Saving Money

37
Saving Money Capability Discussion Presentation

description

Saving Money. Capability Discussion Presentation. Engagement Approach. Solution areas. Business strategy. Horizontal. Industry. Audience. Understand business needs and priorities Discuss range of potential solution capabilities. Business executives. - PowerPoint PPT Presentation

Transcript of Saving Money

Saving Money

Capability Discussion Presentation

Engagement Approach

Audience

Solution road map

Solution areas Industry Horizontal

Business strategy

Integrated Capability Analysis > Projects, architecture, products

1. Present relevant integrated capabilities

2. Position the Integrated Capability approach

Busi

ness

exe

cuti

ves

1. Understand business needs and priorities

2. Discuss range of potential solution capabilities

ITexe

cuti

ves

Arc

hit

ect

s IT

pro

/dev

exe

cuti

ves

AgendaAgenda

Recap Business Discussions

Integrated Capability Approach

Summary and Next Steps

Needed Integrated Capabilities

Business Driver

Phase 1 Phase 2 Phase 3

STREAMLINE THE BUDGETING AND FORECASTING PROCESS

View and gather financial data to standardize the budgeting process across the enterprise via collaboration and workflows

Gain greater visibility into inventory control, purchasing, and sales order processing for demand planning to help reduce costs via reports from different data sources and data marts associated with inventory control, purchasing, and sales order processing

Improve pricing and visibility into supplier performance to control costs via using content-centric social computing capabilities; comparing quotes from suppliers that have different delivery deadlines, price conditions, or other parameters; and analyzing historical data to evaluate past supplier performance

Align budgeting and forecasting processes to business strategies via predictive analysis and strategy-driven, enterprise-wide scorecards

Support budgets and forecasts with workflows for planning, requests, and change approvals via collaborative processes and basic composite applications

Maintain robust audit trails and version control on all budget and forecast information via a framework to manage distributed repositories and content metadata

Compare quotations from suppliers who have different delivery deadlines, price conditions, or other parameters via trend analysis tools and integrated and flexible data services of enterprise resource planning (ERP)-centralized and managed data warehouses

View data from multiple angles including costs, revenue, margin, discounts, number of records, and highest and lowest values via centralized and managed data warehouses that employ customized client/server applications

Provide contract prices, escalations, and terms and conditions in sales and marketing price-management workflows via business-to-business (B2B) integration and collaborative processes with workflows that use collaborative workspaces and portal infrastructures

Provide a dynamic and role-based budgeting process with capabilities to reconcile actuals and forecasts according to budgets via sophisticated composite applications on a service-oriented platform architecture

Be able to adjust performance targets to business conditions via predictive analysis, data mining, and forms integrated with line-of-business (LOB) systems and processes

Implement site accounting for activity-based costing to support analyzing value streams to improve opportunities and ongoing monitoring, tracking, and status via centralized, integrated, and automated value-stream mapping; an electronic system of records for all value streams; and an improved project tracking, status, and reporting application

Provide collaboration portals that share supplier data and information via enterprise data warehouses and the ability to securely share information and collaborate with vendors by using existing collaborative workspaces and portal infrastructures

Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.

Integrated Capability Support for Priority Business Capabilities

Business Driver

Phase 1 Phase 2 Phase 3

RETAIN AND ATTRACT CUSTOMERS WITH A LEAN CUSTOMER SUPPORT STAFF

Enable better collaboration and coordination of sales activities across distributed sales teams via collaborative workspaces for customer and market information and for sales activity tracking that users can access on mobile devicesImprove quality and reduce cycle time to generate sales proposals via collaborative workspaces that contain customer and market information, product and service information, proposal templates, and collaborative authoring capabilitiesAlign front-office application resources, and tag and disseminate client information so the financial advisor, call center, and client Internet experience encapsulate the most-needed information for rapid service fulfillment via an enterprise architecture for integration (enterprise service bus [ESB], enterprise application integration [EAI], and B2B); standardized, packaged integration solutions; and enterprise-wide core processes that are integrated and that use data from enterprise data warehouses

Exploit opportunities to pursue niche markets and high-value customers via self-serve reporting and analysis of transactional data from data martsImprove advisor and call center representative productivity orchestration in all tools, data stores, and applications by using workflow routines that mimic common tasks to end users via collaborative processes that include workflows that use collaborative workspaces and portal infrastructures, forms that are embedded in documents and email to manage metadata and workflows, and automated core business processes; and process activities that are monitored

Drive persistent focus on critical areas of individual performance and improve focused execution in niche markets and for high-value customers via personalized performance scorecardsAlign all application tools so that the work performed and the data, report, and derived data routines automatically update all applications with contingencies to that data, to ultimately drive greater wallet share and revenue via fully mature, enterprise-wide use of service-oriented architecture (SOA) and process abstraction that includes active development on modern tools and platforms and business activity monitoring (BAM) within business process automation, supported by real-time integration, availability, and management across data warehouses, and consistent business processes that use flexible business automation tools

DEEPEN BUSINESS INSIGHTS LESS EXPENSIVELY

Improve access to key operational and performance data across the company via data marts, parameterized reports created by IT, and dashboardsReduce complexity and high training costs for personnel by providing streamlined tools that support their work via role-based applications for specific tasks, that have a comfortable, familiar, and consistent user interfaceReduce paperwork and improve current processes by converting forms from paper to electronic format via an electronic forms tool that is managed and deployed on a collaboration platform and through email and web forms

Improve support for decision making by providing access to enterprise, operational, and performance data across processes and systems via a centralized data warehouse to consolidate, audit, and cleanse data from across the enterprise, that includes self-service reporting, analysis tools, real-time key performance indicators (KPIs), and scorecardsExecute daily processes quickly and effectively while responding appropriately to high-priority functions and information via integrating common desktop applications with role-based applicationsImprove processes and increase collaboration by implementing forms-based workflows via automated forms workflows that support digital signatures, approvals, feedback both inside and outside the firewall, and on mobile devices

Improve the support for decision-making by providing ready access to relevant operational, performance, and financial data via combining operational and financial data into single reports and using spreadsheet-based reporting for complex and parameterized reportsImprove decision making abilities in carrying out daily processes and high-priority functions via role-based composite applications that use contextual Business Intelligence and searchEnhance process agility internally and with partners and suppliers, by enabling users to create and alter workflows to respond to dynamic work conditions via customizable and situational workflows across the firewall, by using alterable parameters and rerouting options

Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.

Integrated Capability Support for Priority Business Capabilities

Business Driver

Phase 1 Phase 2 Phase 3

SPEND LESS ON CORPORATE REPORTING

Improve the focus on KPIs with timely, automated scorecards in a single portal via interactive, departmental scorecards

Encourage continual improvement focus (Lean Six Sigma) and communication with consistent process templates, documentation, and analysis via IT-provisioned portals that are deployed on a single productivity infrastructure

Create and store data electronically via electronic forms

Deliver data across multiple departments via secure collaborative workspaces

Allow users to develop detailed, contextual reports without involving IT via self-serve reporting and analysis tools

Improve visibility into and alignment of KPIs across the enterprise via role-based, strategy-driven, enterprise-wide scorecards and reports

Streamline manual business processes that span multiple departments by using shared metrics, reports, and workflows via portals that deliver customized, targeted, and aggregated information based on a user's identity

Provide comprehensive access to information by fully integrating end-to-end processes across multiple systems via business process automation, workflow automation, and integrated custom applications

Enable users to enter and access data instantly with handheld devices via forms-based solutions that are accessible from mobile devices, email, and browsers

Enable full strategic alignment of metrics and accountability for performance across business functions and roles via advanced visualizations (KPIs exposed in strategy maps and custom visualizations) supported by predictive analysis and data mining

Provide transparency into business units, processes, and their relative performances via embedded reporting in business processes

Streamline access to process performance and improvement data across a portfolio of customers, products, suppliers, channels, and projects via secure portals and Business Intelligence tools for automated business process data across multiple organizations

Provide better root cause analysis and guidance about the key performance drivers of business results via business activity monitoring of automated core business processes

Provide integrated access to data in financial and administrative systems via bidirectional composite applications

Reduce the need to switch to other applications to modify or enter new information via one common interface across various integrated composite applications

Enable users to share information securely and comply with government mandates via accelerators and adapters that enforce compliance

Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.

Integrated Capability Support for Priority Business Capabilities

Business Driver

Phase 1 Phase 2 Phase 3

DECREASE THE COST OF PUBLISHING CONTENT TO THE INTERNET

Provide basic content management of key digital assets and intranet with workflow, collaboration, and search capabilities via an enterprise portal, integrated office productivity software, and email applications for management of structured and unstructured information, messaging, and collaboration

Implement formal processes and the supporting technology platform to author, stage, deliver, and produce website content via an enterprise portal platform that supports integrated design and development tools to manage a multiple-tier environment for intranet, Internet, and external websites to enable collaboration, workflow, and content management

Use a single authoring tool for all intranet, web, and extranet sites via unified enterprise portal design tools that customers use to author all Internet and extranet websites

STREAMLINE APPROVAL PROCESSES

Keep common forms in a central location, to enable operational collaboration from both headquarters and remote locations via categorized forms libraries and document libraries

Provide a centralized, collaborative proposal document library via collaborative workspaces that are integrated with desktop productivity applications, document and content locking, and versioning capabilities

Distribute documents created by the headquarters to remote employees based on their roles, and track delivery and follow-up on documents that are required reading via centralized, workflow-based document distribution and review

Automate proposal work coordination and document handling via centralized collaborative workflows that are supported by workflow management and document workflows

Create a culture of compliance for all critical documents, and assure receipt and review auditing based on how critical a document is via rules and role-focused, workflow-based document review

Streamline and automate proposal generation via automatically populating XML proposal templates

INCREASE ENVIRONMENTAL SUSTAINABILITY

Allow employees in branch offices to travel less frequently to central offices for meetings via communication tools such as voice mail, audio/video conferencing, and secure instant messaging (IM); collaboration tools such as workspaces with document management that interoperates with desktop productivity applications; and online and offline email

Make remote workers more productive with key data or systems via secure remote access

Allow employees to telecommute as often as possible without diminishing performance via communication tools such as web/audio/video conferencing, software-powered voice over Internet Protocol (VoIP), secure IM, email, and voice mail on a browser or mobile device; collaboration tools such as support for offline documents, search for documents and people, and calendar and task management

Show when telecommuting employees are available via presence-based call management and IM on a browser or mobile device

Enable a roaming workforce with the flexibility to work from home, satellite offices, or permanent desks via presence-enabled LOB applications; integrated web/audio/video conferencing; unified inbox with voice mail, email, and fax; and federation of communication information

Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.

Integrated Capability Support for Priority Business Capabilities

AgendaAgenda

Recap Business Discussions

Integrated Capability Approach

Summary and Next Steps

Needed Integrated Capabilities

IT Business

Today Future

Dynamic business agilityand low TCO

Optimizing Finance Operations

Multiple Enterprise Solutions

Point solutions

Siloed, disconnectedtechnology

investments

High TCO | Low agility

Sales Effectiveness

Improving Customer Service

Integrated capabilities

Why the Integrated Enterprise Platform Approach?

Supporting Microsoft Technologies

Client Capabilities

Business Solutions

Solution Areas

Infrastructure Capability Integration

Infr

astr

uctu

re O

pti

miz

ati

on

Infrastructure Optimization Models

Infrastructure Optimization Models

Business Productivity Infrastructure Optimization Model

Collaboration

Messaging

Unified Communications

Content Creation and Management

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Application Platform Optimization Model

BI and Analytics Platform

Database and LOB Platform

Custom Development

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Core Infrastructure Optimization Model

Datacenter Management and Virtualization

Device Deployment and Management

Identity and Security Services

IT Process and Compliance

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Business Solutions

Solution Areas

Infrastructure Capability Integration

Infr

astr

uctu

re O

pti

miz

ati

on

Infrastructure Optimization Models

Infrastructure Optimization Models

Business Productivity Infrastructure Optimization Model

Collaboration

Messaging

Unified Communications

Content Creation and Management

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Application Platform Optimization Model

BI and Analytics Platform

Database and LOB Platform

Custom Development

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Core Infrastructure Optimization Model

Datacenter Management and Virtualization

Device Deployment and Management

Identity and Security Services

IT Process and Compliance

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Client Capabilities

Relationships Between Integrated Capabilities

Business Solutions

Solution Areas

Infrastructure Capability Integration

Infr

astr

uctu

re O

pti

miz

ati

on

Infrastructure Optimization Models

Infrastructure Optimization Models

Business Productivity Infrastructure Optimization Model

Collaboration

Messaging

Unified Communications

Content Creation and Management

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Application Platform Optimization Model

BI and Analytics Platform

Database and LOB Platform

Custom Development

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Core Infrastructure Optimization Model

Datacenter Management and Virtualization

Device Deployment and Management

Identity and Security Services

IT Process and Compliance

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Application Platform Optimization

Integrated Enterprise Platform

Client Capabilities

Business Productivity Infrastructure Optimization

Core Infrastructure Optimization

Each capability has four levels of maturity:

BasicStandardizedRationalizedDynamic

What are these used for?Profiling integrated capabilities, leading to model common capabilitiesUnderstanding dependenciesPlanning advancement in services provided to lead to enterprise-class capabilities

Optimization Model Capability Maturity Levels

Infrastructure Optimization Models

Infrastructure Optimization Models

Business Productivity Infrastructure Optimization Model

Collaboration

Messaging

Unified Communications

Content Creation and ManagementD

YN

AM

IC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Application Platform Optimization Model

BI and Analytics Platform

Database and LOB Platform

Custom Development

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Core Infrastructure Optimization Model

Datacenter Management and Virtualization

Device Deployment and Management

Identity and Security Services

IT Process and Compliance

DY

NA

MIC

RA

TIO

NA

LIZ

ED

STA

ND

AR

DIZ

ED

BA

SIC

Infr

astr

uctu

re O

pti

miz

ati

on

Multiple Solutions, One PlatformUse integrated capabilities for all of your business needs

Application Platform Optimization

Business Productivity Infrastructure Optimization

Core Infrastructure Optimization

Application Platform

OptimizationBusiness Productivity

Infrastructure

OptimizationCore Infrastructure

Optimization

Streamline the

budgeting and

forecasting process

Retain and attract

customers with a lean customer

support staff

Deepen business

insights less expensively

Spend less on corporate reporting

Decrease the cost of

publishing content to the

Internet

Streamline approval processes

Increase environmental sustainability

Application Platform

OptimizationBusiness Productivity

Infrastructure

OptimizationCore Infrastructure

Optimization

Operations

Human Resources SalesFinance

Multiple Solutions, One PlatformUse integrated capabilities for all of your business needs

Application Platform

OptimizationBusiness Productivity

Infrastructure

OptimizationCore Infrastructure

Optimization

Business Benefits IT Benefits

FamiliarityHigh user familiarityFaster adoption rateLower time to value

AgilityFast, efficient deploymentGreater integration

RobustnessConsistent featuresData integrationProcess integration

ScalablePerformance and reliabilitySecuritySupport skills and processes

Lower TCOCommon support skills and processesLower integration costsLow cost software

SustainableContinuity and long-term viability

Value of Integrated Capabilities from Microsoft

AgendaAgenda

Recap Business Discussions

Integrated Capability Approach

Summary and Next Steps

Needed Integrated Capabilities

IT Challenge: Align with Business Goals

IT Strategy and Business

Alignment

OperationsManagement

InnovationEnablement

Business Strategy and

Goals

Cost center More efficient cost center

Business enabler Strategic asset

Time

Valu

eOptimizing the Integrated Enterprise Platform

Sophistication of the Solution

Phase 1

Provides basic support for the most critical elements of the business driver

Phase 2

Provides adequate, typical support for critical and priority elements of the business driver

Phase 3

Provides thorough, streamlined support for the business driver that enables differentiated levels of performance

DEEPEN BUSINESS INSIGHTS LESS

EXPENSIVELY

STREAMLINE APPROVAL PROCESSES

DECREASE THE COST OF PUBLISHING CONTENT TO THE INTERNET

SPEND LESS ON CORPORATE REPORTING

INCREASE ENVIRONMENTAL SUSTAINABILITY

RETAIN AND ATTRACT CUSTOMERS WITH A

LEAN CUSTOMER SUPPORT STAFF

STREAMLINE THE BUDGETING AND FORECASTING PROCESS

Phase 1: Core IOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

Datacenter Mgt and

Virtualization

Data Center Mgt & Virtualization

A defined software library exists. Deployment and management of software updates are tool based. Capacity management processes are manual and reactive, resource utilization and capacity are monitored periodically. The organization actively uses virtualization to consolidate resources for production workloads. Performance monitoring of physical and virtual hardware with defined SLAs; health monitoring of applications; supported across heterogeneous environments with manual remediation. IT services are audited for compliance based on documented company and industry-standard policies (HIPAA, SOX, and PCI); reports are generated monthly. Services are available during server failure (e.g. server clustering, hot spares, and/or virtualization recovery solution).

Server Security

Malware protection is centrally managed across server operating systems within organizations, including the host firewall. Protection for select mainstream/non-custom applications and services (such as e-mail, collaboration and portal applications, instant messaging), if available, is centrally managed. Integrated perimeter firewall, IPS, Web security, gateway anti-virus, and URL filtering are deployed with support for server and domain isolation; network security, alerts, and compliance are integrated with all other tools to provide a comprehensive scorecard view and threat assessment across datacenter, application, organization, and cloud boundaries. Remote access is secure, standardized, and available to end users across the organization.

Networking Redundant Domain Name System servers exist to provide fault tolerance. Dynamic Host Configuration Protocol servers are network-aware and with support for auto configuration. IPv4 for main transport services, using IPv6 for some transport services (eg. to achieve larger address range).

Storage Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite, with fully tested recovery or failover based on service-level agreements.

Device Deploymen

t and Manageme

nt

Device Mgt & Virtualization

Software distribution to local and geographically dispersed users is automated. System and security updates are distributed and installed automatically for desktop systems. Mobile device access configuration is automated and is pushed over-the-air. A solution is in place to configure and update devices. Mobile phones are used for over-the-air synchronization with e-mail, calendar, and contacts. All mobile access to internal systems is through a proxy technology (such as a messaging system and/or selective SSL).

Device Security Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall; non-PC devices are managed and protected through a separate process.

Identity & Security

Services

Identity & Access

To control access, simple provisioning and de-provisioning exists for user accounts, mailboxes, certificates or other multi-factor authentication methods, and machines; access control is role-based. Password policies are set within a directory service to enable single sign on across boundaries for most applications. Password resets through internal tools or manual processes. A centralized, group/role based access policy is defined for business resources, applications, and information resources, managed through industry accepted processes. Most applications and services share a common directory for authentication across boundaries. Point-to-point synchronization exists across different directories.

Information Protection & Control

Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and e-mail); policy templates are used to standardize rights and control access to information.

IT Process & Compliance

IT policies are documented for each IT service. Each IT service has a process to manage bug handling and design changes; IT services are tested according to defined test plans based on specifications. IT service release and deployment processes are formally defined and consistently followed. Each IT service provides service-level and operational-level agreements. Monitoring, reporting, and notifications are centralized for protection against malware, protection of information, and identity and access technologies. Risk and vulnerability are formally analyzed across IT services; IT compliance objectives and activities are defined and audited for each IT service.

Phase 1: BPIOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

Collaboration

WorkspacesWorkspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices; offline synchronization is supported. Team members can simultaneously author, edit, and review content across Clients (including Devices). IT driven onboarding; Integration with directory services for group level onboarding, training for users is available.

Portals

Users and groups can publish content directly to some portals; workflow for review and approval is built-in and automated. Users have widgets to customize their views of information; enterprise search is integrated with portals. Portals (enterprise, departmental, and personal) are provisioned by IT and are deployed on a single productivity infrastructure; governance policies are fully in place, including single sign-on supported by uniform directory services. Line-of-business applications are routinely surfaced through the portal and have the capability to write securely to back-end systems and to maintain data integrity; information from multiple applications can be combined in dashboards.

Social Computing

Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide; communities, if present, are largely through e-mail or are driven by forums. Social feedback is generally limited to comments in e-mail, forums, or within individual documents. Personal profiles are available but cannot be customized; users can publish content on personal shared sites; people can be located based on profile information; the system sorts search results for people by users’ social graphs, which can be refined by using metadata; news feeds are typically delivered through RSS or e-mail alerts.

Project Mgt

Information access Most unstructured information from intranets, e-mail, and content management repositories is indexed; some structured content from databases, people, and expertise information is indexed.

Interactive experience and navigation

Messaging The e-mail platform supports message encryption (S/MIME) to enable digital signatures. Secure, remote, online and offline access to rich mailbox and calendar functionality exists inside and outside the firewall.

Unified Communic

ations

IM/PresenceUsers have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall; peer-to-peer voice and video communications are based on a single directory. Online presence information (automatically refreshed user availability information based on communications, log-on, and calendar activities) is integrated into the e-mail client.

Conferencing

Secure Web conferencing is managed by IT, has policy-based access control, uses a single directory, and is available from PCs and Web browsers inside and outside the firewall; an enterprise-wide, standalone audio conferencing service is also managed by IT. A standalone audio conferencing service is available enterprise-wide and is managed by IT. Desktop video conferencing is available outside the firewall only through room-based systems, and using methods such as virtual private networking and remote access services that are managed by IT; the end-user experience is disconnected (requires specialized end-user devices or applications).

Voice

Voice communications are based on a hybrid telephony infrastructure (IP and legacy time division multiplexing) that has limited integration with PCs and desktop applications. Voice mail is available online and offline from the e-mail client but messages are stored separately, there is no unified directory, and messages can be kept private only by caller request. Redundant call control servers within a cluster or pool provide resilience when failure occurs at a single point.

Content Creation

and Manageme

nt

Information Mgt Managed workspaces exist at the departmental level and are available from individual productivity applications. Metadata capture is enforced; however, the capture process is manual and labor-intensive.

Process Efficiency

Custom solutions developed by IT are used to deliver and manage key forms electronically; form data and scanned paper-based content are stored in a custom data repository. The organization uses basic workflow tools to process, review, and approve documents; simple workflow routing is part of the collaborative workspace infrastructure. Inbound and outbound communications are generated by automating productivity applications; IT creates custom connectors for line-of-business applications, so there is heavy reliance on IT to develop, manage, and maintain solutions; templates and output are centrally stored at the enterprise level but not managed as part of an information management strategy.

Compliance Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including e-mail; reporting occurs manually.

Authoring

Multi-Device Support

Interoperability

User Accessibility

Phase 1: APOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

BI and Analytics Platform

Business Intelligence

IT engaged to create interactive reports to meet specific business needs. Reports are generated on a scheduled basis or on demand by IT and are then shared on reporting portals. Users have some ability to subscribe to reports. A standardized approach is in place for IT to provision data sources for access to users to search across structured and unstructured content. A basic interactive search experience is provided to users that incorporates filter information based on common or explicit metadata. IT provides access for users to sanctioned data sources as database connections, data feeds, or static data dumps, upon which users can easily perform ad-hoc queries and data analysis using Excel or other analysis tools. Users can share their analyses via a BI portal. Users may have access to more advanced self-service analytics tools to perform data mining or predictive analysis without dependence on IT or a Data Analyst. Some level of automation is in place to render data pulled from enterprise systems on dashboards, but is used for only strategic or high profile projects. Dashboards have integrated interfaces to allow users to roll-up and drill-down on live data.

Data Warehouse Management

EDW is refreshed on a near real-time basis so that information is readily available to mission-critical applications, analytics, and reporting systems. A high degree of concurrency exists, with many users running complex queries and interacting with complex analytics tools simultaneously with data loading. Management and maintenance of storage, hardware, and supporting software is manual and ad hoc. Corporate policies are in place for data storage.  Common data taxonomies are defined and used for manual data-cleansing activities. Data mart data structures are optimized for local reporting and analysis performance and user understanding, including use of star/snowflake schemas. Data marts feed a centralized data warehouse that effectively relays information across most key areas of the business. Loading of data into data marts and from data marts to the enterprise data warehouse includes automated transformations to reconcile and validate the integrity of the data. Consistency in data warehouse operation and maintenance across distributed data marts is improved through use of common tools, policies, and sharing of best practices, driven by the EDW team. SLAs emerge. Data changes can be planned through standard impact analysis, and effective collaboration occurs across data mart and EDW teams. An IT-managed BI environment is in place and applications at the department level integrate with departmental data marts. IT designs, implements, and manages data schemas that are optimized for localized self-service reporting and analysis tools.

Big Data

Information Services and Marketplaces

Database and LOB Platform

Transaction Processing

Data Management

Key high-value data has associated formal data management policies and processes.  Data governance may be recognized on a siloed basis, but not as a corporate discipline. Data and asset inventories and dependency relationships are manually documented periodically. Access policies for data and objects in databases are defined but not centralized, and do not reference data classifications. Administrative tasks are still performed using an over-privileged account.  Security management is performed on a server-by-server basis. Systems are in place for retention backup. Organizational/departmental policies exist for how long items are stored and what is stored.

Application Infrastructure

Standard service-based application architectures are being rationalized and implemented with appropriate governance. Applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. Applications use web services to communicate across application boundaries. Processes and infrastructure for managing service endpoints, service discovery, and routing of application messages is in place. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems. Components and services are explicitly tagged for reuse. A range of application services and infrastructure is provided across operating environments with central governance. A central engineering practices group co-sponsored by development and operations has formed and is providing valuable guidance to application development teams. Application developers consistently build applications using these application frameworks, so hosting, application services requirements, and management are predictable. Operating systems provide support for multiple application frameworks.

Custom Developme

nt

Internet Applications

Component and Service Composition

Enterprise Integration

Use of standardized processes for data integration is at the project level and technologies are used to improve back-end integration. The business leverages an integration broker running on-premises to connect to cloud applications using adapters. Application integrations leverage standard application messaging protocols and infrastructure to connect various applications running on-premises and in the cloud, connecting mission-critical data and transactions across enterprise applications. Centralized data integration strategies and tools are used across the enterprise.

Development Platform

The organization has selected and implemented a common set of frameworks for major application development and operating environment needs. Developer skill and use of standard frameworks is consistent. A central architecture and engineering practices group has formed with the participation of development and operations teams, and provides valuable guidance to development teams. A standard set of tools and common development approaches are used across multiple development teams in the organization. Developed applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems.

Application Lifecycle Management

Work-breakdown structures map estimated work to business value. Rudimentary metrics are used to manage project progress. Project managers aggregate data from standard status updates. Effective change management processes are in place. Testing has test harnesses and some automation, formal unit testing with good code coverage, and defined test strategy and processes. Explicit use of code quality tools typically occurs at the end of the development cycle. Processes are defined for debugging production defects and incidents, with a standard set of defect artifacts.

Phase 2: Core IOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

Datacenter Mgt and

Virtualization

Data Center Mgt & Virtualization

Service capacity and resource utilization are monitored continuously; analysis tools are used to predict the impact of proposed changes (software, hardware, usage, and topology); Workloads can be relocated manually. Chargeback is consumption based. Performance monitoring of applications as well as physical and virtual hardware pools with enforceable SLAs; Service health monitoring with consistent reporting across heterogeneous environments.

Server Security Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.

Networking Using IPv6 with IPSec for secure private communication over public network.

Storage Critical data is backed up by taking snapshots using a centralized, application-aware system.

Device Deploymen

t and Manageme

nt

Device Mgt & Virtualization

Users have self-service capabilities to find, request, and install approved applications appropriate to their roles. A unified solution offers a single view to manage security patches and to detect current and emerging malware, viruses, and other threats automatically; non-compliant systems are remediated automatically. Certificate provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Mobile access to internal systems is granted through a virtual private network (IP Security or SSL).

Device Security Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.

Identity & Security

Services

Identity & Access

Provisioning and de-provisioning of user and super-user accounts, certificates, and/or multi-factor authentication is automated. Multi-factor and certificate-based authentication are applied in some scenarios, such as remote access across boundaries (such as On Prem and Cloud). Self service password resets supported. A scalable directory that is integrated and automatically synchronizes with all remaining directories across multiple geographies and isolated domains for all applications with connectivity to cloud when applicable.

Information Protection & Control

Persistent information protection helps to enforce policy on sensitive data across boundaries, including data on mobile devices. Reporting is predefined for select server and back-office waypoints.

IT Process & Compliance

IT policies are integrated across all IT services, enabling or restricting use of resources as appropriate. IT service issues and design changes are tracked by using formal processes; testing is automated where possible. IT service release processes are uniform across IT services; deployment is automated and offers self service where possible; management reviews each service for readiness to release before deployment. Service-level and operational-level agreements are integrated for IT services; management reviews operational health regularly; some tasks are automated. Monitoring and flexible, tenant/service reporting are aggregated across individual areas for protection against malware, protection of information, and identity and access technologies. Risk and vulnerability analysis is integrated across all IT services; IT compliance objectives and activities are integrated across IT services and automated where possible; management regularly audits to review policy and compliance.

Phase 2: BPIOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

Collaboration

Workspaces Self service onboarding, integration with identity systems, training for users is mandatory and enforced.

PortalsPublishers can direct content to specific audience targets; portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity, role, and device on which content is consumed. Users get targeted information based on their profiles, their roles in the organization, and mobile devices being used.

Social Computing

Rating, tagging, and bookmarking are used broadly to share opinions about all kinds of content and are available from within productivity applications that are used to create content. Profiles are highly customizable; personal sites offer organizational, attention management, and public commenting capabilities; social networking and business productivity tools are integrated; enterprise news feeds complement RSS and e-mail alerts. Social networking capability is available via applications on mobile devices.

Project Mgt

Information access Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed; indexing processes incorporate browsing by people and ranking of expertise.

Interactive experience and navigation

An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.

Messaging The e-mail platform supports advanced, policy-driven message controls that include automatic application of rights protection. Secure, policy-driven access to a unified inbox from PCs, phones, and Web browsers exists inside and outside the firewall.

Unified Communic

ations

IM/PresenceOnline presence, IM, and peer-to-peer voice and video are in place (including multiple-layer anti-malware and contextual content filtering) and are accessible from PCs, phones, and Web browsers. Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.

Conferencing

Secure Web conferencing is managed by IT, has policy-based access control, uses a single directory, and is available from PCs and Web browsers inside and outside the firewall; an enterprise-wide, standalone audio conferencing service is also managed by IT. A standalone audio conferencing service is available enterprise-wide and is managed by IT. Desktop video conferencing is available outside the firewall only through room-based systems, and using methods such as virtual private networking and remote access services that are managed by IT; the end-user experience is disconnected (requires specialized end-user devices or applications).

Voice

Voice communications are secure, encrypted, extended to remote and mobile workers using different mobile devices and integrated within enterprise productivity and collaboration platforms. Voice mail is part of a unified inbox that features single storage and a unified directory; retention and protection policies are enforced by the organization; messages are available as voice or transcribed text and are accessible from PCs, phones, or Web browsers. Server pools that are split across data centers or replicated provide resilience to data centers when disaster occurs.

Content Creation

and Manageme

nt

Information MgtTraditional and new media content types are managed consistently in a single repository that has integrated workflow. Metadata is centrally managed and deployed across the business; metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created, published, and managed by business owners who use appropriate publishing workflows to govern review cycles.

Process Efficiency

Users are empowered to create and deploy electronic forms by using visual design tools; data from forms (stored in an open format) and scanned paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications. The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications; people can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time. Inbound and outbound communications are generated by scalable, server-based, automated processes; processes and line-of-business applications are integrated within a framework; templates and output are stored and managed at the enterprise level as part of an information management strategy that provisions core document and records management capabilities.

Compliance Policy management is based on content type, location, and document libraries, and includes adherence of content used offline; an integrated solution for electronic discovery of information is in place; retention policies and holds on records are automated.

Authoring

Multi-Device Support Key applications support optimized usage scenarios; for example, Web for reach, rich client for responsiveness, and phone for mobility.

Interoperability Core productivity applications support the ability to save files in open-standards approved formats.

User Accessibility

Phase 2: APOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

BI and Analytics Platform

Business Intelligence

Self-service reporting and analysis environment and tools established and maintained by IT. Access to data is decentralized but governed by IT with a well-defined process for stewardship and governance. Portals exist for dynamic reporting that supports rich report formats. Reports are generated with group or individual filter parameters and delivered via direct push or subscription and can vary by device. Users have the ability to share alerts and subscriptions with other users via limited collaboration and social networking. Users search for unstructured documents and structured reports based on metadata and content of reports. Using search on the BI portal allows users to find data, analyses, and reports, and users can launch tools for self service report generation and analysis from the search interface. From the BI portal, users are able to connect to internal and external data sources and combine them in a single report or data set for further analysis. Users can do sophisticated analysis and build rich BI applications using Excel or other analysis tools. BI portal has reporting and analysis capabilities that include exception highlighting, guided analysis, and predictive analysis with rich logic. Dashboards are consistently used to provide operational and strategic views of the business from real time or periodically refreshed data. BI portal experience has rich visualizations, dashboards and scorecards with full data interactivity (slicing, filtering, etc.) consistent with self service reporting and analysis tools. Users have the ability to create unique personal and/or shared views of data that are actually combinations of multiple views (i.e. mashups). IT provisions and provides access to infrastructure, statistical analysis and data mining tools, and common sanctioned data sources to Data Analyst roles to analyze business data and build models to enable future decisions, predict trends, find correlations in business attributes, etc. Data Analysts publish the results of their analyses to business users via reports, spreadsheets, charts, visualizations, etc.

Data Warehouse Management

Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. Data-cleansing tools are used to reconcile data through common taxonomies with trusted internal and external data sources and rules populated by expert business users.  Data-cleansing tools are commonly embedded as an activity in business process automation, and are available directly to users for them to clean unmanaged data and information. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed.  Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.

Big Data

Information Services and Marketplaces

Phase 2: APO Continued

Basic

Standardized

Rationalized

Dynamic

B S R D

Database and LOB Platform

Transaction Processing

Data Management

Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores.  

Application Infrastructure

Application messaging services used by development are aligned with standard application operating environments. Development and operations teams have the skills required to effectively and consistently make use of these technologies.

Custom Developme

nt

Internet Applications

Component and Service Composition

Developers have tools that allow them to automate the creation of components usable by end users out of low-level services, and to publish them to the central repository and obtain basic metrics of usage. Tooling for solution assembly is simplified.

Enterprise Integration Applications leverage an application communication infrastructure deployed in operations that is actively managed and has dynamic routing capabilities.

Development Platform

The organization has selected and implemented a common set of frameworks for major application development and operating environment needs. Developer skill and use of standard frameworks is consistent. A central architecture and engineering practices group has formed with the participation of development and operations teams, and provides valuable guidance to development teams. A standard set of tools and common development approaches are used across multiple development teams in the organization. Developed applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems.

Application Lifecycle Management

Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.

Phase 3: Core IOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

Datacenter Mgt and

Virtualization

Data Center Mgt & Virtualization

Software and configuration library is maintained at current update levels with version control and auditing on demand. Software update management and auditing are policy-driven and monitored, including automated vulnerability detection. Isolation and remediation of vulnerable and non-compliant systems are automated. Policy enforcement occurs in near real time based on company and industry-standard polices that allow for immediate quarantine of non-compliant systems, and consistent compliance reporting and standards exist across all IT services.

Server Security Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.

Networking Using IPv6 with IPSec for secure private communication over public network.

Storage Critical data is backed up by taking snapshots using a centralized, application-aware system.

Device Deploymen

t and Manageme

nt

Device Mgt & Virtualization

Users have self-service capabilities to find, request, and install approved applications appropriate to their roles. A unified solution offers a single view to manage security patches and to detect current and emerging malware, viruses, and other threats automatically; non-compliant systems are remediated automatically. Certificate provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Mobile access to internal systems is granted through a virtual private network (IP Security or SSL).

Device Security Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.

Identity & Security

Services

Identity & Access Centralized IT offering of Federation services. Multiple Federation and trust relations between separate organizations 1 to 1 relationship.

Information Protection & Control Reporting for server, back-office, and end-user waypoints; analysis capabilities exist to provide investigation of critical incidents.

IT Process & Compliance

IT policies are integrated across all IT services, enabling or restricting use of resources as appropriate. IT service issues and design changes are tracked by using formal processes; testing is automated where possible. IT service release processes are uniform across IT services; deployment is automated and offers self service where possible; management reviews each service for readiness to release before deployment. Service-level and operational-level agreements are integrated for IT services; management reviews operational health regularly; some tasks are automated. Monitoring and flexible, tenant/service reporting are aggregated across individual areas for protection against malware, protection of information, and identity and access technologies. Risk and vulnerability analysis is integrated across all IT services; IT compliance objectives and activities are integrated across IT services and automated where possible; management regularly audits to review policy and compliance.

Phase 3: BPIOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

Collaboration

Workspaces Workspaces are centrally managed, support a hybrid on-premises and Web (cloud)-based infrastructure, and integrate fully with business applications; life-cycle management, including creation, discoverability, archiving, and retirement, is automated.

Portals

Portals support collaboration and information sharing across extranet and Internet sites in a hybrid on-premises and Web (cloud)-based infrastructure and through federated relationships with trusted partners. Portals and line-of-business applications are integrated and users can take them offline for changes and secure synchronization later; can access data from these LOB apps across mobile devices; users can combine data from disparate sources into composite applications without IT involvement; IT has the flexibility to create rich client applications and surface them within productivity applications that are used to create and integrate content with the system of record.

Social Computing Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This Content is accessible through multiple mobile devices.

Project Mgt

Information access A single platform provides an organization-wide search experience; structured data is incorporated and exposed in search-driven applications.

Interactive experience and navigation

An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.

Messaging Advanced policy controls are applied to mobile devices and applications; suppliers and customers have federated calendars; e-mail and contacts are integrated across the enterprise to support collaboration and are available to line-of-business applications.

Unified Communic

ations

IM/PresenceInstant messaging (IM) and online presence are federated to suppliers and customers across multiple devices, and integrated across line-of-business applications, which enables enterprise networking through expert search. IM and online presence are federated to suppliers and customers across multiple devices and integrated across line-of-business applications, which enables enterprise networking through expert search.

Conferencing A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.

VoiceVoice communications are integrated with other communications modes (such as e-mail, IM/online presence, and conferencing) and with line-of-business applications on a single platform. Voice mail is integrated with Unified Communications (IM and online presence, conferencing, and messaging) and extends to business processes and line-of-business applications; Voice mail is accessible from PCs, phones, and Web browsers.

Content Creation

and Manageme

nt

Information MgtTraditional and new media content types are managed consistently in a single repository that has integrated workflow. Metadata is centrally managed and deployed across the business; metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created, published, and managed by business owners who use appropriate publishing workflows to govern review cycles.

Process Efficiency

Users are empowered to create and deploy electronic forms by using visual design tools; data from forms (stored in an open format) and scanned paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications. The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications; people can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time. Inbound and outbound communications are generated by scalable, server-based, automated processes; processes and line-of-business applications are integrated within a framework; templates and output are stored and managed at the enterprise level as part of an information management strategy that provisions core document and records management capabilities.

Compliance Policy management is based on content type, location, and document libraries, and includes adherence of content used offline; an integrated solution for electronic discovery of information is in place; retention policies and holds on records are automated.

Authoring

Multi-Device Support Underlying capabilities such as instant messaging, communications, workflow, collaboration, and content management are available in each delivery mode as appropriate.

Interoperability Core productivity applications are integrated with workflows and validation engines, and support rendering changes made directly to files.

User Accessibility

Phase 3: APOBasi

cStandardiz

edRationalize

dDynami

c

B S R D

BI and Analytics Platform

Business Intelligence Symbiotic relationship and process between self-service and managed BI. IT has visibility into self-service activities that it uses to recommend and guide the enhancement of the managed BI environment and data structures that support self-service.

Data Warehouse Management

Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. Data-cleansing tools are used to reconcile data through common taxonomies with trusted internal and external data sources and rules populated by expert business users.  Data-cleansing tools are commonly embedded as an activity in business process automation, and are available directly to users for them to clean unmanaged data and information. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed.  Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.

Big Data

Information Services and Marketplaces

Database and LOB Platform

Transaction Processing

Data Management

Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores.  

Application Infrastructure

A common application messaging services infrastructure is in place and well managed for larger mission-critical applications. Business processes follow a model-driven, dynamic approach. IT manages a SOA-based application infrastructure, comprised of LOB back ends and composite applications that extend them and has complete monitoring of integration scenarios across the cloud and on-premises applications.

Custom Developme

nt

Internet Applications

Component and Service Composition

Developers have tools and access to advanced portal frameworks to enable loosely coupled messaging between application components, enabling a seamless, coordinated user experience across application components as they interact with one or more of the components.

Enterprise Integration End-to-end dynamic integration enables more complete automation of data and processes to increase business efficiency. Standardized platforms enable developers to build real-world SOA with built-in governance across enterprises.

Development Platform

Use of standard application services supported by the operating application infrastructure environment is maximized. Architectural layering is enforced as part of code delivery and build automation. Engineering of infrastructure and central application services is performed jointly by development and operations teams, resulting in complete symmetry between development and operating environments. Development work management tools are integrated with operations incident management systems. A large number of application characteristics can be modified by changing configuration, not changing code. Complex customizations and extensions use defined solution extensibility models.

Application Lifecycle Management

Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.

AgendaAgenda

Recap Business Discussions

Integrated Capability Approach

Summary and Next Steps

Needed Integrated Capabilities

Reduced complexity, IT support time, and training costs for remote personnel from streamlined tools that support their work

Data is created and stored electronically

Data is delivered across multiple business units and departments

Users can develop detailed, contextual reports without involving IT

IT can provide an audit history or trail and a log of changes

Easy accessibility to an organization's documents, records, and other content that is stored in a centralized and managed environment

IT Benefits of the Integrated Capability Approach

Is a key driver of business productivity and growth

Fuels profitable revenue growth

Gives managers more insight and control

Encourages employee productivity

Benefits of Optimizing IT Capabilities

Grow revenue 6.8% faster per year than their peers in the bottom 25% of IT capability.

Enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability.

Achieve superior productivity (a company’s IT infrastructure is a key determinant).

Have significantly better insight into, and control over, key dimensions of their business. 

Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006, http://www.microsoft.com/business/enterprise/itdrivesgrowth.mspx

Optimized IT… Companies in the top 25% of IT capability…

Engagement Approach

Audience

Solution road map

Solution areas Industry Horizontal

Business strategy

Integrated Capability Analysis => Projects, architecture, products

1. Present relevant integrated capabilities

2. Position the Integrated Enterprise Platform approach

Busi

ness

exe

cuti

ves

1. Understand business needs and priorities

2. Discuss range of potential solution capabilities

ITexe

cuti

ves

Arc

hit

ect

s IT

pro

/dev

exe

cuti

ves

Integrated Capability Analysis

Ensure target business capabilities cover process improvement priorities

Translate business capabilities into required infrastructure capabilities

Assess current infrastructure maturity

Determine gaps to target integrated capabilities

Build a road map for integrating capabilities and implementing solutions

Specify required platform architecture, technologies, and services

Baseline the Microsoft platform road map

Next Steps

Integrated capability analysisExplore the Integrated Enterprise Platform

Create a high-level implementation road map

Identify resources in your organization

Business analysts

Solution architects

Platform architects

Infrastructure architects

IT infrastructure managers

IT operations managers

Review the technology road map

Translate into a solution capability road map to review with the business

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing

market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.