Amalgamation of ICT Environments In Local Government
Council Amalgamations Dell Software is the only organisation that provides, with its partner channel, the end-to-end capability and solutions to amalgamate core council IT services in a seamless manner. Our best practice approach to any merger, acquisition or amalgamation starts with Preparation - which is all about discovery of the existing IT environment(s) Co-Exist / Migrate - which involves the actual migration from source to target environment as well as offering seamless co-existence for the users across the new target and their old source locations. Manage - Finally in the newly amalgamated target state, leverage the solutions already implemented in the previous states to implement best practices in the management, governance, compliance and recoverability of the expanded environment. Time saved can now be spent on innovative projects to further enhance the IT services being provided to IT customers. 2 Confidential Product Marketing
ICT Amalgamation Phases Strategy and Financial Management Program and Project Management ICT Amalgamation Strategy ICT Discovery Transformation Migration Migration Implementation Operate 3 Confidential Product Marketing
Ready State Amalgamate Prepare Coexistence/Migration Manage Discover and analyze current state environments: Application authentication to Active Directory User, group and resource accounts IT Services insight Know what to migrate and what to leave behind Ensure coexistence of old and new environments Maintain business productivity with Zero impact to users Synchronise Active Directory and automate migration tasks Manage and report on migration status Best practice management and reporting for users and applications Simplify ICT compliance, and governance Provide automation within the new environments Include recovery solutions for Key IT services 4 Confidential Product Marketing
ICT Discovery Phase Data Centre audits Assessments Workshops Tool set selection Application catalogues Application dependency mapping Application architecture(s) Application impact analysis Critical processes Process impact analysis Governance and Compliance analysis Core Infrastructure Analysis Application Analysis Organizational Analysis Organizational Analysis Review & Refine Technology architectures Asset inventories Technology impact analysis Application inventories Application to organizational / service desk Organisation impact analysis Service desk interviews/workshops Migration impact & Risk analysis Gap analysis Migration database Governance and Compliance management frameworks ICT Discovery Transformation Migration Migration Implementation Operate 5 Confidential Product Marketing
Prepare Within any environment, there are a variety of Applications and IT systems and services that authenticate against Active Directory. Dell Software Change Auditor for Active Directory Queries - provides a wrapper around Active Directory and will capture application authentication requests to AD and detail the list of applications that will be impacted. Dell Software Enterprise Reporter - collects, stores, and reports on configuration items such as network security, share and folder level permissions-related information, providing a scalable solution that enables administrators to easily assess who has access to what resources and how they received that access across a historical Baseline. Discovery Pack 6 Confidential Product Marketing
ICT Transformation Application inventory Standards plans Workshops Transformation shortlist Sourcing shortlist Transformation strategy Sourcing strategy Contingent strategy Transform programme of works / schedule Sourcing programme of works / schedule Workshops Identify transformation options Explore options Risk and benefit assessment Accept or Reject (business and stakeholder) Transform options list Outsource options list Business case Transformation financial analysis Sourcing financial analysis Transformation plan Sourcing plan ICT Discovery Transformation Migration Migration Implementation Operate 7 Confidential Product Marketing
ICT Migration Migration inventory Modeling scenarios Migration methodologies Migration schedules Migration tool sets Governance and Compliance tool set platforms New ICT Procurement Process integration People requirements Governance and Compliance systems integration Application Classification Solution Design Test and acceptance planning Process Integration Pre-migrate Preparation Workshops Application bundles and move groups Prioritised sequencing Systems testing User Acceptance testing Performance benchmarking Rollback procedures Change freeze Logistics Change Implementation Plans Business and CAB approvals ICT Discovery Transformation Migration Migration Implementation Operate 8 Confidential Product Marketing
Environment Co-Existence and Migration Coexistence support is built into the migration solutions to ensure systems, services and end users are able to continue operating while IT systems and services are being migrated to the newly created target environments. Migration manager for AD will synchronise user and group information, inclusive of passwords and sidhistory, across both source and target locations to maintain constant user access and experience. Depending on the messaging environment in place at each location Dell Software have solutions to cater for any messaging platform migration: Migration Pack Migration Manager for Exchange for migrating email from Exchange to Exchange or Exchange to Office 365. On Demand Migrator for Email for migrating from an existing Office 365 tenant to another 365 tenant. Notes or Groupwise Migrator to Exchange for legacy mail platform migration into Exchange or Office 365. 9 Confidential Product Marketing
ICT Migration Implementation Migration inventory Change Implementation Plans Change and User Communications BAU and Pre-Testing Authorizations Communications Governance and Compliance reporting validation Post-migrate run book signed off Prepare Pre-migrate Change Implementation Post Implementation Production Verification Establish Governance, Compliance and Support Structures Confirm readiness Vendor support and warranty readiness Systems tests Performance benchmarking Governance and Compliance audit reporting User acceptance testing Change Implementations signed off Production accepted ICT Discovery Transformation Migration Migration Implementation Operate 10 Confidential Product Marketing
ICT Operational State Post migration support teams Warranty and maintenance verification and activations Business owners sign off Business updates and communications Post migrate support Process integration Close-out Solution optimization Operate state Compliance and Governance tools and systems validation User experience validation Post Implementation Review Logical Decommissioning Physical Decommissioning ICT Discovery Transformation Migration Migration Implementation Operate 11 Confidential Product Marketing
Manage Solutions deployed in the Prepare phase are leveraged and enhanced to provide insight into usage and ongoing management of the newly created target environments. Dell Change Auditor for Active Directory, Exchange, SQL, SharePoint and Windows File Servers - provide an automated governance and compliance platform by enhanced auditing, alerting and security across these windows platforms. Dell Intrust Enterprise - provides event log collection and aggregation service into a single searchable repository. Management Pack Dell Recovery Manager for Active Directory Forest Edition - is an enhanced, fully automated, patented forest recovery solution to mitigate the risk of a full forest or domain failure which would impact every user and system account in the organisation. Dell Active Roles - (optional) automates end user on-and off-boarding within the IT environment and extends the provisioning of users into cloud solutions (Office 365, SFDC, etc.) Active Roles also provides an additional capability in granular, refined, delegated access to Active Directory components via predefined security roles and associated permissions providing versatility in delegated management 12 Confidential Product Marketing
Council Amalgamation Pack Combines: Council Discovery Pack Change Auditor for Active Directory Queries Enterprise Reporter Suite (Active Directory, SQL, Windows Servers) Council Migration Pack Migration Manager for Active Directory Migration for Email (Exchange, Office 365, Lotus Notes, Gmail, Groupwise) Council Management Pack Change Auditor Suite Recovery Manager for Active Directory Forest Edition 13 Confidential Product Marketing
Amalgamated Site 14 Confidential Product Marketing
Case Study Wiltshire Council Amalgamation 15 Confidential Product Marketing
Key Points to Achieving Amalgamation Project Success
Achieving Project Success Ensure a Right-fit Technical Solution (Flexibility is the Key) Understand what you are dealing with, it is the 10% that is not identified in the discovery and high level design and migration plan that can have a significant impact on costs. Complex reconfiguration and rework = dollars! Focus heavily on de-risking the Implementation and Migration Schedules Aside from the expected risk management processes the use of appropriate tools for migrations, incorporating platform governance, compliance, monitoring and performance benchmarking technologies are essential! Carefully Manage the End-User Experience ICT Project objectives need to be effectively communicated across organisations Apply appropriate change management in an end user technology context System administrators and support staff need to be prepared and equipped to manage all their duties in-flight as project activities evolve 17 Confidential Product Marketing
Ensure Right-Fit Technical Solutions Project Risks From experience CSA suggest that the two (2) major project risks in the context of an ICT amalgamation project are: 1. Solution complexity may impact abbreviated timelines and the strategic high profile objectives. Noting though that complexity is hard to avoid in such a project, however over-complexity can be avoided! Note: Project Staff Resourcing and Financial Risks are an assumed as being major so are not included here. 18 Confidential Product Marketing
Ensure Right-Fit Technical Solutions Project Risks From experience CSA suggest that the two (2) major projects risks in the context of an ICT amalgamation project are: 2. Adherence to the relevant policies, guidelines and frameworks in regard to Governance and Compliance aspects of the various migration projects. Appropriate tools and systems for managing these aspects from the and Discovery phase through to the Operational phase are a key requirement 19 Confidential Product Marketing
The Road Ahead How CSA and Dell Software Can Help!
A Myriad of Projects to Manage For Example: Feasibility and Assessments on Shared or Cloud and SaaS/IaaS Services Data Centre (Core Infrastructure Environments) Consolidations Data Networks Integration and Consolidation Security Systems Integration and Consolidation Identity Management (Typically incorporated in such a project these days) Active Directory Integration and Consolidation Messaging and Productivity Platforms Integration and Consolidation Telephony and Contact Centre Integration and Consolidation Line of Business Systems Consolidation Utility Systems Integration and Consolidation SOE Development and SOE Management Systems Consolidation Managed Services and Support Contract Consolidation Etc., Etc. Note: SCADA, Building Management and Site Access /Security systems have also been included in the ICT scope of some of the recent projects, ensure the Amalgamation Strategy clearly identifies where these fit. 21 Confidential Product Marketing
CSA and Dell Software 2 Help with Discovery and Strategic Plan ICT Sub Plans 3 Detailed Design and Migration Councils 1 Advice and Helping with Readines and Preparation 4 Help with Managing and Executing the Transformation Program 22 Confidential Product Marketing
Recent Experience Examples 23 Confidential Product Marketing
CSA Partnerships 24 Confidential Product Marketing