Offre DataCenter & Virtualisation
Embed Size (px)
Transcript of Offre DataCenter & Virtualisation
Offre DataCenter & Virtualisation Laurent Bonnet, Architecte SystmesAlain Le Hegarat, Responsable Marketing24 Novembre 2009Optimisation des infrastructuresBasique
Non coordonne, Gestion manuelleRationalise
gestion de linfrastructure consolide et fortement automatiseDynamique
Automatisation maximale, Allocation dynamique des ressources, SLAsStandardiseAutomatisation partielle de la gestion de linfrastructure
Centre de cotAccelerateur des Fonctions de letpPartenaire stratgiqueCentre de cot EfficaceDynamic ITMicrosoft currently engages with organizations in a way that helps them think through how best to make investments in their environment, get to a better level of maturity, and get to a lower-cost, more flexible, and more agile state. To support this effort, Microsoft has developed Infrastructure Optimization models. Today, were focused on the Core IO model. Core IO is a proven framework for evolving your IT infrastructure to become more agile, secure, and better managed, while reducing overall IT costs and making better use of resources. The bottom line is this: IT becomes a stronger strategic asset to the business. Core IO addresses capabilities across many critical aspects of IT.
Levels of Maturity
Infrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of Dynamic IT for that capability. The levels of maturity are Basic, Standardized, Rationalized, and Dynamic.
A Basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:IT governance is negligible, as policies for security and compliance are non-existent or inconsistently enforced. The overall health of applications and services is unknown due to a lack of tools and resources. Theres no vehicle for sharing accumulated knowledge across IT.The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.Software deployments, security updates, and services are provided in a high-touch and high-cost manner.
At a Standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:A unified directory service is used to manage resources, security policies, and network access.Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. Inventories of hardware and software assets are maintained through a reasonable process, and license use is managed to an extent. Security is improved with a locked-down perimeter, though internal security may still require improvements.
At a Rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest, and processes and policies have been optimized:Security is proactive, and response to threats is rapid and controlled.The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. The process for managing desktops is very low touch, and the number of images is minimal. Theres an accurate inventory of hardware and software, and companies purchase only those licenses and computers that they need. Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.
When an organization achieves a Dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:Costs are fully controlled. Theres integration among users and information, desktops, and servers. Mobile users have nearly on-site levels of service and capabilities. Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. Additional investments in technology yield specific, rapid, and measurable business benefits. Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.2La virtualisation est un bon dbut !BasiqueRationaliseDynamiqueStandardiseMachines Physiques & virtuellesAdministration centraliseDploiement, Patching, backup & monitoringAutomatisation des dploiements et de ladministrationThe capabilities within the Core IO model are:
Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.
Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and serversincluding planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch office technologies to improve your IT infrastructure.
Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.
Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to back up, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.
IT and Security ProcessIT and Security Process provides guidance, based on industry best practices, on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organizations demands for reliable, available, and highly secure IT services, technology alone is not sufficient. Excellent processes and trained staff with clear roles and responsibilities are also required.3
Efficacit des services
Poste de Travail
Scurit de bout en bout
Linfrastructure devient un gage defficacitRationalisation des infrastructures
Microsoft has three core infrastructure solutions that are made up of products, tools, and technologies designed to optimize your desktop and datacenter environments and enable business-ready security throughout your infrastructure.The primary role of each of these solutions is to help customers increase the efficiency of their core infrastructure and enable them to better align that infrastructure to the needs of the business. That is, to maximize the value of IT for the business as efficiently as possible.Each solution focus area, Desktop, Datacenter, and BRS, is designed to address capabilities across many critical aspects of IT, and to deliver increased business efficiency by reducing costs and driving automation.Today well be focusing on Business Ready Security.4DataCenter Optimis
Physique et VirtuelAccs, nimporte o
Gestion de bout en boutEfficacit des oprations
Puissance & stabilit
DataCenter OptimisTo advance the maturity of your datacenter and achieve a more efficient and agile core infrastructure, your datacenter will needa scalable and reliable platform; an ability to manage across the service, both virtual and physical environments; and an abilityto protect and provide secure access so that you can extend your datacenter services to where the business needs them most.Examples of efficiency and agility benefitsSources:1: Data derived from Microsoft Spotlight on Cost Server Study, 2009Impact on labor costs for core server workloads on moving from basic to standardized through best practice implementationhttp://arsenalcontent/ContentDetail.aspx?ContentID=154342&view=folder&portal=officesystem2: Data derived from Gartner The effective use of virtualization can reduce server energy consumption by up to 82% and floor space by 85%. Energy Savings via Virtualization: Green IT on a Budget, November 10, 2008
Gartner clients have reported that single virtualized servers often support ratios from as little as five to 12 VMs on a single server to as many as 70. The 10 Key Server Virtualization Unknowns, and What to Do About Them, Gartner, January 16, 20093. Microsoft Case Study Banque de Luxembourg: Quote is from HP BelgiumIn the past, provisioning a new business application required one or two days, but now it requires less than an hour, Franck Lartigue, System Engineer, HP Belgium & Luxembourghttp://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=40000026084: Microsoft Case Study Bank BGZhttp://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000000475. AV-Test.orgAV lab response times were tested for 365 In the Wild viruses and variants that appeared from January March 2009.They tested the next generation of the Forefront Server Security engine set vs. three single-engine vendors.Forefront Server Security engines had an average de