Amalgamation of ICT Environments In Local Government

Similar documents
ADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3

Gartner, Inc. DIR-SDD-2042

Top 10 Most Popular Reports in Enterprise Reporter

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Microsoft Design and Deploy Messaging Solutions with Microsoft Exchange Server 2010

Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led

Qlik UKI Consulting Services Catalogue

Netwrix Auditor for Exchange

Migrating Lotus Notes Applications to Google Apps

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

SMART Solutions for Active Directory Migrations

Does my server customer need to Modernize their Active Directory infrastructure?

Quest Software Product Guide

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

Microsoft Premier Deployment. Office 365 Service Description

At the Heart of Connected Manufacturing

SecureGRC TM - Cloud based SaaS

Netwrix Auditor for SQL Server

10751-Configuring and Deploying a Private Cloud with System Center 2012

Datacenter Management Optimization with Microsoft System Center

Best Practices for an Active Directory Migration

Planning, Deploying, and Managing an Enterprise Project Management Solution

Why you need an Automated Asset Management Solution

Ensuring a Successful Migration, Consolidation or Restructuring

Microsoft Active Directory Project

Governed Migration using Dell One Identity Manager

Quest Unified Communications Solutions Overview

State of Oregon. State of Oregon 1

MIGRATION SERVICES MIGRATION SERVICES

How To Create A Help Desk For A System Center System Manager

agility made possible

Six Steps to SSL Certificate Lifecycle Management

Migrating to Cloud Best Practices and Strategies. Srinivasa Raghavan, CTO Office

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)

Cloud Business Case: A View from the Field

Quest Software Unternehmensportrait Quest Software, Inc. All rights reserved.

Simplify Your Windows Server Migration

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform

Dell Software. Jiří Svatuška

Optimizing Service Levels in Public Cloud Deployments

Centrify Server Suite Management Tools

Documentation for data centre migrations

LEARNING SOLUTIONS website milner.com/learning phone

Master Data Management Enterprise Architecture IT Strategy and Governance

Configuring and Administering Microsoft SharePoint 2010

Solution Brief for HIPAA HIPAA. Publication Date: Jan 27, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Mapping the Technical Dependencies of Information Assets

Simplify SSL Certificate Management Across the Enterprise

DIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector

Digital Marketplace - G-Cloud

Windows Least Privilege Management and Beyond

Oracle Database 12c: Administration Workshop NEW

Microsoft Design Windows Server 2008 Active Directory

EXCHANGE SERVER 2013 MESSAGING

Job Description Head of CRM

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010

ZervicePoint Provides Automated, End-to-End Provisioning of Accounts, Services, and Material

The Danwood Group Professional Services Offering DANWOOD

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

How Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008

can I customize my identity management deployment without extensive coding and services?

Implementing Support and Monitoring For a Business- Critical Application Migrated to Windows Azure

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233

Marathon Information Management Program

<Business Case Name> <Responsible Entity> <Date>

Establishing a Mature Identity and Access Management Program for a Financial Services Provider

Dell Migration Manager for Exchange Product Overview

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006

MCSE: Private Cloud Training Course (System Center 2012)

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen

HP Service Manager software

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Windows 7 Upgrade Risk Mitigation Planning: Ensuring Windows 7 Upgrade Success

Oxford City Council ICT Strategy

Windows Server 2003 migration: Your three-phase action plan to reach the finish line

Quest InTrust. Change auditing and policy compliance for the secure enterprise. May Copyright 2006 Quest Software

WHITEPAPER. The Case for Mobile Management Outsourcing

Deploying Exchange Server 2007 SP1 on Windows Server 2008

Technology Consulting. Infrastructure Consulting: Next-Generation Data Center

Netwrix Auditor for SQL Server

Senior Manager Information Technology (India) Duration of job

Oracle Database 12c: Administration Workshop NEW. Duration: 5 Days. What you will learn

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

ADMT v3 Migration Guide

Netwrix Auditor for Active Directory

Optimizing the Data Center for Today s State & Local Government

Installation Guide Identity Manager August 31, 2012

Configuring and Administering Microsoft SharePoint 2010

DocAve 6 SharePoint Migrator

This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties,

Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Microsoft Training and Certification Guide. Current as of December 31, 2013

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

BSM for IT Governance, Risk and Compliance: NERC CIP

Information & Asset Protection with SIEM and DLP

Transcription:

Amalgamation of ICT Environments In Local Government

Council Amalgamations Dell Software is the only organisation that provides, with its partner channel, the end-to-end capability and solutions to amalgamate core council IT services in a seamless manner. Our best practice approach to any merger, acquisition or amalgamation starts with Preparation - which is all about discovery of the existing IT environment(s) Co-Exist / Migrate - which involves the actual migration from source to target environment as well as offering seamless co-existence for the users across the new target and their old source locations. Manage - Finally in the newly amalgamated target state, leverage the solutions already implemented in the previous states to implement best practices in the management, governance, compliance and recoverability of the expanded environment. Time saved can now be spent on innovative projects to further enhance the IT services being provided to IT customers. 2 Confidential Product Marketing

ICT Amalgamation Phases Strategy and Financial Management Program and Project Management ICT Amalgamation Strategy ICT Discovery Transformation Migration Migration Implementation Operate 3 Confidential Product Marketing

Ready State Amalgamate Prepare Coexistence/Migration Manage Discover and analyze current state environments: Application authentication to Active Directory User, group and resource accounts IT Services insight Know what to migrate and what to leave behind Ensure coexistence of old and new environments Maintain business productivity with Zero impact to users Synchronise Active Directory and automate migration tasks Manage and report on migration status Best practice management and reporting for users and applications Simplify ICT compliance, and governance Provide automation within the new environments Include recovery solutions for Key IT services 4 Confidential Product Marketing

ICT Discovery Phase Data Centre audits Assessments Workshops Tool set selection Application catalogues Application dependency mapping Application architecture(s) Application impact analysis Critical processes Process impact analysis Governance and Compliance analysis Core Infrastructure Analysis Application Analysis Organizational Analysis Organizational Analysis Review & Refine Technology architectures Asset inventories Technology impact analysis Application inventories Application to organizational / service desk Organisation impact analysis Service desk interviews/workshops Migration impact & Risk analysis Gap analysis Migration database Governance and Compliance management frameworks ICT Discovery Transformation Migration Migration Implementation Operate 5 Confidential Product Marketing

Prepare Within any environment, there are a variety of Applications and IT systems and services that authenticate against Active Directory. Dell Software Change Auditor for Active Directory Queries - provides a wrapper around Active Directory and will capture application authentication requests to AD and detail the list of applications that will be impacted. Dell Software Enterprise Reporter - collects, stores, and reports on configuration items such as network security, share and folder level permissions-related information, providing a scalable solution that enables administrators to easily assess who has access to what resources and how they received that access across a historical Baseline. Discovery Pack 6 Confidential Product Marketing

ICT Transformation Application inventory Standards plans Workshops Transformation shortlist Sourcing shortlist Transformation strategy Sourcing strategy Contingent strategy Transform programme of works / schedule Sourcing programme of works / schedule Workshops Identify transformation options Explore options Risk and benefit assessment Accept or Reject (business and stakeholder) Transform options list Outsource options list Business case Transformation financial analysis Sourcing financial analysis Transformation plan Sourcing plan ICT Discovery Transformation Migration Migration Implementation Operate 7 Confidential Product Marketing

ICT Migration Migration inventory Modeling scenarios Migration methodologies Migration schedules Migration tool sets Governance and Compliance tool set platforms New ICT Procurement Process integration People requirements Governance and Compliance systems integration Application Classification Solution Design Test and acceptance planning Process Integration Pre-migrate Preparation Workshops Application bundles and move groups Prioritised sequencing Systems testing User Acceptance testing Performance benchmarking Rollback procedures Change freeze Logistics Change Implementation Plans Business and CAB approvals ICT Discovery Transformation Migration Migration Implementation Operate 8 Confidential Product Marketing

Environment Co-Existence and Migration Coexistence support is built into the migration solutions to ensure systems, services and end users are able to continue operating while IT systems and services are being migrated to the newly created target environments. Migration manager for AD will synchronise user and group information, inclusive of passwords and sidhistory, across both source and target locations to maintain constant user access and experience. Depending on the messaging environment in place at each location Dell Software have solutions to cater for any messaging platform migration: Migration Pack Migration Manager for Exchange for migrating email from Exchange to Exchange or Exchange to Office 365. On Demand Migrator for Email for migrating from an existing Office 365 tenant to another 365 tenant. Notes or Groupwise Migrator to Exchange for legacy mail platform migration into Exchange or Office 365. 9 Confidential Product Marketing

ICT Migration Implementation Migration inventory Change Implementation Plans Change and User Communications BAU and Pre-Testing Authorizations Communications Governance and Compliance reporting validation Post-migrate run book signed off Prepare Pre-migrate Change Implementation Post Implementation Production Verification Establish Governance, Compliance and Support Structures Confirm readiness Vendor support and warranty readiness Systems tests Performance benchmarking Governance and Compliance audit reporting User acceptance testing Change Implementations signed off Production accepted ICT Discovery Transformation Migration Migration Implementation Operate 10 Confidential Product Marketing

ICT Operational State Post migration support teams Warranty and maintenance verification and activations Business owners sign off Business updates and communications Post migrate support Process integration Close-out Solution optimization Operate state Compliance and Governance tools and systems validation User experience validation Post Implementation Review Logical Decommissioning Physical Decommissioning ICT Discovery Transformation Migration Migration Implementation Operate 11 Confidential Product Marketing

Manage Solutions deployed in the Prepare phase are leveraged and enhanced to provide insight into usage and ongoing management of the newly created target environments. Dell Change Auditor for Active Directory, Exchange, SQL, SharePoint and Windows File Servers - provide an automated governance and compliance platform by enhanced auditing, alerting and security across these windows platforms. Dell Intrust Enterprise - provides event log collection and aggregation service into a single searchable repository. Management Pack Dell Recovery Manager for Active Directory Forest Edition - is an enhanced, fully automated, patented forest recovery solution to mitigate the risk of a full forest or domain failure which would impact every user and system account in the organisation. Dell Active Roles - (optional) automates end user on-and off-boarding within the IT environment and extends the provisioning of users into cloud solutions (Office 365, SFDC, etc.) Active Roles also provides an additional capability in granular, refined, delegated access to Active Directory components via predefined security roles and associated permissions providing versatility in delegated management 12 Confidential Product Marketing

Council Amalgamation Pack Combines: Council Discovery Pack Change Auditor for Active Directory Queries Enterprise Reporter Suite (Active Directory, SQL, Windows Servers) Council Migration Pack Migration Manager for Active Directory Migration for Email (Exchange, Office 365, Lotus Notes, Gmail, Groupwise) Council Management Pack Change Auditor Suite Recovery Manager for Active Directory Forest Edition 13 Confidential Product Marketing

Amalgamated Site 14 Confidential Product Marketing

Case Study Wiltshire Council Amalgamation 15 Confidential Product Marketing

Key Points to Achieving Amalgamation Project Success

Achieving Project Success Ensure a Right-fit Technical Solution (Flexibility is the Key) Understand what you are dealing with, it is the 10% that is not identified in the discovery and high level design and migration plan that can have a significant impact on costs. Complex reconfiguration and rework = dollars! Focus heavily on de-risking the Implementation and Migration Schedules Aside from the expected risk management processes the use of appropriate tools for migrations, incorporating platform governance, compliance, monitoring and performance benchmarking technologies are essential! Carefully Manage the End-User Experience ICT Project objectives need to be effectively communicated across organisations Apply appropriate change management in an end user technology context System administrators and support staff need to be prepared and equipped to manage all their duties in-flight as project activities evolve 17 Confidential Product Marketing

Ensure Right-Fit Technical Solutions Project Risks From experience CSA suggest that the two (2) major project risks in the context of an ICT amalgamation project are: 1. Solution complexity may impact abbreviated timelines and the strategic high profile objectives. Noting though that complexity is hard to avoid in such a project, however over-complexity can be avoided! Note: Project Staff Resourcing and Financial Risks are an assumed as being major so are not included here. 18 Confidential Product Marketing

Ensure Right-Fit Technical Solutions Project Risks From experience CSA suggest that the two (2) major projects risks in the context of an ICT amalgamation project are: 2. Adherence to the relevant policies, guidelines and frameworks in regard to Governance and Compliance aspects of the various migration projects. Appropriate tools and systems for managing these aspects from the and Discovery phase through to the Operational phase are a key requirement 19 Confidential Product Marketing

The Road Ahead How CSA and Dell Software Can Help!

A Myriad of Projects to Manage For Example: Feasibility and Assessments on Shared or Cloud and SaaS/IaaS Services Data Centre (Core Infrastructure Environments) Consolidations Data Networks Integration and Consolidation Security Systems Integration and Consolidation Identity Management (Typically incorporated in such a project these days) Active Directory Integration and Consolidation Messaging and Productivity Platforms Integration and Consolidation Telephony and Contact Centre Integration and Consolidation Line of Business Systems Consolidation Utility Systems Integration and Consolidation SOE Development and SOE Management Systems Consolidation Managed Services and Support Contract Consolidation Etc., Etc. Note: SCADA, Building Management and Site Access /Security systems have also been included in the ICT scope of some of the recent projects, ensure the Amalgamation Strategy clearly identifies where these fit. 21 Confidential Product Marketing

CSA and Dell Software 2 Help with Discovery and Strategic Plan ICT Sub Plans 3 Detailed Design and Migration Councils 1 Advice and Helping with Readines and Preparation 4 Help with Managing and Executing the Transformation Program 22 Confidential Product Marketing

Recent Experience Examples 23 Confidential Product Marketing

CSA Partnerships 24 Confidential Product Marketing