Offre DataCenter & Virtualisation . Laurent Bonnet, Architecte Systmes Alain Le Hegarat, Responsable Marketing. 24 Novembre 2009. Optimisation des infrastructures. Dynamique. Basique. Rationalise. Standardise. Non coordonne , Gestion manuelle. - PowerPoint PPT Presentation
Offre DataCenter & Virtualisation Laurent Bonnet, Architecte SystmesAlain Le Hegarat, Responsable Marketing24 Novembre 2009Optimisation des infrastructuresBasique
Non coordonne, Gestion manuelleRationalise
gestion de linfrastructure consolide et fortement automatiseDynamique
Automatisation maximale, Allocation dynamique des ressources, SLAsStandardiseAutomatisation partielle de la gestion de linfrastructure
Centre de cotAccelerateur des Fonctions de letpPartenaire stratgiqueCentre de cot EfficaceDynamic ITMicrosoft currently engages with organizations in a way that helps them think through how best to make investments in their environment, get to a better level of maturity, and get to a lower-cost, more flexible, and more agile state. To support this effort, Microsoft has developed Infrastructure Optimization models. Today, were focused on the Core IO model. Core IO is a proven framework for evolving your IT infrastructure to become more agile, secure, and better managed, while reducing overall IT costs and making better use of resources. The bottom line is this: IT becomes a stronger strategic asset to the business. Core IO addresses capabilities across many critical aspects of IT.
Levels of Maturity
Infrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of Dynamic IT for that capability. The levels of maturity are Basic, Standardized, Rationalized, and Dynamic.
A Basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:IT governance is negligible, as policies for security and compliance are non-existent or inconsistently enforced. The overall health of applications and services is unknown due to a lack of tools and resources. Theres no vehicle for sharing accumulated knowledge across IT.The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.Software deployments, security updates, and services are provided in a high-touch and high-cost manner.
At a Standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:A unified directory service is used to manage resources, security policies, and network access.Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. Inventories of hardware and software assets are maintained through a reasonable process, and license use is managed to an extent. Security is improved with a locked-down perimeter, though internal security may still require improvements.
At a Rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest, and processes and policies have been optimized:Security is proactive, and response to threats is rapid and controlled.The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. The process for managing desktops is very low touch, and the number of images is minimal. Theres an accurate inventory of hardware and software, and companies purchase only those licenses and computers that they need. Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.
When an organization achieves a Dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:Costs are fully controlled. Theres integration among users and information, desktops, and servers. Mobile users have nearly on-site levels of service and capabilities. Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. Additional investments in technology yield specific, rapid, and measurable business benefits. Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.2La virtualisation est un bon dbut !BasiqueRationaliseDynamiqueStandardiseMachines Physiques & virtuellesAdministration centraliseDploiement, Patching, backup & monitoringAutomatisation des dploiements et de ladministrationThe capabilities within the Core IO model are:
Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.
Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and serversincluding planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch office technologies to improve your IT infrastructure.
Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.
Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to back up, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.
IT and Security ProcessIT and Security Process provides guidance, based on industry best practices, on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organizations demands for reliable, available, and highly secure IT services, technology alone is not sufficient. Excellent processes and trained staff with clear roles and responsibilities are also required.3
Efficacit des services
Poste de Travail
Scurit de bout en bout
Linfrastructure devient un gage defficacitRationalisation des infrastructures
Microsoft has three core infrastructure solutions that are made up of products, tools, and technologies designed to optimize your desktop and datacenter environments and enable business-ready security throughout your infrastructure.The primary role of each of these solutions is to help customers increase the efficiency of their core infrastructure and enable them to better align that infrastructure to the needs of the business. That is, to maximize the value of IT for the business as efficiently as possible.Each solution focus area, Desktop, Datacenter, and BRS, is designed to address capabilities across many critical aspects of IT, and to deliver increased business efficiency by reducing costs and driving automation.Today well be focusing on Business Ready Security.4DataCenter Optimis
Physique et VirtuelAccs, nimporte o
Gestion de bout en boutEfficacit des oprations
Puissance & stabilit
DataCenter OptimisTo advance the maturity of your datacenter and achieve a more efficient and agile core infrastructure, your datacenter will needa scalable and reliable platform; an ability to manage across the service, both virtual and physical environments; and an abilityto protect and provide secure access so that you can extend your datacenter services to where the business needs them most.Examples of efficiency and agility benefitsSources:1: Data derived from Microsoft Spotlight on Cost Server Study, 2009Impact on labor costs for core server workloads on moving from basic to standardized through best practice implementationhttp://arsenalcontent/ContentDetail.aspx?ContentID=154342&view=folder&portal=officesystem2: Data derived from Gartner The effective use of virtualization can reduce server energy consumption by up to 82% and floor space by 85%. Energy Savings via Virtualization: Green IT on a Budget, November 10, 2008
Gartner clients have reported that single virtualized servers often support ratios from as little as five to 12 VMs on a single server to as many as 70. The 10 Key Server Virtualization Unknowns, and What to Do About Them, Gartner, January 16, 20093. Microsoft Case Study Banque de Luxembourg: Quote is from HP BelgiumIn the past, provisioning a new business application required one or two days, but now it requires less than an hour, Franck Lartigue, System Engineer, HP Belgium & Luxembourghttp://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=40000026084: Microsoft Case Study Bank BGZhttp://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000000475. AV-Test.orgAV lab response times were tested for 365 In the Wild viruses and variants that appeared from January March 2009.They tested the next generation of the Forefront Server Security engine set vs. three single-engine vendors.Forefront Server Security engines had an average detection time of 6 hours for this three month period. The competitive solutions had average detection times of 26 hours, 83 hours and 206 hours, respectively.
Aspects of an optimized datacenter include the following:
One of the best ways to move an IT operation to a more mature level of optimization is to increase the degree of centralizedcontrol across the infrastructure. Unifying the management of the datacenter requires the incorporation of systems formanaging:Both physical and virtual systems in the datacenter An extensible and interoperable platform that provides cross-platform monitoring An end-to-end solution for management from the desktop to the datacenterSystems at headquarters and branch locations from a central locationIdentity, access, and security solutions from within a centralized console
As part of management, increased IT automation helps reduce strain on IT resources and increase efficiency. To help automateIT operations, Microsoft is building infrastructure solutions that are knowledge driven. They capture and aggregate knowledgeabout an organizations infrastructure, policies, processes, and best practices so its IT staff can build more manageable systemsand automate operations. By building integrated solutions in this way, Microsoft enables organizations to make more efficientuse of IT resources and drive down operational costs.
There are many opportunities for automation in the datacenter, including, but not limited to:Automated provisioning and updating As the number of both physical and virtual servers in the datacenter expands, datacenter managers can automate the complete server deployment processfrom creating and provisioning the server baseline to updating the operating systems and applications deployed in the datacenter.Automated configuration management IT professionals can automatically ensure that configurations match their best practices and policies, reducing the risk of configuration drift, which can introduce security vulnerabilities or cause downtime.
Pervasive Security (Protect Everywhere)
Microsoft Forefront security solutions deliver end-to-end security and access to information through an integrated line of protection, access, and identity management products. Microsoft is working to achieve the goal of business-ready security based on the following fundamental tenets:Integrate and extend across the enterprise Forefront solutions integrate with the identity infrastructure and across the stack.Support for heterogeneous environments Forefront includes on-premises and hosted solutions for seamless connectivity. Forefront solutions also adhere to open standards and protocols.Help protect everywhere, access anywhere Forefront provides defense in depth across multiple layers to help protect across endpoints, servers, and the network. Secure, identity-based access products help connect the mobile workforce virtually anywhere. Identity-aware protection helps organizations secure information and enable policy-based access.Simplify the experience, manage compliance Forefront solutions enable centralized management of the environment and allow you to gain critical visibility into the state of the infrastructure. They help improve security and compliance through identity tracking and enforcement throughout the enterprise. And finally, they provide policy management features and reporting to enable auditing and compliance.
To be most productive, users in an organization need to be able to access data and services, no matter where they arein theoffice, at a customer site, at home, in an airport, etc. Microsoft solutions are designed to maximize access while maintainingsecurity.
Sources:1: Data derived from Microsoft Spotlight on Cost Server Study, 2009Impact on labor costs for core server workloads on moving from basic to standardized through best practice implementationhttp://arsenalcontent/ContentDetail.aspx?ContentID=154342&view=folder&portal=officesystem2: Data derived from IDC based on 4:1 virtual to physical consolidation ratio 4 virtual servers use the hardware and facilities costs (power, space) of 1 physical server.3. Microsoft Case Study Banque de Luxembourg: Quote is from HP BelgiumIn the past, provisioning a new business application required one or two days, but now it requires less than an hour, Franck Lartigue, System Engineer, HP Belgium & Luxembourghttp://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=40000026084: Microsoft Case Study Bank BGZhttp://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=400000047
Additional Access Stat:Improve branch data access by 30 percent without expanding bandwidth (Microsoft case study: Sporton International http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?casestudyid=4000004044)5
AdministrationWebVirtualisationIIS 7.0 & Extensions .NET et Server CoreConfiguration TracingService-Oriented ArchitectureHyper-V 2.0Live Migration RemoteApp & Desktop ServicesDes fondations solides pour les besoins les plus exigeantsAD Administrative CenterPowerShell 2.0Best Practices AnalyzerSynergies avec Windows 7Monte en charge...