SlideShare a Scribd company logo
1 of 15
Delivered by MindShare Services Pvt. Ltd. Prepared for PR - RAJESH BANSAL
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Infrastructure Optimization Building a People-Ready Business ,[object Object],[object Object],[object Object],[object Object],[object Object],Model-Based Approach- Frame Work-Microsoft , Gartner, IDC, MIT
[object Object],[object Object],[object Object],[object Object],[object Object],Infrastructure Optimization Model Stage Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Basic Standardized Rationalized Dynamic
Core Infrastructure   Optimization Model Data Protection and Recovery Identity and Access Management Security and Networking IT and Security Process Desktop, Device, and Server Management Basic Standardized Rationalized Dynamic
Interpreting the Results •   Basic: "We Fight Fires" The Basic IT infrastructure is characterized by manual, localized processes and minimal central control, as well as nonexistent or un‑enforced IT policies and standards for security, backup, image management, and deployment, compliance, and other common IT practices. •   Standardized: "We're Gaining Control" The Standardized infrastructure introduces controls through the use of standards and policies to manage desktops and servers; how machines are introduced to the network; and the use of Active Directory services to manage resources, security policies, and access control. •   Rationalized: "We Enable Business" The Rationalized infrastructure exists where the costs involved in managing desktops and servers are at their lowest, and processes and policies have matured to play a large role in supporting and expanding the business. Security is proactive with rapid response to threats. •   Dynamic: "We're a Strategic Asset" The Dynamic infrastructure provides strategic value that helps the organization run its business efficiently and competitively. Costs are fully controlled. Integration and collaboration between users is pervasive, and mobile users have high levels of service and capabilities.
PR Core IO Assessment  ,[object Object],[object Object]
Organized by the technology capability areas for Core IO, the results show that PR Holdings Pvt. Ltd’s Core Infrastructure has been currently assessed as follows: The results show that PR Holdings Pvt. Ltd’s Core IT Infrastructure has been categorized as basic. PR Holdings Pvt. Ltd's Current Score ,[object Object],[object Object],Basic Standardized Rationalized Dynamic Identity and Access Management √ Desktop, Device, and Server Management √ Security and Networking √ Data Protection and Recovery √ IT and Security Process √
Comparing PR Holdings Pvt. Ltd's to Peers Comparing PR Holdings Pvt. Ltd to similar organizations within Retail industry, located in Asia,   and 40-99 PCs in size, PR Holdings Pvt. Ltd's Application Platform compares to peers as follows:  Core Infrastructure Optimization - Comparison
The Value of Improving PR Holdings Pvt. Ltd was analyzed using per user total cost of ownership (TCO) to estimate the current IT costs, and project the value of improving from basic to the next highest level of standardized. The value estimates are based on IDC, Wi Pro and Alinean research of 600+ worldwide companies as to the benefits they received from core infrastructure optimization. Total savings opportunity per user: Rs10,821.70 Total annual savings for 70 users: Rs757,509.43
Identity and Access Management - Responses PR Holdings Pvt. Ltd's Responses for Identity and Access Management Question Response Does this organization use Active Directory for authenticating 80% or more of their users? Yes Does this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)? No Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems? No Does this organization use a directory-based tool to enable authenticated access to external customers and business partners? No Does this organization use a directory-based solution to allow users to protect content from being copied, printed, or distributed without proper rights or permissions? No Does this organization have a solution for user identity validation and data protection (if lost) for their mobile devices? No Does this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (e.g., certificates)? No What the Identity and Access Management Results Means to PR Holdings Pvt. Ltd Your organization probably has either no common directory service in place or multiple, disconnected user directories resulting in inefficiencies in user experience and authentication. This kind of inefficiency can be reduced by deploying tools to unify user and group identities, access directories, and by giving users visibility across the different directories.
Desktop, Device & Server Management - Responses Question Response Is this organization using virtualization to dynamically manage resource allocation for workloads including moving workloads from server to server based on resource need or business rules? No Does this organization have a desktop image strategy for managing desktop images that includes OS, drivers, anti-virus, management tools, productivity tools (like Office) as well as line of business (LOB) applications? No Does this organization have a layered or thin image strategy for deploying desktop images? No Does this organization have a plan to manage a maximum of two OS versions (not including x64/x86 platform or hardware abstraction layer (HAL)-related multipliers) for 80% of their Desktops? No Does this organization have monitoring for 80% or more of their critical servers for ensuring consistent and reliable user experiences (e.g. ensuring that email is always available)? Yes Does this organization have a service level agreement (SLA)-defined and centralized monitoring solution for 80% or more of their servers with availability reporting capabilities? No Does this organization have model-enabled service level monitoring of desktops, applications and servers? No Is this organization's remote infrastructure managed from a central location? No
Planet Planet Road Map- CONFIDENTIAL
[object Object]

More Related Content

What's hot

KS2 Technologies - Managed Services
KS2 Technologies - Managed ServicesKS2 Technologies - Managed Services
KS2 Technologies - Managed ServicesEric Kuefler
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementChristian Sundell
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
Prolifics Managed Services Offering
Prolifics Managed Services OfferingProlifics Managed Services Offering
Prolifics Managed Services Offeringvenkata burra
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software CapabilitiesNone
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapInnovate Vancouver
 
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...Perficient, Inc.
 
ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance Jade Global
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts WSO2
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringShiv Koppad
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Servicessangerarayal
 
Teradata Customer Services
Teradata Customer ServicesTeradata Customer Services
Teradata Customer ServicesTeradata
 

What's hot (20)

KS2 Technologies - Managed Services
KS2 Technologies - Managed ServicesKS2 Technologies - Managed Services
KS2 Technologies - Managed Services
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement Management
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Prolifics Managed Services Offering
Prolifics Managed Services OfferingProlifics Managed Services Offering
Prolifics Managed Services Offering
 
How to Choose an Agency Management System
How to Choose an Agency Management SystemHow to Choose an Agency Management System
How to Choose an Agency Management System
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software Capabilities
 
Are you ready for the transformation
Are you ready for the transformationAre you ready for the transformation
Are you ready for the transformation
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
 
ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
 
NSI Net Factor Advantage
NSI Net Factor AdvantageNSI Net Factor Advantage
NSI Net Factor Advantage
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Services
 
Teradata Customer Services
Teradata Customer ServicesTeradata Customer Services
Teradata Customer Services
 

Similar to Core optimization methodology_benefit ver 1.1

Core Assesment For Sample Scientific
Core Assesment For Sample ScientificCore Assesment For Sample Scientific
Core Assesment For Sample Scientificmarkbauer
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overviewjayallen77
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdflearntransformation0
 
Webinar_CloudOps final.pptx
Webinar_CloudOps final.pptxWebinar_CloudOps final.pptx
Webinar_CloudOps final.pptxAshnikbiz
 
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentIntroducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentAmazon Web Services
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer ChecklistAnita Amelia
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
Inventory System
Inventory System Inventory System
Inventory System Nasir152222
 
Reduce Costs and Boost Productivity with Infrastructure Automation
Reduce Costs and Boost Productivity with Infrastructure AutomationReduce Costs and Boost Productivity with Infrastructure Automation
Reduce Costs and Boost Productivity with Infrastructure AutomationInexture Solutions
 
Performance Analytics for IT Operations Management
Performance Analytics for  IT Operations ManagementPerformance Analytics for  IT Operations Management
Performance Analytics for IT Operations ManagementJade Global
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Smart ERP Solutions, Inc.
 
Introducing Express Software Manager
Introducing Express Software ManagerIntroducing Express Software Manager
Introducing Express Software ManagerCherwell Software
 
Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)Deatra Lopez
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentationguest0df6b0
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM ChecklistEstuate, Inc.
 

Similar to Core optimization methodology_benefit ver 1.1 (20)

Core Assesment For Sample Scientific
Core Assesment For Sample ScientificCore Assesment For Sample Scientific
Core Assesment For Sample Scientific
 
Business Intelligenze Corporate
Business Intelligenze CorporateBusiness Intelligenze Corporate
Business Intelligenze Corporate
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf
 
Webinar_CloudOps final.pptx
Webinar_CloudOps final.pptxWebinar_CloudOps final.pptx
Webinar_CloudOps final.pptx
 
MAnish Kumar-G
MAnish Kumar-GMAnish Kumar-G
MAnish Kumar-G
 
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentIntroducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Gayathri Rajaraman
Gayathri RajaramanGayathri Rajaraman
Gayathri Rajaraman
 
Inventory System
Inventory System Inventory System
Inventory System
 
Reduce Costs and Boost Productivity with Infrastructure Automation
Reduce Costs and Boost Productivity with Infrastructure AutomationReduce Costs and Boost Productivity with Infrastructure Automation
Reduce Costs and Boost Productivity with Infrastructure Automation
 
Performance Analytics for IT Operations Management
Performance Analytics for  IT Operations ManagementPerformance Analytics for  IT Operations Management
Performance Analytics for IT Operations Management
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
 
Introducing Express Software Manager
Introducing Express Software ManagerIntroducing Express Software Manager
Introducing Express Software Manager
 
Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)Deatra Lopez QA IVV July 16 (6)
Deatra Lopez QA IVV July 16 (6)
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentation
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM Checklist
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Core optimization methodology_benefit ver 1.1

  • 1. Delivered by MindShare Services Pvt. Ltd. Prepared for PR - RAJESH BANSAL
  • 2.
  • 3.  
  • 4.
  • 5.
  • 6. Core Infrastructure Optimization Model Data Protection and Recovery Identity and Access Management Security and Networking IT and Security Process Desktop, Device, and Server Management Basic Standardized Rationalized Dynamic
  • 7. Interpreting the Results • Basic: "We Fight Fires" The Basic IT infrastructure is characterized by manual, localized processes and minimal central control, as well as nonexistent or un‑enforced IT policies and standards for security, backup, image management, and deployment, compliance, and other common IT practices. • Standardized: "We're Gaining Control" The Standardized infrastructure introduces controls through the use of standards and policies to manage desktops and servers; how machines are introduced to the network; and the use of Active Directory services to manage resources, security policies, and access control. • Rationalized: "We Enable Business" The Rationalized infrastructure exists where the costs involved in managing desktops and servers are at their lowest, and processes and policies have matured to play a large role in supporting and expanding the business. Security is proactive with rapid response to threats. • Dynamic: "We're a Strategic Asset" The Dynamic infrastructure provides strategic value that helps the organization run its business efficiently and competitively. Costs are fully controlled. Integration and collaboration between users is pervasive, and mobile users have high levels of service and capabilities.
  • 8.
  • 9.
  • 10. Comparing PR Holdings Pvt. Ltd's to Peers Comparing PR Holdings Pvt. Ltd to similar organizations within Retail industry, located in Asia, and 40-99 PCs in size, PR Holdings Pvt. Ltd's Application Platform compares to peers as follows: Core Infrastructure Optimization - Comparison
  • 11. The Value of Improving PR Holdings Pvt. Ltd was analyzed using per user total cost of ownership (TCO) to estimate the current IT costs, and project the value of improving from basic to the next highest level of standardized. The value estimates are based on IDC, Wi Pro and Alinean research of 600+ worldwide companies as to the benefits they received from core infrastructure optimization. Total savings opportunity per user: Rs10,821.70 Total annual savings for 70 users: Rs757,509.43
  • 12. Identity and Access Management - Responses PR Holdings Pvt. Ltd's Responses for Identity and Access Management Question Response Does this organization use Active Directory for authenticating 80% or more of their users? Yes Does this organization have a directory based tool to centrally define and enforce configuration standards and security on 80% or more of their desktops (e.g. Group Policy)? No Does this organization have a central tool to automate user account provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of their heterogeneous systems? No Does this organization use a directory-based tool to enable authenticated access to external customers and business partners? No Does this organization use a directory-based solution to allow users to protect content from being copied, printed, or distributed without proper rights or permissions? No Does this organization have a solution for user identity validation and data protection (if lost) for their mobile devices? No Does this organization require a secured and guaranteed way to verify secure communications between their corporate network and mobile devices (e.g., certificates)? No What the Identity and Access Management Results Means to PR Holdings Pvt. Ltd Your organization probably has either no common directory service in place or multiple, disconnected user directories resulting in inefficiencies in user experience and authentication. This kind of inefficiency can be reduced by deploying tools to unify user and group identities, access directories, and by giving users visibility across the different directories.
  • 13. Desktop, Device & Server Management - Responses Question Response Is this organization using virtualization to dynamically manage resource allocation for workloads including moving workloads from server to server based on resource need or business rules? No Does this organization have a desktop image strategy for managing desktop images that includes OS, drivers, anti-virus, management tools, productivity tools (like Office) as well as line of business (LOB) applications? No Does this organization have a layered or thin image strategy for deploying desktop images? No Does this organization have a plan to manage a maximum of two OS versions (not including x64/x86 platform or hardware abstraction layer (HAL)-related multipliers) for 80% of their Desktops? No Does this organization have monitoring for 80% or more of their critical servers for ensuring consistent and reliable user experiences (e.g. ensuring that email is always available)? Yes Does this organization have a service level agreement (SLA)-defined and centralized monitoring solution for 80% or more of their servers with availability reporting capabilities? No Does this organization have model-enabled service level monitoring of desktops, applications and servers? No Is this organization's remote infrastructure managed from a central location? No
  • 14. Planet Planet Road Map- CONFIDENTIAL
  • 15.

Editor's Notes

  1. 02/23/11 01:24 ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.