400 likes | 538 Views
Infrastructure Optimization @ SEAT PG Segrate, 24 Marzo 2006. Umberto Casalone ( Umberto.Casalone@seat.it ) Project Leader - Infrastructure Manager Fabio Spina ( f.spina@reply.it ) Manager. Agenda. Company profiles SEAT PG Cluster REPLY
E N D
Infrastructure Optimization @ SEAT PG Segrate, 24 Marzo 2006 Umberto Casalone ( Umberto.Casalone@seat.it ) Project Leader - Infrastructure Manager Fabio Spina ( f.spina@reply.it ) Manager //
Agenda • Company profiles • SEAT PG • Cluster REPLY • Introducing Infrastructure Optimization • Infrastructure Optimization Model • Stages, Workloads, Requirements • SEAT PG : Maturity Roadmap • Year by Year Snapshot • Step by Step • Management “Ability” • Rapid Economic Justification • Business Case (Seat Pagine Gialle) • Business Case (Gruppo Bancario) • Conclusions //
IT Infrastructure Figures • 3863 Desktop ( 70% Notebook ) • 20 Intel Infrastructure Server • 3500 Authenticated user • 100 Windows Mobile devices • 2000 Mobile users • 3500 Mailboxes //
Company Profile • Cluster REPLY is part of REPLY group [Rey.MI] • Solutions Portfolio on Microsoft Technology • Business Solution (ERP,CRM) • Advanced Applications ( Enterpise Portal, Collaboration, E.A.I., S.O.A., B.I., Mobile) • Advanced Infrastructure (next slide) • Cluster Reply Employees • >200 (95% graduated, certified) • Operational Sites • TO, MI, Silea(TV), ROMA //
Advanced Infrastructure competencies Rapid Economic Justification Studies Architectural and Migration Studies Infrastructure Optimization Advisory Network Infrastructure Solutions Identity & Access Mgmt Real Time Collaboration Solutions Secure and Mobile Messaging Business Desktop Mgmt Health Monitoring Solutions Infrastructure Security Operations Support Services Advisory Solutions //
More Efficient Cost Center Business Enabler Strategic Asset Cost Center Infrastructure Optimization ModelStages //
Security, Networking & Monitoring Identity & Access Management Desktop Engineering Disaster Recovery Secured Messaging Infrastructure Infrastructure Optimization ModelTechnologicalWorkloads //
AV desktops • Central FW • DNS and DHCP • RAS (VPN-TS) • IPSec /Cert • Monitoring srv • FW srv & desktops • Secure wireless • SLA monitor desktops • AD authentic/authoriz • GPO config/security • Identity Integration • Limited infrastructure • Limited or no IT policies • No standards desktops • Aut. patch mgm servers • Aut. app compatibility • Aut. reference image sys • Aut. patch mgm • Standard images • Current OS • Aut. sw distribution • App. compatibility testing • Reference image system • B/R all servers+desktops • B/R all critical servers • B/R all servers • Proactive monitoring • Secure for mobile dev. • Basic email services • Email authentication • AV/SPAM blocking • Health monitoring • https email access Infrastructure Optimization ModelPass-throughRequirements Security, Networking, & Monitoring Identity & Access Mgmt Desktop Engineering Disaster Recovery Secured Messaging Infrastructure //
AV desktops • Central FW • DNS and DHCP • RAS (VPN-TS) • IPSec /Cert • Monitoring srv • FW srv & desktops • Secure wireless • SLA monitor desktops • AD authentic/authoriz • GPO config/security • Identity Integration • Limited infrastructure • Limited or no IT policies • No standards desktops • Aut. patch mgm servers • Aut. app compatibility • Aut. reference image sys • Aut. patch mgm • Standard images • Current OS • Aut. sw distribution • App. compatibility testing • Reference image system • B/R all servers+desktops • B/R all critical servers • B/R all servers • Proactive monitoring • Secure for mobile dev. • Basic email services • Email authentication • AV/SPAM blocking • Health monitoring • https email access Infrastructure Optimization ModelSEAT PG : Year 2000 (Baseline) Security, Networking, & Monitoring Identity & Access Mgmt Desktop Engineering Disaster Recovery Secured Messaging Infrastructure //
AV desktops • Central FW • DNS and DHCP • RAS (VPN-TS) • IPSec /Cert • Monitoring srv • FW srv & desktops • Secure wireless • SLA monitor desktops • AD authentic/authoriz • GPO config/security • Identity Integration • Limited infrastructure • Limited or no IT policies • No standards desktops • Aut. patch mgm servers • Aut. app compatibility • Aut. reference image sys • Aut. patch mgm • Standard images • Current OS • Aut. sw distribution • App. compatibility testing • Reference image system • B/R all servers+desktops • B/R all critical servers • B/R all servers • Proactive monitoring • Secure for mobile dev. • Basic email services • Email authentication • AV/SPAM blocking • Health monitoring • https email access Active Directory.GPO SMS,Img Infrastructure Optimization ModelSEAT PG : Year 2002 Security, Networking, & Monitoring Identity & Access Mgmt Desktop Engineering Disaster Recovery Secured Messaging Infrastructure //
Desktop Engineering Basic to Standardized Identity & Access Management Basic to Rationalized S R Architectural Solution //
Challenge Solution Benefits Capabilities Business Agility • Increased productivity by providing access to right resources based on business roles and reducing time required to support organizational changes • Reduced time to market for new applications and services (unified authentication) Service Levels • Centralized user accounts mgmt • Rapid resolution of authentication requests (users, HR, etc.) Enabling Technology • Directory services (Active Directory) for authentication and authorization • Directory tools for central administration of configurations and security (Group Policy) Costs • Lower operations cost (client services, service desk) • Lower end-user operations cost Identity & Access Management Identity & Access ManagementMoving from Basic to Rationalized • Create a computing environment that: • Centralized, controlled access to resources and applications • Centrally manages and controls policies for different types of users • Quickly adapts to new and changing user requirements • Centralized user authentication • Managed user access to resources and applications • Centrally administered users and groups • Custom-configured end-user experience • Apply and enforce security policies * Source: Microsoft, based on Gartner TCO model // Order of magnitude TCO Impact*: $50-$100
Challenge Solution Benefits Capabilities Business Agility • Business continuity • Increased productivity • Evolve PC standards to support changing business needs Service Levels • Minimum business disruption during deployments (data and settings migration) • Ensure broader compatibility across user base • Reduce time at risk with proactive patch management strategy Enabling Technology • Automated patch management SW • Defined set of standard basic images • Image based deployment technology • Lower software and hardware costs (standardization) • Lower operations cost (client services, service desk, upgrade) • Lower downtime cost Costs Desktop Engineering Desktop EngineeringMoving from Basic to Standardized • Create a capable IT organization that: • Provides users with stable, up-to-date corporate software • Encourages standards on the desktops • Manages desktop deployments with more efficiency • Automated patch management for desktops • Defined set of standard basic images • Light-touch desktop deployment (minimum IT involvement required) Benefits Benefits Benefits Show all * Source: Microsoft, based on Gartner TCO model // Order of magnitude TCO Impact*: $50-$100
AV desktops • Central FW • DNS and DHCP • RAS (VPN-TS) • IPSec /Cert • Monitoring srv • FW srv & desktops • Secure wireless • SLA monitor desktops • AD authentic/authoriz • GPO config/security • Identity Integration • Limited infrastructure • Limited or no IT policies • No standards desktops • Aut. patch mgm servers • Aut. app compatibility • Aut. reference image sys • Aut. patch mgm • Standard images • Current OS • Aut. sw distribution • App. compatibility testing • Reference image system • B/R all servers+desktops • B/R all critical servers • B/R all servers • Proactive monitoring • Secure for mobile dev. • Basic email services • Email authentication • AV/SPAM blocking • Health monitoring • https email access MigratingNotes to Exchange Infrastructure Optimization ModelSEAT PG : Year 2004 Security, Networking, & Monitoring Identity & Access Mgmt Desktop Engineering Disaster Recovery Secured Messaging Infrastructure //
Secured Messaging Infrastructure Basic to Rationalized R Architectural Solution //
Challenge Solution Benefits Capabilities Business Agility • Improve productivity through problem-free messaging communication • Increase business responsiveness by providing secured and near real-time remote access to email • Ensure end-users can trust corporate email platform to filter out potentially harmful virus and SPAM • Enhance business continuity via reduction of harmful technologies • 24x7 planned availability Service Levels Enabling Technology • Exchange Server and security technology to enable mobile solutions Costs • Lower service costs via: • Reduced help desk support for harmful technologies • Reduced resources to restore users • Efficient use of storage with minimum duplication of attachments Secured Messaging Infrastructure Secured Messaging InfrastructureMoving from Basic to Rationalized • Create a messaging environment that: • Is reliable and free from viruses and SPAM • Provides simple access to the entire organization • Provides mobile employees with a real-time alternative to in-office messaging • Protects messaging infrastructure from harmful technologies and attacks • Unified directory infrastructure for access and messaging • SPAM blocked at gateway and mailbox store • Server antivirus • Monitoring of messaging server health and performance • Simple backup and restore of messaging items Benefits Show all //
AV desktops • Central FW • DNS and DHCP • RAS (VPN-TS) • IPSec /Cert • Monitoring srv • FW srv & desktops • Secure wireless • SLA monitor desktops • AD authentic/authoriz • GPO config/security • Identity Integration • Limited infrastructure • Limited or no IT policies • No standards desktops • Aut. patch mgm servers • Aut. app compatibility • Aut. reference image sys • Aut. patch mgm • Standard images • Current OS • Aut. sw distribution • App. compatibility testing • Reference image system • B/R all servers+desktops • B/R all critical servers • B/R all servers • Proactive monitoring • Secure for mobile dev. • Basic email services • Email authentication • AV/SPAM blocking • Health monitoring • https email access RTC,MobileDev SMS,Image Provisioning MOM,VPN,PKI,FWclient Infrastructure Optimization ModelSEAT PG : March 2006 (Today) Security, Networking, & Monitoring Identity & Access Mgmt Desktop Engineering Disaster Recovery Secured Messaging Infrastructure //
Basic to Rationalized Security, Networking, and Monitoring R Architectural Solution (MOM, VPN, PKI, FWClient) //
Challenge Solution Benefits Capabilities • Improve productivity of distributed workforce • Business continuity • Ensure compliance • Maximize productivity of PC users Business Agility Service Levels • Access to information • Proactive response to issues • Reduce downtime through improved system reliability • Security plan for maximum business continuity Enabling Technology • VPN Remote access • Secure wireless • IPSec server isolation • Monitoring of servers via systems mgmt software • Firewall on server and desktops Costs • Lower operations cost • Minimize end-user operations and downtime cost • Improve SLAs to meet business requirements vs. minimize cost Security, Networking, and Monitoring Security, Networking, & MonitoringMoving from Basic to Rationalized • Create a computing environment that: • Provides state-of-the-art security • Protects and monitors critical server assets against harmful technologies • Optimizes asset utilization to maximize business agility • Secure, reliable connectivity solution for mobile workforce inside/outside corporate • Protect network traffic • Proactive SLA mgmt • In-depth protection with real-time security and firewall mgmt on clients and servers Benefits Benefits Benefits Benefits Show all Order of magnitude TCO Impact*: $70-$250 * Source: Microsoft, based on Gartner TCO model //
Secured Messaging Infrastructure Rationalized to Dynamic D Architectural Solution (Real Time Collaboration) //
Challenge Solution Benefits Capabilities Business Agility • Increase productivity via access to network by “qualified” mobile devices for real-time communication • Increase productivity via quick and immediate accessibility to individuals that can address concerns • Increase productivity via access to network by “qualified” mobile devices for real-time communication • Increase productivity via quick and immediate accessibility to individuals that can address concerns • Increase productivity via access to network by “qualified” mobile devices for real-time communication Service Levels • Potentially 24x7 accessibility with instant response • Enhance business continuity via systems reliability • Potentially 24x7 accessibility with instant response • Enhance business continuity via systems reliability • Potentially 24x7 accessibility with instant response Enabling Technology • Live Communication Server • Exchange Server • Live Communication Server • Exchange Server Costs • IT spend optimized to provide remote management of mobile messaging devices, proactive service, and instant communication capabilities • IT spend optimized to provide remote management of mobile messaging devices, proactive service, and instant communication capabilities Secured Messaging Infrastructure Rationalized to Dynamic D Secured Messaging InfrastructureMoving from Rationalized to Dynamic • Create a messaging environment that: • Provides real-time messaging for remote users • Integrates with mobile devices • Proactively manages messaging capabilities • Allows for message based instant communication • Security of mobile devices, including remote reset and remote wipe • Detection and advance alerts of potential service outages • Live dialog and chat Benefits Benefits Show all //
Identity & Access Management Rationalized to Dynamic D Architectural Solution (Provisioning) //
Challenge Solution Benefits Capabilities Business Agility • Access to information across all IT systems • Regulatory compliance enforcement (replication) • Reduced time to market for applications requiring enterprise identity and role management capabilities (e.g. HR portals) • Access to information across all IT systems • Regulatory compliance enforcement (replication) • Reduced time to market for applications requiring enterprise identity and role management capabilities (e.g. HR portals) Service Levels • Add/remove users from all systems within seconds (AD, HR, Sales, etc.) • Dynamically change organization charts with all IT services provisioned automatically • Add/remove users from all systems within seconds (AD, HR, Sales, etc.) • Dynamically change organization charts with all IT services provisioned automatically Enabling Technology • Centrally manage users provisioning across heterogeneous system with Meta Directory • Centrally manage users provisioning across heterogeneous system with Meta Directory Costs • Lower IT operations cost to facilitate dynamic organization changes • Lower IT operations cost to facilitate dynamic organization changes Identity & Access Management Rationalized to Dynamic D Identity & Access ManagementMoving from Rationalized to Dynamic • Create a computing environment that: • Enables central provisioning of users and services across all systems in the enterprise • Centrally administered users and groups across the enterprise • Custom-configured end-user experience Benefits Show all //
AV desktops • Central FW • DNS and DHCP • RAS (VPN-TS) • IPSec /Cert • Monitoring srv • FW srv & desktops • Secure wireless • SLA monitor desktops • AD authentic/authoriz • GPO config/security • Identity Integration • Limited infrastructure • Limited or no IT policies • No standards desktops • Aut. patch mgm servers • Aut. app compatibility • Aut. reference image sys • Aut. patch mgm • Standard images • Current OS • Aut. sw distribution • App. compatibility testing • Reference image system • B/R all servers+desktops • B/R all critical servers • B/R all servers • Proactive monitoring • Secure for mobile dev. • Basic email services • Email authentication • AV/SPAM blocking • Health monitoring • https email access OSD,BDD Infrastructure Optimization ModelSEAT PG : Dic 2006 (Work in Progress) Security, Networking, & Monitoring Identity & Access Mgmt Desktop Engineering Windows Vista Disaster Recovery Secured Messaging Infrastructure //
Desktop Engineering Solution Accelerator //
Costs Productivity Service Level //
Deployment Savings Manual Deployment $500 - $1,000 per PC Light Touch Deployment~ $350 per PC USMT, ACT, WinPE, RIS, PQDI, Ghost Zero Touch Based Deploymentless than $100< per PC Deployment automation with Zero Touch (SMS, MOM) Free prescriptive guidance and tools collection for Windows and Office Client deployment //
Rapid Ecomonic JustificationWhat is • Rapid Economic Justification study (TCO calculation, pay back time analisys, ROI) builds a bridge (made of common terms) between IT and business executives to demonstrate how investments in IT benefit the business. • It ensures that the IT projects are aligned with the specific business strategies and priorities and all stakeholders (business and IT) are committed to both the process and the final results. //
- 93,60% Desktop Engineering Rapid Economic Justification BDDGruppo Bancario //
Conclusions //
Next Steps • Assess where you are in the maturity model • Analize high-impact options • Build a plan aligned with your business and IT priorities • Follow IOI Steps //
Opportunity • 1 IOI Advisory day for you (see in the feedback form) //