Infrastructure Architecture Blueprint. 26 January 2011
|
|
- Wilfrid Webster
- 8 years ago
- Views:
Transcription
1 Infrastructure Architecture Blueprint 26 January 2011
2 Contents Introduction to Infrastructure Architecture Blueprint Current Environment Overview Infrastructure Architecture Framework Strategic Recommendations Proposed Strategies and Implementation Approach for Infrastructure Architecture Blueprint Implementation Roadmap Proposed Governance Structure 1
3 Current Environment Overview and dframework
4 Current Environment Overview Disparate network services & connectivity Disparate data centre & disaster recovery centre infrastructure Non-standard end-user computing standards High cost of maintenance Inefficiencies in ICT infrastructure operations Non optimised resource utilisation 3
5 KPMG Technology Framework 4
6 Strategic Recommendations and dimplementation Approach
7 To Be Strategies Overview Objective To increase public sector productivity, add value to services and improve efficiencies through a whole-of- of government approach on ICT infrastructure. Areas of Concern Public Sector ICT infrastructures are currently not fully optimised due to redundancies and inefficiencies resulting from disparate ICT Infrastructure. Strategy Consolidation of Public Sector Network Consolidation of Data Centres and Disaster Recovery C t Establishment of Public Sector Cloud Computing Infrastructure re Standardise End User Computing Infrastructure Development of Common Security Infrastructure Deployment of Mobile Computing Solutions Increasing Usage of Open Centres Infrastructure Solutions Source 6
8 Strategies Implementation Methodology Laying the Foundation Pilot Projects Implementation & Roll-out Establish governance, roles and responsibilities. Define policies, procedures, processes and standards. Gather public sector & agency requirements. Establish change management plan. Conduct current environment assessment. Selection of pilot site. Impact assessment of pilot implementation. Implementation on pilot site. Post implementation review to identify areas of improvement. Plan enhancement based on lessons learned. Project roll-out to agency sites. Establish project management and monitoring. Establish performance measurement processes. Conduct impact assessment study for benefits realisation. Continuous improvement. 7
9 Strategy 1: Consolidation of Public Sector Network To support policy purpose specified in RMK10 - Consolidation of WAN. Integrated whole-of-governmentof network connecting federal, state and local government. Agencies may access government applications from any government office locations. Agencies may access all government applications from a single network access. Foundation to enable infrastructure consolidation & support future technology infrastructure (e.g. cloud computing). Key Benefits Reduced cost of procurement and services. Increased responsiveness to organisational change. Enhanced service standards. Greater assurance of interoperability and security. New opportunities for more efficient information sharing. 8
10 Strategy 1: Consolidation of Public Sector Network Implementation Approach Prioritisation of agency network consolidation** Impact Assessment Integration Simulation Network migration Federal agency network consolidation Local Authority network consolidation State agency network consolidation Assessment of the overall impact of the network migration to agencies applications, network security and connectivity requirements. Establish migration plan for the network and related applications. Establish test environment and plans for the network migration. Simulate the network integration to test the impact of the network migration to the agency s network connectivity and security requirements. Migration of the network connectivity and services to the single public sector network. Establish agency level standard operating procedures for network and security operations. **Prioritisation will be based on factors such as current network contractual timeframe, complexity of application integration and agency front line functions. 9
11 Strategy 1: Consolidation of Public Sector Network Responsibilities Responsibilities Responsibilities of MAMPU To establish a working group within the Jawatankuasa Infrastruktur ICT for the Public Sector network consolidation initiative for project coordination and monitoring. To develop the policies related to the governance, procurement, security, management and operational aspects of the consolidated Public Sector network. To develop the strategies and project implementation plan for network consolidation with regards to the aspects of technical implementation, security, progress monitoring and promotions. To develop the framework agreements with regards tonetwork procurement from service provider and network provisioning i i for Agencies with flexible commercial and technical requirements. To manage the contractual agreements between the Public Sector and third party network service providers with regards to deliverables acceptance and payment disbursement. To develop a change management plan to establish the buy-in from Agencies to centralise the network services and consolidate the network of Public Sector Agencies. To conduct an assessment framework for Agencies network and impact of the network migration to the Agencies applications. 10
12 Strategy 1: Consolidation of Public Sector Network Responsibilities Responsibilities Responsibilities of MAMPU To develop a plan for phased migration of Agencies network connectivity and services with pilot projects and prioritisation according to Agencies mission criticality and information sharing requirements. To provide assistance and guidelines for the Agency s network migration and related network configuration and application changes required during migration. Responsibilities of Agencies To conduct an assessment of the Agencies network according to the assessment framework to study the impact of the network integration to the public sector network. To develop a network migration plan including critical dependencies, network hardware and software configuration changes, application changes and technical recovery processes for the implementation of the Agency s network migration. To provide resources during the Agency s network migration and related network configuration and application changes required during migration. To develop change management plan for the Agency to address organisational changes due to the network consolidation initiative. 11
13 Infrastructure Architecture Network Consolidation Guideline 12
14 Infrastructure Architecture Network Consolidation Guideline 13
15 Strategy 2: Consolidation of Data Centres and Disaster Recovery Centres Data Centre Consolidation This strategy to support policy purpose specified in RMK10 - Consolidation of DC and DRC. Consolidation of data centres across the states accordingly under different regions for Federal agencies (e.g. Northern, Southern, Central, East Coast, Sabah and Sarawak). Consolidation by states for State Government. Local Authorities data centres may be consolidated in either Regional or State data centres. The number of consolidated data centres will depend on the quantity of agency servers and the capability of the data centres. Key Benefits Substantial savings in operating cost and energy consumption. Improved service standards. Encourage sharing of techniques, expertise and innovation among agencies sharing a data centre. Financial investment can be focused on operating highend data centres. 14
16 Strategy 2: Consolidation of Data Centres and Disaster Recovery Centres Implementation Approach Implementation Roadmap Implementation Approach Prioritisation of agency DC/DRC consolidation** Target Data Centre Selection Impact Assessment Server Relocation Federal agency DC/DRC consolidation Local Authority DC/DRC consolidation Selection of target data center for consolidation. Gather agency s requirements for hosting applications in consolidated data center environment. Assessment of the overall impact of the data center relocation to agencies business, applications, security and connectivity requirements. Development of business continuity plans for the agency. Establish relocation strategy & plan for agency s servers and hardware equipments. Relocate the servers and hardware equipments into the consolidated data center. State agency DC/DRC consolidation **Prioritisation will be based on factors such as.infrastructure readiness and agency front line functions. 15
17 Strategy 2: Consolidation of Data Centres and Disaster Recovery Centres Responsibilities Responsibilities of MAMPU To establish s a work group within the Jawatankuasa a a Infrastruktur u ICT for the data a centre e and disaster recovery e centre e consolidation initiative for project coordination and monitoring. To conduct feasibility study to identify target data centre for consolidation purposes. The study should highlight the impact with regards to law and regulations, compliance, application migration, technology integration and process. To develop the policies related to the governance, procurement, security, management and operational aspects of the consolidated data centre. To develop a change management plan to establish the buy-in from agencies to centralise the data centre facility services by region or state. To develop a plan for phased implementation of agencies data centre consolidation with pilot projects and prioritisation according to agencies mission criticality. To advise agencies on data centre relocation strategy and activities. To develop the framework agreements with regards to data centre space provisioning from service providers and public sector agencies. 16
18 Strategy 2: Consolidation of Data Centres and Disaster Recovery Centres Responsibilities Responsibilities of Agencies To identify agency data centre design, specification, technology architecture and capabilities. Additionally, agency should also inventorise the existing data centre assets which include applications and hardware. To conduct an impact assessment study on application migration and data centre assets relocation. To identify and recommend agency data centre relocation strategies to the central agency. To develop or review own Disaster Recovery Plan to align with the consolidation strategy. 17
19 Infrastructure Architecture Data Centre & Disaster Recovery Centre Consolidation Guideline 18
20 Infrastructure Architecture Data Centre & Disaster Recovery Centre Consolidation Guideline 19
21 Strategy 3: Establishment of Public Sector Cloud Computing Infrastructure Public Sector Cloud Computing Infrastructure Development of Private Cloud for the public sector for total control and security. Enables agencies to select and host ICT services from a secure, scalable and cost-effective shared environment. Agencies will be able to obtain access to various cloud services through web portal which can be provided on-demand with rapid provisioning. Agencies procurement process will be faster. Key Benefits Substantial savings due to sharing of common services, applications and infrastructure. Enable services to be provided on demand. Enable faster provisioning of resources. Minimise redundancies. 20
22 Strategy 3: Establishment of Public Sector Cloud Computing Infrastructure EG Apps. OSCC Apps. Virtual Desktop Gov2.0 tools Office Automation Website Hosting Knowledge Management Storage Developer Tools Server Unified Communication Testing Tools Virtual Machines Network Database 21
23 Strategy 3: Establishment of Public Sector Cloud Computing Infrastructure Cloud Computing Dimensions Five distinct dimensions focused on key aspects, as necessary to plan and implement comprehensive cloud computing capabilities Finance - Cloud Computing Business Case - Chargeback Metrics & Models Controls - Laws, Regulations & Business Requirements Impacting Cloud Models - Audit Impact & Considerations - Application criticality - Cloud provider SLA contracts - Conformance to Standards, Continuous Improvement Technology - Technology Integration - Technology Architecture Standardization - POC Review - Application Rationalization - Technology Standardization Organization - Operating in the Cloud - Organizational Changes - Organization Change Management - Skills, Roles and Responsibilities - Right-Sizing - Governance Framework Process - Impact on IT Service Management Processes - Change, Release, Config - Incident, Problem - Capacity Provisioning - Vendor Management - Process Metrics 22
24 Strategy 3: Establishment of Public Sector Cloud Computing Infrastructure Implementation Approach Implementation Roadmap Implementation Approach Prioritisation of Cloud Services** Consolidation & Virtualisation Automation Service Operationalisation Infrastructure-as-a- Service cloud offering Platform-as-a- Service cloud offering Software-as-a- Service cloud offering Consolidation of server, storage, and network resources by utilising virtualisation technology. Comprehensive virtualisation management: o Configuration management o Capacity planning o Performance monitoring o Real-time automation Integration of management tools that manages all resources (server, storage, network) as a single pool that can be allocated on demand. Identification of cloud service requirements which consists of technical and functional requirements. Integration of a web portal with the cloud resource management tools to offer cloud services to public sector agencies. **Prioritisation will be based on factors such as service estimated utilisation, service provisioning complexity and infrastructure readiness. 23
25 Strategy 3: Establishment of Public Sector Cloud Computing Infrastructure Responsibilities Responsibilities of MAMPU To establish awork group within the Jawatankuasa Infrastruktur ICT for the cloud computing initiativeiti for project coordination and monitoring. To review and/or develop policies related to governance, procurement, chargeback, service provisioning, security, service management and operational aspects of the Cloud Computing infrastructure. t To develop a change management and communication plan to establish the buy-in from agencies to utilise the services provided within the cloud. To develop a comprehensive cloud computing strategy and plan which covers but not limited to identification of cloud services, development of technical implementation plan, development of standards roadmap, identification of security policy issues, service acquisition and provisioning roadmap, development of detailed technical cloud architecture. To develop comprehensive marketing plan that focuses on creating awareness and encouraging agencies to use the cloud services offered. To identify potential collaboration with the local industry in order to foster new sources of growth in the ICT sector. 24
26 Strategy 3: Establishment of Public Sector Cloud Computing Infrastructure Responsibilities Responsibilities of Agencies To support the consolidation of Public Sector network and data centres initiatives which are the key enablers to the cloud computing initiative. To be involved in the cloud services requirement study and development to ensure services provided meet the Agency s need, requirements and expectations. To review Agency-level policies and procedures to support the utilisation of cloud computing technology. To develop change management plan for the Agency to address organisational changes due to the utilisation of cloud computing. 25
27 Infrastructure Architecture Cloud Computing Deployment Guideline 26
28 Strategy 4: Standardise End-User Computing Infrastructure Baseline requirement of ICT infrastructure for all public sector agencies. Each agency places of work should have access to PCs and printers, official , Internet, office application and end-point security (e.g. antivirus & personal firewall). Common desktop platform and centralised ICT procurement. Standard hardware & software maintenance policy framework. Integration of Green ICT practices. Key Benefits Agencies infrastructure will be at par with latest technology standards and best practices. Reduced procurement costs through economies of scale. Increased efficiency in deployment and maintenance. Greater assurance of up to date end-point security. 27
29 Strategy 4: Standardise End-User Computing Infrastructure Implementation Approach Implementation Roadmap Implementation Approach Prioritisation of agency EUC standardisation** Develop Baseline Requirements Policy Development EUC Infrastructure Standardisation Federal agency EUC standardisation Local Authority EUC standardisation State agency EUC standardisation Develop baseline requirements of ICT infrastructure for public sector agency. Establish technology and technical standards for ICT infrastructure within the public sector that are based on various agency and user requirements. Development of policies including for procurement and lifecycle management for ICT infrastructure within the public sector. Establish a centralised ICT infrastructure lifecycle management processes. Standardise di the ICT infrastructure management and lifecycle across all public sector agencies. Assessment of agencies ICT infrastructure environment to identify the requirements for the development of roll-out plan. **Prioritisation will be based on factors such as infrastructure availability, current infrastructure lifespan and agency front line function. 28
30 Strategy 4: Standardise End-User Computing Infrastructure Responsibilities Responsibilities of MAMPU To publish policy and establish centralised governance structure and processes to manage the standardisation of end-user computing infrastructure. To define policies, procedures, processes and standards related to end user computing standardisation. To execute its role as the technical advisor to the Ministry of Finance and Public Sector Agencies for the development and implementation of the standardized end user computing. To identify a baseline requirement for the Public Sector end user computing infrastructure software and hardware technology, and to develop an EUC baseline standard for the Public Sector. To advise Ministry of Finance on the Public Sector EUC technical standards and the appointment of panel of vendors to supply EUC infrastructure. To perform project management and monitoring i of the standards d implementation, ti including performance measurement processes to identify targets and key accomplishments, plus impact assessment studies for benefits realisation. To develop a plan for phased implementation of the standardisation of end user computing infrastructure and integration with Public Sector Agencies current environment. 29
31 Strategy 4: Standardise End-User Computing Infrastructure Responsibilities Responsibilities of Ministry of Finance To define policies, processes and procedures for the procurement of Public Sector end user computing infrastructure. To appoint a panel of vendors to supply EUC infrastructure and to provide an online ordering mechanism for Agencies to access and order EUC infrastructure based on its requirements. Responsibilities of Public Sector Agencies To conduct an assessment of the Agencies specific business requirements and identify any possible specialised end user computing requirements. To develop change management plan for the Agency to address organisational changes due to the standardisation di ti of end user computing environment. 30
32 Infrastructure Architecture End User Computing Guideline Proposed Specification Specifications Specifications Processor Multi Core x86 architecture with support for 64 Processor Multi Core x86 architecture with support for 64 Bit Bit Computing, minimum 1.8 GHZ Computing, minimum 2.2GHz Input / Output Ports Minimum 2x USB 2.0 ports Input / Output Ports Minimum 4x USB 2.0 ports Motherboard Integrated sound and network features, Motherboard Integrated sound and network features, supports Supports 2x USB2.0 ports 4x USB2.0 ports RAM Minimum 2GB DDR2 RAM Minimum 4GB DDR2 Hard Disk Drive Minimum i 160GB, supports SATAII and Hard Disk Drive Minimum i 320GB, Supports SATAII and 8MB 8MB Cache Cache Optical Drive Internal Rewritable DVD Drive, Minimum x8 Optical Drive Internal Rewritable DVD Drive, Minimum x16 Basic System Speed Video Adapter Minimum 64MB shared Video Memory, supports minimum resolution of 1280x1024 Network Interface 10/100/1000 Ethernet LAN and / or High End System Speed Video Adapter Minimum 128MB dedicated video memory, supports minimum resolution of 1280x1024 Network Interface 10/100/1000 Ethernet LAN and / or b/g wireless WIFI adapter b/g wireless WIFI adapter Software Operating System, Office Automation Application, Software Operating System, Office Automation Application, Personal Security (Anti-Virus and Firewall), Internet Browser Personal Security (Anti-Virus and Firewall), Internet Browser and and Client. Use Open Source Software where possible. Client. Use Open Source Software where possible. Keyboard and Mouse QWERTY 101 Keyboard and Keyboard and Mouse QWERTY 101 Keyboard and Optical Optical Scroll Mouse Scroll Mouse Warranty All hardware and software must have a minimum Warranty All hardware and software must have a minimum of of twelve (12) months parts and labour warranty from the date twelve (12) months parts and labour warranty TITLE15 November from the date 2011 of 31 of delivery. delivery.
33 Infrastructure Architecture End User Computing Guideline EUC User Classification End User Level EUC Classification Top Level Management (Head of Division and Above) Recommended for top level management: High End Laptop Basic Desktop Mobile Smart Phone Recommended for management level staff from Recommended for professionals with work requirements Management (Grade 41 and grade 41 and above: for high computing resources: above) Desktop* Desktop* Operational / Administrative / Technical Staff Recommended for ICT facing clerical / administrative staff, operational staff, helpdesk staff, and ICT facing technical staff from grade 41 and below: Basic Laptop or Desktop* * Dependant on mobility requirements 32
34 Infrastructure Architecture End User Computing Guideline 33
35 Strategy 5: Development of Common Security Infrastructure Centralised Security Management A centralised log and security event management infrastructure. Enabling the automation of log aggregation, correlation, and intelligent analysis centrally, to accelerate recognition & response to incidents. Federated Identity & Access Management Federated identity management with a portable identity concept. Seamless navigation between different applications while maintaining a single login identity. Integration of current PKI services into the Federated IAM framework. Data Leakage Protection Classification of data to identify the sensitivity of information transmitted through electronic channels. Establishment of policies and processes to manage the data lifecycle and prevent unauthorised data movement. Key Benefits Strengthens the overall public sector ICT security. Cost effectiveness in ICT security infrastructure procurement & operations. Centralised reporting for compliance and eliminating vulnerabilities. Facilitates swift and quicker security response. Public Sector ICT Study 34
36 Strategy 5: Development of Common Security Infrastructure Implementation Approach Implementation Roadmap Prioritisation of agency IAM & DLP integration ** Federal agency IAM & DLP integration Local Authority IAM & DLP integration State agency IAM & DLP integration Develop Centralised Platform Development of the centralised security management tools & DLP solution to integrate the security & data leakage detection and incident handling mechanism. Development of the Federated IAM standard platform to unify the provisioning and management of identity in the public sector. Implementation Approach Integration Establish plan for implementing the Federated IAM & DLP solution to agency sites. Assessment of agency applications to identify the integration ti requirements with the Federated IAM platform & DLP solution. Integration of agency applications / end user computing environment with the Federated IAM platform & DLP solution. Operation Establish standard operating procedures for the security & data leakage detection and incident handling through the centralised security management platform & DLP solution. Establish standard operating procedures for the provisioning and management of identity through the Federated IAM platform KPMG, a company incorporated under the Malaysian Companies Act 1965 and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. Printed in Malaysia. **Prioritisation will be based on factors such as application identity mapping requirements, application readiness and integration value. 35
37 Strategy 5: Development of Common Security Infrastructure Responsibilities Responsibilities of MAMPU To establish a work group within the Jawatankuasa Infrastruktur ICT for the centralised security management initiative for project coordination and monitoring. To define and establish the criteria for assessment of ICT Security & Compliance in the Public Sector based on MS ISO/IEC 27001:2007. To develop automation ti tools for the purpose of continuous auditing of ICT Security for Public Sector Agencies. To develop the policies related to the governance, management and operational aspects of the Centralised Security Management infrastructure. To develop the policies related to the governance, management and operational aspects of the Federated Identity and Access Management infrastructure. To develop a change management plan to establish the buy-in from Agencies for the implementation of the Federated IAM framework across Public Sector and integration of the Federated IAM into Agencies applications. To conduct an assessment framework for Agencies applications with a high-value and high-impact for the implementation of the Federated IAM framework. To develop a Federated IAM platform solution as a shared service which integrates with the identity repositories of Agency applications. 36
38 Strategy 5: Development of Common Security Infrastructure Responsibilities Responsibilities of MAMPU To develop a plan for phased implementation of Federated IAM and integration with Public Sector applications including enterprise-wide (EG) applications, community applications and Agency-specific applications. To develop a change management plan to establish the buy-in from Agencies for the implementation of the Data Leakage Prevention framework. To conduct an assessment framework for Agencies to identify data classification, location and pathways within the Agencies. To establish high level policies for data leakage prevention including defining the specific classifications, handling mechanism of each data category, violation actions and escalation processes. To develop a Data Leakage Prevention solution to automate the monitoring and blocking of data leakage violations. 37
39 Strategy 5: Development of Common Security Infrastructure Responsibilities Responsibilities of Agencies To conduct an assessment of the agencies applications according to the assessment framework to study the impact and value of the integration and implementation of the Federated IAM framework. To assist in integration of the Federated IAM platform into the agency s application. To assist in integration of the Data Leakage Prevention platform into the Agency s application and end-user computing environment. 38
40 Infrastructure Architecture Common Security Infrastructure Guideline ICT Security & Compliance 39
41 Infrastructure Architecture Common Security Infrastructure Guideline Identity & Access Management 40
42 Infrastructure Architecture Common Security Infrastructure Guideline Data Leakage Prevention 41
43 Strategy 6: Deployment of Mobile Computing Solutions Development of backend infrastructure to support mobile computing technologies. Development of mobile applications to enhance government service delivery. Enabling business/ citizens as well as government employees to access and use government services and applications anytime, anywhere and anyhow. Key Benefits Access to government applications and services anytime, anywhere and anyhow. Increase delivery of services through various service delivery channels. Increase operational efficiency and productivity. Reduce operational costs. 42
44 Strategy 6: Deployment of Mobile Computing Solutions Implementation Approach Implementation Roadmap Prioritisation of agency mobile computing deployment** Federal agency deployment Local Authority deployment State agency deployment Develop Backend Infrastructure Conduct assessment on agency s mobility requirement. Identity strategic initiatives that can be best resolved with mobility. Identify government mobility strategy based on above assessment. Strategy should include addressing security concerns. Develop backend infrastructure that is able to support various technologies in mobile computing. Implementation Approach Develop Mobile Applications Identify mobile applications to be developed based on value to the citizen, businesses and government employees. Development of mobile applications based on potential utilisation. Operation Staging of mobile devices to apply standard d settings and installation of applications. Establish centralised management of the mobile devices that includes device monitoring, automatic patch and security updates. **Prioritisation will be based on factors such as.infrastructure readiness and agency front line functions. 43
45 Strategy 6: Deployment of Mobile Computing Solutions Responsibilities Responsibilities of MAMPU To establish a work group within the Jawatankuasa Infrastruktur ICT for the public sector mobile computing initiative for project coordination and monitoring. To identify the requirements of the agencies with regards to information flow and mobility to develop the requirements of the mobile computing solution for citizen and business service delivery. To identify the requirements of the public sector mobility working requirement to develop the mobile computing solution for increasing productivity of public sector employees. To develop the backend infrastructure to support mobile computing technologies in a robust and high-performance environment. To develop a mobile computing solution as a shared service to be used across public sector agencies. To revise and update the relevant policies with regards to public sector mobility requirements and facilitating the use of mobile computing within the public sector. Responsibilities of Agencies To conduct an assessment of the agencies applications and gather the relevant information requirements for introducing mobile services. 44
46 Infrastructure Architecture Mobile Computing Deployment Guideline INFRASTRUCTURE ARCHITECTURE GUIDELINE 30 November
47 Strategy 7: Increasing Usage of Open Source Adopt usage of open source software wherever it gives the best value for money in delivering public services. Increasing public sector IT personnel s exposure to open source standards. Government uses open standards in its procurement specifications and requires all future solutions to comply with open standards. Integration of open source with infrastructure related solutions and tools such as government cloud and mobile applications. Key Benefits Cost savings delivered via the reuse of applications and solutions. Avoidance to being locked in to costly proprietary software. Increased potential for further development and customization of IT solutions within the public sector. Minimal licensing and developmentelopment costs. Maximized accessibility to OSS solutions across agencies. 46
48 Strategy 7: Increasing Usage of Open Source Implementation Approach Implementation Roadmap Implementation Approach Achieve targets in OSS Master Plan II Identify OSS Solutions Strategy Development OSS Standardisation OSS offered in a mobile computing environment OSS offered in a cloud computing environment Identify Solution Areas of ICT infrastructure to be implemented. Identify OSS initiatives, agencies involved and OSS migration processes for the ICT infrastructure within the public sector based on various agency and user requirements. Establish OSS personnel development and awareness initiatives across agencies. Integrate OSS into government mobile & cloud computing infrastructure to facilitate accessibility. Standardise OSS adoption within the ICT infrastructure management and lifecycle across all public sector agencies. Perform reviews, enhancements and accelerated development of OSS initiatives to ensure continuity. 47
49 Strategy 7: Increasing Usage of Open Source Responsibilities Responsibilities of MAMPU To conduct feasibility study to identify opportunities to develop and use open source software to support centralised infrastructure management and operation. To develop and specify OSS related standards, guidelines and policies for all public sector OSS implementations. To facilitate, coordinate, advice and assist all public sector agencies for OSS related implementation. To conduct and coordinate OSS training, certification and awareness initiatives for public sector ICT personnel. To conduct, facilitate t and monitor OSS research and development initiatives. iti To create and maintain OSS knowledge bank for the sharing of OSS related knowledge and experience. To provide technical support to all public sector agencies for all OSS implementation. To identify suitable common OSS ICT infrastructure management tools for development and implementation across the public sector. 48
50 Strategy 7: Increasing Usage of Open Source Responsibilities Responsibilities of Agencies To comply with OSS standards, guidelines and policies for every possible ICT infrastructure implementation. To consider OSS in all ICT infrastructure procurement, lifecycle management and processes. To encourage all of its ICT personnel to obtain OSS training and certification. 49
51 Infrastructure Architecture Open Source Software Deployment Guideline 50
52 Infrastructure Roadmap
53 ICT Infrastructure Roadmap 0-1 years Pilot Projects Establish pilot project for Public Sector Network, Cloud Computing Infrastructure, End-User Computing Standardisation and Mobile Computing deployment. 1-2 years Public Sector ICT Infrastructure t Integration Consolidation of Data Centers within Putrajaya & Klang Valley areas (Federal agencies). Development of Federated Identity and Access Management to selected agencies. 2-5 years Public Sector ICT Infrastructure Optimisation Complete consolidation of the Public Sector Network. Expansion of cloud computing services. Consolidation of regional Data Centers. Provisioning of Infrastructure as a Service. Provisioning of Platform as a Service. Provisioning of Software as a Service. 52
54 ICT Infrastructure Implementation Plan Project Phases Plateau 1 ( 12 Months ) Plateau 2 ( 18 Months) Plateau 3 ( 18 Months) Plateau 4 ( 12 Months ) Consolidation of Public Sector Network Consolidation of Data Centre and Disaster Recovery Centre Establishment of Public Sector Cloud Computing Infrastructure Infrastructure Architecture Strategic Roadmap Standardise End User Computing Infrastructure Development of Common Security Infrastructure Deployment of Mobile Computing Solutions Increasing Usage of Open Source Infrastructure Architecture Change Management Year Plateau 1 Establishing the governance structure and processes as well as Pilot Projects for the strategies Plateau 2 Deployment of initiatives to federal and front line agencies Plateau 3 Deployment of the initiatives to the remaining federal, state and local government agencies Plateau 4 Monitoring and ensuring continuous improvement of the infrastructure management and operations o 53
55 To Be Governance Model ICT Infrastructure
56 To-Be Governance Structure ICT Infrastructure Steering Committee Jawatankuasa ICT Sektor Awam (JISA) Coordinating Committee Working Committee Management & Operations Jawatankuasa Perlaksanaan dan Koordinasi Program ICT Jawatankuasa Infrastruktur ICT Centralised Management & Operation Entiity Plan, monitor and coordinate the development of ICT infrastructure. Recommend relevant policies, standards and strategies to JISA. Report on the status of development and progress of ICT infrastructure projects Monitor and coordinate the implementation and operation of network infrastructure, DC, DRC and Cloud Computing infrastructure; and Resolve implementation and operational issues. Manage the day to day operation and service provisioning related to public sector ICT infrastructure. 55
57 To-Be Governance Structure ICT Infrastructure Centralised Management & Operation Entity coordinates procurement services from service providers & provisioning of services to agencies. Provider A Provider B Provider C Infrastructure Standards Agreement Centralised Management & Operation Entiity Ministry Agency State Agency Agency PBT Infrastructure Provisioning Agreement Infrastructure Procurement Agreement Se ervice Level Agre eement Standardised procurement and service level agreements across public sector. Centralised budget for public sector infrastructure provisioning. Centralised monitoring of service provision including service levels & infrastructure operations. 56
58 Summary and Moving Forward Summary and Moving Forward Plans
59 Summary and Moving Forward Plans Objective To increase public sector productivity, add value to services and improve efficiencies through a whole-ofgovernment approach on ICT infrastructure. Strategy Consolidation of Public Sector Network Consolidation of Data Centres and Disaster Recovery Centres Establishment of Public Sector Cloud Computing Infrastructure Standardise End User Computing Infrastructure Development of Common Security Infrastructure Deployment of Mobile Computing Solutions Increasing Usage of Open Source Moving Forward: Establishment of governance structure in the form of Jawatankuasa Infrastruktur ICT and Centralised Mgmt and Operation Entity; Development of detail implementation plan for each program which include conducting requirement study and developing technical design; and Project implementation and monitoring. 58
60 Summary Strategy #3 : Establishment of fcloud dcomputing Infrastructure Strategy #7: Increasing Usage of Open Source Strategy #6: Deployment of Mobile Computing Solutions Strategy #5: Development of Common Security Infrastructure Strategy #2: Consolidation of DC and DRC Strategy #1: Consolidation of Public Sector Network Strategy #4: Standardisation di i of fend duser Computing Infrastructure 59
61 Infrastructure Architecture Q&A Session Thank You 60
INFRASTRUCTURE ARCHITECTURE BLUEPRINT
INFRASTRUCTURE ARCHITECTURE BLUEPRINT MESYUARAT PENGURUS-PENGURUS ICT SEKTOR AWAM BIL.3 TAHUN 2010 26 Oktober 2010 BERSAMA MELAKSANA TRANSFORMASI Table of Content Introduction Current Environment Overview
More informationPersonal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design.
Document Control Document Title Personal Computer Standard Version 1.0 Owner National Infrastructure Group Author Paul McLaren, paul.mclaren@scotland.gsi.gov.uk, 0131 244 2258 Creation date 13 th November
More informationBridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.
Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationAsset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
More informationDatacenter Management Optimization with Microsoft System Center
Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationICT Category Sub Category Description Architecture and Design
A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationJOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
More informationProfile. Business solutions with a difference
Profile Business solutions with a difference Overview ITeM Group was founded in 1999 and has a successful history of delivering IT solutions in Australia, New Zealand, Indonesia, China and Canada. We specialise
More informationCLOUD. Nik Zarina Nik Mat (Pasukan Perunding Pengurusan Rangkaian) 10 Mei 2011
CLOUD COMPUTING Nik Zarina Nik Mat (Pasukan Perunding Pengurusan Rangkaian) 10 Mei 2011 Unit Pemodenan Tadbiran dan Perancangan Pengurusan Malaysia, Jabatan Perdana Menteri Contents 1 What is Cloud Computing?
More informationCisco Data Center Optimization Services
Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization
More informationMicrosoft Private Cloud
Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.
More informationIT & Asset Management Quick-Start Consulting Services for Clients
IT & Asset Management Quick-Start Consulting Services for Clients Contents Client Management Services... 3 Q-Armada Project Methodologies... 3 About Q-Armada... 4 Q-Armada Consultants... 4 Altiris Notification
More informationNOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
More information...DYNAMiC INTERNET SOLUTiONS >> Reg.No. 1995/020215/23
GamCo Managed Dedicated Virtual Hosting Business growth in the number of users, application and data has left many organisations with sprawling servers, storage and supporting infrastructure crammed into
More informationEND TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
More informationCisco Cloud Enablement Services for Education
Services Overview Cisco Cloud Enablement Services for Education Bringing the Cloud to the Campus In today s higher education environment, IT organizations must keep pace with a long list of competing demands:
More informationSupport & Field Services
Support & Field Services The Right Engineer, In the Right Place, With the Right Skills, At the Right Time, With the Right Parts 2 At, we work with a wide range of customers across the UK delivering flexible
More informationM2TD Consulting Company. Profile 2014. M2TD Consulting 2014
M2TD Consulting Company Profile 2014 About M2TD Consulting M2TD is a level 1 BBBEE 100% black owned corporation with 61% black women ownership pioneering the Government strategy to empower women into leadership
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationDell Desktop Virtualization Solutions Enterprise Offering Overview
Dell Desktop Virtualization Solutions Enterprise Offering Overview Dell Desktop Virtualization Solutions Enterprise are designed to help you get up and running faster, with less risk, and optimal end user
More informationVirtual Client Solution: Desktop Virtualization
IBM System x and BladeCenter Virtual Client Solution: Desktop Virtualization Powered by and VMware View June 29, 2010 Agenda 1 2 3 4 5 6 Virtual client solution overview Addressing companies pain points
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationTable of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
More informationSystem Requirements - filesmart
System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed
More informationService Description for Hosted Server
Service Overview tolomy has created its Hosted Server environment using VMware ESXi which provides the foundation for building and managing a virtualised IT infrastructure. These market leading, production-proven
More informationMigrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services
Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationVirtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10
Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation
More informationWHITE PAPER. Acronis Backup & Recovery 10 Overview
Acronis Backup & Recovery 10 Overview Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 The Next Generation Backup and Recovery Solution from Acronis... 4 New! Scaleable Architecture
More informationCisco Unified Communications Predeployment, Deployment, and Postdeployment Service Bundle
Cisco Unified Communications Predeployment, Deployment, and Postdeployment Service Bundle Successfully deploy a secure, resilient Cisco Unified Communications solution, accelerating business advantage.
More informationAuditMatic Enterprise Edition Installation Specifications
Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this
More informationDell Desktop Virtualization Solutions DVS Enterprise
Dell Desktop Solutions Enterprises of all sizes are poised to explore alternatives to traditional end user computing. Many are reevaluating how their IT groups provision, manage, and support their workforce.
More informationCenSus ICT Strategy (2012 2015)
CenSus ICT Strategy (2012 2015) Date: September 2012 Version: 5.0 Version Control Amendment History including Author: Version Date Author / Amendment History 1.0 Draft 30 th August 2012 Graham Crossingham
More informationA discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.
A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering
More informationUnifying IT How Dell Is Using BMC
Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.
More informationAppendix C to DIR Contract No. DIR-SDD-1880 Pricing Index
Appendix C to DIR Contract No. DIR-SDD-1880 Pricing Index NOTE: Services pricing and/or desktop/laptop pricing may change from what is listed in this Appendix C based on customer requirements and changes
More informationResources Management. Pascal Nuyttens Consultant. Stephan Pauwels Technology Specialist
Pascal Nuyttens Consultant Stephan Pauwels Technology Specialist What is Required Today? Ensure Security and Compliance Enforce business rules and processes by policy Ensure systems are secure and locked
More informationProduct Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet
Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP
More informationInfraStruxure TM Management Software
InfraStruxure TM Management Software End to end data centre infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems
More informationMarval Software Limited. G Cloud iii Framework Service Definition
1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)
More informationcloud computing by Orange séminaire Aristote 17/12/2009
cloud computing by Orange séminaire Aristote 17/12/2009 Orange and the cloud vision and strategy cloud computing - what is it about? cloud computing is a model for enabling convenient on-demand network
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationG-Cloud Cloud Storage Service Definition
G-Cloud 6 Cloud Storage Service Definition 1 Table of Contents 1 Service Definition (Technical Service Overview) 1.1 Overview 1.2 Trial 2 Service and Process 2.1 Service Provisioning 2.1.1 On-boarding
More informationUbertas Cloud Services: Service Definition
Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud
More information605: Design and implement a desktop virtualization solution based on a mock scenario. Hands-on Lab Exercise Guide
605: Design and implement a desktop virtualization solution based on a mock scenario Hands-on Lab Exercise Guide Contents Overview... 2 Scenario... 5 Quick Design Phase...11 Lab Build Out...12 Implementing
More informationNetwork Infrastructure Design and Build
Initial Architecture Assessment Satellite Vehicle Tracking and Telecommunications Pay-As-You-Drive Road Pricing Trac-Car Vehicle Telecommunications www.trac-car.com - 1 - TABLE OF CONTENTS Table of Contents...2
More informationManage Your Data: Virtualization for Small Businesses
Manage Your Data: Virtualization for Small Businesses July 2012 Contents: Introduction 3 What is Virtualization 4 What Could Virtualization Mean for your Business 5 Is Server Virtualization Right for your
More informationOperationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationTELECOMS Expense management. Considerations for Large Enterprises Operating in South Africa
TELECOMS Expense Considerations for Large Enterprises Operating in South Africa JANUARY 2013 CONTACT NEBULA SOUTH AFRICA WESTERN CAPE Tel: +27 (0)21 555 3227 Fax: +27 (0)21 551 0676 Address: 1 Ceres Road
More informationLegislative Council Panel. on Information Technology and Broadcasting. Implementation of a Government Cloud Platform
LC Paper No. CB(1)1783/11-12(06) For discussion on 14 May 2012 Legislative Council Panel on Information Technology and Broadcasting Implementation of a Government Cloud Platform Purpose This paper seeks
More informationProspect 365 CRM Installation Requirements. Technical Document
Prospect 365 CRM Installation Requirements Technical Document Prospect 365 Software Prospect 365 is a cloud-based solution and for the browser-based components there is no installation required (just minimum
More informationWhite paper: Unlocking the potential of load testing to maximise ROI and reduce risk.
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,
More informationA white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
More informationManaging the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models
Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models A Guide to Cloud Computing Costs, Server Costs, Pricing Plans, and Chargeback Implementation and Systems Introduction
More information1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6
Contents 1 Executive Summary... 3 2 Document Structure... 5 3 Business Context... 6 4 Strategic Response... 8 4.1 Platform... 8 4.2 Network... 10 4.3 Unified Communications... 11 5 Implementation status...
More informationCisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More informationSPECIFICATIONS FOR HARDWARE/ SOFTWARE PROCUREMENT USAID SMALL GRANT PROGRAM MUNICIPALITY OF VIDIN, BULGARIA. Prepared for.
SPECIFICATIONS FOR HARDWARE/ SOFTWARE PROCUREMENT USAID SMALL GRANT PROGRAM MUNICIPALITY OF VIDIN, BULGARIA Prepared for Prepared by Tassos Bellesis ICMA East European Regional Housing Sector Assistance
More informationCitrix XenDesktop Architecture and Implementation on ProLiant Servers
Citrix XenDesktop Architecture and Implementation on ProLiant Servers integration note Abstract... 2 What is Citrix XenDesktop?... 2 Virtual Desktops... 2 Why use the HP integrated XenServer?... 4 HP ProLiant
More informationEverything you need for your mobile enterprise
Everything you need for your mobile enterprise A complete software, hardware and managed service solution for mobile workers Spirit Data Capture Limited is an enterprise mobility company. We have an in-depth
More information0.00 2000 2001 2002 2003 2004 2005 Year
1 Background 1.1 Healthcare organisations are increasingly generating and thus storing information in electronic format. This is an eclectic mix of Email, Microsoft Office Documents, Images as well as
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationASSET Connect. The next level in Critical Environment Operational Efficiency
Connect The next level in Critical Environment Operational Efficiency 10-30% is the potential efficiency gain from optimized Data Centers and Critical Environments Operational Efficiency of Your Critical
More informationIT Services. We re the IT in OrganIsaTion. Large Organisations
IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationVICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES
VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES Consult and assess your business and technical requirements Advise you on the best cloud solutions
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationBackup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist
Backup for branch offices and compartment backups Måns Höiom & Rikard Lindkvist Today s IT Challenges: Why Better Backup is needed? Accelerated Data Growth 62% Year Over Year This kind of data growth means
More informationMANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationHow To Create A Desktop Computer From A Computer Or Mouse And Keyboard (For Business)
Wyse WSM The power of a PC. Without the complexity. : Learn all you need to know. Here. Introducing Powerful, cost-effective desktop and application virtualization for businesses of all sizes. delivers
More informationWAYNE FUSION FORECOURT SYSTEM. Meet the new face of. forecourt control.
WAYNE FUSION FORECOURT SYSTEM Meet the new face of forecourt control. Control where you need it most. Control where you The Wayne Fusion Forecourt System allows your dispensers, tank gauging system, price
More informationB. Executive Summary
B. Executive Summary Across the country, state governments face tough economic challenges. High unemployment is causing record numbers of citizens to seek public assistance, straining government s aging
More informationRemote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
More informationvmedia An introduction to subscription based document and imaging management software June 10, 2015
Vertican Technologies, Inc. vmedia An introduction to subscription based document and imaging management software June 10, 2015 info@vertican.com www.vertican.com Executive Summary This white paper discusses
More informationCAMAvision v18.5.x System Specification Guide 7/23/2014
The computer industry is very fast moving, with larger and faster technologies supplanting previous hardware releases within six to nine months. Some of the specifications listed may no longer be available,
More informationGuide to Cloud Computing INFORMATION
Guide to Cloud Computing INFORMATION INFORMATION PREFACE 3 INTRODUCTION 3 WHAT IS CLOUD COMPUTING? 3 WHY IS CLOUD COMPUTING IMPORTANT TO ORGANISATIONS OF ALL SIZES? 4 BUSINESS BENEFITS 5 COST BENEFITS
More informationBBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: Spencer.piggott@bbc.co.uk Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
More informationCisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationG DATA TechPaper #0275. G DATA Network Monitoring
G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationINDUSTRY PERSPECTIVE
INDUSTRY PERSPECTIVE 1 A Brief Introduction As IT administrators and chief information officers, you face a particular challenge: facilitate the ability for your agency to work remotely, while reducing
More informationNetwork device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
More informationG-Cloud IV Services Service Definition Accenture Netsuite Cloud Services
G-Cloud IV Services Service Definition Accenture Netsuite Cloud Services 1 Table of contents 1. Scope of our services... 3 2. Methodology & Approach... 4 3. Assets and tools... 5 4. Pricing... 6 5. Contacts...
More informationMicrosoft Office 365 from Vodafone. Do business virtually anywhere
Do business virtually anywhere Now there s an easy way to do business virtually anywhere 2 Microsoft Office 365 from Vodafone is helping to empower people to work the way they want, on their terms, from
More informationSINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY MICROSOFT
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY MICROSOFT SingTel Managed Cloud, powered by Microsoft, is a secure and agile cloud computing solution (Infrastructure-as-a-Service or IaaS)
More informationARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
More informationG-Cloud Custom Enterprise Mobile Applications Service Definition
G-Cloud 6 Custom Enterprise Mobile Applications Service Definition 1 Table of Contents 1 Service Definition (Technical Service Overview) 1.1 Overview 1.2 Service Detail 1.3 Trial 2 Service and Process
More informationManaged Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
More informationAt the Heart of Connected Manufacturing
www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of
More informationTransformational Managed Network Services
Transformational Managed Network Services Accelerating your transformation to an IP world. Accenture Publishing Solutions 1 The Challenge Enterprises today are finding it increasingly difficult to reconcile
More informationDell Software. Jiří Svatuška
Dell Software Jiří Svatuška Servers, storage and network Dell Software offerings Software is an important part of Dell solutions Services Client devices Dell Software portfolio - What we offer Transform
More informationSubmit to: PT. Adi Sarana Armada (Assa Rent) Proof of Concept (POC) of 2X Solution. Ver. 1.0 Mei 2011. Prepared by: PT. Netmarks Indonesia
Submit to: PT. Adi Sarana Armada (Assa Rent) Proof of Concept (POC) of 2X Solution Ver. 1.0 Mei 2011 Prepared by: 株 式 会 社 ネットマークス PT. Netmarks Indonesia Jl. Kalimantan 11B-C, Surabaya 60281 e-mail mail:
More informationMaximizer CRM 2015 system requirements
Maximizer CRM 2015 system requirements Cover introduction Enterprise and Group Editions A typical Maximizer implementation consists of a server and one or more workstations. The hardware and software requirements
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
More information