Saving Money
-
Upload
alec-nieves -
Category
Documents
-
view
30 -
download
0
description
Transcript of Saving Money
Engagement Approach
Audience
Solution road map
Solution areas Industry Horizontal
Business strategy
Integrated Capability Analysis > Projects, architecture, products
1. Present relevant integrated capabilities
2. Position the Integrated Capability approach
Busi
ness
exe
cuti
ves
1. Understand business needs and priorities
2. Discuss range of potential solution capabilities
ITexe
cuti
ves
Arc
hit
ect
s IT
pro
/dev
exe
cuti
ves
AgendaAgenda
Recap Business Discussions
Integrated Capability Approach
Summary and Next Steps
Needed Integrated Capabilities
Business Driver
Phase 1 Phase 2 Phase 3
STREAMLINE THE BUDGETING AND FORECASTING PROCESS
View and gather financial data to standardize the budgeting process across the enterprise via collaboration and workflows
Gain greater visibility into inventory control, purchasing, and sales order processing for demand planning to help reduce costs via reports from different data sources and data marts associated with inventory control, purchasing, and sales order processing
Improve pricing and visibility into supplier performance to control costs via using content-centric social computing capabilities; comparing quotes from suppliers that have different delivery deadlines, price conditions, or other parameters; and analyzing historical data to evaluate past supplier performance
Align budgeting and forecasting processes to business strategies via predictive analysis and strategy-driven, enterprise-wide scorecards
Support budgets and forecasts with workflows for planning, requests, and change approvals via collaborative processes and basic composite applications
Maintain robust audit trails and version control on all budget and forecast information via a framework to manage distributed repositories and content metadata
Compare quotations from suppliers who have different delivery deadlines, price conditions, or other parameters via trend analysis tools and integrated and flexible data services of enterprise resource planning (ERP)-centralized and managed data warehouses
View data from multiple angles including costs, revenue, margin, discounts, number of records, and highest and lowest values via centralized and managed data warehouses that employ customized client/server applications
Provide contract prices, escalations, and terms and conditions in sales and marketing price-management workflows via business-to-business (B2B) integration and collaborative processes with workflows that use collaborative workspaces and portal infrastructures
Provide a dynamic and role-based budgeting process with capabilities to reconcile actuals and forecasts according to budgets via sophisticated composite applications on a service-oriented platform architecture
Be able to adjust performance targets to business conditions via predictive analysis, data mining, and forms integrated with line-of-business (LOB) systems and processes
Implement site accounting for activity-based costing to support analyzing value streams to improve opportunities and ongoing monitoring, tracking, and status via centralized, integrated, and automated value-stream mapping; an electronic system of records for all value streams; and an improved project tracking, status, and reporting application
Provide collaboration portals that share supplier data and information via enterprise data warehouses and the ability to securely share information and collaborate with vendors by using existing collaborative workspaces and portal infrastructures
Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1 Phase 2 Phase 3
RETAIN AND ATTRACT CUSTOMERS WITH A LEAN CUSTOMER SUPPORT STAFF
Enable better collaboration and coordination of sales activities across distributed sales teams via collaborative workspaces for customer and market information and for sales activity tracking that users can access on mobile devicesImprove quality and reduce cycle time to generate sales proposals via collaborative workspaces that contain customer and market information, product and service information, proposal templates, and collaborative authoring capabilitiesAlign front-office application resources, and tag and disseminate client information so the financial advisor, call center, and client Internet experience encapsulate the most-needed information for rapid service fulfillment via an enterprise architecture for integration (enterprise service bus [ESB], enterprise application integration [EAI], and B2B); standardized, packaged integration solutions; and enterprise-wide core processes that are integrated and that use data from enterprise data warehouses
Exploit opportunities to pursue niche markets and high-value customers via self-serve reporting and analysis of transactional data from data martsImprove advisor and call center representative productivity orchestration in all tools, data stores, and applications by using workflow routines that mimic common tasks to end users via collaborative processes that include workflows that use collaborative workspaces and portal infrastructures, forms that are embedded in documents and email to manage metadata and workflows, and automated core business processes; and process activities that are monitored
Drive persistent focus on critical areas of individual performance and improve focused execution in niche markets and for high-value customers via personalized performance scorecardsAlign all application tools so that the work performed and the data, report, and derived data routines automatically update all applications with contingencies to that data, to ultimately drive greater wallet share and revenue via fully mature, enterprise-wide use of service-oriented architecture (SOA) and process abstraction that includes active development on modern tools and platforms and business activity monitoring (BAM) within business process automation, supported by real-time integration, availability, and management across data warehouses, and consistent business processes that use flexible business automation tools
DEEPEN BUSINESS INSIGHTS LESS EXPENSIVELY
Improve access to key operational and performance data across the company via data marts, parameterized reports created by IT, and dashboardsReduce complexity and high training costs for personnel by providing streamlined tools that support their work via role-based applications for specific tasks, that have a comfortable, familiar, and consistent user interfaceReduce paperwork and improve current processes by converting forms from paper to electronic format via an electronic forms tool that is managed and deployed on a collaboration platform and through email and web forms
Improve support for decision making by providing access to enterprise, operational, and performance data across processes and systems via a centralized data warehouse to consolidate, audit, and cleanse data from across the enterprise, that includes self-service reporting, analysis tools, real-time key performance indicators (KPIs), and scorecardsExecute daily processes quickly and effectively while responding appropriately to high-priority functions and information via integrating common desktop applications with role-based applicationsImprove processes and increase collaboration by implementing forms-based workflows via automated forms workflows that support digital signatures, approvals, feedback both inside and outside the firewall, and on mobile devices
Improve the support for decision-making by providing ready access to relevant operational, performance, and financial data via combining operational and financial data into single reports and using spreadsheet-based reporting for complex and parameterized reportsImprove decision making abilities in carrying out daily processes and high-priority functions via role-based composite applications that use contextual Business Intelligence and searchEnhance process agility internally and with partners and suppliers, by enabling users to create and alter workflows to respond to dynamic work conditions via customizable and situational workflows across the firewall, by using alterable parameters and rerouting options
Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1 Phase 2 Phase 3
SPEND LESS ON CORPORATE REPORTING
Improve the focus on KPIs with timely, automated scorecards in a single portal via interactive, departmental scorecards
Encourage continual improvement focus (Lean Six Sigma) and communication with consistent process templates, documentation, and analysis via IT-provisioned portals that are deployed on a single productivity infrastructure
Create and store data electronically via electronic forms
Deliver data across multiple departments via secure collaborative workspaces
Allow users to develop detailed, contextual reports without involving IT via self-serve reporting and analysis tools
Improve visibility into and alignment of KPIs across the enterprise via role-based, strategy-driven, enterprise-wide scorecards and reports
Streamline manual business processes that span multiple departments by using shared metrics, reports, and workflows via portals that deliver customized, targeted, and aggregated information based on a user's identity
Provide comprehensive access to information by fully integrating end-to-end processes across multiple systems via business process automation, workflow automation, and integrated custom applications
Enable users to enter and access data instantly with handheld devices via forms-based solutions that are accessible from mobile devices, email, and browsers
Enable full strategic alignment of metrics and accountability for performance across business functions and roles via advanced visualizations (KPIs exposed in strategy maps and custom visualizations) supported by predictive analysis and data mining
Provide transparency into business units, processes, and their relative performances via embedded reporting in business processes
Streamline access to process performance and improvement data across a portfolio of customers, products, suppliers, channels, and projects via secure portals and Business Intelligence tools for automated business process data across multiple organizations
Provide better root cause analysis and guidance about the key performance drivers of business results via business activity monitoring of automated core business processes
Provide integrated access to data in financial and administrative systems via bidirectional composite applications
Reduce the need to switch to other applications to modify or enter new information via one common interface across various integrated composite applications
Enable users to share information securely and comply with government mandates via accelerators and adapters that enforce compliance
Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1 Phase 2 Phase 3
DECREASE THE COST OF PUBLISHING CONTENT TO THE INTERNET
Provide basic content management of key digital assets and intranet with workflow, collaboration, and search capabilities via an enterprise portal, integrated office productivity software, and email applications for management of structured and unstructured information, messaging, and collaboration
Implement formal processes and the supporting technology platform to author, stage, deliver, and produce website content via an enterprise portal platform that supports integrated design and development tools to manage a multiple-tier environment for intranet, Internet, and external websites to enable collaboration, workflow, and content management
Use a single authoring tool for all intranet, web, and extranet sites via unified enterprise portal design tools that customers use to author all Internet and extranet websites
STREAMLINE APPROVAL PROCESSES
Keep common forms in a central location, to enable operational collaboration from both headquarters and remote locations via categorized forms libraries and document libraries
Provide a centralized, collaborative proposal document library via collaborative workspaces that are integrated with desktop productivity applications, document and content locking, and versioning capabilities
Distribute documents created by the headquarters to remote employees based on their roles, and track delivery and follow-up on documents that are required reading via centralized, workflow-based document distribution and review
Automate proposal work coordination and document handling via centralized collaborative workflows that are supported by workflow management and document workflows
Create a culture of compliance for all critical documents, and assure receipt and review auditing based on how critical a document is via rules and role-focused, workflow-based document review
Streamline and automate proposal generation via automatically populating XML proposal templates
INCREASE ENVIRONMENTAL SUSTAINABILITY
Allow employees in branch offices to travel less frequently to central offices for meetings via communication tools such as voice mail, audio/video conferencing, and secure instant messaging (IM); collaboration tools such as workspaces with document management that interoperates with desktop productivity applications; and online and offline email
Make remote workers more productive with key data or systems via secure remote access
Allow employees to telecommute as often as possible without diminishing performance via communication tools such as web/audio/video conferencing, software-powered voice over Internet Protocol (VoIP), secure IM, email, and voice mail on a browser or mobile device; collaboration tools such as support for offline documents, search for documents and people, and calendar and task management
Show when telecommuting employees are available via presence-based call management and IM on a browser or mobile device
Enable a roaming workforce with the flexibility to work from home, satellite offices, or permanent desks via presence-enabled LOB applications; integrated web/audio/video conferencing; unified inbox with voice mail, email, and fax; and federation of communication information
Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.
Integrated Capability Support for Priority Business Capabilities
AgendaAgenda
Recap Business Discussions
Integrated Capability Approach
Summary and Next Steps
Needed Integrated Capabilities
IT Business
Today Future
Dynamic business agilityand low TCO
Optimizing Finance Operations
Multiple Enterprise Solutions
Point solutions
Siloed, disconnectedtechnology
investments
High TCO | Low agility
Sales Effectiveness
Improving Customer Service
Integrated capabilities
Why the Integrated Enterprise Platform Approach?
Supporting Microsoft Technologies
Client Capabilities
Business Solutions
Solution Areas
Infrastructure Capability Integration
Infr
astr
uctu
re O
pti
miz
ati
on
Infrastructure Optimization Models
Infrastructure Optimization Models
Business Productivity Infrastructure Optimization Model
Collaboration
Messaging
Unified Communications
Content Creation and Management
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Application Platform Optimization Model
BI and Analytics Platform
Database and LOB Platform
Custom Development
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Core Infrastructure Optimization Model
Datacenter Management and Virtualization
Device Deployment and Management
Identity and Security Services
IT Process and Compliance
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Business Solutions
Solution Areas
Infrastructure Capability Integration
Infr
astr
uctu
re O
pti
miz
ati
on
Infrastructure Optimization Models
Infrastructure Optimization Models
Business Productivity Infrastructure Optimization Model
Collaboration
Messaging
Unified Communications
Content Creation and Management
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Application Platform Optimization Model
BI and Analytics Platform
Database and LOB Platform
Custom Development
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Core Infrastructure Optimization Model
Datacenter Management and Virtualization
Device Deployment and Management
Identity and Security Services
IT Process and Compliance
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Client Capabilities
Relationships Between Integrated Capabilities
Business Solutions
Solution Areas
Infrastructure Capability Integration
Infr
astr
uctu
re O
pti
miz
ati
on
Infrastructure Optimization Models
Infrastructure Optimization Models
Business Productivity Infrastructure Optimization Model
Collaboration
Messaging
Unified Communications
Content Creation and Management
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Application Platform Optimization Model
BI and Analytics Platform
Database and LOB Platform
Custom Development
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Core Infrastructure Optimization Model
Datacenter Management and Virtualization
Device Deployment and Management
Identity and Security Services
IT Process and Compliance
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Application Platform Optimization
Integrated Enterprise Platform
Client Capabilities
Business Productivity Infrastructure Optimization
Core Infrastructure Optimization
Each capability has four levels of maturity:
BasicStandardizedRationalizedDynamic
What are these used for?Profiling integrated capabilities, leading to model common capabilitiesUnderstanding dependenciesPlanning advancement in services provided to lead to enterprise-class capabilities
Optimization Model Capability Maturity Levels
Infrastructure Optimization Models
Infrastructure Optimization Models
Business Productivity Infrastructure Optimization Model
Collaboration
Messaging
Unified Communications
Content Creation and ManagementD
YN
AM
IC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Application Platform Optimization Model
BI and Analytics Platform
Database and LOB Platform
Custom Development
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Core Infrastructure Optimization Model
Datacenter Management and Virtualization
Device Deployment and Management
Identity and Security Services
IT Process and Compliance
DY
NA
MIC
RA
TIO
NA
LIZ
ED
STA
ND
AR
DIZ
ED
BA
SIC
Infr
astr
uctu
re O
pti
miz
ati
on
Multiple Solutions, One PlatformUse integrated capabilities for all of your business needs
Application Platform Optimization
Business Productivity Infrastructure Optimization
Core Infrastructure Optimization
Application Platform
OptimizationBusiness Productivity
Infrastructure
OptimizationCore Infrastructure
Optimization
Streamline the
budgeting and
forecasting process
Retain and attract
customers with a lean customer
support staff
Deepen business
insights less expensively
Spend less on corporate reporting
Decrease the cost of
publishing content to the
Internet
Streamline approval processes
Increase environmental sustainability
Application Platform
OptimizationBusiness Productivity
Infrastructure
OptimizationCore Infrastructure
Optimization
Operations
Human Resources SalesFinance
Multiple Solutions, One PlatformUse integrated capabilities for all of your business needs
Application Platform
OptimizationBusiness Productivity
Infrastructure
OptimizationCore Infrastructure
Optimization
Business Benefits IT Benefits
FamiliarityHigh user familiarityFaster adoption rateLower time to value
AgilityFast, efficient deploymentGreater integration
RobustnessConsistent featuresData integrationProcess integration
ScalablePerformance and reliabilitySecuritySupport skills and processes
Lower TCOCommon support skills and processesLower integration costsLow cost software
SustainableContinuity and long-term viability
Value of Integrated Capabilities from Microsoft
AgendaAgenda
Recap Business Discussions
Integrated Capability Approach
Summary and Next Steps
Needed Integrated Capabilities
IT Challenge: Align with Business Goals
IT Strategy and Business
Alignment
OperationsManagement
InnovationEnablement
Business Strategy and
Goals
Cost center More efficient cost center
Business enabler Strategic asset
Time
Valu
eOptimizing the Integrated Enterprise Platform
Sophistication of the Solution
Phase 1
Provides basic support for the most critical elements of the business driver
Phase 2
Provides adequate, typical support for critical and priority elements of the business driver
Phase 3
Provides thorough, streamlined support for the business driver that enables differentiated levels of performance
DEEPEN BUSINESS INSIGHTS LESS
EXPENSIVELY
STREAMLINE APPROVAL PROCESSES
DECREASE THE COST OF PUBLISHING CONTENT TO THE INTERNET
SPEND LESS ON CORPORATE REPORTING
INCREASE ENVIRONMENTAL SUSTAINABILITY
RETAIN AND ATTRACT CUSTOMERS WITH A
LEAN CUSTOMER SUPPORT STAFF
STREAMLINE THE BUDGETING AND FORECASTING PROCESS
Phase 1: Core IOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
Datacenter Mgt and
Virtualization
Data Center Mgt & Virtualization
A defined software library exists. Deployment and management of software updates are tool based. Capacity management processes are manual and reactive, resource utilization and capacity are monitored periodically. The organization actively uses virtualization to consolidate resources for production workloads. Performance monitoring of physical and virtual hardware with defined SLAs; health monitoring of applications; supported across heterogeneous environments with manual remediation. IT services are audited for compliance based on documented company and industry-standard policies (HIPAA, SOX, and PCI); reports are generated monthly. Services are available during server failure (e.g. server clustering, hot spares, and/or virtualization recovery solution).
Server Security
Malware protection is centrally managed across server operating systems within organizations, including the host firewall. Protection for select mainstream/non-custom applications and services (such as e-mail, collaboration and portal applications, instant messaging), if available, is centrally managed. Integrated perimeter firewall, IPS, Web security, gateway anti-virus, and URL filtering are deployed with support for server and domain isolation; network security, alerts, and compliance are integrated with all other tools to provide a comprehensive scorecard view and threat assessment across datacenter, application, organization, and cloud boundaries. Remote access is secure, standardized, and available to end users across the organization.
Networking Redundant Domain Name System servers exist to provide fault tolerance. Dynamic Host Configuration Protocol servers are network-aware and with support for auto configuration. IPv4 for main transport services, using IPv6 for some transport services (eg. to achieve larger address range).
Storage Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite, with fully tested recovery or failover based on service-level agreements.
Device Deploymen
t and Manageme
nt
Device Mgt & Virtualization
Software distribution to local and geographically dispersed users is automated. System and security updates are distributed and installed automatically for desktop systems. Mobile device access configuration is automated and is pushed over-the-air. A solution is in place to configure and update devices. Mobile phones are used for over-the-air synchronization with e-mail, calendar, and contacts. All mobile access to internal systems is through a proxy technology (such as a messaging system and/or selective SSL).
Device Security Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall; non-PC devices are managed and protected through a separate process.
Identity & Security
Services
Identity & Access
To control access, simple provisioning and de-provisioning exists for user accounts, mailboxes, certificates or other multi-factor authentication methods, and machines; access control is role-based. Password policies are set within a directory service to enable single sign on across boundaries for most applications. Password resets through internal tools or manual processes. A centralized, group/role based access policy is defined for business resources, applications, and information resources, managed through industry accepted processes. Most applications and services share a common directory for authentication across boundaries. Point-to-point synchronization exists across different directories.
Information Protection & Control
Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and e-mail); policy templates are used to standardize rights and control access to information.
IT Process & Compliance
IT policies are documented for each IT service. Each IT service has a process to manage bug handling and design changes; IT services are tested according to defined test plans based on specifications. IT service release and deployment processes are formally defined and consistently followed. Each IT service provides service-level and operational-level agreements. Monitoring, reporting, and notifications are centralized for protection against malware, protection of information, and identity and access technologies. Risk and vulnerability are formally analyzed across IT services; IT compliance objectives and activities are defined and audited for each IT service.
Phase 1: BPIOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
Collaboration
WorkspacesWorkspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices; offline synchronization is supported. Team members can simultaneously author, edit, and review content across Clients (including Devices). IT driven onboarding; Integration with directory services for group level onboarding, training for users is available.
Portals
Users and groups can publish content directly to some portals; workflow for review and approval is built-in and automated. Users have widgets to customize their views of information; enterprise search is integrated with portals. Portals (enterprise, departmental, and personal) are provisioned by IT and are deployed on a single productivity infrastructure; governance policies are fully in place, including single sign-on supported by uniform directory services. Line-of-business applications are routinely surfaced through the portal and have the capability to write securely to back-end systems and to maintain data integrity; information from multiple applications can be combined in dashboards.
Social Computing
Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide; communities, if present, are largely through e-mail or are driven by forums. Social feedback is generally limited to comments in e-mail, forums, or within individual documents. Personal profiles are available but cannot be customized; users can publish content on personal shared sites; people can be located based on profile information; the system sorts search results for people by users’ social graphs, which can be refined by using metadata; news feeds are typically delivered through RSS or e-mail alerts.
Project Mgt
Information access Most unstructured information from intranets, e-mail, and content management repositories is indexed; some structured content from databases, people, and expertise information is indexed.
Interactive experience and navigation
Messaging The e-mail platform supports message encryption (S/MIME) to enable digital signatures. Secure, remote, online and offline access to rich mailbox and calendar functionality exists inside and outside the firewall.
Unified Communic
ations
IM/PresenceUsers have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall; peer-to-peer voice and video communications are based on a single directory. Online presence information (automatically refreshed user availability information based on communications, log-on, and calendar activities) is integrated into the e-mail client.
Conferencing
Secure Web conferencing is managed by IT, has policy-based access control, uses a single directory, and is available from PCs and Web browsers inside and outside the firewall; an enterprise-wide, standalone audio conferencing service is also managed by IT. A standalone audio conferencing service is available enterprise-wide and is managed by IT. Desktop video conferencing is available outside the firewall only through room-based systems, and using methods such as virtual private networking and remote access services that are managed by IT; the end-user experience is disconnected (requires specialized end-user devices or applications).
Voice
Voice communications are based on a hybrid telephony infrastructure (IP and legacy time division multiplexing) that has limited integration with PCs and desktop applications. Voice mail is available online and offline from the e-mail client but messages are stored separately, there is no unified directory, and messages can be kept private only by caller request. Redundant call control servers within a cluster or pool provide resilience when failure occurs at a single point.
Content Creation
and Manageme
nt
Information Mgt Managed workspaces exist at the departmental level and are available from individual productivity applications. Metadata capture is enforced; however, the capture process is manual and labor-intensive.
Process Efficiency
Custom solutions developed by IT are used to deliver and manage key forms electronically; form data and scanned paper-based content are stored in a custom data repository. The organization uses basic workflow tools to process, review, and approve documents; simple workflow routing is part of the collaborative workspace infrastructure. Inbound and outbound communications are generated by automating productivity applications; IT creates custom connectors for line-of-business applications, so there is heavy reliance on IT to develop, manage, and maintain solutions; templates and output are centrally stored at the enterprise level but not managed as part of an information management strategy.
Compliance Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including e-mail; reporting occurs manually.
Authoring
Multi-Device Support
Interoperability
User Accessibility
Phase 1: APOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
BI and Analytics Platform
Business Intelligence
IT engaged to create interactive reports to meet specific business needs. Reports are generated on a scheduled basis or on demand by IT and are then shared on reporting portals. Users have some ability to subscribe to reports. A standardized approach is in place for IT to provision data sources for access to users to search across structured and unstructured content. A basic interactive search experience is provided to users that incorporates filter information based on common or explicit metadata. IT provides access for users to sanctioned data sources as database connections, data feeds, or static data dumps, upon which users can easily perform ad-hoc queries and data analysis using Excel or other analysis tools. Users can share their analyses via a BI portal. Users may have access to more advanced self-service analytics tools to perform data mining or predictive analysis without dependence on IT or a Data Analyst. Some level of automation is in place to render data pulled from enterprise systems on dashboards, but is used for only strategic or high profile projects. Dashboards have integrated interfaces to allow users to roll-up and drill-down on live data.
Data Warehouse Management
EDW is refreshed on a near real-time basis so that information is readily available to mission-critical applications, analytics, and reporting systems. A high degree of concurrency exists, with many users running complex queries and interacting with complex analytics tools simultaneously with data loading. Management and maintenance of storage, hardware, and supporting software is manual and ad hoc. Corporate policies are in place for data storage. Common data taxonomies are defined and used for manual data-cleansing activities. Data mart data structures are optimized for local reporting and analysis performance and user understanding, including use of star/snowflake schemas. Data marts feed a centralized data warehouse that effectively relays information across most key areas of the business. Loading of data into data marts and from data marts to the enterprise data warehouse includes automated transformations to reconcile and validate the integrity of the data. Consistency in data warehouse operation and maintenance across distributed data marts is improved through use of common tools, policies, and sharing of best practices, driven by the EDW team. SLAs emerge. Data changes can be planned through standard impact analysis, and effective collaboration occurs across data mart and EDW teams. An IT-managed BI environment is in place and applications at the department level integrate with departmental data marts. IT designs, implements, and manages data schemas that are optimized for localized self-service reporting and analysis tools.
Big Data
Information Services and Marketplaces
Database and LOB Platform
Transaction Processing
Data Management
Key high-value data has associated formal data management policies and processes. Data governance may be recognized on a siloed basis, but not as a corporate discipline. Data and asset inventories and dependency relationships are manually documented periodically. Access policies for data and objects in databases are defined but not centralized, and do not reference data classifications. Administrative tasks are still performed using an over-privileged account. Security management is performed on a server-by-server basis. Systems are in place for retention backup. Organizational/departmental policies exist for how long items are stored and what is stored.
Application Infrastructure
Standard service-based application architectures are being rationalized and implemented with appropriate governance. Applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. Applications use web services to communicate across application boundaries. Processes and infrastructure for managing service endpoints, service discovery, and routing of application messages is in place. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems. Components and services are explicitly tagged for reuse. A range of application services and infrastructure is provided across operating environments with central governance. A central engineering practices group co-sponsored by development and operations has formed and is providing valuable guidance to application development teams. Application developers consistently build applications using these application frameworks, so hosting, application services requirements, and management are predictable. Operating systems provide support for multiple application frameworks.
Custom Developme
nt
Internet Applications
Component and Service Composition
Enterprise Integration
Use of standardized processes for data integration is at the project level and technologies are used to improve back-end integration. The business leverages an integration broker running on-premises to connect to cloud applications using adapters. Application integrations leverage standard application messaging protocols and infrastructure to connect various applications running on-premises and in the cloud, connecting mission-critical data and transactions across enterprise applications. Centralized data integration strategies and tools are used across the enterprise.
Development Platform
The organization has selected and implemented a common set of frameworks for major application development and operating environment needs. Developer skill and use of standard frameworks is consistent. A central architecture and engineering practices group has formed with the participation of development and operations teams, and provides valuable guidance to development teams. A standard set of tools and common development approaches are used across multiple development teams in the organization. Developed applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems.
Application Lifecycle Management
Work-breakdown structures map estimated work to business value. Rudimentary metrics are used to manage project progress. Project managers aggregate data from standard status updates. Effective change management processes are in place. Testing has test harnesses and some automation, formal unit testing with good code coverage, and defined test strategy and processes. Explicit use of code quality tools typically occurs at the end of the development cycle. Processes are defined for debugging production defects and incidents, with a standard set of defect artifacts.
Phase 2: Core IOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
Datacenter Mgt and
Virtualization
Data Center Mgt & Virtualization
Service capacity and resource utilization are monitored continuously; analysis tools are used to predict the impact of proposed changes (software, hardware, usage, and topology); Workloads can be relocated manually. Chargeback is consumption based. Performance monitoring of applications as well as physical and virtual hardware pools with enforceable SLAs; Service health monitoring with consistent reporting across heterogeneous environments.
Server Security Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.
Networking Using IPv6 with IPSec for secure private communication over public network.
Storage Critical data is backed up by taking snapshots using a centralized, application-aware system.
Device Deploymen
t and Manageme
nt
Device Mgt & Virtualization
Users have self-service capabilities to find, request, and install approved applications appropriate to their roles. A unified solution offers a single view to manage security patches and to detect current and emerging malware, viruses, and other threats automatically; non-compliant systems are remediated automatically. Certificate provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Mobile access to internal systems is granted through a virtual private network (IP Security or SSL).
Device Security Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.
Identity & Security
Services
Identity & Access
Provisioning and de-provisioning of user and super-user accounts, certificates, and/or multi-factor authentication is automated. Multi-factor and certificate-based authentication are applied in some scenarios, such as remote access across boundaries (such as On Prem and Cloud). Self service password resets supported. A scalable directory that is integrated and automatically synchronizes with all remaining directories across multiple geographies and isolated domains for all applications with connectivity to cloud when applicable.
Information Protection & Control
Persistent information protection helps to enforce policy on sensitive data across boundaries, including data on mobile devices. Reporting is predefined for select server and back-office waypoints.
IT Process & Compliance
IT policies are integrated across all IT services, enabling or restricting use of resources as appropriate. IT service issues and design changes are tracked by using formal processes; testing is automated where possible. IT service release processes are uniform across IT services; deployment is automated and offers self service where possible; management reviews each service for readiness to release before deployment. Service-level and operational-level agreements are integrated for IT services; management reviews operational health regularly; some tasks are automated. Monitoring and flexible, tenant/service reporting are aggregated across individual areas for protection against malware, protection of information, and identity and access technologies. Risk and vulnerability analysis is integrated across all IT services; IT compliance objectives and activities are integrated across IT services and automated where possible; management regularly audits to review policy and compliance.
Phase 2: BPIOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
Collaboration
Workspaces Self service onboarding, integration with identity systems, training for users is mandatory and enforced.
PortalsPublishers can direct content to specific audience targets; portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity, role, and device on which content is consumed. Users get targeted information based on their profiles, their roles in the organization, and mobile devices being used.
Social Computing
Rating, tagging, and bookmarking are used broadly to share opinions about all kinds of content and are available from within productivity applications that are used to create content. Profiles are highly customizable; personal sites offer organizational, attention management, and public commenting capabilities; social networking and business productivity tools are integrated; enterprise news feeds complement RSS and e-mail alerts. Social networking capability is available via applications on mobile devices.
Project Mgt
Information access Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed; indexing processes incorporate browsing by people and ranking of expertise.
Interactive experience and navigation
An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.
Messaging The e-mail platform supports advanced, policy-driven message controls that include automatic application of rights protection. Secure, policy-driven access to a unified inbox from PCs, phones, and Web browsers exists inside and outside the firewall.
Unified Communic
ations
IM/PresenceOnline presence, IM, and peer-to-peer voice and video are in place (including multiple-layer anti-malware and contextual content filtering) and are accessible from PCs, phones, and Web browsers. Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.
Conferencing
Secure Web conferencing is managed by IT, has policy-based access control, uses a single directory, and is available from PCs and Web browsers inside and outside the firewall; an enterprise-wide, standalone audio conferencing service is also managed by IT. A standalone audio conferencing service is available enterprise-wide and is managed by IT. Desktop video conferencing is available outside the firewall only through room-based systems, and using methods such as virtual private networking and remote access services that are managed by IT; the end-user experience is disconnected (requires specialized end-user devices or applications).
Voice
Voice communications are secure, encrypted, extended to remote and mobile workers using different mobile devices and integrated within enterprise productivity and collaboration platforms. Voice mail is part of a unified inbox that features single storage and a unified directory; retention and protection policies are enforced by the organization; messages are available as voice or transcribed text and are accessible from PCs, phones, or Web browsers. Server pools that are split across data centers or replicated provide resilience to data centers when disaster occurs.
Content Creation
and Manageme
nt
Information MgtTraditional and new media content types are managed consistently in a single repository that has integrated workflow. Metadata is centrally managed and deployed across the business; metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created, published, and managed by business owners who use appropriate publishing workflows to govern review cycles.
Process Efficiency
Users are empowered to create and deploy electronic forms by using visual design tools; data from forms (stored in an open format) and scanned paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications. The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications; people can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time. Inbound and outbound communications are generated by scalable, server-based, automated processes; processes and line-of-business applications are integrated within a framework; templates and output are stored and managed at the enterprise level as part of an information management strategy that provisions core document and records management capabilities.
Compliance Policy management is based on content type, location, and document libraries, and includes adherence of content used offline; an integrated solution for electronic discovery of information is in place; retention policies and holds on records are automated.
Authoring
Multi-Device Support Key applications support optimized usage scenarios; for example, Web for reach, rich client for responsiveness, and phone for mobility.
Interoperability Core productivity applications support the ability to save files in open-standards approved formats.
User Accessibility
Phase 2: APOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
BI and Analytics Platform
Business Intelligence
Self-service reporting and analysis environment and tools established and maintained by IT. Access to data is decentralized but governed by IT with a well-defined process for stewardship and governance. Portals exist for dynamic reporting that supports rich report formats. Reports are generated with group or individual filter parameters and delivered via direct push or subscription and can vary by device. Users have the ability to share alerts and subscriptions with other users via limited collaboration and social networking. Users search for unstructured documents and structured reports based on metadata and content of reports. Using search on the BI portal allows users to find data, analyses, and reports, and users can launch tools for self service report generation and analysis from the search interface. From the BI portal, users are able to connect to internal and external data sources and combine them in a single report or data set for further analysis. Users can do sophisticated analysis and build rich BI applications using Excel or other analysis tools. BI portal has reporting and analysis capabilities that include exception highlighting, guided analysis, and predictive analysis with rich logic. Dashboards are consistently used to provide operational and strategic views of the business from real time or periodically refreshed data. BI portal experience has rich visualizations, dashboards and scorecards with full data interactivity (slicing, filtering, etc.) consistent with self service reporting and analysis tools. Users have the ability to create unique personal and/or shared views of data that are actually combinations of multiple views (i.e. mashups). IT provisions and provides access to infrastructure, statistical analysis and data mining tools, and common sanctioned data sources to Data Analyst roles to analyze business data and build models to enable future decisions, predict trends, find correlations in business attributes, etc. Data Analysts publish the results of their analyses to business users via reports, spreadsheets, charts, visualizations, etc.
Data Warehouse Management
Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. Data-cleansing tools are used to reconcile data through common taxonomies with trusted internal and external data sources and rules populated by expert business users. Data-cleansing tools are commonly embedded as an activity in business process automation, and are available directly to users for them to clean unmanaged data and information. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed. Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.
Big Data
Information Services and Marketplaces
Phase 2: APO Continued
Basic
Standardized
Rationalized
Dynamic
B S R D
Database and LOB Platform
Transaction Processing
Data Management
Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores.
Application Infrastructure
Application messaging services used by development are aligned with standard application operating environments. Development and operations teams have the skills required to effectively and consistently make use of these technologies.
Custom Developme
nt
Internet Applications
Component and Service Composition
Developers have tools that allow them to automate the creation of components usable by end users out of low-level services, and to publish them to the central repository and obtain basic metrics of usage. Tooling for solution assembly is simplified.
Enterprise Integration Applications leverage an application communication infrastructure deployed in operations that is actively managed and has dynamic routing capabilities.
Development Platform
The organization has selected and implemented a common set of frameworks for major application development and operating environment needs. Developer skill and use of standard frameworks is consistent. A central architecture and engineering practices group has formed with the participation of development and operations teams, and provides valuable guidance to development teams. A standard set of tools and common development approaches are used across multiple development teams in the organization. Developed applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems.
Application Lifecycle Management
Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.
Phase 3: Core IOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
Datacenter Mgt and
Virtualization
Data Center Mgt & Virtualization
Software and configuration library is maintained at current update levels with version control and auditing on demand. Software update management and auditing are policy-driven and monitored, including automated vulnerability detection. Isolation and remediation of vulnerable and non-compliant systems are automated. Policy enforcement occurs in near real time based on company and industry-standard polices that allow for immediate quarantine of non-compliant systems, and consistent compliance reporting and standards exist across all IT services.
Server Security Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.
Networking Using IPv6 with IPSec for secure private communication over public network.
Storage Critical data is backed up by taking snapshots using a centralized, application-aware system.
Device Deploymen
t and Manageme
nt
Device Mgt & Virtualization
Users have self-service capabilities to find, request, and install approved applications appropriate to their roles. A unified solution offers a single view to manage security patches and to detect current and emerging malware, viruses, and other threats automatically; non-compliant systems are remediated automatically. Certificate provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Mobile access to internal systems is granted through a virtual private network (IP Security or SSL).
Device Security Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.
Identity & Security
Services
Identity & Access Centralized IT offering of Federation services. Multiple Federation and trust relations between separate organizations 1 to 1 relationship.
Information Protection & Control Reporting for server, back-office, and end-user waypoints; analysis capabilities exist to provide investigation of critical incidents.
IT Process & Compliance
IT policies are integrated across all IT services, enabling or restricting use of resources as appropriate. IT service issues and design changes are tracked by using formal processes; testing is automated where possible. IT service release processes are uniform across IT services; deployment is automated and offers self service where possible; management reviews each service for readiness to release before deployment. Service-level and operational-level agreements are integrated for IT services; management reviews operational health regularly; some tasks are automated. Monitoring and flexible, tenant/service reporting are aggregated across individual areas for protection against malware, protection of information, and identity and access technologies. Risk and vulnerability analysis is integrated across all IT services; IT compliance objectives and activities are integrated across IT services and automated where possible; management regularly audits to review policy and compliance.
Phase 3: BPIOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
Collaboration
Workspaces Workspaces are centrally managed, support a hybrid on-premises and Web (cloud)-based infrastructure, and integrate fully with business applications; life-cycle management, including creation, discoverability, archiving, and retirement, is automated.
Portals
Portals support collaboration and information sharing across extranet and Internet sites in a hybrid on-premises and Web (cloud)-based infrastructure and through federated relationships with trusted partners. Portals and line-of-business applications are integrated and users can take them offline for changes and secure synchronization later; can access data from these LOB apps across mobile devices; users can combine data from disparate sources into composite applications without IT involvement; IT has the flexibility to create rich client applications and surface them within productivity applications that are used to create and integrate content with the system of record.
Social Computing Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This Content is accessible through multiple mobile devices.
Project Mgt
Information access A single platform provides an organization-wide search experience; structured data is incorporated and exposed in search-driven applications.
Interactive experience and navigation
An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.
Messaging Advanced policy controls are applied to mobile devices and applications; suppliers and customers have federated calendars; e-mail and contacts are integrated across the enterprise to support collaboration and are available to line-of-business applications.
Unified Communic
ations
IM/PresenceInstant messaging (IM) and online presence are federated to suppliers and customers across multiple devices, and integrated across line-of-business applications, which enables enterprise networking through expert search. IM and online presence are federated to suppliers and customers across multiple devices and integrated across line-of-business applications, which enables enterprise networking through expert search.
Conferencing A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.
VoiceVoice communications are integrated with other communications modes (such as e-mail, IM/online presence, and conferencing) and with line-of-business applications on a single platform. Voice mail is integrated with Unified Communications (IM and online presence, conferencing, and messaging) and extends to business processes and line-of-business applications; Voice mail is accessible from PCs, phones, and Web browsers.
Content Creation
and Manageme
nt
Information MgtTraditional and new media content types are managed consistently in a single repository that has integrated workflow. Metadata is centrally managed and deployed across the business; metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created, published, and managed by business owners who use appropriate publishing workflows to govern review cycles.
Process Efficiency
Users are empowered to create and deploy electronic forms by using visual design tools; data from forms (stored in an open format) and scanned paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications. The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications; people can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time. Inbound and outbound communications are generated by scalable, server-based, automated processes; processes and line-of-business applications are integrated within a framework; templates and output are stored and managed at the enterprise level as part of an information management strategy that provisions core document and records management capabilities.
Compliance Policy management is based on content type, location, and document libraries, and includes adherence of content used offline; an integrated solution for electronic discovery of information is in place; retention policies and holds on records are automated.
Authoring
Multi-Device Support Underlying capabilities such as instant messaging, communications, workflow, collaboration, and content management are available in each delivery mode as appropriate.
Interoperability Core productivity applications are integrated with workflows and validation engines, and support rendering changes made directly to files.
User Accessibility
Phase 3: APOBasi
cStandardiz
edRationalize
dDynami
c
B S R D
BI and Analytics Platform
Business Intelligence Symbiotic relationship and process between self-service and managed BI. IT has visibility into self-service activities that it uses to recommend and guide the enhancement of the managed BI environment and data structures that support self-service.
Data Warehouse Management
Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. Data-cleansing tools are used to reconcile data through common taxonomies with trusted internal and external data sources and rules populated by expert business users. Data-cleansing tools are commonly embedded as an activity in business process automation, and are available directly to users for them to clean unmanaged data and information. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed. Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.
Big Data
Information Services and Marketplaces
Database and LOB Platform
Transaction Processing
Data Management
Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores.
Application Infrastructure
A common application messaging services infrastructure is in place and well managed for larger mission-critical applications. Business processes follow a model-driven, dynamic approach. IT manages a SOA-based application infrastructure, comprised of LOB back ends and composite applications that extend them and has complete monitoring of integration scenarios across the cloud and on-premises applications.
Custom Developme
nt
Internet Applications
Component and Service Composition
Developers have tools and access to advanced portal frameworks to enable loosely coupled messaging between application components, enabling a seamless, coordinated user experience across application components as they interact with one or more of the components.
Enterprise Integration End-to-end dynamic integration enables more complete automation of data and processes to increase business efficiency. Standardized platforms enable developers to build real-world SOA with built-in governance across enterprises.
Development Platform
Use of standard application services supported by the operating application infrastructure environment is maximized. Architectural layering is enforced as part of code delivery and build automation. Engineering of infrastructure and central application services is performed jointly by development and operations teams, resulting in complete symmetry between development and operating environments. Development work management tools are integrated with operations incident management systems. A large number of application characteristics can be modified by changing configuration, not changing code. Complex customizations and extensions use defined solution extensibility models.
Application Lifecycle Management
Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.
AgendaAgenda
Recap Business Discussions
Integrated Capability Approach
Summary and Next Steps
Needed Integrated Capabilities
Reduced complexity, IT support time, and training costs for remote personnel from streamlined tools that support their work
Data is created and stored electronically
Data is delivered across multiple business units and departments
Users can develop detailed, contextual reports without involving IT
IT can provide an audit history or trail and a log of changes
Easy accessibility to an organization's documents, records, and other content that is stored in a centralized and managed environment
IT Benefits of the Integrated Capability Approach
Is a key driver of business productivity and growth
Fuels profitable revenue growth
Gives managers more insight and control
Encourages employee productivity
Benefits of Optimizing IT Capabilities
Grow revenue 6.8% faster per year than their peers in the bottom 25% of IT capability.
Enjoy 23% higher revenue per employee than their peers in the bottom 25% of IT capability.
Achieve superior productivity (a company’s IT infrastructure is a key determinant).
Have significantly better insight into, and control over, key dimensions of their business.
Source: Enterprise IT Capabilities and Business Performance, Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School George Favaloro, Principal, Keystone Strategy, Inc-March 2006, http://www.microsoft.com/business/enterprise/itdrivesgrowth.mspx
Optimized IT… Companies in the top 25% of IT capability…
Engagement Approach
Audience
Solution road map
Solution areas Industry Horizontal
Business strategy
Integrated Capability Analysis => Projects, architecture, products
1. Present relevant integrated capabilities
2. Position the Integrated Enterprise Platform approach
Busi
ness
exe
cuti
ves
1. Understand business needs and priorities
2. Discuss range of potential solution capabilities
ITexe
cuti
ves
Arc
hit
ect
s IT
pro
/dev
exe
cuti
ves
Integrated Capability Analysis
Ensure target business capabilities cover process improvement priorities
Translate business capabilities into required infrastructure capabilities
Assess current infrastructure maturity
Determine gaps to target integrated capabilities
Build a road map for integrating capabilities and implementing solutions
Specify required platform architecture, technologies, and services
Baseline the Microsoft platform road map
Next Steps
Integrated capability analysisExplore the Integrated Enterprise Platform
Create a high-level implementation road map
Identify resources in your organization
Business analysts
Solution architects
Platform architects
Infrastructure architects
IT infrastructure managers
IT operations managers
Review the technology road map
Translate into a solution capability road map to review with the business
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing
market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.