
Program

Implement
Discrete
Transformation
Elements

Linux Infrastructure
Maturity Assessment
Reporting Maturity
Linux Infrastructure
Maturity Assessment

70 page report designed to inform and advise with
degrees of granularity appropriate to different readers
Accreditations
Linux Infrastructure
Maturity Assessment

Just some of our awards, accreditations and partnerships
Customers
Linux Infrastructure
Maturity Assessment

Some of our private sector customers
Telecommunications

Retail

Media &
Entertainment

Financial Services

Manufacturing
Technology

Transportation
Utilities
Customers
Linux Infrastructure
Maturity Assessment

Some of our public sector customers

Councils

Health

Education

Government

Not For Profit

Police

Charity
Linux Infrastructure
Maturity Assessment

Thank you

More Related Content

What's hot

IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0RMayo22
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
PowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksPowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksSymantec Security Response
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationFlexera
 
SAM Services powered by AUPIT
SAM Services powered by AUPITSAM Services powered by AUPIT
SAM Services powered by AUPITJames Galera
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterSameer Paradia
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency PlatformSymantec
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...CloudPassage
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 

What's hot (20)

IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Cisco Advanced Services
Cisco Advanced ServicesCisco Advanced Services
Cisco Advanced Services
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
PowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksPowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacks
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
SAM Services powered by AUPIT
SAM Services powered by AUPITSAM Services powered by AUPIT
SAM Services powered by AUPIT
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 

Similar to Reducing Risk And Cost In With A Linux Infrastructure Maturity Assessment

Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
Modernize Development with Agile Engineering Practices
Modernize Development with Agile Engineering PracticesModernize Development with Agile Engineering Practices
Modernize Development with Agile Engineering PracticesCollabNet
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management SolutionsLexComply
 
A DevOps adoption playbook- achieving business value at scale
A DevOps adoption playbook- achieving business value at scaleA DevOps adoption playbook- achieving business value at scale
A DevOps adoption playbook- achieving business value at scaleSanjeev Sharma
 
The Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineThe Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineDevOps.com
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudGoogle
 
What’s New with NGINX Controller Load Balancing Module 2.0?
What’s New with NGINX Controller Load Balancing Module 2.0?What’s New with NGINX Controller Load Balancing Module 2.0?
What’s New with NGINX Controller Load Balancing Module 2.0?NGINX, Inc.
 
From Chaos to Compliance: The New Digital Governance for DevOps
From Chaos to Compliance: The New Digital Governance for DevOpsFrom Chaos to Compliance: The New Digital Governance for DevOps
From Chaos to Compliance: The New Digital Governance for DevOpsXebiaLabs
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native ComputingSaju Thomas
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – ExploredAgile Testing Alliance
 

Similar to Reducing Risk And Cost In With A Linux Infrastructure Maturity Assessment (20)

Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Modernize Development with Agile Engineering Practices
Modernize Development with Agile Engineering PracticesModernize Development with Agile Engineering Practices
Modernize Development with Agile Engineering Practices
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 
A DevOps adoption playbook- achieving business value at scale
A DevOps adoption playbook- achieving business value at scaleA DevOps adoption playbook- achieving business value at scale
A DevOps adoption playbook- achieving business value at scale
 
The Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineThe Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD Pipeline
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
DevOps for Enterprise Systems - Rosalind Radcliffe
DevOps for Enterprise Systems - Rosalind RadcliffeDevOps for Enterprise Systems - Rosalind Radcliffe
DevOps for Enterprise Systems - Rosalind Radcliffe
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
What’s New with NGINX Controller Load Balancing Module 2.0?
What’s New with NGINX Controller Load Balancing Module 2.0?What’s New with NGINX Controller Load Balancing Module 2.0?
What’s New with NGINX Controller Load Balancing Module 2.0?
 
From Chaos to Compliance: The New Digital Governance for DevOps
From Chaos to Compliance: The New Digital Governance for DevOpsFrom Chaos to Compliance: The New Digital Governance for DevOps
From Chaos to Compliance: The New Digital Governance for DevOps
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native Computing
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored
 

More from LinuxIT

What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?LinuxIT
 
The Dangers of Shadow IT
The Dangers of Shadow ITThe Dangers of Shadow IT
The Dangers of Shadow ITLinuxIT
 
How to make dev ops flourish (and improve your infrastructure)
How to make dev ops flourish (and improve your infrastructure)How to make dev ops flourish (and improve your infrastructure)
How to make dev ops flourish (and improve your infrastructure)LinuxIT
 
See The Benefits Of Our Open Architectures Readiness Assessment
See The Benefits Of Our Open Architectures Readiness AssessmentSee The Benefits Of Our Open Architectures Readiness Assessment
See The Benefits Of Our Open Architectures Readiness AssessmentLinuxIT
 
Best Practice Linux Guide: Virtualization
 Best Practice Linux Guide: Virtualization Best Practice Linux Guide: Virtualization
Best Practice Linux Guide: VirtualizationLinuxIT
 
Open Architectures- Lessons from the Public Sector
Open Architectures- Lessons from the Public SectorOpen Architectures- Lessons from the Public Sector
Open Architectures- Lessons from the Public SectorLinuxIT
 

More from LinuxIT (6)

What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?
 
The Dangers of Shadow IT
The Dangers of Shadow ITThe Dangers of Shadow IT
The Dangers of Shadow IT
 
How to make dev ops flourish (and improve your infrastructure)
How to make dev ops flourish (and improve your infrastructure)How to make dev ops flourish (and improve your infrastructure)
How to make dev ops flourish (and improve your infrastructure)
 
See The Benefits Of Our Open Architectures Readiness Assessment
See The Benefits Of Our Open Architectures Readiness AssessmentSee The Benefits Of Our Open Architectures Readiness Assessment
See The Benefits Of Our Open Architectures Readiness Assessment
 
Best Practice Linux Guide: Virtualization
 Best Practice Linux Guide: Virtualization Best Practice Linux Guide: Virtualization
Best Practice Linux Guide: Virtualization
 
Open Architectures- Lessons from the Public Sector
Open Architectures- Lessons from the Public SectorOpen Architectures- Lessons from the Public Sector
Open Architectures- Lessons from the Public Sector
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Reducing Risk And Cost In With A Linux Infrastructure Maturity Assessment

  • 2. LIMA Objective Linux Infrastructure Maturity Assessment To provide a Linux operating environment that is fully aligned to your technical and business requirements, dramatically reduce deployment time, simplify maintenance, increase stability, and reduce support and management costs.
  • 3. Structure Linux Infrastructure Maturity Assessment 01. Linux – The State of Play 02. Linux - The Current Challenge? 03. What is Required to Mitigate Risk? 04. The Proven Fast Track - LIMA
  • 5. Linux Adoption Trends Linux Infrastructure Maturity Assessment Linux 80% 2010 2011 2012 60% 69% 73% Windows 20% 5 year plan for increased OS investments Increasing 80% Decreasing 1% Enterprises increasing use of Linux for mission critical workloads The results of this survey were based on responses from 355 IT professionals from organizations with £250 million or more per year in revenues and/or 500+ employees. Maintaining or increasing Linux to support cloud
  • 6. Linux Is Being Used Everywhere Linux Infrastructure Maturity Assessment Stock Exchange use Linux New York Movies are made on Linux The automotive trade uses Linux Banks use Linux International Space Station uses Linux London Singapore
  • 7. Why Linux? Linux Infrastructure Maturity Assessment What our customers tell us motivates them to adopt more Open Architectures* 01. Technical agility 04. End-users 07. Reduced costs 02. Cost agility 05. Customers 08. Innovation 03. Cloud 06. Collaboration 09. Quality *Source: LinuxIT Survey (February 2013)
  • 8. What Are The Market Forces Behind Linux Adoption Trends Preferred OS for Tier-1 Applications Preferred OS for Cloud Preferred OS for Big Data Linux Infrastructure Maturity Assessment Preferred OS Certification for CV’s 93% of employers plan to hire a Linux pro in the next 12 months The results of this survey were based on responses from 850 hiring managers from corporations, small and medium businesses (SMBs), government organizations, and staffing agencies.
  • 10. Current Challenges For Linux Linux Infrastructure Maturity Assessment OSS empowers organisations to increase innovation, efficiency and competitiveness. As OSS becomes more pervasive, the need for governance increases exponentially. Open source governance should be embedded in broader governance to insure IT supports the business goals, and appropriately manages IT-related risks and opportunities. As the use of OSS is growing and maturing, the need for governance has become an integral part of mainstream IT management. OSS is ubiquitous and unavoidable - having a policy against it is impractical and may place you at a competitive disadvantage and more.
  • 11. Current Challenges For Linux Linux Infrastructure Maturity Assessment 50% of Global 2000 organisations will experience technology cost and security challenges due to lack of Open Source governance By 2014 Source: Gartner Through 2015 Less than 50% of IT organisations will have effective Open Source governance programs in place Poor governance can expose organisations to potential quality and business risks, putting organisations in a vulnerable position.
  • 12. Current Challenges For Linux Linux Infrastructure Maturity Assessment Slashed IT budgets are forcing organisations to look at cost effective alternatives like OSS whilst delivering quality and innovation. However, lack of knowledge and information has driven organisations to act outside normal governance when adopting Linux and OSS. Mike Curtis, Executive Director at LinuxIT However, the very nature of OSS and historically the way in which it has proliferated outside of corporate governance filters now means it suffers from a lack of quality and adherence to governance policies. This makes it appear inferior and riskier than governed IT estates, explains Curtis.
  • 13. Current Challenges For Linux Linux Infrastructure Maturity Assessment Why your organisation will benefit from best practice Linux architectures and systems management The common issues • Linux often entered into the organisation via the backdoor many years ago and has proliferated organically, rather than against a strategy or plan. • It has not, therefore, been subject to the same rigorus standards or ROI assessments applied across the UNIX and Microsoft estates. • This very often leads to multiple, undocumented builds of variable standards across numerous Linux distributions.
  • 14. Current Challenges For Linux Linux Infrastructure Maturity Assessment • Some of these distributions do not carry the enterprise assurances demanded of a mission critical environment. • They are often not optimised for the application in terms of performance or security. • Without a standardised architecture design and documentation, there is a great deal of risk through dependency on the engineer that built the servers. • Servers are not built with operational efficiencies in mind, so scaling up capacity is complex, expensive and does not benefit from any economies of scale. • It also often means they are not regularly updated with security patches and fixes which can introduce risk into the organisation.
  • 15. Current Challenges For Linux Linux Infrastructure Maturity Assessment • Because they have not been built against best practice, there is often no facility to detect, isolate and correct problems before they impact on the business. • Very often, security has not been considered to the extent that it should have been when building these servers, particularly in terms of identity management, activity monitoring and virus/malware management. • Ultimately poor practice around Linux causes an increase in failure rates, security risk and costs while decreasing productivity, operational efficiencies and the value your organisation is able to deliver. • Customers may not return if they’ve suffered from a bad experience - for example, on an e-commerce or m-commerce website, leading to lost sales opportunities.
  • 17. Audit Linux Significance Linux Infrastructure Maturity Assessment Perform a thorough audit of your current Linux environments Including what varieties of distributions, versions and configurations exist and where, why and how they are deployed and managed. This includes all instances of Linux existing and planned, the hardware it sits on and applications it underpins, and how it integrates into the environment. Be sure to document.
  • 18. Audit Linux Competencies Linux Infrastructure Maturity Assessment Undertake a skills assessment To establish whether the necessary competencies exist in-house or indeed with your service provider. Beware, there are very few service providers that have these competencies themselves and contractors simply cannot offer the integrated services approach.
  • 19. Implement Best Practice Linux Infrastructure Maturity Assessment • Manage your systems in such a way that you are aware of problems before your customers are - implement fault management systems that are designed specifically to provide a greater return on investment in your Linux estate. • Secure your Linux infrastructure with best practice Linux security management that addresses access controls, user activity, data privacy, viruses and malware and denial of service attacks. • Adopt best practice Linux as the foundation for value recognition further up the stack.
  • 21. Evaluate Maturity Linux Infrastructure Maturity Assessment Define Assess Envision Transform
  • 22. Linux Infrastructure Maturity Model Linux Infrastructure Maturity Assessment Optimised Standardised Controlled or none has been identified in the infrastructure Ad-hoc No Linux U U L R L N N E B C S N L B S 0 1 2 3 4 S B
  • 23. Linux Infrastructure Maturity Model Linux Infrastructure Maturity Assessment Lack of capability Reactive Optimised Unpredictable, Uncoordinated Standardised Undocumented strategy Controlled No Linux Ad-hoc 2 3 4 Lack of reporting or MI No/low budget No Backups or DR 0 1
  • 24. Linux Infrastructure Maturity Model Linux Infrastructure Maturity Assessment Basic documentation Coordinated plans Some systems integration No configuration management Optimised Emergent Linux strategy Standardised Ad-hoc No Linux Controlled 3 4 Less reactive Basic management processes Some cost control Some monitoring & reporting Backups and some DR exists 0 1 2
  • 25. Linux Infrastructure Maturity Model Linux Infrastructure Maturity Assessment Mature Strategy Configurations managed systems integrated Effective monitoring & reporting with detailed MI Proactive management focus Optimised Controlled Ad-hoc No Linux Standardised Consolidated and rationalised Details SLA’s Effective backup policy Effective DR (manual intervention required) Budget and costs managed Most risk identified Capability to deploy new resources in days and hours 0 1 2 3 4
  • 26. Linux Infrastructure Maturity Model Linux Infrastructure Maturity Assessment Standardised Controlled Ad-hoc No Linux Optimised Dynamic & flexible strategy Scalability to accommodate new requirements (deployable in minutes and seconds) Lean & agile processes highly integrated Real time MI fed into KPI’s, Businessbased SLA’s (reflects availability & capacity requirements) Automated systems management Highest levels of auditability and security Full BCP and DR systems in place, regularly tested Fully identifiable cost and risks Proactively focused on improvement 0 1 2 3 4
  • 27. LIMA Process Linux Infrastructure Maturity Assessment Scope Phases Analysis Discovery Current State Strategy Consulting Analysis Assessment Presentation & Discussion Transformation Reporting Enablement Program Future State Vision
  • 28. Assess Maturity Linux Infrastructure Maturity Assessment Groundbreaking Assessment Toolkit Integrated and Holistic Conceptual Framework
  • 29. Envision Appropriate Level of Maturity Linux Infrastructure Maturity Assessment Identify Appropriate Future State of Maturity Mature Strategy Configurations managed systems integrated Effective monitoring & reporting with detailed MI Proactive management focus Optimised Controlled Ad-hoc No Linux Standardised Consolidated and rationalised Details SLA’s Effective backup policy Effective DR (manual intervention required) Budget and costs managed Most risk identified Capability to deploy new resources in days and hours 0 1 2 3 4 ...informed by technology and business requirements and strategy Pragmatically Designed by Qualified Consultants
  • 30. Transformation Linux Infrastructure Maturity Assessment Ambitious but Achievable balances costs, scope, pace, capabilities, benefits and timing Gap Analysis Prioritise Requirements to Bridge Gap Reassess Maturity Design Transformation Enablement Program Implement Discrete Transformation Elements Linux Infrastructure Maturity Assessment
  • 31. Reporting Maturity Linux Infrastructure Maturity Assessment 70 page report designed to inform and advise with degrees of granularity appropriate to different readers
  • 32. Accreditations Linux Infrastructure Maturity Assessment Just some of our awards, accreditations and partnerships
  • 33. Customers Linux Infrastructure Maturity Assessment Some of our private sector customers Telecommunications Retail Media & Entertainment Financial Services Manufacturing Technology Transportation Utilities
  • 34. Customers Linux Infrastructure Maturity Assessment Some of our public sector customers Councils Health Education Government Not For Profit Police Charity