field tdm deck optimize and secure your core infrastructure for midsize businesses

45
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Upload: tyler-hayne

Post on 01-Apr-2015

220 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Field TDM DeckField TDM Deck

Optimize and Secure Your Core Infrastructure for Midsize Businesses

Page 2: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

How to use this deck

This deck was designed to provide the world-wide field with a customer-ready TDM level presentation.

Use this presentation as is or customize it to meet your needs.

This deck can also be “partnerized” if you wish to leverage it as a through-partner resource. If you choose to “partnerize” it please be sure to follow world wide partner branded guidelines.

Page 3: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Agenda

IT ChallengesCore IOTechnology SolutionsCustomer Scenarios

Page 4: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Microsoft’s Promises to IT:Enabling IT Pros and Development Teams Across the IT Lifecycle

Page 5: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Linking IT to PerformanceCompanies in the top 25% of IT capability grew revenue 6.8% faster per year than their peers in the bottom 25% of IT capability.

The firms in the top 25% of IT capability enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability.

Isolating the impact of all IT functions on productivity shows that IT Infrastructure is a key determinant of superior productivity.

Managers in firms that are supported by better information systems have significantly better insight into, and control over, key dimensions of their business. 

Sources: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006

Information technology fuels profitable revenue growth

Firms with better IT have more productive

employees

Robust IT infrastructure is a key driver of productivity

and growth

Information technology gives managers more insight and control

Page 6: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

IT as a Strategic AssetAlign IT with the business; control complexity

IT Goals

Establish a Responsive

Infrastructure

Proactively leverage

IT investments tomeet business

needs

Eliminate Unnecessary Complexity

Manage IT resources efficiently by eliminating

unnecessary redundancy,

reducing manual tasks and lowering

costs

Ensure Your Business Is

Always Running

Use IT as a trusted partner

in meeting business goals

Move from complexity to efficiency

Page 7: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Management – The Manual RealityPeople intensive nature drives costs

Those people are Those people are spending their time spending their time on manual taskson manual tasks

53%53% 24%24% 23%23%

54%54% 17%17% 29%29%

56%56% 17%17% 28%28%

58%58% 18%18% 24%24%

60%60% 16%16% 24%24%

62%62% 14%14% 25%25%

Percent of ReponsesPercent of Reponses

Degree of AutomationDegree of AutomationManualManual ScriptsScripts Automated ToolsAutomated Tools

Source: IDC 2002, Microsoft Primary Quantitative Research. Source: IDC 2002, Microsoft Primary Quantitative Research. 400, 30 min phone surveys of IT professionals in data centers 400, 30 min phone surveys of IT professionals in data centers with 25 or more serverswith 25 or more servers

Over 60% of TCO over a 5 year Over 60% of TCO over a 5 year period driven by people costs period driven by people costs

Page 8: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Does Your Infrastructure Look Like This?

Pieced togetherNo end-to-end architectureRequires lots of manual interventionNot sure if it’s secure

Page 9: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

A More Secure and Well Managed Infrastructure for Midsized Businesses

Printer Workstations

WAP

PDA

Home Office

Branch/Remote Office

Network Srv

Windows Server 2003 R2

Core Services

AD/GPO

IAS

DNS, DHCP, WINS

IIS

CertService

File/Print

Messaging Srv

Windows Server 2003 R2

Core Services

AD/GPO

IAS

DNS, DHCP, WINS

IIS

Exchange

OWA

Management Srv

Windows Server 2003 R2

Core Services

SC Essentials

WSS R2

RIS

Page 10: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

How Do You Get There?

Cost Cost Center Center

Uncoordinated, manual

InfrastructureKnowledge

not captured

More Efficient More Efficient Cost CenterCost Center

Managed IT Infrastructure

with limited automation

and knowledge capture

Managed and consolidated

IT

Infrastructurewith

extensive Automation, knowledge

captured and re-used

Fully automated

management, dynamic resource Usage ,

business linked SLA’s.

Knowledge capture

automated and use

automated

Business Business EnablerEnabler

Strategic Strategic AssetAsset

Infrastructure Optimization ModelInfrastructure Optimization Model

Page 11: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Key DriversPeople, Process and Technology

Desktop, Server and Device Management

Security and Networking

Identity and Access Management

Data Protection and Recovery

IT Process and Policy

Page 12: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Technology View of ModelOne Example

• No server-based identity or access management

• Users operate in admin mode

• Limited or inconsistent use of passwords at the desktop

• Minimal enterprise access standards

• Active Directory for Authentication and Authorization

• Users have access to admin mode

• Security templates applied to standard images

• Desktops not controlled by group policy

• Active Directory group policy and security templates used to manage desktops for security and settings

• Desktops are tightly managed

• Centrally manage users provisioning across heterogeneous systems

Page 13: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

• Reactive

• Ad hoc

• Problem-Driven

• “AvoidingDowntime”

• Reactive

• Stable IT

• Request Driven

• Change Management and Planning

• “Keeping ItRunning”

• Proactive

• Accountable

• Increased Monitoring

• Formal ChangeManagement

• SLA’s

• Improvement

• Predictability

• “Quality Driven”

• Proactive

• OptimizingCosts and Quality

• Agile

• Self Assessingand ContinuousImprovement

• “Taking The

Lead”

Most effortspent in:

Process Culture ViewOperations Framework/ITIL in IOM

Page 14: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Cost Reduction

Uncoordinated, manual

infrastructure

Managed IT Infrastructure

with limited automation

Managed and consolidated IT Infrastructurewith maximum

automation

Fully automated management,

dynamic resource Usage ,

business linked SLA’s

IT Labor Costs $774 $542

$261

Basic to Rationalized: IT

Labor Costs reduced $513

(66%)

$232(30%)

$281(52%)

IT

Lab

or

IT

Lab

or

Infrastructure Optimization Model

Page 15: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Best Practices Lower IT Costs Best Practice Research Supports IT Maturity

Basic = 0-2 Best Practices Adopted Standardized = 3-4 Best Practices Adopted Rationalized = 5-6 Best Practices Adopted

Best Practice Annual Benefit per PC

IT Tasks Improved

Enabling MS Technology

1: OS Standardization $52 • Image ManagementImage Management• Desktop AdministrationDesktop Administration• Service Desk/Deskside Service Desk/Deskside SupportSupport

• Vista WIM Image ManagementVista WIM Image Management• Vista VirtualizationVista Virtualization

2: Centrally Managed PC Firewall

$39 • Security & PatchingSecurity & Patching• Desktop AdministrationDesktop Administration• Service Desk/Deskside Service Desk/Deskside SupportSupport

• Vista FirewallVista Firewall• Active DirectoryActive Directory• Group PoliciesGroup Policies

3: Automated Password Reset

$29 • Service Desk/Deskside Service Desk/Deskside SupportSupport

• 33rdrd Party Party

4: Users Cannot Install Software

$50 • Application ManagementApplication Management• Desktop AdministrationDesktop Administration• Service DeskService Desk

• Vista User Account ProtectionVista User Account Protection• Active Directory/Group PoliciesActive Directory/Group Policies• Automated SW Deployment Automated SW Deployment (SMS)(SMS)

5: Users Cannot Change Settings

$30 • Application ManagementApplication Management• Desktop AdministrationDesktop Administration• Service Desk/Deskside Service Desk/Deskside SupportSupport

• Vista User Account ProtectionVista User Account Protection• Active DirectoryActive Directory• Group PoliciesGroup Policies

6: Automated Software Distribution

$26 • Application ManagementApplication Management• Desktop AdministrationDesktop Administration• Security & PatchingSecurity & Patching

• Active Directory/Group PoliciesActive Directory/Group Policies• Vista Windows Installer ServiceVista Windows Installer Service• Systems Management Server Systems Management Server (SMS)(SMS)

Page 16: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

The Foundation for Midsize Businesses to A More Secure and Well Managed Infrastructure

Page 17: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Technology Solutions

Identity and Access Management

Page 18: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Identity and Access ManagementChallenges

•No centralized management of user identity

•Users have multiple digital identities

User namePassword

Page 19: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Active Directory

The Solution – Active DirectoryProvide single sign-on

Enforce password security

Implement scalable centralized management

Robustreplication

Application-friendly

Policy Driven Security

Simplified administrationScalable

infrastructure

Page 20: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Identity and Access Management

Single sign-onCentralized accountingApplication Integration

Standardized

Security Policies controlled and enforcedAccess control through security policesDelegation of administration as necessary

Rationalized

Single sign-onCentralized accountingApplication Integration

Dynamic Automated User Provisioning

Page 21: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Reducing Cost and Complexity of Infrastructure

Reduce administration costs• Consolidating domains and application directories on Windows

Server 2003 and Active Directory.

• Realizing problem resolution with System Center Essentials.

• Using group policy and software tools to easily make one-to-many changes, drastically reducing the manual effort and cost of security administration. (Active Directory, WSUS, GPMC).

• Reducing the possibility that users will make configuration changes or install unauthorized software that decreases the security of your infrastructure by locking down user desktops (Active Directory, Group Policy).

• Minimizing local administration & local back-up (Branch).

• Reducing the cost of desktop support and decreasing the cost of keeping systems updated with Windows Vista.

Increase efficiency• Drastically reducing the manual

effort of security administration using group policy and software tools to easily make one-to-many changes,. (Active Directory®, WSUS, GPMC).

• Minimizing local administration & local back-up (Branch).

• Proactively reducing time to diagnose, troubleshoot, and repair unauthorized configuration changes or software installations.

Page 22: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Technology Solutions

Security and Networking

Page 23: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Security Threats and Challenges

Messaging Challenges

Network Challenges

Protection from attacks

Threat alerts

Secure Remote Access to the network

Security connectivity to Remote Offices

Secure Publishing of Applications

External E-Mail viruses

Internal E-Mail viruses

SPAM

E-Mail Access for Remote / Mobile Users

Page 24: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Solution - Powerful Tools Built on Proven Technology

Comprehensive• Control & protection of:

• Operating systems

• Servers

• Server applications

• Network “edge”

• Content

• Current & emerging threats

• 24/7 research & response

• Heterogeneity through partner ecosystem

Integrated•Cross-product integration

• MSFT security products• MSFT server apps

•Integrates with existing Microsoft IT infrastructure

•Integration with ecosystem partners

Simplified•Centralized management•Unified state view & analytics•Simplified deployment

• Integrates into existing IT infrastructure

• Choice of form factors• Prescriptive guidance

Page 25: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

ISA Server 2006

FirewallSecure NAT and Web high performance Web cachingVPN Connectivity (inbound and site-to-site)Secure Application Publishing

Integrates with Active DirectoryIntegrates with ForeFront Security (SPAM)Integrates with Exchange (SPAM and OWA)

Familiar, easy to use, MMC interfaceCentralized consoleAlerting and monitoring built in

Comprehensive

Integrated

Simplified

Page 26: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Forefront Security for Exchange

• Manage up to eight scan engines

• Eliminate single point of failure

• Minimize window of exposure during outbreaks

Quarantine

Antigen for

Exchange

Scan Engine 1

Scan Engine 4

Scan Engine 2

Scan Engine 3

Page 27: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Branch and Remote Office Security

Headquarters

Remote OfficeSite-to-

site VPN

Integrated securityApplication filtering, BITS caching

Fast, secure accessHTTP compression, traffic prioritization

Efficient managementEasy deployment, fast propagation of policies

Page 28: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Security and Networking

Multi-layer defenseServers and e-Mail Server protected from virusesE-Mail protected from SPAM

Centralized management of Anti-virus softwareCentralized updates to Antivirus Software

Access controlled through firewall policies

Standardized

Rationalized

Dynamic

Page 29: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Technology Solutions

Desktop and Server Management

Page 30: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Management Challenges …..

“Keeping OS and applications updated with the latest patches wastes my time”

“Server outages are the biggest risk to my organization. I need watchdog features to reboot servers or monitor whether they are running”

“I need better support for remote management for all my customers”

“End-user troubleshooting is manual for us –telephone, email, and remote desktop in XP”

“Right now our hardware and software inventory is in spreadsheets, and it’s hard to pull it all together”

Page 31: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

SolutionSimplified infrastructure management

Security management• Updated and automated

security features are built right in, so your IT staff can help secure vital business information without taking unknown risks.

Emergency management• Advanced management

tools enable your IT staff to configure and manage desktops and servers to minimize disruption so people can get the information they need, when they need it.

Operations management• Your IT staff can more easily keep

the IT environment available to authorized users to enable a higher level of productivity.

Page 32: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Group Policy for Desktop Control

• Manage user and computer environments• Manage user and computer environments• Enforce IT policies• Enforce IT policies• Simplify administrative tasks• Simplify administrative tasks• Implement security settings• Implement security settings

Page 33: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Single console designed with simplicity Easily secure, update, monitor and track

your entire IT environment More effectively service and support

users Support for management services

An integrated management solution designed for medium sized

businesses with ~50-500 PCs

Page 34: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Key capabilitiesSimple Installation 10 click installation for easy setupGetting started wizards Out of the box wizards to configure SCEUnified management console A single easy to use console to manage your environmentReporting Report on health, availability, compliance and IT assetsNotifications and health reports Be notified of problems via email, page or SMS text

message when not at your desk

Page 35: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Management and Control Attributes

Standardized Operating SystemAutomatic updates enabledUsers can’t install their own software

User not allowed to configure their desktopsCentralized monitoring of critical servers

Fully automated software distributionCentralized monitoring of server and workstations

Standardized

Rationalized

Dynamic

Page 36: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Technology Solutions

Data Protection and Recovery

Page 37: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Backup and Recovery

Backup and Recovery in place for critical servers

Backup and Recovery in place for all servers

Fully automated backup and recovery

Standardized

Rationalized

Dynamic

Page 38: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Customer Scenarios

Page 39: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Improved security

Technology-Savvy Law Firm Gains EasierRemote Access from Any Computer

SituationSecurity, connectivity, and support issues for remote users

SolutionDeploy a clientless remote access solution using Microsoft technologies that provides lawyers secure, improved, remote access to corporate network resources from virtually anywhere in the world

Benefits•Increased security •Simplified management•Easy-to-use remote access to all network resources

“ISA Server improves security for us in several areas. It eliminates local files from being stored on the

remote computer, helps prevent suspect PCs from connecting to our network, and exposes a small

surface area to the Internet.”—Robert Musial, Director of Information Systems,

Kirkpatrick & Lockhart Nicholson Graham LLP

Page 40: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Reduce Costsand Complexity

Professional services organization with 4 remote branch locations realizes increased employee productivity with the ability to access and share centrally stored files and documents plus increased up-time with central IT managementSituationBranch office staff needs to access centrally published documents for proposal development, project planning, and knowledge transfer, and collaborate with each other, including those in different branches. With no on-site IT administrator, they also need to make sure their systems can be centrally monitored and updated for increased security and availability.

SolutionDeploy Windows Server 2003 R2 in each branch office enabling staff to access files and collaborate. Install System Center Essentials 2007 at the main office to centrally monitor and updated branch clients, servers and applications.

BenefitsEnhanced employee productivity with better connectivity and reliabilityDecreased TCO – Up to 50% WAN traffic reductionIncreased SecuritySimplified Management from central office

Page 41: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Enhance Productivity

Situation

Over the years, the company’s messaging system has become an indispensable part of its business. APA is looking at new ways to use technology to support communication and collaboration.

SolutionAPA migrated its employees to Microsoft® Exchange Server 2007 and is using it as a foundation for providing its users with advanced unified messaging and mobility solutions.

BenefitSeeking new ways of using technology to improve its processes and keep its employees connected,

APA deployed Microsoft® Exchange Server 2007. The simplified administrator interface enables the network administrator to perform large management tasks in seconds. Local Continuous Replication helps to protect the system against disk failure or data corruption. APA is currently deploying unified messaging and mobility features to give APA employees access to their e-mail, calendar, and contacts even when an Internet connection isn’t available.

“When I told our executives that they could listen to their e-mail along with their voice-

mail messages within Exchange Server 2007, they were thrilled.”

Steve Gould, Network Administrator, APA

Trade association improves administrator and end-user productivity with anywhere access to next-generation messaging system

Page 42: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Simplified Infrastructure Management

On-line sales company realizes increased system reliability and lower TCO of IT infrastructure with a unified IT management solution

SituationOn-line sales company depends directly on the reliability of their IT systems to generate sales and revenue. Any web server downtime can lead to lost sales. The more proactively and efficiently their IT staff can manage their infrastructure, the more reliable their systems and the healthier their sales.

SolutionDeploy System Center Essentials 2007 as the unified IT management solution, and deploy Windows Server 2003 R2 for web servers.

BenefitsIncreased IT system uptimeUnified IT management consoleQuicker IT problem resolutionImproved security of clients and servers

System Center Essentials 2007 is easy to deploy and maintain, helping simplify complex management tasks for increased IT efficiency.

Page 43: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

IT Capability Predicts Profitable Growth

The Enterprise IT Capability Study demonstrates that:

• Better information technology (IT) makes a quantifiable, positive difference in business performance.

• More productive employees. The firms in the top 25 percent of IT capability enjoy 23 percent higher revenue per employee than their peers in the bottom 25 percent of IT capability.

• Isolating the impact of all IT functions on productivity shows that IT infrastructure is the key determinant of achieving superior productivity.

• Information technology makes managers more effective.

Keystone Strategy, Inc., conducted under the direction of Professor Marco Iansiti of the Harvard Business School 2005

Information Technology Fuels Revenue Growth.

Companies in the top 25 percent of IT capability grew revenue 6.8 percent faster per year than their peers in the bottom 25 percent of IT capability.

Page 44: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Your Call To Action This slide should be customized for each subsidiaries

specific CTAs.

Page 45: Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses

Closing/Summary Placeholder