16

The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation

Embed Size (px)

Citation preview

The Infrastructure The Infrastructure Optimization JourneyOptimization Journey

Kamel Abu AyashKamel Abu Ayash

Microsoft CorporationMicrosoft Corporation

Wilhelmina Duyvestyn
Scale the IO logo

AgendaAgendaChallengesChallenges

The Solution-An Optimized The Solution-An Optimized InfrastructureInfrastructure

Getting ThereGetting ThereThe JourneyThe Journey

The Infrastructure Optimization ModelThe Infrastructure Optimization Model

The Destination-Dynamic SystemsThe Destination-Dynamic Systems

How to take the journeyHow to take the journey

Customer examplesCustomer examples

How you can get engagedHow you can get engaged

IT Complexity And CostIT Complexity And Cost

Enterprise IT ChallengesEnterprise IT Challenges

GrowthGrowth

Customer serviceCustomer service

Regulatory Regulatory compliancecompliance

Device Device managementmanagement

Varying skill setsVarying skill sets

MobilityMobility

PC maintenancePC maintenance

Server sprawlServer sprawl

Legacy platformsLegacy platforms

Deployment and Deployment and maintenancemaintenance

Identity Identity managementmanagement

Software updatesSoftware updates

Malicious Malicious attacks, viruses, attacks, viruses, spam, etc.spam, etc.

Evolving threatsEvolving threats

Patch Patch management, management, VPN, etc.VPN, etc.

Secure access Secure access (employees, (employees, partners and partners and customers)customers)

Solving The Challenge:Solving The Challenge:Infrastructure OptimizationInfrastructure Optimization

How Do You Get There?How Do You Get There?Infrastructure Optimization ModelInfrastructure Optimization Model

Cost Center Cost Center

Uncoordinated, Uncoordinated, manualmanual

infrastructure infrastructure

More Efficient More Efficient Cost CenterCost Center

Managed IT Managed IT Infrastructure Infrastructure

with limitedwith limited automationautomation

Managed and Managed and consolidated ITconsolidated IT InfrastructureInfrastructurewith maximum with maximum

automationautomation

Fully automated Fully automated management, management,

dynamic resource dynamic resource Usage , business Usage , business

linked SLA’slinked SLA’s

Business Business EnablerEnabler

Strategic Strategic AssetAsset

* Based on the Gartner IT Maturity Model* Based on the Gartner IT Maturity Model

Technology View of ModelTechnology View of Model

Technology View of ModelTechnology View of ModelOne ExampleOne Example

LimitedLimitedInfrastructureInfrastructure

Lack of Lack of standardized standardized security security measuresmeasures

Ad hock Ad hock management management of system of system configurationconfiguration

Limited to no Limited to no monitoring of monitoring of infrastructureinfrastructure

Defense-in-Defense-in-depth security depth security measures measures widely deployedwidely deployed

Anti-malware Anti-malware protection (i.e. protection (i.e. spyware, bots, spyware, bots, rootkits, etc.)rootkits, etc.)

Firewall enabled Firewall enabled on desktops, on desktops, laptops & laptops & serversservers

Secure wireless Secure wireless networkingnetworking

Service level Service level monitoring monitoring on desktops on desktops

IPSec used to IPSec used to isolate critical isolate critical systemssystems

Automated Automated patch patch management management (WU, Update (WU, Update Services, SMS)Services, SMS)

Edge firewall Edge firewall with lock-down with lock-down configurationconfiguration

Standardized Standardized antivirus antivirus solutionsolution

Firewall enabled Firewall enabled on laptopson laptops

New systems New systems limited to those limited to those supported by ITsupported by IT

Defined set of Defined set of standard basic standard basic imagesimages

Security, Networking & MonitoringSecurity, Networking & Monitoring

Security Security updates for updates for both clients & both clients & serversservers

Application Application compatibility compatibility testingtesting

Client & server Client & server firewall firewall mitigationsmitigations

Application and Application and image image deploymentdeployment

Server Server operationsoperations

Reference Reference image systemimage system

Security event Security event correlationcorrelation

Automated, Automated, central central management of:management of:

Wilhelmina Duyvestyn
Andrea Can you fix this build so that it all comes down at once.Thanks

Dynamic SystemsDynamic Systems will result in reduced costs, improved reliability, and will result in reduced costs, improved reliability, and increased responsiveness across the entire IT life cycleincreased responsiveness across the entire IT life cycle

Faster, more efficient Faster, more efficient development resulting development resulting

in IT systems that are in IT systems that are Designed for Designed for OperationsOperations

Responsive, policy-driven Responsive, policy-driven IT systems that are self IT systems that are self

managing, reliable and cost managing, reliable and cost effectiveeffective

SLAs that are met or SLAs that are met or exceeded resulting in exceeded resulting in

satisfied business units satisfied business units and productive end and productive end

usersusers

What is the Destination? What is the Destination?

Microsoft’s Dynamic Systems Microsoft’s Dynamic Systems InitiativeInitiativeCore Technical PrinciplesCore Technical PrinciplesSW platforms and tools SW platforms and tools

that enable…that enable…Knowledge of an IT System: Knowledge of an IT System:

Designer’s intentDesigner’s intent

Operational Operational environmentenvironment

Governing IT Governing IT policiespolicies

Associated end Associated end user experienceuser experience

To be captured in…To be captured in…Software ModelsSoftware Models

MOM Management PacksMOM Management Packs

System Definition ModelSystem Definition Model

That can be created, That can be created, Modified and operated Modified and operated on…on…

Across the IT lifecycleAcross the IT lifecycle

Develop, Operate, Analyze/ActDevelop, Operate, Analyze/Act

How To Take The JourneyHow To Take The Journey

Enhancing ProcessesEnhancing ProcessesMicrosoft Operations Framework (MOF) and Microsoft Operations Framework (MOF) and ITILITIL

Microsoft through MOF Microsoft through MOF defined many ITIL principlesdefined many ITIL principles

MOF applies ITIL MOF applies ITIL to Microsoft to Microsoft productsproducts

MOF and ITIL provide MOF and ITIL provide common IT Service common IT Service Management taxonomyManagement taxonomy

MOF makes Microsoft MOF makes Microsoft ITIL-CompliantITIL-Compliant

MOF is a foundation to MOF is a foundation to comply with SarbOx, HIPPA, comply with SarbOx, HIPPA, ISO, and other best practice ISO, and other best practice compliancecompliance

MOF makes ITIL MOF makes ITIL actionable on the actionable on the Microsoft PlatformMicrosoft Platform

ITILITIL®®

Detailed View

Process Culture OptimizationProcess Culture OptimizationMicrosoft Operations Framework/ITIL in IOMMicrosoft Operations Framework/ITIL in IOM

ReactiveReactive

Ad hocAd hoc

Problem-Problem-DrivenDriven

““AvoidingAvoidingDowntime”Downtime”

Reactive Reactive

Stable ITStable IT

Request Request DrivenDriven

Change Change Management Management and Planningand Planning

““Keeping ItKeeping ItRunning”Running”

ProactiveProactive

AccountableAccountable

Increased Increased MonitoringMonitoring

Formal Formal ChangeChangeManagementManagement

SLA’sSLA’s

ImprovementImprovement

PredictabilityPredictability

““Quality Quality Driven”Driven”

ProactiveProactive

OptimizingOptimizingCosts and Costs and QualityQuality

AgileAgile

Self AssessingSelf Assessingand and ContinuousContinuousImprovementImprovement

““Taking The Taking The Lead”Lead”

Where our customers are Where our customers are todaytoday

Cost Center Cost Center

Uncoordinated, Uncoordinated, manualmanual

infrastructure infrastructure

Efficient Cost Efficient Cost CenterCenter

Managed IT Managed IT Infrastructure Infrastructure

with limitedwith limited automationautomation

Managed and Managed and consolidated ITconsolidated IT InfrastructureInfrastructurewith maximum with maximum

automationautomation

Fully automated Fully automated management, management,

dynamic resource dynamic resource Usage , business Usage , business

linked SLA’slinked SLA’s

Business Business EnablerEnabler

Strategic Strategic AssetAsset

© 2005 Microsoft Corporation. All rights reserved.© 2005 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.