Remote Infrastructure Optimization

Size: px
Start display at page:

Download "Remote Infrastructure Optimization"

Transcription

1 Four best practices that lead towards an optimized remote site infrastructure Remote Infrastructure Optimization Four best practices to streamline front-line IT capabilities Remote Infrastructure empowers the frontline of your organization: Stores Bank Branches Medical Facilities Hotels Restaurants Factories Schools Utility Sites Field Offices REMOTE INFRASTRUCTURE OPTIMIZATION

2 Introduction Today, your remote sites are more important than ever. In banking, 80 percent of new products or services are obtained at the branch. Yet many organizations (like stores, banks, hotels, schools, factories, and field offices) must catch up from reduced remote infrastructure investments resulting from the Internet wave. Adding to the challenge, Internet offerings have increased pressure on Remote Infrastructure is margins and expectations for click and mortar integration of information across channels (Web, The front line of the organization. local, and phone). To spread fixed physical costs, remote locations are pressured to offer more solutions and services (often with partners) and to increase responsiveness to ever-changing A critical customer interface, business conditions. where business is won or lost. As customers demand better, faster, tailored products and services at the lowest possible cost, Distributed and distant from businesses with large networks of remote locations are pressed to optimize their IT infrastructures the data center. to meet these demands in order to succeed. Critical challenges that CIOs face are: Workplace of 80 percent Cost Control Remote infrastructure is becoming increasingly complex, distributed, and of employees. expensive. IT management and support costs are outpacing hardware and software expenses. Yet IT staff is increasingly centralized and budget constrained, on-site technical support is rare to nonexistent, and local technicians are very expensive. 1/3 of IT spending. Home to 25 percent of servers. Security Threats of data breach, targeted attacks, and viral system disruption are multiplying in frequency, type, and damage impact. Regulatory and disaster preparedness requirements are growing; the risks are increasing, and more frequent updates are required for protection. Agility Competition in the digital age produces an ever-growing need to deliver, use, and capture information at the point of service about customers, products, partners, and processes that is fresh, actionable, and integrated. IT must respond by delivering these capabilities within a tightening timeframe, before they are commoditized. Faced with these challenges, many IT managers undertake point-solution projects aimed at solving the most pressing needs while incrementally adding to overall system complexity and cost. These managers often focus on short-term measures of performance like hardware and software costs, overlooking longer-term TCO and IT management costs. Many companies are taking a more structured approach to IT infrastructure optimization one that allows for step-rate improvements while considering the impacts on the system as a whole. The Microsoft Infrastructure Optimization Model One way to do this is through the Microsoft Infrastructure Optimization (IO) Model, which helps enterprises understand the current state of their IT infrastructure and devise a roadmap to increase business capabilities and agility. The Microsoft Infrastructure Optimization Model has been used to profile thousands of large organizations across all industries and geographies. By assessing the maturity of specific infrastructure capabilities, Microsoft identifies the process and strategic value in moving from a basic level of maturity (cost center) toward a more dynamic level where IT becomes a strategic asset and true business enabler. Basic Standardized Rationalized Dynamic Uncoordinated, manual infrastructure Managed IT infrastructure with some automation Managed and consolidated IT infrastructure Fully automated management, dynamic resources usage Cost Center Efficient Cost Center Business Enabler Strategic Asset Early progressions are accompanied by significant cost savings and improved service levels. As IT infrastructure is optimized for cost, the focus then shifts to enabling business competitiveness, with IT becoming a key strategic asset for the organization. The IO model addresses business productivity optimization, application platform optimization, and core infrastructure optimization (Core IO) REMOTE INFRASTRUCTURE OPTIMIZATION

3 Benefits of Infrastructure Optimization Progression The impact of infrastructure optimization can be dramatic. A recent IDC study 1 focused on server operational efficiencies in (remote) branch offices. While there is high variation between and within industries, based on customers surveyed, it identified: U.S. $67,957 per site savings in hardware and software. $8,014 per site savings from reduced bandwidth. 2.1 percent average user productivity increase percent reduction in IT support requirements (such as storage, setup, help desk). A separate study focused on desktops found that the cost of hardware and software is typically only 24 to 28 percent of the total expense. The labor associated with provisioning and managing PCs in a typical large organization is estimated by IDC 2 to be U.S.$1,320 per PC. However, by adopting certain best practices, this study found that this figure could be reduced to $230 a savings of 80 percent. In addition, service desk calls were reduced by 8 percent, and business applications were deployed 20 percent faster. Remote Infrastructure Optimization Benefits Within the Core IO Model, Remote Infrastructure Optimization outlines elements that are tailored to remote sites to help develop a progression roadmap. Against the remote infrastructure challenges outlined above (cost control, security, and agility), Remote Infrastructure Optimization offers the following benefits: Cost Control Security Agility Reduce onsite support by centralizing remote infrastructure management Simplify backup and restore with a centralized, automated, near-continuous backup of server and desktop data to disk Use site hardware and bandwidth more efficiently with server and application virtualization Increase remote data and access security through centralized security management and tight integration with existing infrastructure Help protect systems by preventing misconfiguration and deploying security pervasively Support secure connectivity by gaining a unified view into network security Improve existing infrastructure by consolidating hardware and integrating to existing systems Deliver new capabilities quickly by building an extensible environment Establish a platform for future by enhancing server capabilities to extend life of existing hardware These benefits are supported by the four best practices discussed in this paper. Each best practice incorporates several specific projects from the Microsoft Core IO Model, which provide a bridge between IO maturity levels and are detailed at Best Practices This document explains how the four best practices below increase Core IO maturity for Remote Infrastructure and deliver benefits in controlling costs, strengthening security, and driving agility. 1. Centralize remote infrastructure management. 2. Automate central backup. 3. Establish comprehensive integrated security. 4. Integrate remote hardware infrastructure. Each best practice has specific Core IO projects appropriate to each level of the IO model maturity progression. Profiling your organization may assist in prioritizing which best practices should be addressed most urgently. Combined with the right software tools, well-defined policies, and documented processes, these best practices support a well-managed, secure remote IT infrastructure and streamline efforts to maintain it. Each best practice is explored in turn, outlining the issue it addresses, leading practices, benefits, and evidence. The following pages also show how Microsoft products support each practice. 1 IDC white paper Addressing Operational Efficiencies in Branch Offices, May 2006, Jean S Bozman, et. al. 2 IDC white paper Optimizing Infrastructure: The Relationship between IT Labor Costs and Best Practices for Managing the Windows Desktop, October 2006, Al Gillen, et. al. REMOTE INFRASTRUCTURE OPTIMIZATION

4 1. Centralize Remote Infrastructure Management Minimize site visits, deploy faster, and take advantage of up-to-date software Site Visits Deployment Speed Awareness & Response Patch & Configuration Security The Remote Infrastructure Management Challenge Typically, remote sites have few or no local IT skills on-site, and need remote technical assistance to add, update, or repair computer resources, to access key operational data, and to resolve system outages. As a consequence, remote infrastructure support consists of site visits, non-technical employees, and local consultants. Site visits by central or regional IT create require travel time and expense. They may require a day or more per site, depending on travel time and density of locations visited. Non-technical employees may be used as the eyes and hands of IT, guided by phone, written instructions, or auto-install disks. Effectiveness and risk are the issues here, with potential for avoidance, confusion, mistakes, noncompliance, or disaster. VARs, system integrators, or consultants may be called in, particularly for distant sites. High cost and low consistency across sites are the major difficulties with this approach. As a result, upgrades, patches, and maintenance are delayed until a business need justifies the cost of rollout. This delay opens the door to security risk and keeps front-line employees from using the most up-todate tools: a lack of agility. Visibility into the remote system health is also limited, with user-reported failure often the first indication of trouble, and limited ability to respond quickly. Local stopgap fixes may hide potentially immobilizing problems. In addition, site actions can, over time, create marked variation in local configuration. Benefits Site visits will be reduced, saving IT pro labor, travel expense, and in-store support. The amount of savings depends upon frequency and cost of site visits today. In addition, automating software installation and upgrades increases each user s productivity by 5.6 hours per year, according to IDC 3. Perhaps even more valuable are benefits from decoupling software upgrades from an IT rollout schedule, providing applications, upgrades, and patches to employees as soon as they are available. System Center Management and Reporting Console Remote Infrastructure Management Asia Pacific Servers Software and Patch Deployment Monitoring and Response User Support All Servers Europe Servers Best Practice North AmericaServers Centralizing remote infrastructure management provides deployment, configuration, monitoring, and support solutions for remote servers and PCs. Deploy: From a central console, IT can deploy and configure applications, updates, patches, even operating systems. Monitor: Real-time feedback on the status of servers, networks, on-site devices, and operating performance can alert enterprise IT operations to problems, often before they affect remote users. Respond: Central IT can act on error codes; for example, resetting print servers, managing file space, responding to storage limits, and monitoring application health. Support: When users do have difficulty, the central help desk can help troubleshoot and support them with shared screen views and shared control to explain issues, or take direct administrator control without user input for advanced troubleshooting. Assess: By providing a log of failures and recoveries, IT may often determine in advance whether the problem can be dealt with by phone, through additional training of site personnel, or by on-site maintenance, repair, or replacement as necessary. Melborne Servers Singapore Servers Beijing Servers Hongkong Servers Vancouver Servers LA Servers NYC Servers Danver Servers Dellas Servers London London Servers Paris Servers Servers Rome Servers 3 IDC white paper Addressing Operational Efficiencies in Branch Offices, May 2006, Jean S Bozman, et. al REMOTE INFRASTRUCTURE OPTIMIZATION

5 Implement Remote Infrastructure Management with Microsoft Technologies Effective remote infrastructure management can be achieved with Microsoft System Center and Windows Server Microsoft Management Console products. Here is how: Microsoft System Center Configuration Manager 2007 Deploy: Provides comprehensive remote deployment and update capabilities to operating systems and applications, across physical and virtual clients, servers, and mobile devices throughout the distributed enterprise. Enhances control of the IT infrastructure with tools that help IT translate inventory data into rich reports to monitor deviation from a desired or standardized configuration. Microsoft System Center Operations Manager 2007 Monitor and Assess: Provides detailed remote monitoring and status reporting on servers (including SLA monitoring and business process monitoring), error reporting on PCs to track problem applications, and device error codes, supporting a proactive rather than a reactive response, and saving resources in IT and in the field. Windows Server 2008 Respond and Support: The Microsoft Management Console supports remote control of day-to-day administrative tasks, including print management, file share management, device management, network management, and other snap-in modules through a common interface. For example, the Print Management snap-in provides the status of printers and print servers on the network, Retailers can monitor the misread rate of tens of thousands of magnetic strip card readers in stores, alerting central IT of a device requiring maintenance well before the device fails. identifies error conditions, installs printers on PCs, runs scripts, and can even monitor toner and paper levels of some printers. Manage and Secure: The new Server Manager console eases the task of managing and securing multiple server roles across the enterprise, by providing a single source for managing a server s identity and system information, displaying system status, identifying problems, and managing all roles installed on the server. It also automatically configures default security settings for server roles as new servers are deployed. Case Study: Garanti Bank Centralizes Remote IT Management Organization Profile Garanti is one of the largest private banks in Turkey. Business Situation Garanti needed a centralized administration tool to help IT staff monitor some 800 servers, including more than 400 in branch offices. Garanti has a large IT infrastructure that includes extensive use of the Windows Server operating system and Microsoft SQL Server database software. Business Solution The company s technology subsidiary, Garanti Technology, uses System Center Operations Manager 2007 to provide event and performance management, proactive monitoring, alerting, and reporting on systems and applications. Benefits Garanti is benefiting because Operations Manager provides centralized management, enterprise-level performance, support for service level agreements, and ease of customization, so that internally developed applications can also be monitored. Before Operations Manager we didn t have a centralized tool. We now can monitor and manage the entire network and all of the servers from one location including applications. If a line-of-business application isn t working, people throughout the bank, including more than 400 branch offices, can t be working and helping their customers. Hakan Acu Systems Support Specialist Garanti Technology REMOTE INFRASTRUCTURE OPTIMIZATION

6 2. Automate Central Backup Reduce the cost of backup, simplify recovery for users, and enable disaster recovery Cost & Complexity Risk of Data Loss Recovery Time End-User Productivity The Challenge of Data Remote Backup IT managers find local backup and recovery to be one of the most complex, time-consuming, error-prone, and costly storage operations, in part because localized backup traditionally involves expensive hardware, software, tape or disk drives, and tape or disk media at each site; furthermore it requires people trained to manage the process. Data may be stored on-site or sent to storage (at risk of loss). Restoration is so difficult and time-consuming that it is rarely worth recovery for a single file. As a result, many remote sites have no backup solution or only sporadic, incomplete data capture. This exposes the enterprise to great risks, including compliance issues. Previous solutions are limited in providing effective backup for remote sites. Most enterprises don t have a disaster recovery strategy for their branch offices. - Forrester 4 These challenges, and best practices to address them, are explored in more depth in the table below. Remote Backup Challenges Local backup is expensive, time consuming, too technical, and error prone. It is a major driver of costs and complexity at branch offices and as a result local backups may not run regularly or successfully. Tape backup, local or centralized, is unwieldy and carries added risk of data loss. 97% of all tape restores are single files and 85% are less than 30 days old but this takes hours of IT professionals time and puts user productivity on hold. Best Practice Central backup reduces capital expenses as well as the operational expenses of local backup and recovery. IT can configure remote backup from a central console and because today s systems transmit only the data which changes, this is possible even with limited bandwidth. Automatic disk-based backup replaces tape, enabling recovery in seconds rather than hours, often by the end users themselves, with tape solutions reserved for much less frequent long-term archiving (a significant ongoing savings in tape media alone). Backup window/frequency is limited. Backups only run outside of operating hours, on a daily or weekly basis and many hours of work or transactions may be unrecoverable (leading to irate customers or end users). Near continuous backup, including open files, allows data to be preserved throughout the business day with multiple recall points as frequent as every 15 minutes. Benefits A centralized, automated, near-continuous backup of server and desktop data to disk, with capability for end-user initiated restore, will pay dividends on a daily basis and may even save the business, if disaster recovery becomes necessary at remote sites. An IDC survey 5 found: IT Labor Savings: 34 percent in file repair and restoration 34 percent in storage management 28 percent in disaster planning and recovery End-User Savings (a 1.3-percent productivity gain): 7.6 hours per year in backing up files 2.3 hours per year in restoring files 4 Forrester, The Evolving Branch Office: Intelligently Reducing your Network Infrastructure Footprint, 10/4/2006 Robert Whiteley, Stephanie Balaouras 5 IDC white paper Addressing Operational Efficiencies in Branch Offices, May 2006, Jean S Bozman, et. al REMOTE INFRASTRUCTURE OPTIMIZATION

7 Enterprises could solve many backup headaches by simply eliminating local backups and the requisite hardware infrastructure in favor of remote backups to a central site. - Leading analyst 2006 Implement Central, Automatic, Disk-based, Near-Continuous Backup with Microsoft Technologies Active Directory Domain Services Every 15 minutes online snapshots (up to 512) disk-based recovery tape-based archive Microsoft System Center Data Protection Manager 2007 Seamlessly automates integrated backup between disk and tape media, enabling IT to set and forget. Provides near continuous data protection with snapshots saved as often as every 15 minutes, eliminating the backup window (and supporting archive-to-tape anytime). Allows end users to recover their own files in seconds, simply by right-clicking the lost file in Windows Explorer or the Microsoft Office system, instead of burdening the help desk, and waiting hours to recover it from the previous night s tape. Protects Windows servers by continuously replicating data changes with application-aware agents, providing an easyto-manage and robust disk/tape data protection solution, and near zero data loss and application recovery, which is optimized for Microsoft Exchange Server, SQL Server, Microsoft Office SharePoint Server, and file and virtual server environments. Makes an ideal disaster recovery solution for distributed sites. Windows Windows file servers Desktops Microsoft Exchange Server Microsoft SQL Server Microsoft Office SharePoint Server Windows Server 2008 Hyper-V including clusters DPM 2007 server with tape library offline tape Case Study: San Francisco Unified School District Adopts New File Backup System, to Save $100,000 Organization Profile Among the largest school districts in the United States with about 58,000 students, the San Francisco Unified School District (SFUSD) employs more than 7,100 people, at over 160 schools. Business Situation The San Francisco Unified School District needed a reliable method for backing up important files. The district had used tape backups, which relied on schools to manually change tapes and check data. But even when files were recorded properly, tapes often failed. Business Solution To backup users files reliably and inexpensively, SFUSD adopted Microsoft System Center Data Protection Manager Monitoring from a central console helps administrators see potential problems before files are lost. Lesson plans and homework that previously took days to recover if they could be recovered at all are now easily retrieved in minutes by teachers and students, reducing the need for support calls. Because it won t have to hire additional staff or use tapes, the district expects to save U.S.$100,000 in the first year. It will save thousands more by combining System Center Data Protection Manager 2007 with other IT projects and repurposing hardware. Benefits: Saves an expected $100,000 Enables users to restore files easily Increases reliability and credibility Centralizes server-maintenance tasks DPM just solved problems. It didn t really have any problems that came with it amazing... We ll be spending less on backups than we actually would have without the product. We look at this project, and it s going to be saving money from day one. Eric Boutwell CIO, San Francisco Unified School District. REMOTE INFRASTRUCTURE OPTIMIZATION

8 3. Establish Comprehensive Integrated Security Reduce risk, by making security an integrated part of operations Risk of Data Breach Malware & Network Protection Security Management Cost Security Policy Compliance Remote Security Challenges Remote locations face multiple threats, increasing security requirements, and have limited help or oversight in managing a patchwork of complex security solutions. Particularly challenging issues for remote sites include the following: Limited Physical Security (theft or access) Protecting sensitive data in the event of hardware theft. Managing access control beyond traditional device- or location based security (such as Microsoft Public Key Infrastructure [PKI]), requiring solutions such as access cards or other strong authentication measures. Internal separation if hot-spot or other guest Internet or network access is made available to customers. Identity/Employee Turnover High employee turnover and temporary employees in some industries require quick, easy, secure identity management to avoid idling employees without access, or ID-sharing workarounds. - ID creation - Enabling/disabling system access - Password reset - Location transfers Simplify configuration of who has access to what. Network Connectivity/Edge Security Remote sites require secure and efficient connectivity to resources located in the corporate headquarters or data center. Remote sites connected to the Internet need to be protected from malware and other external security threats. Client Security Local PCs need antivirus, antispyware/malware, and antispam software; patching (OS and application); security updates; virus removal tools; and controls for phishing, content filtering, Web sites, and instant messaging. Server Protection Attacks target intrusions at the application layer, such as , Web servers, and online collaboration software. Increased threat motivated by criminal profit, targeting names, addresses, Social Security numbers, and financial data. Historically, IT security includes disparate products from several vendors, which requires multiple tools for management, reporting, and analysis. Many security products have poor interoperability and integration with the existing security and IT infrastructure. Properly deploying and configuring these complex security solutions can be challenging and time-consuming. A leading analyst found that 65 percent of all security breaches were due to mismanagement and misconfiguration. Facing these threats with a growing array of point-solutions and add-on tools is becoming increasingly time-consuming, expensive, and difficult to monitor. Without central management or reporting, central IT has little control or visibility into the remote network s overall security state. Best Practice and Benefits The business-critical nature of security calls for effective management and centralized policy control. Leading companies are pursuing an integrated, comprehensive, designed-in approach to security with centralized policy management, enforcement, and visibility. Security administration must become an integral, easy-to-manage part of IT operations. The benefits of comprehensive integrated security appear in: Reduced administration costs Meeting compliance requirements Avoiding the expensive nightmare of security breach IDC found that comprehensive client security can reduce costs by U.S.$130 per PC. This proactive approach to protect PCs with firewalls, antispyware, antivirus, mandated patching, and network quarantines will dramatically reduce IT labor costs and improve service levels. 6 Compliance with industry regulation, partner mandates, and audit requirements (SOX, PCI DSS, COBIT, Basel II, HIPAA, DOD , and others) adds to the security pressure. For example, the payment card industry (PCI DSS) now requires systems that transact credit card data to be secure and separate from all other processing. A single, significant breach may run into millions or even billions of dollars. Forrester 7 Estimates of the average cost of a security breach run from $167,000 8 to $4.8 million. 9 Integrate Security with Microsoft Technologies Microsoft is addressing the operational aspects of security through comprehensive, integrated, and simplified management the end-to-end securability of remote infrastructure: Centralize security management. Tighten integration with existing infrastructure. Prevent misconfiguration. Deploy security pervasively. Gain a unified view into network security REMOTE INFRASTRUCTURE OPTIMIZATION

9 The following products help provide this capability. Microsoft Forefront Microsoft Forefront Client Security detects and removes viruses, spyware, rootkits, and other emerging threats. Forefront Server Security products utilize a multi-engine architecture to protect specific server applications from malware. Microsoft Internet Security and Acceleration Server 2006 (ISA) and Microsoft Intelligent Application Gateway (IGA) 2007 offer a broad array of firewall, virtual private networking (VPN), and encryption technologies, to connect securely and cost-effectively over the public Internet. Forefront integrated management consoles offer familiar interfaces, ease of use, and integration with Microsoft tools like Windows Server Update Services. Forefront centralizes the collection and analysis of security management information. Microsoft System Center System Center Configuration Manager 2007 centralizes distribution of configurations, policies, and operating system updates. It reduces threat exposure with rapid automated patch and update, and provides Forefront deployment and antivirus updates for server and client hosts. System Center Operations Manager 2007 integrates Forefront outbreak reporting for threat analysis, and efficiently supports compliance monitoring. Windows Server 2008 Built-in capabilities for virtualizing servers establish secure compliant separation of the processing environment without adding a separate box (like PCI credit card processing). Virtualization can also protect logon access between guest (customer) users and employees. Data stored on servers can be encrypted to protect against confidentiality breach in the event of hardware theft. Microsoft Identity Lifecycle Manager 2007 integrates employee identity data for rapid changes in access control, to address the security impact of employee turnover. The Microsoft Active Directory Domain Service allows simplified Group Policy creation for remote users with Advanced Group Policy Manager and Active Directory Domain Services. Local logon enables access if the network connection is down. Read-Only Doman Controller increases security by providing delegated management for branch offices. Windows BitLocker Drive Encryption allows you to exercise additional control over data on a server s hard drive in less secure branch locations. Server Core provides options for installing select server roles, which consequently reduces the attack surface and the need for software updates. Addressing these issues makes the network more secure. It helps deploy security on the front lines where it needs to be, instead of simply where it is easiest to do so. Finally, the security administration console helps clarify what is happening across the network. IAG 2007 with Application Optimizers provides secure socket layer virtual private network, a Web application firewall, and endpoint security management that enable access control, authorization, and content inspection for a wide variety of line-of-business applications. Internet Security and Acceleration Server 2006 provides an integrated edge security gateway that helps protect IT environments from Internet-based threats while providing users with fast and secure remote access to applications and data. IT Security Scenario: Integrated Security Management Don, an IT security administrator for a 300-store electronics retailer, logged on to System Center Operations Manager 2007 to check the security status of the remote network. A new virus alert was reported and he wanted to ensure that the network was protected end-to-end. Viewing a few screens, he could see that patches and Forefront antivirus engine updates had gone out automatically, using System Center Configuration Manager 2007 to protect all servers and client PCs on the network. He could also review where this virus and other threats had been identified. The new WiFi network for customers had recognized the virus on customer PCs, but the servers were protected against the threat, and virtualization created full separation of the guest network from business applications. In addition, credit card processing ran in a separate virtual instance, which included Windows BitLocker Drive Encryption-encrypted storage drives. Don also reviewed the identities created for temporary Christmas hires. Last year configuring thousands of these accounts was a big time sink, but Identity Lifecycle Manager enabled these accounts in Active Directory Domain Services when approved by the HR system, and Group Policy Manager automatically configured access based on role, so Don now received no more calls from store managers about the backlog in adding or deleting employees. By integrating security and management, Don could focus on strategic new business capabilities rather than playing defense against the threat of the day. For example, a new buy on the Web, pick up in the store offering required store employees to have Web access; thankfully the Web-caching ability of Microsoft Internet Security and Acceleration Server (ISA) allowed this offering to be added without increasing store bandwidth requirements. Management was also quite pleased to learn that ISA allowed in-store PCs to be restricted to relevant corporate Web sites to sustain productivity. Security had become a true business enabler. 6 IDC white paper Optimizing Infrastructure: The Relationship between IT Labor Costs and Best Practices for Managing the Windows Desktop, October 2006, Al Gillen, et. al. 7 Forrester, Calculating The Cost Of A Security Breach, 4/10/2007 Khalid Kark 8 CSI/FBI Computer Crime and Security Survey Trusted Strategies, commissioned by Phoenix Technologies, Network Attacks: Analysis of Department of Justice Prosecutions , August 28, 2006 REMOTE INFRASTRUCTURE OPTIMIZATION

10 4. Integrate Remote Hardware Infrastructure Reduce cost, complexity, and risk of managing multiple boxes Hardware Related Costs System Capability Corporate Integration Business Agility & Interoperability Challenges in Remote Hardware Architecture Remote infrastructure is often a piecemeal, difficult-to-manage constraint to technical capabilities, but it can be transformed into a powerful strategic advantage. Remote architecture is often the result of a history of tactical, pointproduct solutions to specific business needs. Each site may be different, increasing complexity and reducing manageability. Many depend on legacy applications, which may be difficult or expensive (in development and employee training) to migrate to new platforms. Limitations in the existing environment are the most often cited barrier to delivering solutions to the critical point of customer interaction. The challenge grows as local use of information and devices increases and accelerates wireless devices, RFID, self-service kiosks, dynamic electronic/ video displays, and VoIP are just a few examples. This ever-increasing complexity is the outcome of solving tactical pains with tactical solutions. Nonetheless, branch locations demand choice a wide selection of best of breed solutions, along with the option to create their own solutions with a flexible interoperable platform. Best Practice Transforming remote infrastructure into a source of strategic advantage requires cutting through the complexity with hardware consolidation, and integration to existing systems and to new capabilities. Virtualize to consolidate hardware: Virtualization allows what today runs on multiple boxes from different vendors, with different operating systems and vintages, to be hosted on a single server. This reduces the costs of IT support, maintenance, licensing, and hardware upgrade; it increases reliability; and it simplifies the network. Application reliability increases, and testing is reduced by using separate virtual instances to avoid application incompatibility. Performance improves as prioritized tasks increase utilization on a more powerful, load-balanced processor. Virtualization enables applications to be independent of deployed hardware, establishing a flexible, responsive foundation for future capabilities. Consolidation to one or more servers also supports backup, disaster recovery, and extreme service level solutions such as clustering with failover. Integrate to existing systems: IT managers must bridge today s hardware to a future platform. A compatible solution which makes use of existing hardware (such as aging desktops) may defer capital expenditures by enhancing local capabilities for example, added file storage, application processing on servers using desktops as terminals, as well as wide-area network (WAN) management for low-bandwidth environments. This may provide a path to platform standardization across diverse sites (often the result of acquisitions) to reduce network complexity. Integrate to new capabilities: In establishing a common platform, extensibility is key to strategic advantage. Decision-makers and technical implementers must ask which systems host best-of-breed solutions, support new devices, incorporate industry standards, and provide ease of use for employees, to ensure advantage for years to come. Benefits Web Servers Domain Controller Remote Site Servers Server Virtualization Application Servers Remote Site Servers Web Servers Application Servers Domain Controller Virtual Server Microsoft-based operating systems are installed on 73 percent of retail point-of-sale systems in North America, and have risen to 77 percent of annual shipments. Consolidating remote infrastructure provides both short-term financial benefits in cost savings as well as long-term strategic benefits in business agility. IDC estimated over three years, the hardware and software cost savings would average $67,957 per branch office annually [in addition to saving] an average of $8,014 annually in bandwidth costs. 11 Having a flexible, interoperable, remote infrastructure in place may be of even greater value strategically in rapid business enablement. This provides the ability to experiment with and deploy new business tools, sales systems, and partnership offerings, on a short cycle time, without having to justify a major hardware investment. Integrate Remote Hardware with Microsoft Technologies In addition to the Core IO Model, the Microsoft Branch Office Infrastructure Solution (BOIS) guide provides detailed guidance on streamlining remote infrastructure, specifically in system architecture, application hosting considerations, and management processes. Find more information at: 10 IHL Consulting Group 2005 North American Retail POS Terminal Market Study 11 IDC May Microsoft POS for.net device redirection is supported only if the terminal server is running an x86-based version of Windows Server You can download Microsoft POS for.net 1.11 from the Microsoft Download Center at //go.microsoft.com/fwlink/?linkid= REMOTE INFRASTRUCTURE OPTIMIZATION

11 Choosing the Windows Server platform supports this best practice and utilizes the following products: Windows Server 2008 Interoperable by design, with a rich partner ecosystem, widely used developer tools, commitment to standards, and plug-and-play support to devices and peripherals. Provides a common platform between corporate headquarters and remote sites, with efficient data replication to reduce bandwidth requirements. Provides installation options for implementing select server roles such as Windows Server 2008 Hyper-V. Consistent, easy-to-use interface for reduced training, customer familiarity (such as self-service kiosks and devices), and potential connection to consumer devices (for example, the PDA). Built-in virtualization allows for multiple operating systems Windows, Linux, and others to run on the same server. Easy remote access and applications integration with local desktops enabling highly secure and seamless application deployment without the need for a VPN. Hosts most x86 operating systems, so custom applications on legacy OS (such as Windows NT Server 4.0 and Windows 2000 Server) or Linux can run on new hardware using Windows Server Microsoft System Center Microsoft System Center Virtual Machine Manager 2007 manages host configuration, virtual machine creation, library management, intelligent virtual machine placement, monitoring, rapid recovery, self-provisioning, and automation. System Center Operations Manager 2007 can monitor virtual or physical servers in the same environment. System Center Virtual Machine Manager 2007 reports virtual-tophysical machine relationships. System Center Data Protection Manager 2007 provides backup and restore to complete virtual machines while ensuring data consistency within the virtual environments during backup, often with zero downtime Windows Server 2008 Terminal Services Virtualizes presentation of entire desktops or specific applications hosted on the local server or data center, with enhanced desktop display capabilities that enable IT managers to make the remote computer look and feel more like the user s local Windows Vista desktop experience. Redirects Windows portable devices such as media players, based on the Media Transfer Protocol, and digital cameras, based on the Picture Transfer Protocol. Redirects devices that use Microsoft Point of Services (POS) for Microsoft.NET Installs line-of-business applications on a terminal server, makes them available through Remote Desktop Connection 6.0, and gives users a better experience with single-signon capabilities that eliminate the need to enter credentials each time a remote session is initiated. Microsoft Desktop Optimization Pack Microsoft Application Virtualization Microsoft Application Virtualization virtualizes applications and delivers them as an on-demand streaming service to desktop users. Microsoft Partner Solution ishaper TM ishaper from Packeteer accelerates delivery of applications and provides security, with management through a Windows-based wide area file service (WAFS) and a WAN optimization appliance. The ishaper appliance by Packeteer marries the best of real-time WAN optimization, monitoring, and shaping with WAFS, and provides key Microsoft services in one easy-to-manage unified branch office appliance to deliver great performance for every application voice, video, and data. Case Study: 7-Eleven On-Site Servers Provide Speed, Support and Savings Organization Profile 7-Eleven is the world s largest convenience store chain, with over 5,800 stores in the U.S. and Canada, and 19,500 licensed stores worldwide. Business Situation North American convenience store giant, 7-Eleven, needed to upgrade the server platform and application infrastructure of the core retail information system for its 5,800 stores. Business Solution At the heart of 7-Eleven s business is a distributed retail information system that runs on Microsoft Windows NT Server 4.0. Each store uses the system to evaluate and report sales, order inventory, and relay information to suppliers. To complicate matters, the array of devices in each store that the system must support credit card scanners, point-of-sale systems, check scanners, and even handheld computers to order merchandise. The system must integrate all of these devices and support new interfaces as stores adopt new hardware. Stores routinely add new devices, which developers must integrate into this retail information system. Benefits A detailed analysis led the company to conclude that a Windows-based platform would save 20 percent over Linux in total cost of ownership and reduce new-capability deployment time by 50 percent. These advantages, along with the partner community and device compatibility, made the choice of Windows Server an easy one. The needs of convenience customers change all the time so we needed a retail information system that enabled our IT and development staff to quickly introduce new products and services out to our stores... Reducing development time by half will allow us to anticipate customer demand, not just respond to it. Keith Morrow, Chief Information Officer, 7-Eleven, Inc. REMOTE INFRASTRUCTURE OPTIMIZATION

12 Achieving Remote Infrastructure Optimization Employing these best practices across your company will move your organization closer to infrastructure optimization, to control costs, boost security, and increase business agility. Site visits will be reduced with remote control management from central IT. Software will be be more up-to-date with automated patching, central configuration, and application rollout/update independent of site-visit requirements. Monitoring remote infrastructure will enable IT to be proactive in responding to issues, and more informed in providing solutions, leading to increased service levels. Automated central backup will reduce administration for IT and local sites, reduce risk of data loss, allow users to restore their own files, and support a disaster recovery solution for remote site data. IT security at remote sites will increase, reducing risk of malware disruption and data breach, as well as supporting compliance requirements. Remote site hardware may be consolidated, reducing costs and increasing capabilities. Business agility will increase with an integrated, interoperable, integrated platform. Getting Started Ask your Microsoft or partner representative to help you assess your Core IO maturity with the Infrastructure Optimization Assessment at: Jointly evaluate remote infrastructure opportunities for your organization. Prioritize infrastructure practices for your organization and identify specific Core IO projects for these practices to get started in moving toward a more dynamic infrastructure; find details at: Quantify the savings potential using the Remote Infrastructure Savings Calculator. For more information: Contact your Microsoft or partner representative, visit the product Web sites (above), or see the Remote Infrastructure Web site which includes: Remote Infrastructure Savings Calculator: Analyze your current IT investments with a customized savings report for implementing a Microsoft remote infrastructure solution. Planning Guide: Branch Office Infrastructure Solution (BOIS) for Microsoft Windows Server 2003 Release 2: In-depth guidance for decisions on whether to centralize services, standardize infrastructure, or consolidate servers. Integrating the branch office with Windows Server 2008: Learn about the underlying technology to simplify integration of branch office servers into your larger enterprise IT environment. Microsoft Technologies for Remote Infrastructure Optimization Remote server administration Server consolidation through virtualization with application OS neutrality Identity and access management Persistent information protection PC terminal services Systems monitoring Change and configuration management Backup and recovery Virtual machine management Client security Application server security Network edge security Secure remote access Microsoft Partner Solution WAFS and WAN optimization appliance The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred Microsoft Corporation. All rights reserved. Microsoft, Active Directory Domain Services, BitLocker, Forefront, SharePoint, SQL Server, Windows, Windows NT, Windows Server, and Windows Vista are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners REMOTE INFRASTRUCTURE OPTIMIZATION

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Windows Server Virtualization An Overview

Windows Server Virtualization An Overview Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Intelligent Infrastructure & Security

Intelligent Infrastructure & Security SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Everything Your Business Needs in a Server, Nothing it doesn t.

Everything Your Business Needs in a Server, Nothing it doesn t. Everything Your Business Needs in a Server, Nothing it doesn t. Ideal as a first server for small businesses with up to 25 users, Windows Small Business Server 2011 Essentials provides a cost-effective

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

A Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January 2009. www.microsoft.com/ government

A Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January 2009. www.microsoft.com/ government Federal Server Core Configuration (FSCC) A high-level overview of the value and benefits of deploying a single, standard, enterprise-wide managed server environment A Microsoft U.S. Public Sector White

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Cisco Security Services

Cisco Security Services Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Virtualization Essentials

Virtualization Essentials Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically

More information

Server Infrastructure Optimization

Server Infrastructure Optimization Best Practices to Reduce IT Operational Costs Abstract This paper shows technical decision makers and IT managers how organizations can reduce costs and improve their IT efficiency by optimizing their

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you You

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

Manufacturer to Enhance Efficiency with Improved Identity Management

Manufacturer to Enhance Efficiency with Improved Identity Management Microsoft Forefront: Security Products for Business Customer Solution Case Study Manufacturer to Enhance Efficiency with Improved Identity Management Overview Country or Region: United States Industry:

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

Virtualization with Microsoft Windows Server 2003 R2, Enterprise Edition

Virtualization with Microsoft Windows Server 2003 R2, Enterprise Edition Virtualization with Microsoft Windows Server 2003 R2, Enterprise Edition Microsoft Corporation Published: March 2006 Abstract Virtualization in the volume server market is starting to see rapid adoption

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise

Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise Providing Enterprise-Class Performance and Scalability and Driving Lower Customer Total Cost of Ownership

More information

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev WINDOWS SERVER SMALL BUSINESS SOLUTIONS Name: Marko Drev SMB Windows Server Family SOLUTION SERVERS TRADITIONAL SERVERS Complete server platform, integrated and optimized Customizable Server platform for

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Windows Small Business Server 2003 Upgrade Best Practices

Windows Small Business Server 2003 Upgrade Best Practices Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003

More information

Datacenter Management Optimization with Microsoft System Center

Datacenter Management Optimization with Microsoft System Center Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Desktop Virtualization Strategy

Desktop Virtualization Strategy Choosing the right solution for your needs ABSTRACT Several forms of desktop virtualization can help organizations satisfy users needs for mobility and flexibility, while relieving pressure on information

More information

CompleteCare+ Enterprise Voice

CompleteCare+ Enterprise Voice There s more to communications than email: Unified communication and collaboration, information sharing and team productivity services Contents 1. Executive Summary 2. Introduction Enterprise-level communications

More information

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Effective storage management and data protection for cloud computing

Effective storage management and data protection for cloud computing IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage

More information

MOBILIZE. Transforming Field Service Operations with Mobile Technologies. Microsoft Dynamics GP. White Paper

MOBILIZE. Transforming Field Service Operations with Mobile Technologies. Microsoft Dynamics GP. White Paper MOBILIZE Microsoft Dynamics GP Transforming Field Service Operations with Mobile Technologies White Paper Solutions that Help Transform Field Service Operations into Strategic Profit Centers Date: June

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

Global Outsourcing / Infrastructure Management. Instinct 2.0. Bridging the Gap between the Disparate Needs of Organizations and End-Users

Global Outsourcing / Infrastructure Management. Instinct 2.0. Bridging the Gap between the Disparate Needs of Organizations and End-Users Global Outsourcing / Infrastructure Management the way we do it Instinct 2.0 Bridging the Gap between the Disparate Needs of Organizations and End-Users Bridging the Gap between the Disparate Needs of

More information

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Michael Nowacki, CISSP - ISSAP. Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com

Michael Nowacki, CISSP - ISSAP. Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com Michael Nowacki, CISSP - ISSAP Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com More advanced Application-oriented More frequent Profit motivated Too many point

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

MaaS360 Mobile Service

MaaS360 Mobile Service Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.

More information

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:

More information

Enterprise Desktop Solutions: VMware View 4.5

Enterprise Desktop Solutions: VMware View 4.5 C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform

More information

Effective Storage Management for Cloud Computing

Effective Storage Management for Cloud Computing IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations

More information

VMware System, Application and Data Availability With CA ARCserve High Availability

VMware System, Application and Data Availability With CA ARCserve High Availability Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Virtualization Case Study

Virtualization Case Study INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Achieving PCI Compliance with Red Hat Enterprise Linux. June 2009

Achieving PCI Compliance with Red Hat Enterprise Linux. June 2009 Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Gaining Competitive Advantage through Consolidated POS Asset Management

Gaining Competitive Advantage through Consolidated POS Asset Management Gaining Competitive Advantage through Consolidated POS Asset Management 1 (6) Table of Contents 1. Executive summary... 3 2. Challenges in retail markets... 3 3. Miradore turns challenges into opportunities...

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

VMware Solutions for Small and Midsize Business

VMware Solutions for Small and Midsize Business SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs

Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs . White Paper Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs Executive Summary The concept of virtualization has gotten renewed

More information

Technical Overview of Terminal Services

Technical Overview of Terminal Services Technical Overview of Terminal Services Microsoft Corporation Updated: January 2005 Abstract Windows Server 2003 includes the Terminal Services features of Windows 2000, the client and protocol enhancements

More information

ACI ON DEMAND DELIVERS PEACE OF MIND

ACI ON DEMAND DELIVERS PEACE OF MIND DELIVERS PEACE OF MIND SERVICE LINE FLYER ACI ON DEMAND ACCESS TO THE LATEST RELEASES OF FEATURE-RICH SOFTWARE AND SYSTEMS, INCLUDING INTEGRATION WITH VALUE- ADDED THIRD PARTIES IMPLEMENTATION CONFIGURED

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Virtualization in Healthcare: Less Can Be More

Virtualization in Healthcare: Less Can Be More HEALTH INDUSTRY INSIGHTS EXECUTIVE BRIEF Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.healthindustry-insights.com Virtualization in Healthcare: Less Can

More information

How Microsoft Technologies, System Center and Windows Vista Improve Supporting and Maintaining the Desktop

How Microsoft Technologies, System Center and Windows Vista Improve Supporting and Maintaining the Desktop How Microsoft Technologies, System Center and Windows Vista Improve Supporting and Maintaining the Desktop Teesak Chinpairoj Partner Technology Specialist Microsoft Thailand Agenda Advances in Windows

More information

Datacenter Management and Virtualization. Microsoft Corporation

Datacenter Management and Virtualization. Microsoft Corporation Datacenter Management and Virtualization Microsoft Corporation June 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery ADVISORY Top 10 Reasons for Using Disk-based Online Server Backup and Recovery INTRODUCTION Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

Prepared for: The American Association of State Highway and Transportation Officials. Julian Soh Microsoft Corporation. Julian.Soh@microsoft.

Prepared for: The American Association of State Highway and Transportation Officials. Julian Soh Microsoft Corporation. Julian.Soh@microsoft. Prepared for: The American Association of State Highway and Transportation Officials Julian Soh Microsoft Corporation Julian.Soh@microsoft.com This is a directional view into Windows investments for businesses

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE

More information

Windows Server 2012 2,500-user pooled VDI deployment guide

Windows Server 2012 2,500-user pooled VDI deployment guide Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution

More information

WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com

WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com WHITE PAPER Citrix XenDesktop Cost savings with centralized virtual desktops www.citrix.com Introduction Centralized virtual desktops optimize the efficiency, security and flexibility of any PC environment.

More information

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES TABLE OF CONTENTS Introduction... 3 Overview: Delphix Virtual Data Platform... 4 Delphix for AWS... 5 Decrease the

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

SERVER CAL SUITES COMPONENT PRODUCT SPECIFIC DETAIL. Product

SERVER CAL SUITES COMPONENT PRODUCT SPECIFIC DETAIL. Product Windows Server 2003 R2 CAL Component Key Benefits Core CAL Dependable- Windows Server 2003 is the fastest, most reliable, most secure Windows server operating system ever fered by Microst. ive- Windows

More information

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

MANAGED SERVICE PROVIDERS SOLUTION BRIEF MANAGED SERVICE PROVIDERS SOLUTION BRIEF The Assured Recovery Services Platform The data protection world has drastically changed in the past few years. Protection and recovery of data and systems has

More information

This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties,

This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties, This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties, express, implied or statutory, as to the information

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

Understanding How to Choose a Database Platform for Siemens PLM Software s Teamcenter

Understanding How to Choose a Database Platform for Siemens PLM Software s Teamcenter Understanding How to Choose a Database Platform for Siemens PLM Software s Teamcenter White Paper Published: April 2009 For the latest information, see http://www.microsoft.com/sqlserver/2008. Copyright

More information