Solution Implementer Guide - Center

Download Report

Transcript Solution Implementer Guide - Center

Optimizing Your Infrastructure for Sustainability
Solution Implementer Guide
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Engagement Approach
Business strategy
Solution areas
Industry
Horizontal
Business
executives
1. Understand business needs and priorities
IT
executives
1. Present relevant integrated capabilities
Architects
IT pro/dev
executives
Audience
Integrated Capability Analysis > Projects, architecture, products
2. Discuss range of potential solution capabilities
2. Position the Integrated Capability approach
Solution road map
Integrated Capability Analysis
Ensure target business capabilities cover process
improvement priorities
Translate business capabilities into required
infrastructure capabilities
Assess current infrastructure maturity
Determine gaps to target infrastructure
Build a road map for integrated capabilities and solution
implementation
Specify required architecture, technologies, and services
Baseline road map for integrated capabilities
Integrated Capability Support for Priority Business Capabilities
Business Driver
REDUCE THE
CARBON
FOOTPRINT BY
MINIMIZING THE
ENVIRONMENTAL
IMPACT OF
TECHNOLOGY
Phase 1
Allow workers to reduce travel by
working remotely, sharing ideas,
posting questions, and having
general discussions via collaborative
workspaces with discussion boards
and blogs, secure access to email,
secure IM, and standardized audio
and video conferencing
Promote the Energy Star program
and Electronic Product
Environmental Assessment Tool
(EPEAT), resulting in lower
equipment costs, less electrical
consumption for server power and
cooling, and less physical space for
servers via products that are Energy
Star and EPEAT compliant;
optimization of the deployment and
management infrastructure; and
group policies for power settings and
centralized control
Enable organizations to remotely
monitor and maintain IT resources,
visualize problems, and take
proactive measures to reduce site
visit costs via interactive,
personalized, and relevant reports
Phase 2
Securely conduct online meetings and
training, and enable workers to
collaborate in real time regardless of
geography to reduce office space
requirements and the need for interoffice and customer-related travel via
collaboration tools that support offline
access to documents; integrated audio
and video conferencing to provide a rich
online meeting experience for internal
and remote users who need secure,
instant collaboration; a unified inbox
with voice mail, email, and fax; and email
and voice mail on a browser or mobile
device
Consolidate multiple workloads onto one
platform and make data centers more
environmentally friendly via server
virtualization to provision new servers
rapidly and consolidate multiple
workloads onto a physical server; and
management of virtual machines
Streamline processes to improve tracking
and control of old and outdated
equipment and to help ensure correct
disposal or recycling of equipment and
other consumables via scorecards and
dashboards within a collaborative portal
platform and self-serve reporting and
analysis tools
Phase 3
Fully integrate telecommuting into the culture
and business practices to reduce automobile and
aircraft emissions via collaborative workspaces
and portals that provide access from almost any
location, presence-enabled line-of-business (LOB)
applications, and software-powered voice over
Internet Protocol (VoIP)
Take advantage of cloud computing to shift and
consolidate resources via a cloud-based platform
Provision servers for application portfolio
management to lower the number of servers by
consolidating applications onto fewer servers via
application virtualization to automate and
simplify the application management life cycle
and reduce regression testing
Develop and distribute applications in the cloud
with minimal resources on the premises via
measurement through a Business Intelligence
(BI)-like reporting sensor and load monitoring by
rack and row; and a cloud-based platform to
build new applications and use interoperable
services in the cloud
Proactively perform preventative maintenance
and achieve other equipment improvements
through automated alerts that are linked to
more details about root causes, effects, and
other troubleshooting data via predictive analysis
and data mining to explore data, discover
patterns, and drill into historical trend reports;
and workflows to generate automated alerts
Integrated Capability Support for Priority Business Capabilities
Business Driver
MEASURE AND
TRACK INTERNAL
RESOURCES AND
ENVIRONMENTAL
IMPACT GOALS
Phase 1
Pull the right information and present it to
executives and reporting authorities so
they can quickly see issues visually and
have an idea of the overall status of
operations via easy–to-use wizards and
advanced data visualization tools that
enable insight into large amounts of
historical data quickly and summarize
analysis results in reports and charts that
are integrated with the portal
infrastructure
Collaborate on and publish product design
objectives, sourcing policies, packaging
and transportation processes, disposal
guidelines, internal models and calculation
of value streams, and product carbon
footprints via effective document
management with workflow, collaboration,
and search capabilities
Allow managers to train and monitor
employees to promote and evaluate
remote workers’ effectiveness via custom
Web sites and self-serve reporting and
analysis tools; conferencing to support
training; and social computing to support
training and monitoring
Phase 2
Provide rich visualization of resource
metrics to help executives and reporting
authorities rapidly identify trends and
issues for better predictive analysis via
interactive and cascaded scorecards and
dashboards that are integrated with the
portal infrastructure, to analyze and
interpret data and to reveal trends and
patterns
Provide collaboration portals for
suppliers' approvals and receiving
submission requirements of carbon
footprint and compliance data via
portals tied to LOB systems or business
applications; and authoring and
publishing Web content
Allow for analysis and reporting in near
real time to gain visibility and insight
into and control over productivity across
all employees who work from home via
Web-based self-serve reporting and
analysis tools connected to subjectoriented data
Improve alignment with business
strategy by maximizing the ways
resources are used via strategy-driven,
enterprise-wide scorecards and
enterprise project management
Phase 3
Enable executives and reporting authorities
to take proactive measures when certain
trends begin to change to enable analysis
and understanding of the root cause and
effects, and to share details and best
practices via root-cause analysis with realtime alerts that are integrated with the
portal infrastructure and that link to more
details to enable visualization and
exploration of multi-dimensional data
Share and collaborate on product,
packaging, storage, and transportation
improvement opportunities internally and
throughout the supply chain, and in
business modeling and simulation tools via
automated core business processes;
integration across applications to enable
internal and federated access to suppliers
and partners; and streamlined creation,
publication, and life cycle management of
Web content
Define performance levels for
telecommuters and measure the outcomes
in real time via Web parts with KPIs and
personalized performance views
Assign role-based key performance
indicators (KPIs) for key business metrics
that can be monitored for productivity via
role-based scorecards and KPIs
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1
Phase 2
Phase 3
SUPPORT
CREATION,
MANAGEMENT,
AND
MONITORING OF
COMPLIANCE
FRAMEWORKS
Pull together relevant regulatory
compliance metrics about energy
consumption, carbon footprint, and
greenhouse gas emissions to identify
ways to fund incentives and drive
participation via data mart and ITdriven reports with effective content
management to integrate and capture
auditable data consistently over time,
to reduce risk of exposure to potential
regulations, taxation, or increases in
energy costs
Accelerate collaboration and information
exchange to share best practices and
learning, to raise awareness for
compliance regulations via Web-based
self-serve reporting; custom Web sites and
multi-threaded online discussion forums;
and search technology to share learning
across the organization
Proactively monitor compliance metrics,
triggered events, and alerts when compliance
is compromised, and give prescriptive
guidance about how to mitigate future risk
via scorecards and dashboards to monitor
compliance metrics, and custom workflows
to generate alert notifications when
exceptions occur
NORMALIZE
CORPORATE
COMPLIANCE
WITH EXTERNAL
ENVIRONMENTAL
REGULATIONS
Give the compliance and audit team a
consolidated view of environmental
regulations, policies, and procedures to
make critical information more easily
available via interactive diagrams with
data visualization to represent complex
business data sets cleanly and clearly
for compliance and auditing purposes;
and content management to collect
and manage information to create the
consolidated views
Enable compliance awareness and
adoption while monitoring compliance
and generating alerts to be aware of every
non-compliance issue via custom
workflows that use external business rules
and generate alert notifications when
exceptions occur, and dissemination of
policies, practices and compliance status;
and search technology to support
awareness (discoverability of information)
Provide advanced data visualization to make
it easier for users to understand and respond
to new compliance requirements via
scorecards and dashboards that include
information relevant to emerging business
and technological compliance initiatives,
including energy conservation programs or
conservation goals
Introduce consistency into
environmentally sustainable or Green
initiatives by driving awareness and
making processes automated,
repeatable, and reliable via workflows
that make processes more prescriptive
and repeatable, and assure that the
same steps are carried out each time
and are shared across the organization
Enable business stakeholders to design,
interact with, monitor, innovate, and
automate compliance processes and drive
collaboration across the organization via
workflows that are integrated into custom
line-of-business applications with nearreal-time tracking of in-process workflows
Optimize compliance processes by managing
initiatives, monitoring risks, and delivering
alerts to appropriate people to raise
environmental awareness via custom
workflows that use external business rules
and generate alert notifications when
exceptions occur
Integrated Capability Support for Priority Business Capabilities
Business Driver
RESPOND TO
CONSUMER
EXPECTATIONS
THAT INDUSTRIES
TAKE A HOLISTIC
APPROACH TO
SUSTAINING THE
ENVIRONMENT
Phase 1
Hire and retain next-generation workers by
providing a virtual office working environment
that has optimized and secure access to critical
applications, documents, and data via a virtual
private network (VPN), offline and online
access to email, collaborative workspaces,
secure IM, standardized audio/video
conferencing, and the ability to search within
content repositories
Increase customer awareness of the "Green
code of conduct" the organization enforces in
its core operations such as e-commerce,
telecommuting, and other activities via custom
Web sites and multi-threaded online
discussion forums; and Web content
management to build awareness by enabling a
controlled and broad set of users to contribute
and share content
Standardize the methodology for collection
and assessment of data about energy
consumption, carbon footprint, and
greenhouse gas emissions to identify areas for
improvement to the strategy to include Green
technologies via a data mart to integrate and
store data related to energy consumption; and
reporting and search to collect and assess
carbon footprint and greenhouse gas
emissions data
Promote sustainable practices,
environmentally preferable offerings, and
ecologically efficient strategies to raise
customer awareness of corporate involvement
in Green initiatives via custom Web sites and
multi-threaded online discussion forums and
with Web content management
Phase 2
Provide remote workers with the ability to
communicate in real time with peers and
customers even while on the go via
comprehensive pre-authentication;
authorization services and single sign on;
VPN-based full network access;
collaboration tools that support offline
access to documents; integrated audio and
video conferencing; a unified inbox with
voice mail, email, and fax; and email and
voice mail on a browser or mobile device
Strengthen the organization's Web
presence by branding products and
services with specific environmentally
friendly attributes such as recyclable or
biodegradable, or by establishing
measurable sustainability baselines and
improvements via custom Web sites with
content that supports environmentally
friendly branding; and integrated rich
media capabilities and reporting on KPIs
Implement environmentally sustainable
business policies and practices to align
Green initiatives with the brand image via
collaboration and user-driven reporting
Provide customers the ability to share
ideas, give feedback, and suggest
improvements to sustainable offerings,
including products and services, to keep
customers engaged via social computing
technologies such as blogs and wikis to
share views and opinions, IT-driven reports,
and authoring and publishing Web content
Phase 3
Update the infrastructure for next-generation
workers by using the cost-savings gained by
enabling remote workers via application
virtualization for automated application
distribution, collaborative workspaces and
portals that provide access from almost any
location, presence-enabled LOB applications,
and software-powered VoIP
Safeguard information when workers access
sensitive data from remote locations via rights
management and information protection
Collect customer feedback and suggestions for
improvement to the organization's
environmental initiatives via custom Web sites
that have multi-threaded online discussion
forums; social computing technologies such as
blogs, wikis, and other people-centric venues
that support communication among people
with common interests; and streamlined
creation, publication, and life cycle management
of Web content
Analyze sustainability performance data, plans,
and targets to increase performance
transparency and mitigate risk via predictive
reports linked to an environmental sustainability
dashboard that tracks and displays effects of
these policies and practices
Measure and report on metrics related to Green
initiatives and identify opportunities to stimulate
more sustainable processes to improve customer
relationships via reports, scorecards, and
dashboards to analyze, monitor, and plan
environmental sustainability initiatives; and
streamlined creation, publication, and life cycle
management of Web content
Integrated Capability Support for Priority Business Capabilities
Business Driver
PARTICIPATE IN
BUSINESS
OPPORTUNITIES
THAT SUSTAIN
THE
ENVIRONMENT
Phase 1
Collect employee feedback and
knowledge, share best practices, and learn
from each other to protect and sustain the
environment via a centralized knowledge
base and content-centric social computing
Improve access to key operational and
resource data across the organization to
identify the regulatory, physical, and
general risks that climate change poses to
the business via a data mart with
heterogeneous data support to access
data that is shared throughout the
organization; desktop analysis; and a
collaboration infrastructure and search
technology to improve access to data
Easily tap into information about carbon
position, footprint, and liability stored in
disparate data systems and develop key
process indicators to quantify metrics for
managing carbon certificate inventory via
a data mart to integrate and store data
about to carbon use; scorecards with KPIs
for managing the carbon certificate
inventory; and a collaborative workspace
and portals to help workers manage and
disseminate relevant information
Phase 2
Phase 3
Make the knowledge base and portal
infrastructure available to more people
within and outside the organization to
improve collaboration via integration of
the knowledge base with collaborative
workspaces and the portal
infrastructure, and forms-driven
workflows to route ideas
Provide social computing capabilities within
and across the enterprise, including
suppliers and customers, to collect feedback
and gather suggestions for improvement via
social computing technologies such as blogs
and wikis to share views and opinions, and
subscriptions to external newsfeeds to learn
about new developments
Provide the ability to analyze metrics
related to energy usage, carbon
emissions, water inefficiencies, and
greenhouse gas emissions to make
informed risk assessments via
scorecards and dashboards to
seamlessly analyze off-target KPIs
Enable ongoing optimization and alignment
of processes with corporate sustainability
guidelines by analyzing the carbon footprint
and environmental impact of suppliers to
maintain a resilient and sustainable supply
chain via strategy-driven enterprise-wide
scorecards to monitor and analyze KPIs in
real time
Enable workers to monitor key
performance indicators that are linked
to various systems to help initiate
processes such as carbon trading via
balanced scorecards that are integrated
with the portal infrastructure and that
have defined KPIs that draw data from
data warehouse, and dashboard
content that is optimized for the Web
Enable real-time availability of operational
information across the organization and
provide the ability to compare data with
competitors and analyze trends via a
centralized and managed data warehouse
that helps ensure real-time availability of
operational information; and reporting and
analysis to identify trends, patterns, and
opportunities
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Sophistication of the Solution
PARTICIPATE IN BUSINESS
OPPORTUNITIES THAT SUSTAIN THE
ENVIRONMENT
REDUCE THE CARBON FOOTPRINT
BY MINIMIZING THE
ENVIRONMENTAL IMPACT OF
TECHNOLOGY
RESPOND TO CONSUMER
EXPECTATIONS THAT
INDUSTRIES TAKE A HOLISTIC
APPROACH TO SUSTAINING
THE ENVIRONMENT
MEASURE AND TRACK
INTERNAL RESOURCES AND
ENVIRONMENTAL IMPACT
GOALS
NORMALIZE CORPORATE
COMPLIANCE WITH EXTERNAL
ENVIRONMENTAL REGULATIONS
SUPPORT CREATION,
MANAGEMENT, AND
MONITORING OF COMPLIANCE
FRAMEWORKS
Phase 1
Provides basic support for the most
critical elements of the business
driver
Phase 2
Provides adequate, typical support for
critical and priority elements of the
business driver
Phase 3
Provides thorough, streamlined
support for the business driver
that enables differentiated levels of
performance
Solution Guidance
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase Definition
For each business driver, list the business challenges, solution features, and business benefits for this solution phase. Use this
information and the “Integrated Capability Support for Priority Business Capabilities” slides to structure the conversation with
IT professional(s) for capturing, refining, and baselining business problems and solution functionality priorities.
Mapping
The Optimization mapping indicates the maturity level required for each capability to fully support the features specified in
this solution phase. Use the mapping as a starting point to determine appropriate maturity levels for the solution. After
mapping the solution, assess the gap between the current and desired infrastructure to:
• Understand the scope and sequencing of work required
• Organize a deployment road map
Technologies
Use the results of the Optimization mapping to determine the technologies required for the features and supporting
capabilities specified in this solution phase.
Conceptual Architecture
Use this high-level, use case diagram to provide the “black box” definition of this solution phase. Customize to your solution
definition during the integrated capability analysis.
Logical Architecture
Use this logical, component-level architecture view to show all software components and how they interact to support this
solution phase. Tailor to fit your particular solution definition during the integrated capability analysis.
Note: Physical architecture is covered in the Architecture Guide also used during the integrated capability analysis.
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Phase 1
Business Driver
PHASE
DEFINITION
Needs
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Business Capabilities
REDUCE THE CARBON
FOOTPRINT BY
MINIMIZING THE
ENVIRONMENTAL
IMPACT OF
TECHNOLOGY
Establish and support a secure and
continuous work environment to reduce
environmental impact related to travel
and commuting
Make data centers more environmentally
friendly
Manage utilization of distributed IT
resources such as laptops, printers, and
other devices
Allow workers to reduce travel by working remotely, sharing ideas, posting
questions, and having general discussions
Promote the Energy Star program and Electronic Product Environmental
Assessment Tool (EPEAT), resulting in lower equipment costs, less electrical
consumption for server power and cooling, and less physical space for servers
Enable organizations to remotely monitor and maintain IT resources, visualize
problems, and take proactive measures to reduce site visit costs
MEASURE AND TRACK
INTERNAL RESOURCES
AND
ENVIRONMENTAL
IMPACT GOALS
Establish resource utility baselines and the
means to measure and report
improvements
Empower customers to make ecologically
friendly choices based on the reported
environmental impact of products
Track and measure the impact of
teleworking
Pull the right information and present it to executives and reporting authorities
so they can quickly see issues visually and have an idea of the overall status of
operations
Collaborate on and publish product design objectives, sourcing policies,
packaging and transportation processes, disposal guidelines, internal models
and calculation of value streams, and product carbon footprints
Allow managers to train and monitor employees to promote and evaluate
remote workers’ effectiveness
SUPPORT CREATION,
MANAGEMENT, AND
MONITORING OF
COMPLIANCE
FRAMEWORKS
Give businesses incentives to comply with
regulations, reduce carbon, save energy,
and have workers commute less
frequently
Pull together relevant regulatory compliance metrics about energy
consumption, carbon footprint, and greenhouse gas emissions to identify ways
to fund incentives and drive participation
NORMALIZE
CORPORATE
COMPLIANCE WITH
EXTERNAL
ENVIRONMENTAL
REGULATIONS
Ensure that organizations are informed
and complying with environmental
sustainability regulations
Define and convert to environmentally
sustainable or Green processes that are
agile and adaptable to future regulations
Give the compliance and audit team a consolidated view of environmental
regulations, policies, and procedures to make critical information more easily
available
Introduce consistency into environmentally sustainable or Green initiatives by
driving awareness and making processes automated, repeatable, and reliable
Phase 1
Business Driver
RESPOND TO
CONSUMER
EXPECTATIONS THAT
INDUSTRIES TAKE A
HOLISTIC APPROACH
TO SUSTAINING THE
ENVIRONMENT
PARTICIPATE IN
BUSINESS
OPPORTUNITIES THAT
SUSTAIN THE
ENVIRONMENT
PHASE
DEFINITION
Needs
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Business Capabilities
Attract, hire, and retain workers in virtual
workplaces
Improve the organization's image related
to corporate social responsibility (CSR)
by supporting measurable improvements
in environmental sustainability and
Green initiatives
Include Green technologies as a strategy
that complements brand image
Empower customers by providing
incentives to be more environmentally
aware and choose sustainable offerings
Hire and retain next-generation workers by providing a virtual office working
environment that has optimized and secure access to critical applications,
documents, and data
Increase customer awareness of the "Green code of conduct" the organization
enforces in its core operations such as e-commerce, telecommuting, and other
activities
Standardize the methodology for collection and assessment of data about
energy consumption, carbon footprint, and greenhouse gas emissions to
identify areas for improvement to the strategy to include Green technologies
Promote sustainable practices, environmentally preferable offerings, and
ecologically efficient strategies to raise customer awareness of corporate
involvement in Green initiatives
Capturing the power and passion of
employees to learn, share, and reevaluate opportunities to sustain the
environment, so the organization can
implement opportunities that have the
highest potential for impact and profit
first
Address the risk of climate change for
the business, supply chain, and target
markets
Establish a carbon trading platform to
plan and manage the carbon certificate
inventory
Collect employee feedback and knowledge, share best practices, and learn from
each other to protect and sustain the environment
Improve access to key operational and resource data across the organization to
identify the regulatory, physical, and general risks that climate change poses to
the business
Easily tap into information about carbon position, footprint, and liability stored
in disparate data systems and develop key process indicators to quantify
metrics for managing carbon certificate inventory
Phase 1
PHASE
DEFINITION
B
Core IO
Data Center
Services
Client
Services
Data Center Mgt &
Virtualization
Server Security
Networking
Storage
Client Mgt &
Virtualization
Client Security
Identity
Identity & Access
& Security
Information
Protection &
Services
Control
IT Process & Compliance
Workspaces
Portals
Collab
Social Computing
Project Mgt
Messaging
IM/Presence
UC
Conferencing
BPIO
Voice
Information Mgt
ECM
Process Efficiency
Compliance
Enterprise Information Access
Interactive Experience &
Search
Navigation
Dashboards
Reporting
& Analysis Analytics & Data Mining
Content
Creation
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
S
R
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
D
There is a defined, end-to-end server deployment process that includes application compatibility testing. Capacity management processes for consolidation of business, services, resources,
and servers are manual. Software asset management processes are automatic and a tool and data repository for hardware and software are in place to track and audit server assets. IT system
(hardware, hypervisor, OS, and application)-aware monitoring and reporting on the majority of applications are in place across the heterogeneous environment, with defined service-level
agreements and manual remediation functionality. Limited process in place to assign costs for IT Services back to business groups. Some Production server resources are virtualized. A
virtualized server pool is being offered as services (minimal Private Cloud progress). The organization actively uses virtualization to consolidate servers for production workloads. Users can
only have visibility into specific VM's based on business units but manual security isolation exists between the VM's themselves.
Remote access is secure, standardized, and available to end users across the organization.
Redundant Domain Name System servers exist in a single location and provide fault tolerance. Zone creation and record updates are automatic to support directory services.
Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite.
An image library and deployment process are in place for operating systems. Configurations are standardized; systems are assessed for compliance, and some settings are enforced through
group policies. Desktop applications and system events are centrally monitored for critical desktop systems. Hardware and software inventory is automated and reporting is centralized.
Information may not be complete or accurate, and typically is not used for decision-making. Inventory is reconciled annually. Some applications are virtualized, but most are installed as
packages or are included in the standard image. A solution is in place to configure and update devices.
Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall. Non-PC devices are managed and protected through a separate process.
Most applications and services share a common directory for authentication; some point-to-point synchronization exists across different directories, applications, and repositories. Multiple
application directory services exist to support multiple standards. There is a centralized access policy for business resources, with some standardization in the policy.
Individual business units align with the IT service portfolio. IT service costs, returns, capacity, availability, continuity, and integrity are reported. Each IT service has a process to manage bug
handling and design changes. IT services are tested according to defined test plans based on specifications. Each IT service has its own change and configuration management process;
standard changes are identified for each IT service. Ownership and accountability are assigned for each IT service. Risk and vulnerability are formally analyzed for each IT service. IT
compliance objectives and activities are defined for each IT service. Each IT service provides service-level or operational-level agreements. Incident and problem management processes are
in place for each IT service. IT policies are documented for each IT service. Monitoring and reporting are centralized for protection against malware, protection of information, and identity
and access technologies. Monitoring, reporting, and auditing are in place for IT services. Processes to manage incidents and problems are in place for each IT service.
Workspaces are managed at the departmental level and are available from individual productivity applications.
Users and groups can publish content directly to some portals. Workflow for review and approval is built-in and automated. Multiple portals exist. Directory services, authentication, and
authorization are not uniform across portals, requiring users to sign in multiple times; user management methods are redundant.
News feeds are typically delivered through RSS or email alerts. Social feedback is generally limited to comments in email, forums, or within individual documents. Blogs, wikis, and podcasts
are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This
Content is accessible through multiple mobile devices.
Secure, remote, online and offline access to rich mailbox and calendar functionality exists inside and outside the firewall. The messaging solution (email and calendar) includes basic antivirus, anti-spam, and anti-phishing protection.
Users have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall. Peer-to-peer voice and video communications are based on a
single directory.
A standalone audio conferencing service is available enterprise-wide and is managed by IT. Desktop video conferencing is available outside the firewall only through room-based systems,
and using methods such as virtual private networking and remote access services that are managed by IT. The end-user experience is disconnected (requires specialized end-user devices or
applications). Secure web conferencing is managed by IT, has policy-based access control, uses a single directory, and is available from PCs and web browsers inside and outside the firewall.
An enterprise-wide, standalone audio conferencing service is also managed by IT.
Metadata capture is enforced; however, the capture process is manual and labor-intensive. Managed workspaces exist at the departmental level and are available from individual
productivity applications. Websites are built using off-the-shelf web content management platforms; styles and templates are used consistently. Content owners are empowered by
technology to publish and manage their own information, but most still rely on web specialists.
Custom solutions developed by IT are used to deliver and manage key forms electronically. Form data and scanned paper-based content are stored in a custom data repository. The
organization uses basic workflow tools to process, review, and approve documents. Simple workflow routing is part of the collaborative workspace infrastructure.
Content can be rapidly identified and preserved. Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including email.
Reporting occurs manually.
Most unstructured information from intranets, email, and content management repositories is indexed. Some structured content from databases, people, and expertise information is indexed.
Diagrams are linked to data and shared as static web pages or in PDF. Users can search for unstructured documents and structured reports based on metadata and report content. IT
manages data connections for users. Users also can connect to external data sources and combine them in a single report. Users create and manage personal or team dashboards and
scorecards based on a balanced scorecard methodology that includes dynamic and cascading updates.
End users perform ad hoc queries and data analysis by using spreadsheet or other analysis tools, and by pulling data from sources sanctioned by IT in addition to other non-sanctioned
sources. Information workers share their analysis through the business intelligence portal.
IT manages reporting as a standalone application or function. Data is shared from a source library to which end users can apply basic filters.
Design & Management: Standards and practices for discrete areas such as physical storage and capacity planning, performance and tuning, data integrity, and security exist enterprise-wide.
Integration: Data "silos" are consolidated by using basic extract, transform, and load (ETL) packages to combine, integrate, and cleanse raw data from diverse data sources.
Human Workflow: Business stakeholders can design, interact with, monitor, innovate, and automate critical business processes in a more defined, monitored, and reportable manner using workflows.
Software Quality: Active development processes use modern tools and frameworks to support object-oriented and rapid development, and help manage evolving application architectures.
Phase 1
PHASE
DEFINITION
B
Data Center Mgt &
Virtualization
Core IO
Data Center Server Security
Services
Client
Services
R
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
D
Windows Server® 2008/2008 R2; Microsoft® Hyper-V™ Server 2008/2008 R2; Microsoft System Center Configuration Manager 2007 R3/2012; Microsoft System Center
Operations Manager 2007 R2/2012; Microsoft System Center Virtual Machine Manager 2008 R2/2012; Windows® Azure™ Platform; Opalis; Microsoft System Center Orchestrator
2012; Microsoft System Center Service Manager 2010/2012
Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Microsoft Forefront® Threat Management Gateway 2010; Microsoft Internet Security and
Acceleration Server 2006; Microsoft Forefront Protection 2010 for Exchange Server; Microsoft Forefront Security for Exchange Server; Microsoft Forefront Endpoint Protection
2010/2012
Networking
Windows Server 2008/2008 R2; Windows 7
Storage
Windows Server 2008/2008 R2; Windows 7; Microsoft Windows Storage Server 2008/2008 R2
Client Mgt &
Virtualization
Microsoft Deployment Toolkit 2008/2010; Windows Automated Installation Kit; Microsoft Diagnostics and Recovery Toolset; Microsoft Virtual Desktop Infrastructure Suite;
Windows 7; Windows Vista®; Windows Server 2008/2008 R2; Microsoft Application Compatibility Toolkit 5.0/5.5; Microsoft Windows Server Update Services 2.0/3.0; Microsoft
Desktop Optimization Pack 2008 R2/2009 R2; System Center Configuration Manager 2007 R3/2012; Microsoft Exchange Server 2007/2010; Windows Phone 7; Microsoft
Windows Mobile® 6.1/6.5; Windows Embedded Device Manager 2011
Client Security
Forefront Endpoint Protection 2010/2012; Windows 7 ; Windows Vista; Windows Server 2008/2008 R2
Identity & Access
Identity
& Security Information Protection &
Services
Control
IT Process & Compliance
Collab
S
MAPPING
Windows Server 2008/2008 R2
Microsoft Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; Microsoft System Center Service
Manager 2010/2012; Hyper-V Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Forefront Threat Management Gateway 2010; Internet Security and Acceleration
Server 2006; Forefront Endpoint Protection 2010/2012; Windows Server 2008/2008 R2; Microsoft Security Assessment Tool; System Center Data Protection Manager 2010/2012;
System Center Virtual Machine Manager 2008 R2/2012; System Center Orchestrator 2012; Opalis
Workspaces
Microsoft SharePoint® Server 2010; Microsoft Office SharePoint Server 2007; Microsoft Office 2007/2010; SharePoint Online; Microsoft Office SharePoint Designer 2007;
Microsoft SharePoint Designer 2010
Portals
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online; Office 2007/2010
Social Computing
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010
Project Mgt
UC
Messaging
Exchange Server 2007/2010; Microsoft Outlook® 2010; Microsoft Office Outlook 2007; Microsoft Exchange Online; Microsoft Exchange Hosted Encryption; Microsoft Exchange
Hosted Archive
IM/Presence
Microsoft Office Communications Server 2007 R2; Microsoft Lync™ Server 2010; Microsoft Office Communications Online; Microsoft Office Communicator 2007 R2; Microsoft
Lync 2010; Microsoft Lync Online
Conferencing
Office Communications Server 2007 R2; Lync Server 2010; Office Communicator 2007 R2; Lync 2010; Microsoft Office Live Meeting 2007; Lync Online
BPIO
Voice
Information Mgt
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online; SharePoint Designer 2010; Office SharePoint Designer 2007
Process Efficiency
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online; SharePoint Designer 2010; Office SharePoint Designer 2007
Compliance
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010
Enterprise Information Access
Interactive Experience &
Search
Navigation
Dashboards
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010
Reporting Analytics & Data Mining
& Analysis
Report Generation &
Distribution
Authoring
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
ECM
Content
Creation
SharePoint Server 2010; Office SharePoint Server 2007; Microsoft SQL Server® 2008/2008 R2; Office 2007/2010; SharePoint Online; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; SharePoint Online; Office 2007/2010
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
SQL Server 2008/2008 R2
Integration Dependencies
Microsoft BizTalk® Server 2009/2010; Microsoft Visual Studio® Team System 2008/2010
Development Dependencies
Visual Studio Team System 2008/2010; Microsoft Expression® Studio 3/4; Microsoft Silverlight™ 4/5
Phase 1
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase 1
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Phase 2
Business Driver
PHASE
DEFINITION
Needs
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Business Capabilities
REDUCE THE CARBON
FOOTPRINT BY
MINIMIZING THE
ENVIRONMENTAL
IMPACT OF
TECHNOLOGY
Establish and support a secure and
continuous work environment to reduce
environmental impact related to travel
and commuting
Make data centers more environmentally
friendly
Manage utilization of distributed IT
resources such as laptops, printers, and
other devices
Securely conduct online meetings and training, and enable workers to
collaborate in real time regardless of geography to reduce office space
requirements and the need for inter-office and customer-related travel
Consolidate multiple workloads onto one platform and make data centers more
environmentally friendly
Streamline processes to improve tracking and control of old and outdated
equipment and to help ensure correct disposal or recycling of equipment and
other consumables
MEASURE AND TRACK
INTERNAL RESOURCES
AND
ENVIRONMENTAL
IMPACT GOALS
Establish resource utility baselines and the
means to measure and report
improvements
Empower customers to make ecologically
friendly choices based on the reported
environmental impact of products
Track and measure the impact of
teleworking
Provide rich visualization of resource metrics to help executives and reporting
authorities rapidly identify trends and issues for better predictive analysis
Provide collaboration portals for suppliers' approvals and receiving submission
requirements of carbon footprint and compliance data
Allow for analysis and reporting in near real time to gain visibility and insight
into and control over productivity across all employees who work from home
Improve alignment with business strategy by maximizing the ways resources are
used
SUPPORT CREATION,
MANAGEMENT, AND
MONITORING OF
COMPLIANCE
FRAMEWORKS
Give businesses incentives to comply with
regulations, reduce carbon, save energy,
and have workers commute less
frequently
Accelerate collaboration and information exchange to share best practices and
learning, to raise awareness for compliance regulations
NORMALIZE
CORPORATE
COMPLIANCE WITH
EXTERNAL
ENVIRONMENTAL
REGULATIONS
Ensure that organizations are informed
and complying with environmental
sustainability regulations
Define and convert to environmentally
sustainable or Green processes that are
agile and adaptable to future regulations
Enable compliance awareness and adoption while monitoring compliance and
generating alerts to be aware of every non-compliance issue
Enable business stakeholders to design, interact with, monitor, innovate, and
automate compliance processes and drive collaboration across the organization
Phase 2
Business Driver
RESPOND TO
CONSUMER
EXPECTATIONS THAT
INDUSTRIES TAKE A
HOLISTIC APPROACH
TO SUSTAINING THE
ENVIRONMENT
PARTICIPATE IN
BUSINESS
OPPORTUNITIES THAT
SUSTAIN THE
ENVIRONMENT
PHASE
DEFINITION
Needs
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Business Capabilities
Attract, hire, and retain workers in virtual
workplaces
Improve the organization's image related
to corporate social responsibility (CSR)
by supporting measurable improvements
in environmental sustainability and
Green initiatives
Include Green technologies as a strategy
that complements brand image
Empower customers by providing
incentives to be more environmentally
aware and choose sustainable offerings
Provide remote workers with the ability to communicate in real time with peers
and customers even while on the go
Strengthen the organization's Web presence by branding products and services
with specific environmentally friendly attributes such as recyclable or
biodegradable, or by establishing measurable sustainability baselines and
improvements
Implement environmentally sustainable business policies and practices to align
Green initiatives with the brand image
Provide customers the ability to share ideas, give feedback, and suggest
improvements to sustainable offerings, including products and services, to keep
customers engaged
Capturing the power and passion of
employees to learn, share, and reevaluate opportunities to sustain the
environment, so the organization can
implement opportunities that have the
highest potential for impact and profit
first
Address the risk of climate change for
the business, supply chain, and target
markets
Establish a carbon trading platform to
plan and manage the carbon certificate
inventory
Make the knowledge base and portal infrastructure available to more people
within and outside the organization to improve collaboration
Provide the ability to analyze metrics related to energy usage, carbon
emissions, water inefficiencies, and greenhouse gas emissions to make
informed risk assessments
Enable workers to monitor key performance indicators that are linked to
various systems to help initiate processes such as carbon trading
Phase 2
PHASE
DEFINITION
B
Data Center Mgt &
Virtualization
Data Center Server Security
Services
Networking
Core IO
Storage
Client
Services
Client Mgt &
Virtualization
Client Security
Identity
Identity & Access
& Security
Services Information Protection &
Control
IT Process & Compliance
Workspaces
Collab
Portals
Social Computing
Project Mgt
Messaging
UC
IM/Presence
Conferencing
Voice
BPIO
Information Mgt
ECM
Process Efficiency
Compliance
Enterprise Information Access
Interactive Experience &
Search
Navigation
Dashboards
Reporting Analytics & Data Mining
& Analysis
Content
Creation
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
S
R
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
D
The IT software asset life cycle is managed using vision, policies, procedures, and tools. Asset and business target management are based on reliable information. Use-analysis tools are used to predict the
impact of change. The organization has a consolidated view and management process for heterogeneous virtual environments, including branch offices. Per-project charge back based on hardware and
software acquisition cost and based on resources allocated to the project. A virtualized server pool is offered as a service. Several Compliance and cost savings strategies leverage that Private Cloud.
Secure remote access is integrated with quarantine for compliance with corporate policy.
Automatic server cleanup uses scavenging. Redundant Domain Name System servers exist in multiple locations and provide fault tolerance.
Critical data is backed up by taking snapshots using a centralized, application-aware system. Backup copies are stored separately at a physical location or by using a cloud-based service, with fully tested
recovery or failover based on service-level agreements.
Desktop applications and system events are centrally monitored and reported, and trends are analyzed and integrated into incident management systems. All mobile access to internal systems is proxied
through the messaging system. Installation and inventory of standard corporate applications on mobile devices are manual. Mobile devices are managed by security policy provisioning and remote
deletion. Mobile phones are used for over-the-air synchronization with email, calendar, and contacts.
Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices. Desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability
shield, and quarantine.
A centralized, common-access policy is defined for business resources, applications, and information resources; entitlement is managed. A centralized, scalable directory works across geographies for all
intranet applications, and supports authentication and authorization. A single application directory service covers multiple standards and most applications.
Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and email).
IT service issues and design changes are tracked by using formal processes; testing is automated where possible. Ownership and accountability, compliance objectives and activities are integrated across
IT services and automated where possible. The change and configuration management process is integrated across IT services. The organization aligns with the IT service portfolio. Management regularly
reviews how the service portfolio and strategy align, and reports costs and returns across IT services. IT policies, Monitoring, reporting, and auditing, SLAs, problem management and incident
management are integrated across IT services; some capabilities exist for event investigation, analysis, and forensics. Management reviews operational health regularly.
Team members can simultaneously author, edit, and review content across Clients (including Devices). Workspaces are centrally managed, customizable, and reusable, and provide users the capability to
collaborate through web browsers and mobile devices. Offline synchronization is supported.
Line-of-business applications are routinely surfaced through the portal and have the capability to write securely to back-end systems and to maintain data integrity; information from multiple
applications can be combined in dashboards. Publishers can direct content to specific audience targets; portals deliver a customized, targeted, or aggregated view of information to individuals based on
user identity, role & device on which content is consumed. Governance policies are fully in place, including single sign-on supported by uniform directory services.
Teams plan, track, and share tasks in lists by using collaboration tools. Multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop
productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.
Provisioning of user inboxes is driven by business demand, uses a single directory, and provides features based on user needs. Secure, policy-driven access to a unified inbox from PCs, phones, and web
browsers exists inside and outside the firewall.
Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.
A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications. The platform also has a single
user interface, a single directory, and is available across organizational boundaries.
Voice mail is part of a unified inbox that features single storage and a unified directory. Retention and protection policies are enforced by the organization; messages are available as voice or transcribed
text and are accessible from PCs, phones, or web browsers.
Metadata is centrally managed and deployed across the business. Metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created,
published, and managed by business owners who use appropriate publishing workflows to govern review cycles. Traditional and new media content types are managed consistently in a single repository.
The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications. People can
design and validate customized parallel or serial workflows and electronic forms visually as needed, run them manually or automatically, and monitor them in real time. Data from forms and scanned
paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications.
All information is well managed in accordance with government and industry regulations; content can be rapidly identified and preserved, and the in-house aspect of the discovery process is managed
by automated workflow. An integrated solution for electronic discovery of information is in place.
Unstructured content from the web, collaborative and content-managed data repositories, databases, and line-of-business applications are indexed.
Diagrams are dynamically linked to data and shared using a web browser. Diagrams display real-time data from one or more sources; data can be refreshed automatically at specific intervals. Personal,
team, and corporate dashboards and scorecards include communication, collaboration, search, and content management capabilities on a single platform that IT manages and users can modify.
Data mining analysts use statistical and data mining software to analyze business data and build models to enable future decisions, predict trends, and find correlations in business attributes using a
limited set of data mining algorithms and limited data volumes. The analysts then publish results of predictive analyses to business users through reports, spreadsheets, charts, and visualizations. End
users consume the results of predictive analyses or embedded line-of-business applications to improve business decisions. IT provisions the business intelligence portal infrastructure with advanced
business intelligence capabilities that include search, dashboards, scorecards, alerts, social interaction, browser-based thin-client experience, and advanced visualization. Users can easily find data,
analyses, and reports on the portal by conducting intelligent searches, and can set up alerts or notifications based on changes to key business metrics.
IT manages reporting components and shared data sets to provide a highly interactive library and reporting environment in which end users can modify or edit source content, change the display, sort,
apply filters, and customize reports after they are generated.
Content authoring tools support rich formatting and rich media editing, and content can be secured with rights management. Tools are available to capture notes and research gathered by using search.
Key applications support optimized usage scenarios, for example, web for reach, rich client for responsiveness, and phone for mobility.
Core productivity applications offer standards-based tools for users to confirm accessibility of content. Productivity applications are designed to facilitate use by people who need accessibility features.
High Availability: Systems are able to handle highly tuned workloads with quantified service-level agreements (SLAs) and real-time query performance to achieve and maintain high levels of data
availability and business continuity; advanced restoration capabilities are in place across the enterprise; Planned Architecture: Extensible architecture improves manageability, availability,
programmability, scalability, and performance of a loosely-coupled data environment to support a high volume of transactions; Verification and Validation: Data verification and validation are
automated using reconciliation tools to facilitate adherence to business rules and provide context across multiple, diverse source systems.
Enterprise Application Integration: Access to business services and information is aggregated into a set of dynamic, composite business applications to gain more accurate, comprehensive information;
Service Architecture: Federated security with trust brokering is facilitated between domains; development methods are established to publish, discover, and use services in technology-neutral and
standard ways.
User Experience: Investment in next-generation development tools provides tight integration of various development tasks and offers the highest-quality user experience on multiple devices;
Enterprise Design: Rich monitoring and diagnostic capabilities enable development of applications that are capable of automatic tuning and alerting users to critical status.
Phase 2
PHASE
DEFINITION
B
Data Center Mgt &
Virtualization
Data Center
Services
Server Security
Networking
Core IO
Storage
Client
Services
Client Mgt &
Virtualization
Client Security
Identity & Access
Identity
& Security Information Protection &
Services Control
IT Process & Compliance
Workspaces
Collab
UC
BPIO
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
D
Windows Server 2008/2008 R2; Hyper-V Server 2008/2008 R2; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System
Center Virtual Machine Manager 2008 R2/2012; Windows Azure Platform; System Center Service Manger 2010/2012; Opalis; System Center Orchestrator 2012
Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006;
Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Forefront Protection 2010 for SharePoint; Microsoft Forefront Security for SharePoint;
Microsoft Forefront Security for Office Communications Server; Forefront Endpoint Protection 2010/2012; Forefront Unified Access Gateway 2010; Microsoft Intelligent
Application Gateway 2007
Windows Server 2008/2008 R2; Windows 7; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Windows Server AppFabric (Caching);
System Center Operations Manager 2007 R2/2012
Windows Server 2008/2008 R2; Windows 7 Enterprise ; Windows Storage Server 2008/2008 R2; System Center Service Manager 2010/2012; System Center Virtual Machine
Manager 2008 R2/2012; Microsoft System Center Data Protection Manager 2010/2012
Deployment Toolkit 2008/2010; Diagnostics and Recovery Toolset; Virtual Desktop Infrastructure Suite; Microsoft Application Virtualization 4.5/4.6; Microsoft Enterprise Desktop
Virtualization; Windows 7; Windows Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Windows Server Update Services 2.0/3.0; Desktop Optimization Pack 2008
R2/2009 R2; Windows Phone 7; Windows Mobile® 6.1/6.5; Windows Automated Installation Kit; Forefront Endpoint Protection 2010/2012; Exchange Server 2007/2010; System
Center Configuration Manager 2007 R3/2012; System Center Mobile Device Manager 2008; System Center Operations Manager 2007 R2/2012; Windows Embedded Device
Manager 2011; Windows User State Migration Tool 3.0/4.0
Forefront Endpoint Protection 2010/2012; Windows 7; Windows Vista; Windows Server 2008/2008 R2; Windows Mobile 6.1/6.5; Forefront Threat Management Gateway 2010;
Internet Security and Acceleration Server 2006; Windows Phone 7
Microsoft Forefront Identity Manager 2010; Microsoft Identity Lifecycle Manager 2007; Windows Server 2008/2008 R2; Windows 7; Hyper-V Server 2008/2008 R2
Windows Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Protection 2010 for Exchange Server ;
Forefront Security for Exchange Server; Forefront Endpoint Protection 2010/2012
Microsoft Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager
2010/2012; Hyper-V Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Endpoint Protection
2010/2012; Windows Server 2008/2008 R2; Opalis; System Center Orchestrator 2012; System Center Data Protection Manager 2010/2012; Microsoft Security Assessment Tool;
System Center Virtual Machine Manager 2008 R2/2012
SharePoint Server 2010; Office SharePoint Server 2007; Office 2010 (including SharePoint Workspace 2010); Office 2007; SharePoint Online; Office SharePoint Designer 2007;
SharePoint Designer 2010; Microsoft Office Groove® 2007
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online; Office 2007/2010
Project Mgt
Microsoft Project Server 2010; Office Project Server 2007; Microsoft Project 2010; Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010;
Microsoft Office Project Portfolio Server 2007
Messaging
Exchange Server 2007/2010; Outlook 2010; Office Outlook 2007; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Exchange Online;
Microsoft Exchange Hosted Filtering; Exchange Hosted Encryption; Exchange Hosted Archive; Windows Mobile 6.1/6.5; Windows Phone 7; Microsoft Office Mobile 2007/2010
IM/Presence
Office Communications Server 2007 R2; Lync Server 2010; Office Communicator 2007 R2; Lync 2010; Forefront Security for Office Communications Server; Microsoft Office
Communicator Mobile 2007 R2; Microsoft Office Communicator Web Access 2007 R2; Office Communications Online; Lync Online
Conferencing
Office Communications Server 2007 R2; Lync Server 2010; Office Communicator 2007 R2; Lync 2010; Office Live Meeting 2007; Lync Online
Information Mgt
Office Communications Server 2007 R2; Lync Server 2010; Office Communicator 2007 R2; Lync 2010; Office Communications Online; Exchange Server 2007/2010; Outlook 2010;
Office Outlook 2007; Exchange Online; Windows Phone 7; Windows Mobile 6.1/6.5; Lync Online
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online ; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007
Process Efficiency
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online; Visio 2010; SharePoint Designer 2010; Office SharePoint Designer 2007
Compliance
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010
Enterprise Information Access
Interactive Experience &
Search
Navigation
Dashboards
Reporting Analytics & Data Mining
& Analysis
Report Generation &
Distribution
Authoring
Content
Creation
R
TECHNOLOGIES
Portals
Social Computing
Voice
ECM
S
MAPPING
SharePoint Server 2010; Office SharePoint Server 2007; Microsoft FAST™ Search Server 2010 for SharePoint; SharePoint Online; Office 2007/2010
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; SharePoint Online; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Visio 2010; Office Visio 2007; SharePoint Online; Office 2007/2010
SharePoint Server 2010; Office 2010; Visio 2010; Office Visio 2007
Multi-Device Support
Office 2010; SharePoint Server 2010; Visio 2010; Microsoft Office Web Apps; Microsoft Office Mobile 2010
User Accessibility
Office 2010
Interoperability
Database Dependencies
SQL Server 2008/2008 R2
Integration Dependencies
BizTalk Server 2009/2010; Visual Studio Team System 2008/2010
Development Dependencies
Visual Studio Team System 2008/2010; Expression Studio 3/4; Silverlight 4/5
Phase 2
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Category Products
Business Driver
Category Product
REDUCE THE CARBON
FOOTPRINT BY MINIMIZING THE
ENVIRONMENTAL IMPACT OF
TECHNOLOGY
None
MEASURE AND TRACK
INTERNAL RESOURCES AND
ENVIRONMENTAL IMPACT
GOALS
None
SUPPORT CREATION,
MANAGEMENT, AND
MONITORING OF COMPLIANCE
FRAMEWORKS
None
NORMALIZE CORPORATE
COMPLIANCE WITH EXTERNAL
ENVIRONMENTAL REGULATIONS
None
RESPOND TO CONSUMER
EXPECTATIONS THAT
INDUSTRIES TAKE A HOLISTIC
APPROACH TO SUSTAINING THE
ENVIRONMENT
Microsoft Dynamics AX 2009/2012: Use collaboration tools to share and discuss environmentally friendly
products, packaging, storage, and transportation improvements to reduce the carbon footprint
PARTICIPATE IN BUSINESS
OPPORTUNITIES THAT SUSTAIN
THE ENVIRONMENT
®
Dynamics AX 2009/2012: Use collaboration tools to share and discuss environmentally friendly products,
packaging, storage, and transportation improvements to reduce the carbon footprint
Phase 2
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase 2
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Phase 3
Business Driver
PHASE
DEFINITION
Needs
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Business Capabilities
REDUCE THE CARBON
FOOTPRINT BY
MINIMIZING THE
ENVIRONMENTAL
IMPACT OF
TECHNOLOGY
Establish and support a secure and
continuous work environment to reduce
environmental impact related to travel
and commuting
Make data centers more environmentally
friendly
Manage utilization of distributed IT
resources such as laptops, printers, and
other devices
Fully integrate telecommuting into the culture and business practices to reduce
automobile and aircraft emissions
Take advantage of cloud computing to shift and consolidate resources
Provision servers for application portfolio management to lower the number of
servers by consolidating applications onto fewer servers
Develop and distribute applications in the cloud with minimal resources on the
premises
Proactively perform preventative maintenance and achieve other equipment
improvements through automated alerts that are linked to more details about
root causes, effects, and other troubleshooting data
MEASURE AND TRACK
INTERNAL RESOURCES
AND
ENVIRONMENTAL
IMPACT GOALS
Establish resource utility baselines and the
means to measure and report
improvements
Empower customers to make ecologically
friendly choices based on the reported
environmental impact of products
Track and measure the impact of
teleworking
Enable executives and reporting authorities to take proactive measures when
certain trends begin to change to enable analysis and understanding of the root
cause and effects, and to share details and best practices
Share and collaborate on product, packaging, storage, and transportation
improvement opportunities internally and throughout the supply chain, and in
business modeling and simulation tools
Define performance levels for telecommuters and measure the outcomes in real
time
Assign role-based key performance indicators (KPIs) for key business metrics
that can be monitored for productivity
SUPPORT CREATION,
MANAGEMENT, AND
MONITORING OF
COMPLIANCE
FRAMEWORKS
Give businesses incentives to comply with
regulations, reduce carbon, save energy,
and have workers commute less
frequently
Proactively monitor compliance metrics, triggered events, and alerts when
compliance is compromised, and give prescriptive guidance about how to
mitigate future risk
Phase 3
Business Driver
PHASE
DEFINITION
Needs
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Business Capabilities
NORMALIZE
CORPORATE
COMPLIANCE WITH
EXTERNAL
ENVIRONMENTAL
REGULATIONS
Ensure that organizations are informed
and complying with environmental
sustainability regulations
Define and convert to environmentally
sustainable or Green processes that are
agile and adaptable to future regulations
Provide advanced data visualization to make it easier for users to understand
and respond to new compliance requirements
Optimize compliance processes by managing initiatives, monitoring risks, and
delivering alerts to appropriate people to raise environmental awareness
RESPOND TO
CONSUMER
EXPECTATIONS THAT
INDUSTRIES TAKE A
HOLISTIC APPROACH
TO SUSTAINING THE
ENVIRONMENT
Establish and support a secure and
continuous work environment to reduce
environmental impact related to travel
and commuting
Make data centers more environmentally
friendly
Manage utilization of distributed IT
resources such as laptops, printers, and
other devices
Update the infrastructure for next-generation workers by using the cost-savings
gained by enabling remote workers
Safeguard information when workers access sensitive data from remote
locations
Collect customer feedback and suggestions for improvement to the
organization's environmental initiatives
Analyze sustainability performance data, plans, and targets to increase
performance transparency and mitigate risk
Measure and report on metrics related to Green initiatives and identify
opportunities to stimulate more sustainable processes to improve customer
relationships
Establish resource utility baselines and the
means to measure and report
improvements
Empower customers to make ecologically
friendly choices based on the reported
environmental impact of products
Track and measure the impact of
teleworking
Provide social computing capabilities within and across the enterprise, including
suppliers and customers, to collect feedback and gather suggestions for
improvement
Enable ongoing optimization and alignment of processes with corporate
sustainability guidelines by analyzing the carbon footprint and environmental
impact of suppliers to maintain a resilient and sustainable supply chain
Enable real-time availability of operational information across the organization
and provide the ability to compare data with competitors and analyze trends
PARTICIPATE IN
BUSINESS
OPPORTUNITIES THAT
SUSTAIN THE
ENVIRONMENT
Phase 3
PHASE
DEFINITION
B
Core IO
Data Center Mgt &
Virtualization
Data Center Server Security
Services
Networking
Storage
Client
Services
Client Mgt &
Virtualization
Client Security
Identity & Access
Identity
& Security Information Protection &
Services Control
IT Process & Compliance
Workspaces
Collab
Portals
Social Computing
Project Mgt
Messaging
IM/Presence
UC
BPIO
Information Mgt
Process Efficiency
Compliance
Enterprise Information Access
Interactive Experience &
Search
Navigation
Dashboards
Reporting Analytics & Data Mining
& Analysis
Report Generation &
Distribution
Authoring
Content
Creation
R
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
D
Software mapping spans physical, virtual, and heterogeneous environments and is application-aware with real-time enforcement of compliance for applications that have licensed-based
use. All business units follow the same strategy, process, and technology for software asset management.
Applications are distributed on demand for the majority of traditional desktop environments and productivity applications. Software installed in physical and virtual environments is
identified and categorized automatically. There is a single location to track license and contract details and to manage the software allocation. Inventory is reconciled quarterly. Certificate
provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile access to internal systems is granted through a virtual private network (IP
Security or SSL). Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Mobile devices are used to access
lightweight line-of-business applications. Installation and inventory of standard corporate applications on mobile devices are managed automatically through integrated software
distribution tools.
Persistent information protection helps to enforce policy on sensitive data across the enterprise, including data on mobile devices. Policy templates are used to standardize rights and control
access to information.
IT service release processes are uniform across IT services; deployment is automated where possible. Management reviews each service for readiness to release before deployment. All
standard changes across IT services are automated and provisioned by self-service processes where appropriate. IT policies initiate automated remediation. Risks and vulnerabilities are
analyzed across all IT services against developed models. Compliance objectives and activities are automated, and then updated automatically based on changes to IT policies.
Workspaces are centrally managed, support hybrid on-premises and web (cloud)-based infrastructure, and integrate fully with business applications. Life-cycle management, including
creation, discoverability, archiving, and retirement, is automated.
Portals support collaboration and information sharing across extranet and Internet sites in a hybrid on-premises and web (cloud)-based infrastructure and through federated relationships
with trusted partners. Users can publish content to extranet and Internet sites with the same systems, device form-factors and methods they use to publish content to the intranet; in
addition, users can publish content that includes line-of-business data to portals from within business and productivity applications.
Enterprise news feeds complement RSS and email alerts. Social feedback is incorporated into profiles. Users can discover colleagues who share their interests by finding all subscribers to a
tag. Feedback is used in search and analytics to help determine the best content or resource for a particular need. There is a robust microblogging engine that handles social network
updates and comments dynamically.
Provisioning of user inboxes occurs automatically based on needs of individual users and spans on-premises and off-premises messaging environments.
IM and online presence are federated to suppliers and customers across multiple devices and integrated across line-of-business applications, which enables enterprise networking through
expert search.
Conferencing
Voice
ECM
S
MAPPING
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
Voice communications are secure, encrypted, extended to remote and mobile workers using different mobile devices and integrated within enterprise productivity and collaboration
platforms.
Centrally managed workspaces support a hybrid on-premises and web (cloud)-based infrastructure. Business content is integrated with automated life-cycle management that includes
content creation, discoverability, archiving, and retirement.
The organization orchestrates processes with advanced custom workflows, and deploys and integrates line-of-business applications. Human and system workflows are integrated for
orchestration, exception handling, and automation. People can design workflows by using visual tools, and can reuse workflow patterns in similar scenarios.
Content that results from electronic discovery can be quickly refined to produce relevant information for use as evidence in court. Automated workflow manages the entire discovery
process. Policy and compliance are consistently enforced across traditional content, web content, email, social content, and semi-structured information.
Search results are contextual, based on parameters such as user access level, role, and natural language queries. Users can filter report content based on keywords.
The workbench enables data preparation, cleansing, multivariate analysis, and a sophisticated set of data mining algorithms and tuning options (including additional extensibility options
such as custom algorithms) to support data mining across huge data volumes.
End users subscribe to reports dynamically based on group membership, data values, or filters, for improved context and access to information that is more relevant to their needs. Users
receive reports when data is refreshed; based on their report usage and consumption; when content is relevant to their roles or other specified information; and in response to search criteria.
Ideas, notes, and research gathered across web productivity tools and conversations are easy to find and share. Content authoring tools deliver advanced formatting. Rich media can be
centrally stored, tagged, managed, and made easily available for use in building content deliverables.
Underlying capabilities such as instant messaging, communications, workflow, collaboration, and content management are available in each delivery mode as appropriate.
Productivity applications meet guidelines for information and content accessibility in recognized accessibility standards such as Section 508 and Web Content Accessibility Guidelines
(WCAG) 2.0 for both PC and web. New sites meet standards guidelines for supporting assistive technologies in the browser.
High Availability: Data is replicated for distributed or mobile data processing applications, high systems availability, scalable concurrency with secondary data stores for enterprise reporting
solutions, and integration with heterogeneous systems.
Process Definition: There is emphasis on a shared services architecture that is well defined, business centric, reusable, and can be extended beyond the organizational boundaries to fully
integrate cross-enterprise processes; Business to Business Integration: All core business processes are automated and extended beyond the firewall with workflows that include
management and monitoring of end-user tasks, and mission-critical events.
User Experience: Rapid application development tools are used extensively for all development projects on various platforms, to enable organizations to rapidly create more secure,
manageable, and reliable applications.
Phase 3
PHASE
DEFINITION
B
Core IO
R
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
D
Data Center Mgt &
Virtualization
Windows Server 2008/2008 R2; Hyper-V Server 2008/2008 R2; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System
Center Virtual Machine Manager 2008 R2/2012; Windows Azure Platform; System Center Service Manger 2010/2012; Opalis; System Center Orchestrator 2012; System Center
Data Protection Manager 2010/2012
Client Mgt &
Virtualization
Deployment Toolkit 2008/2010; User State Migration Tool 3.0; Diagnostics and Recovery Toolset; Virtual Desktop Infrastructure Suite; Application Virtualization 4.5/4.6;
Enterprise Desktop Virtualization; Windows 7; Windows Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Windows Server Update Services 2.0/3.0; Desktop
Optimization Pack 2008 R2/2009 R2; System Center Mobile Device Manager 2008; Exchange Server 2007/2010; Windows Phone 7; Windows Mobile 6.1/6.5; Forefront Endpoint
Protection 2010/2012; Windows Automated Installation Kit; Forefront Endpoint Protection 2010/2012; Windows Embedded Device Manager 2011; User State Migration Tool
4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012
Data Center
Services Server Security
Networking
Storage
Client
Services
S
MAPPING
Client Security
Identity & Access
Identity
& Security Information Protection &
Services Control
IT Process & Compliance
Collab
Windows Server 2008/2008 R2; Forefront Endpoint Protection 2010/2012; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Forefront Threat
Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; System
Center Operations Manager 2007 R2/2012
Microsoft Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager
2010/2012; Hyper-V Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Endpoint Protection
2010/2012; Windows Server 2008/2008 R2; Opalis; Security Assessment Tool; System Center Virtual Machine Manager 2008 R2/2012; System Center Orchestrator 2012; System
Center Data Protection Manager 2010/2012
Workspaces
SharePoint Server 2010; Office SharePoint Server 2007; Office 2010 (including SharePoint Workspace 2010); Office 2007; SharePoint Online; Office SharePoint Designer 2007;
SharePoint Designer 2010; Office Groove 2007
Portals
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online; Office 2007/2010
Social Computing
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010
Project Mgt
UC
Messaging
Exchange Server 2007/2010; Outlook 2010; Office Outlook 2007; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Exchange Hosted
Filtering; Exchange Hosted Encryption; Exchange Hosted Archive; Outlook Mobile 2010; System Center Mobile Device Manager 2008; Windows Phone 7; Windows Mobile
6.1/6.5; Exchange Online; Microsoft Forefront Server Security Management Console
IM/Presence
Office Communications Server 2007 R2; Lync Server 2010; Office Communicator 2007 R2; Lync 2010; Forefront Security for Office Communications Server; Office Communicator
Mobile 2007 R2; Office Communicator Web Access 2007 R2; Office Communications Online; Lync Online
BPIO
Conferencing
ECM
Voice
Office Communications Server 2007 R2; Lync Server 2010; Office Communicator 2007 R2; Lync 2010; Office Communications Online; Exchange Server 2007/2010; Outlook 2010;
Office Outlook 2007; Exchange Online; Windows Phone 7; Windows Mobile 6.1/6.5; Lync Online
Information Mgt
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007
Process Efficiency
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Online; Office 2007/2010; Visio 2010; SharePoint Designer 2010; Office SharePoint Designer 2007
Compliance
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online
Information Access
Enterprise
Interactive Experience &
Search
Navigation
Dashboards
Reporting Analytics & Data Mining
& Analysis
Report Generation &
Distribution
Content
Creation
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; SharePoint Online; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Visio 2010; Office Visio 2007; SharePoint Online; Office 2007/2010
Authoring
SharePoint Server 2010; Office 2010; Visio 2010; Office Visio 2007
Multi-Device Support
Office 2010; SharePoint Server 2010; Visio 2010; Office Web Apps; Office Mobile 2010
User Accessibility
Office 2010; SharePoint Server 2010
Interoperability
Database Dependencies
SQL Server 2008/2008 R2
Integration Dependencies
BizTalk Server 2009/2010; Visual Studio Team System 2008/2010
Development Dependencies
Visual Studio Team System 2008/2010; Expression Studio 3/4; Silverlight 4/5
Phase 3
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Category Products
Business Driver
Category Product
REDUCE THE CARBON
FOOTPRINT BY MINIMIZING THE
ENVIRONMENTAL IMPACT OF
TECHNOLOGY
Dynamics AX 2009/2012: Connect environmental sustainability dashboards to historical data and use analysis
tools to evaluate performance data, plans, and targets
MEASURE AND TRACK
INTERNAL RESOURCES AND
ENVIRONMENTAL IMPACT
GOALS
Dynamics AX 2009/2012: Connect environmental sustainability dashboards to historical data and use analysis
tools to evaluate performance data, plans, and targets
SUPPORT CREATION,
MANAGEMENT, AND
MONITORING OF COMPLIANCE
FRAMEWORKS
None
NORMALIZE CORPORATE
COMPLIANCE WITH EXTERNAL
ENVIRONMENTAL REGULATIONS
Dynamics AX 2009/2012: Connect environmental sustainability dashboards to historical data and use analysis
tools to evaluate performance data, plans, and targets
™
Microsoft Bing Maps: Integrate services for a dynamic online experience via maps and geospatial images to
report environmental quality issues and status
RESPOND TO CONSUMER
EXPECTATIONS THAT
INDUSTRIES TAKE A HOLISTIC
APPROACH TO SUSTAINING THE
ENVIRONMENT
Dynamics AX 2009/2012: Connect environmental sustainability dashboards to historical data and use analysis
tools to evaluate performance data, plans, and targets
PARTICIPATE IN BUSINESS
OPPORTUNITIES THAT SUSTAIN
THE ENVIRONMENT
Dynamics AX 2009/2012: Connect environmental sustainability dashboards to historical data and use analysis
tools to evaluate performance data, plans, and targets
Phase 3
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase 3
PHASE
DEFINITION
MAPPING
TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Example: Steps to Customize the Solution
Customize the pre-defined solutions
(Phase 1, Phase 2, or Phase 3) by doing the following:
Understand your
priorities
Identify your top-priority
business drivers
Identify the business
capabilities in the Capability
Discussion Guide that match
your priorities (see below)
Choose a starting
point
Choose the phase (Phase 1,
Phase 2, or Phase 3) that
corresponds to your priorities
Adjust the
mapping
Add, remove, or adjust
capabilities
Example: Customized Solution Requirements
Identity
Client
& Security Services
Svcs
Core IO
Data Center
Services
Example Solution Area: Phase 2
Collab
UC
ECM
Enterprise
Search
Reporting
& Analysis
R
D
A defined set of core standard images exists. There is a defined, end-to-end server deployment process that includes application compatibility testing.
Server Security
Networking


Protection for select applications (such as email) is centrally managed. Remote access is secure, standardized, and available to end users across the organization.
Zone creation and record updates are automatic to support directory services. Dynamic Host Configuration Protocol servers are aware of sub-networks.
Storage

Storage is managed on server clusters or shared storage arrays. Transparent failover occurs if a storage node fails, with no interruption in availability.
Client Mgt &
Virtualization

The majority of the installed client base has a combination of current and recently released operating systems. A centralized store of user profiles supports the ability to apply
policies.
Client Security

All users are deployed as standard users, and users who require administrative access are given secondary accounts. Users are restricted from running applications that are
considered harmful to the environment. Disk-level encryption is in place across all desktop systems and laptops.
Identity & Access
Federation and trust are set manually per instance for select applications or systems across boundaries. Password policies are set within the directory service to enable lifecycle management.
?
Information Protection &
Control
Data classification is contextual at select points and for select protocols in the network, and complements classification by end users. Data classification is both contextual and
driven by end-users as data is created and used.
?
Individual business units align with the IT service portfolio. IT service costs, returns, capacity, availability, continuity, and integrity are reported. IT policies are documented for
each IT service.

Workspaces

Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices. Offline
synchronization is supported. Team members can simultaneously author, edit, and review content.
Portals

Publishers can direct content to specific audience targets. Portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity and
role. Users get targeted information based on their profiles and roles in the organization.
Social Computing

Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide. Communities, if present, are largely through email or are driven by forums.
Social feedback is generally limited to comments in email, forums, or within individual documents.
Project Mgt
?
Teams plan, track, and share tasks in lists by using collaboration tools. Multiple baselines exist. Portfolios are analyzed in graphical views that include status, resource
allocations, and financial details.
Messaging
?
The email platform supports message encryption (S/MIME) to enable digital signatures. IT manages mailbox provisioning by using a single directory.
IM/Presence

Users have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall. Peer-to-peer voice and video communications
are based on a single directory. Multiple-party IM is managed by the enterprise.
Conferencing

A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications. The
platform also has a single user interface, a single directory, and is available across organizational boundaries.
Voice

Call routing within an organization is based on identity and online presence. Server pools that are split across data centers or replicated provide resilience to data centers
when disaster occurs.
Information Mgt

Metadata includes social tags. Search indexing automates promotion of metadata to business applications and processes. Web content is dynamically presented to visitors
based on real-time behavior analysis. Web sites are integrated with line-of-business systems to manage and deliver content in both locations.
Process Efficiency

All data from forms is captured and validated electronically. Paper-based content is scanned and key data is extracted by using character-recognition technology. Business
processes are automated by using workflows and visual design tools.
Compliance & Discovery
Content Creation
S

IT Process
& Compliance
BPIO
B
Data Center Mgt &
Virtualization
Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including email. Reporting occurs manually. Content is
stored in a well-managed repository and disposition rules are appropriately applied.

Information Access
Interactive Experience &
Navigation
Dashboards
Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed. Indexing processes
incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience.


There is a single way to access all information, structured or unstructured, across the organization. Search-driven portals and applications provide content targets based on
user context and interests.
Users can search for reports and related unstructured documents, and they have access to data through connections managed by IT. Diagrams are linked to data and shared as
static Web pages or in PDF.

Analytics & Data Mining

In addition to the IT-provisioned infrastructure for data mining activities, support by data mining analysts, and self-service capabilities for end users, is a powerful data mining
workbench.
Report Generation &
Distribution

IT manages reporting components and shared data sets to provide a highly interactive library and reporting environment in which end users can modify or edit source
content, change the display, sort, apply filters, and customize reports after they’re generated.
Authoring

Content is efficiently reused without loss of context across applications that have different purposes. Templates are centrally manageable. Ideas, notes, and research gathered
across Web productivity tools and conversations are easy to find and share.
Multi-Device Support

Application user interfaces are customizable at the user and organizational levels for optimal flexibility in user experience and IT control. Documents can be viewed and edited
through optimized modes (such as PC, phone, or browser) without significant formatting or data loss.
User Accessibility

A broad ecosystem of third-party extensions further reduces usability challenges for people who require various accessibility accommodations. Solutions are developed to
support process-led checks of user-created content and sites before publication
Interoperability

Content is actively exchanged with and transformed by line-of-business systems through extensible markup language (XML)-based formats.
Example: Tips to Customize the Solution
Consider using an alternate maturity level that corresponds to your requirements
 Keep a
capability if
you are
unsure
whether you
need it
Identify, document, and discuss how a capability may be relevant
Server Security
helps protect and
secure the server
infrastructure at
the data center
from viruses, spam,
malware, and other
intrusions.
Networking helps
manage the
network and
related
configurations to
ensure optimal
utilization of
network resources
and business
continuity.
Agenda
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Engagement Approach
Business strategy
Solution areas
Industry
Horizontal
Business
executives
1. Understand business needs and priorities
IT
executives
1. Present relevant integrated capabilities
Architects
IT pro/dev
executives
Audience
Integrated Capability Analysis > Projects, architecture, products
2. Discuss range of potential solution capabilities
2. Position the Integrated Capability approach
Solution road map
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it
should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO
WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.