Вы находитесь на странице: 1из 34

Business-IT Mapping

Revision and Signoff Sheet


Change Record
Date

Author

Version

Change reference

Reviewers
Name

Version
approved

Position

Microsoft Confidential for internal use only


Page | 1

Date

Table of Contents
Business-IT Mapping Overview...................................................................................4
Introduction............................................................................................................. 4
What is a Business-IT Map?..................................................................................... 4
What a Business-IT Map is not.................................................................................4
Where does the BITMap fit in the Value Triangle and the SDP?...............................5
Customer segmentation.......................................................................................... 5
Value proposition........................................................................................................ 5
Engagement model for BITMap utilization..................................................................6
1.

Positioning............................................................................................................ 6
Positive (customer is willing to work on the BITMap)...............................................6
Challenging (may require more positioning efforts by the TAM)..............................6

2.

Preparation........................................................................................................... 7

3.

Creation............................................................................................................... 7
Step 1: Identify the company profile.......................................................................7
Step 2: Identify the Business Processes..................................................................8
Questions............................................................................................................. 8
Step 3: Identify the IT Services................................................................................ 9
Questions............................................................................................................. 9
Step 4: Connect IT Services to IT Systems and/or Line of Business (LoB)
applications........................................................................................................... 10
Questions........................................................................................................... 10
Step 5: Connect IT Systems to the underlying infrastructure................................11
Questions........................................................................................................... 11

4.

Validation........................................................................................................... 13

5.

Final presentation............................................................................................... 13

What to do next........................................................................................................ 14
Hints......................................................................................................................... 15
Annex A: Sources of information..............................................................................15
Annex B: EPG Workloads.......................................................................................... 16

Microsoft Confidential for internal use only


Page | 2

Microsoft Confidential for internal use only


Page | 3

Business-IT Mapping Overview


Introduction
At Microsoft Premier Services we are very good understanding how Premier Services
can help our customers to improve their IT Infrastructure and IT Operations, and
how those improvements will help the customers to achieve a better health status
for their IT Services. But we often lack the understanding of how the technology
support the Business, so our conversations remain at an IT level with several
difficulties to go up in the organization.
A Business-IT Map (BITMap from this point forward) can help TAMs and customers
make the connection between the technology and the Business Processes being
supported by that technology, thus helping TAMs get more knowledge about the
Business, and understand how Premier Services impact the Business.

What is a Business-IT Map?


A BITMap is a diagram that shows how the
technology enables the Business Processes, by
establishing top down connections between the
Business Processes, the IT Services used to
enable those Processes, and the application and
Infrastructure that build those services.

What a Business-IT Map is not


A BITMap is not:

A Service Catalog
A Service Map
A Business Process Map or Business
Process Diagram
An Architecture or Infrastructure Diagram

Microsoft Confidential for internal use only


Page | 4

Where does the BITMap fit in the Value Triangle and the SDP?
There is no specific place in the Value Triangle or in the SDP to document a BITMap.
But the process of creating a BITMap implies obtaining a whole bunch of information
that will certainly help create more specific, Business oriented Value Triangles and
SDPs. Review the Step 1 in the following sections and the Questions matrix.

Customer segmentation
The BITMap diagram is targeted
to the following customer
segments:
Depth
Growth
Small/Medium

Value proposition
Creating and using a BITMap representing a customers technology support for their
Business Processes, can provide the following information:

What the core of the Business is


How does the Business make money and what are the most relevant Business
Processes for this
What are the IT Services in place and which ones are used for each of the
Business Processes
What applications, products and/or technologies are used to support each of
the IT Services

With this information in mind, TAMs and Customers will get a better understanding
of:

The Business Processes that add value to customers Business


What are the most critical products and technologies in use (by mapping
those products and technologies all the way up to the most critical Business
Processes)
How an issue in one of the products or technologies in use affects an IT
Service and in consequence, impacts on the Business
o Understanding the criticality of incidents
o Impact of delays in solving problems
Which are the products and technologies to focus on

A BITMap can help TAMs to:

Microsoft Confidential for internal use only


Page | 5

Understand what products and technologies need to be improved and the


reason behind that,
which in turn will help create better Value Triangles,
improving the Service Delivery Planning process,
and enable conversations at a higher level in the organization.

A BITMap can help customers to:

Learn more about their own business.


Understand which Business Processes to focus on and the underlying
products and technologies that need to be improved, which in turn will help
them prioritize proactive activities.
Prioritize efforts, justify investments and ensure those investments are based
on a business reason.
Know where to start troubleshooting a problem (where to look for fire when
they see smoke).
Create technology improvement plans focused on business needs.

Engagement model for BITMap utilization


Creating and using a BITMap is a five-step engagement. The phases are:
1.
2.
3.
4.
5.

Positioning
Preparation
Creation
Validation
Final presentation

The following sections provide more detail of each phase.

1. Positioning
Not all the customers will gently provide time to create a BITMap, so it is important
to position it appropriately. You can use the information provided in this document to
do so.
Please consider the following scenarios.

Positive (customer is willing to work on the BITMap)

Customer has interest to understand better how IT supports the Business


Customer already has a Service Management/Governance area and needs
support to map Business Process
Customer has faced some issue with critical services and doesnt have the IT
architecture mapped

Microsoft Confidential for internal use only


Page | 6

CSM profile is more focused on Service Management than Technology


The organization has Governance and IT Service Management has focus on
strategic planning

Challenging (may require more positioning efforts by the TAM)

Customer doesnt see value on BITMap


Customer is not familiarized with Service Management concepts
IT has a lot of urgent issues to handle and does not have time to dedicate to
build a BITMap
Organization resistant to IT Service Management
No customer sponsor to join Infra and Dev, mainly where they have
disagreement between areas

2. Preparation
You should get prepared to the meeting (next phase) in order to ensure the correct
people is present, avoid wasting time and repeating questions. Please consider the
following:

Ensure all participants are aligned regarding BITMap outcomes and make
them aware about previous information to optimize the Creation (next phase)
Ensure that the people who will participate understand the main Business
Processes
Understand/know participants profile
Request architecture and information about current systems and IT
Infrastructure and Org Chart
Check if the participants have the basic concepts regarding Technical
Services, IT Services and Business Process
Arrange previously the meetings: validation and final presentation
Emphasize the importance of having executive level attend Final Presentation

You can use the same audience to work with the Services Dashboard.

3. Creation
The creation of a BITMap should follow the steps mentioned below in order to
facilitate understanding and execution.

Step 1: Identify the company profile


First of all, before starting a BITMap, it is important to understand the company
profile (such as market segment, industry, organization chart, competitors and so
on) and other aspects that may impact on the Business Processes.
This information can be documented on SDP, using the Customer Background and
Executive Summary section, helping not only Premier team, but entire ATU, to
understand company position.
Microsoft Confidential for internal use only
Page | 7

Before starting this questionnaire with the customer, it is recommended to check


with the ATU if there is any documented information in the Account Plan and other
Sales tools that could support this knowledge, avoiding customer to be asked the
same question twice.
The following questions can help in this step:

How many employees does your organization have? How many employees
work in IT?
How many locations does your organization have?
What is the organization chart? (CEO, CIO, CFO). What are the
organizational areas or departments?
What is the customer industry?
What are the primary Business objectives for your organization at the
moment?
How does the Business make money?
What are the Business units?

Step 2: Identify the Business Processes


The best way to create a Business-IT Map is to do it top down, starting from the
Business Processes. When doing this a Business or Customer perspective must be
used.
Business Process: ITIL defines a Business Process as a process that is owned and
carried out by the Business. A Business Process contributes to the delivery of a
product or service to a Business customer. For example, a retailer may have a
purchasing process that helps to deliver services to its Business customers. Many
Business Processes rely on IT services.
ITIL used to provide the following categories for Business Processes:

Primary Business Processes: represent the main activities at the core of the
organizations Business. Example: the check processing activity in a Bank,
the refining process in Oil and Gas industries.
Support processes: represent the Business Processes that are used by all
other Business units. Example: Finance or Human Resources
Innovation processes: represent processes that position the organization and
products within the market. Example: Corporate Communications
Management processes. Example: Strategic Planning

These categories may represent Business groups that use a set of general IT
Services and application based services specifically designed to serve their areas.
Most major Business Processes have sub-processes. All of them should be identified.

Questions
The following questions can help in this step:

Which Business Processes are considered critical to the Business?

Microsoft Confidential for internal use only


Page | 8

Which Business Processes need to be up and running in order to help the


Business make money and achieve its goals?
Who/Which area is the Business company owner for this Business Process?

Example:

Step 3: Identify the IT Services


An IT Service is a capability, not a technology solution or Business application. Most
of the times an IT Service is built by more than one technology solution and
application; it is the combination of those and the purpose it serves what defines
the IT Service. An IT Service have the following characteristics:

Fulfills on or more needs of the customer


Supports the customers Business objectives
Is perceived by the customer as a coherent whole or consumable product

Service: A means of delivering value to customers by facilitating outcomes


customers want to achieve without the ownership of specific costs and risks. The
term service is sometimes used as a synonym for core service, IT service or
service package.
Core service: A service that delivers the basic outcomes desired by one or more
customers. A core service provides a specific level of utility and warranty.
Customers may be offered a choice of utility and warranty through one or more
service options. Examples of Core services are Financial Management System,
Invoicing System, Power Generation Application and so on.
Enabling service: A service that is needed in order to deliver a core service.
Enabling services may or may not be visible to the customer, but they are not
offered to customers in their own right. Examples of Enabling services are
Monitoring System, Identity Services (such as Active Directory) and so on.
It is important to notice that in some cases the customer refers to IT Services
exactly with the same name that the LoB application that provides it (see Step 4
below). In such cases, the BITMap may repeat this name in the two layers. But the
correct way to do it is to ensure that the IT Service is different than the LoB
application that provides it.

Microsoft Confidential for internal use only


Page | 9

Questions
The following questions can help in this step (this questionnaire should be done for
each Business Process identified on Step 2):

Which IT Services currently support this Business Process?


What are the dependencies for this Business Process?
Who/Which area is the IT company owner for this IT Service?
Review Annex B: EPG Workloads to help guide the conversation when
identifying IT Services.

Example:

Step 4: Connect IT Services to IT Systems and/or Line of Business (LoB)


applications
In this step, the IT Services identified previously should be decomposed in the IT
Systems and/or LoB applications that are needed to deliver that IT Service to the
Business.
IT System: is a set of computer services or programs that provide a specific
functionality.
Line of Business (LoB) application: an LoB (Line of Business) application is one of
the set of critical computer applications that are vital to running the Business, such
as accounting, supply chain management, and resource planning applications. LOB
applications are usually large programs that contain a number of integrated
capabilities and tie into databases and database management systems.
One IT Service may be delivered by one or more IT System or LoB application. At the
same time, one IT System or LoB application may be used to deliver more than one
IT Service.

Questions
The following questions can help in this step (this questionnaire should be done for
each IT Service identified on Step 3):
Microsoft Confidential for internal use only
P a g e | 10

Which are the main applications that support this IT Service?


What are the dependencies for this IT Service?
Review Annex B: EPG Workloads to help guide the conversation when
identifying IT Systems or LoB applications.

Example:

Step 5: Connect IT Systems to the underlying infrastructure


In this final step the IT Systems and/or LoB applications identified earlier should be
decomposed in the infrastructure services that are required to run that IT System or
LoB application.
In most of the cases, more than one infrastructure service is required to run each IT
System or LoB application. At the same time, one infrastructure service may be
used to run more than one IT System or LoB application.

Questions
The following questions can help in this step (this questionnaire should be done for
each Business Process checked on Step 4):

What are the main infrastructure services that support this IT System or LoB
applications?
What are the dependencies for this IT System or LoB application?
Review Annex B: EPG Workloads to help guide the conversation when
identifying the underlying infrastructure

Microsoft Confidential for internal use only


P a g e | 11

It is important to notice that at this level, most if not all of the technologies that the
customer uses in its infrastructure can be identified. This means that the list of
infrastructure services can include Microsoft products and versions, non-supported
products and competitor technologies and products. This can be documented in the
Products section of the SDP.

Example

Once finalized, a simple BITMap may look like the image below. It may be required
to plan for an additional meeting with the customer in order to complete the BITMap
and validate it.

Microsoft Confidential for internal use only


P a g e | 12

4. Validation
This is an important step. In order to be effective both in the executive level
presentation and with further utilization of the BITMap, the TAM must ensure that
the diagram created is correct. This validation may be done immediately after the
creation, or on an additional meeting.
Things to consider for validation:

Check the correctness of the diagram


Show the areas of the infrastructure where Premier can add value and link
them to the Business Processes
Identify with customer what are the priorities for their Organization

5. Final presentation
During the final presentation customers executive management should be
attending. If so, then this presentation is key to engage with them and show how
Premier can support not only their technology, but their business as well. This
changes the conversation.
Microsoft Confidential for internal use only
P a g e | 13

Please consider the following recommendations to create and deliver the


presentation:

Use the Business Process and mapped services names to highlight the areas
where Premier is currently delivering or planning to deliver activities
Comment the risks and red flags identified in BITMap emphasizing the
importance of the service to the Organization
At all time talk in business terms, not in technical terms. Example: instead of
saying we will review the SQL Server installation you can say we will
ensure there are no risks on the database engine that supports the business
process.
Have backup slides with an action plan on how Microsoft can support the
implementations of priorities improvements
Include as a backup the SDP updated with risks and improvement points to
show how are we aligned with their IT goals

What to do next
Once a BITMap is done many opportunities appear in several areas. Some of them
are the following:

Premier Services
o POP Services Catalog
o POP Service Map
o Risk Assessments (RaaS)
o Lab Web Migration
o Other Labs to support migration
Premier Value
o Improve the Value Triangle and SDP
o Whenever recommending a proactive service, map it directly to the
Business Process where it will impact
o When the customer has an incident, understand how it impacts the
Business
o Communicate better with the customer by showing a simple yet very
impactful map about how the infrastructure is being used for the
Business
o Create/improve the shared goals (CoS)
o Open the conversation at executive levels
Customer Business
o Recommend projects to update the infrastructure (either with MCS of
with specific Premier activities)
o Recommend projects that may impact the Business Processes
Cross boundary collaboration
o Provide information about competitors to the ATU
o Provide an holistic view of the customer Business/IT/products to the
ATU
o Provide licensing information to the ATU

Microsoft Confidential for internal use only


P a g e | 14

Hints
Not all customers are the same. Some of them may be more mature than others,
have more or less IT Service Management knowledge than others, know a lot or
little about their own Business or be able to express better than others. With this in
mind, no two BITMaps will be the same. There are several alternatives that should
be considered when getting ready and creating a BITMap with a customer. Some of
the alternatives are:

Use a Services Catalog, if available, as a source of information


Use a Configuration Management Database, if available, as a source of
information
In some cases the customer may find it difficult to understand the difference
between IT Services and IT Systems/LoB applications (layer 2 and 3). In such
cases these two layers can be consolidated in one and the BITMap will have 3
layers instead of 4 (Business Processes, IT Systems and Infrastructure)
Use different colors to show connections between layers, in order to make it
easier to identify where a specific technology impacts
If a BITMap is too large due to the complexity of the customer, it can be
separated by different means such as Department, Business Area and so on
Include Business Process owner names within the diagram
Include IT Services owner names within the diagram
Include product versions within the diagram

Annex A: Sources of information

ITIL Glossary: Crown copyright 20XX. All rights reserved. Material is


reproduced with the permission of the Cabinet Office under delegated authority
from the Controller of HMSO.
Defining IT success through the Service Catalog: a practical guide, second
edition (by Troy DuMoulin, Rodrigo Flores and Bill Fine). Pink Elephant 2008.
http://searchcio.techtarget.com/definition/LOB

Microsoft Confidential for internal use only


P a g e | 15

Annex B: EPG Workloads

Capabi
lity

Workload

Sub-workload

Primary
Technologies

Definition

Exchange Server
Lync
Office
Office
Communications
SharePoint Server

Workspaces describe a
collaborative infrastructure
that gives end users the tools
to easily create single,
integrated work environment
and share assets across global
teams, departments, and
organizations while
maintaining IT control. It
provides users to collaborate
through Web browsers, mobile
devices, have offline
synchronization while
supporting integration of
workspaces with line-ofbusiness applications.

Provisioning and Architecture

Collaboration

BPIO

Infrastruc
ture

Team Experience

Workspaces
Onboarding

Portals

Publishing
User Experience
Provisioning and Architecture
LOB Application Integration

Microsoft Confidential for internal use only

Office
SharePoint Server

Portals describe a
collaborative infrastructure
that helps connect people with
line-of-business data, experts,
and business processes across
the organization. It helps
publish and deliver targeted
content, data, and information
to users based on their
network and corporate

P a g e | 16

Social Media
Social Feedback

Office
SharePoint Server
SharePoint Online

Social
Computing
Social Networks

Project Planning
Project Team Collaboration

Project
management
Project Portfolio Management

Microsoft Confidential for internal use only

Exchange Server
Lync
Office
Office
Communications
SharePoint Server
Project

identities.
Social computing describes
how organizations can obtain
business value from the
experiences and ideas of
people across the
organization. It helps build
collective intelligence with
enterprise-grade wikis, blogs,
and podcasts. It also helps to
accelerate innovation and
collaboration enabling people
to find, connect, and build
social networks across
geographical boundaries.
Based on the social feedback
including ratings, tagging, and
bookmarking; it helps apply
quality management controls
to help search and sort for the
best content.
Project management describes
how organizations can align
work and people with the
business goals to effectively
manage projects from ad-hoc
projects to complex programs.
It helps people effortlessly
collaborate and share
essential information through
team collaboration. It provides
visibility into overall work
commitments, actual
timesheets, and resource
capabilities to plan the project
execution. Project

P a g e | 17

management also includes


project portfolio management
to identify, prioritize, and
Content Sources and Indexing
Relevance
Information
access
Search-Based Applications

Messaging

Interactive
Experience and
Navigation

Interactive Experience and


Navigation

Protection from Malware


Messaging

High Availability
Protection and Control

Microsoft Confidential for internal use only

FAST
Office
SharePoint Online
SharePoint Server

Information Access describes


how customers can enable
users to access all corporate
information assets including
structured and unstructured
data and expertise information
through search capabilities
and search-enabled
applications available in
multiple languages.

SharePoint Server
FAST
Windows
Office 365
SharePoint Online

Interactive experience and


navigation describes how
customers can provide users
with a single way to access
structured and unstructured
information across the
organization. It provides a
unified search experience
across desktops, servers, and
Internet based on user context
and interests.

Exchange Server
Outlook
Forefront
Office 365
Exchange Online

Messaging describes how


customers can provide access
to e-mail, voice mail,
calendars, and contacts from a
variety of clients and devices.

P a g e | 18

Anywhere Access
Provisioning

It helps enable confidential


communications via
information protection and
rights management. It helps
safeguard users' and the
organizations valuable
information with anti-virus,
anti-spam, and anti-phishing

Unified Communications

Archiving

Enterprise IM

Office
Communications
Server
Lync Server
Office Communicator
SharePoint Server
Office 365

Instant messaging allows realtime communication to help


reduce turnaround time and
increase productivity. It offers
presence indication to make
effective communication
choices by providing detailed
information about a persons
availability and status. The
IM/online presence solution is
accessible from a variety of
devices, and is integrated into
the enterprise productivity
and collaboration platform to
help improve efficiency.

Lync Server
Office 365
Office

Conferencing empowers users


with audio, video, and web
conferencing tools accessible

Group Chat

IM/Presence
Presence

Conferencing

Web Conferencing
Audio Conferencing

Microsoft Confidential for internal use only

P a g e | 19

Video Conferencing
Communications
SharePoint Server
Outlook

VoIP
Voice Mail
Voice Quality
Voice

Call Routing

High Availability

Document Management and


Repository Services
Information
Management

Metadata Management
Web and New Media
Management

Microsoft Confidential for internal use only

from variety of devices and


remote locations. It provides
users the ability to effectively
collaborate, train, or deliver
interactive presentations with

Exchange Online
Exchange Server
Lync Server
Office 365
Office
Communications
Outlook
SharePoint Server
Windows Phone

Voice describes how


customers can use a secure,
integrated, all-time available
voice communications
platform accessible from PCs,
mobile devices, and Web
browsers. It provides access to
voice mail integrated with
other communication modes
like IM and online presence,
conferencing, and messaging.
It provides call routing based
on identity and online
presence and ensures high
voice quality.

Office
SharePoint Server
SharePoint Online
SharePoint Designer

Information Management
describes how customers can
manage the documents, Web
content, and rich media. It
helps organizations to store
and organize all business
documents and content in one

P a g e | 20

Content Creation and Management

Information Governance
central location, and enables
users to have a consistent
mechanism to navigate and
find relevant information. It
enables to control the life
cycle of documents, how they
are created, reviewed, and
published, and how they are
Process
efficiency

Electronic Forms and Image


Capture
Human Workflow
Document Automation

Microsoft Confidential for internal use only

Office
SharePoint Designer
SharePoint Online
SharePoint Server
Visio
Visio Studio

Process Efficiency describes


how customers can streamline
the everyday business
processes by using electronic
forms and workflow processes
using visual design tools.
Users can initiate, track, and
participate in automated
document-centric processes
through familiar desktop
applications, e-mail, or Web
browsers. Human and system
workflows are integrated for
orchestration, exception
handling, and automation. It
also offers the ability to
generate, manage, and
maintain a range of
discoverable templates and
content fragments integrated
with line-of-business

P a g e | 21

applications.
Records Management

Compliance
E-Discovery

Authoring

Content Options
Creation Efficiency
Idea Capture and Retention

Microsoft Confidential for internal use only

Office
SharePoint Server
SharePoint Online

Office
SharePoint Server
Visio

Organizations can
demonstrate compliance with
well-designed records
management and e-Discovery
solution including automated
workflows to manage the
entire discovery process. It
helps increase organizational
efficiency with the ability to
dispose of out-of-date items,
manage versions, apply
retention schedules, declare
records, and place legal holds
while dealing with traditional
content, Web content, or
social content. It also helps
locate and produce electronic
information to support events
such as litigation, audits, or
investigations.
Authoring describes how
customers can support a
seamless content life cycle
using content creation tools
integrated with ideation and
capture mechanisms. It
provides contextual formatting
options, rich media editing,
and extension to line-ofbusiness processes to
consume and repurpose
content.

P a g e | 22

Consistent Interface

Exchange Server
Lync Server
Office
Office
Communications
SharePoint Server
Visio

Multi-Device Support
describes how customers can
deliver consistent and high
fidelity experiences across
client, Web and other line-ofbusiness applications to help
optimize the content creation
experience while supporting
different usage scenarios. It
also helps ensure document
integrity with high fidelity
across PC, phone, or browser
and between internal and
external users.

Office
SharePoint Server

Interoperability describes how


customers can help users to
render changes to files,
provide ability to save files in
open-standards and approved
formats, and have active
exchange of information with
line-of-business systems
through defined and standard
formats.

Office
SharePoint Server

User Accessibility describes


how customers can enhance
accessibility of tools and
content to help reduce
usability challenges for people
who require various
accessibility accommodations.
It helps validate user-created
content and sites before
publication and make sure
that they adhere to content
accessibility standards.

Delivery Options

Multi-Device
Support
Document Integrity

Interoperability

Interoperability

Application Accessibility
Content Accessibility
User
Accessibility

Microsoft Confidential for internal use only

P a g e | 23

BI and Analytics Platform

APO

BI Lifecycle Management

Office Professional
Sharepoint
Office 365
Visio

Management and distribution


of dashboards and managed
reports on data from various
sources across the
organization, and support for
user access to reports,
including notifications,
subscriptions, search, and
sharing. Management and
support for self-service
reporting, data search, data
analysis, visualization, and
advanced analytics tools.

Office Professional
SQL Server

Architecture, design,
implementation,
administration, and
maintenance of the
technologies, policies,
practices, and procedures that
support data warehouses and
data marts.

Report Generation and Access


BI Search and Discovery
Business
Intelligence

Self Service Reporting and


Analysis
Dashboards and Visualization
Advanced Analytics
Enterprise Data Warehouse
Master Data Management
Data Quality

Data Warehouse
Management

Data Movement and


Consolidation
Data Warehouse Operation and
Maintenance
Data Modeling and BI
Development

Big Data

Big Data Storage and


Management
Big Data Filtering, Discovery and
Analytics
Big Data Staging for Low Latency
Consumption

Microsoft Confidential for internal use only

SQL Server

Discovery, movement,
management, and analysis of
large volumes of structured
and unstructured information
from various sources. It is
supported by various storage
and analytics algorithms
specifically designed for
handling large volumes of

P a g e | 24

data, including Hadoop and


Composition

Office Professional
PowerPivot
SharePoint Server

Surfaces available information


in a variety of methods,
including suggested
annotation or extension,
overlay, and analytics.
Internally and/or externally
available and supported data,
information, and associated
value-add services are
published in centrally
accessible catalogs.

SQL Server

Data storage and processing


support for applications that
handle business transactions.

Office Professional
SQL Server

The development ,
governance, and execution of
architectures, policies,
practices, and procedures that
properly manage the full
database life cycle needs of
an enterprise.

.NET Framework
Internet Information

Support for application


execution that includes any

Data Catalog
Information
Services and
Marketplaces

Event Processing
Information Suggestion

Transaction Processing
Performance and Scalability

Database and LOB Platform

Transaction Processing HADR


Transaction
Processing

Transaction Processing
Manageability
Transaction Processing
Operational Transparency
Database and BI Governance and
Security

Data
Management

Database Lifecycle Management


Data Auditing and Compliance

Application
Infrastructure

Application Messaging Integration


Environment

Microsoft Confidential for internal use only

P a g e | 25

Application Orchestration and


Messaging Transformation
Environment
Application Framework
Environment
Application Hosting and
Management

Services
Office Professional
SQL Server
Visual Studio
Windows HPC Server

required operating system,


framework, container,
application fabric, integration,
and/or other common services
required by the application
architecture.

Visual Studio
Internet Information
Services

Technologies that are used to


code in a browser-supported
language and that rely on a
standards-based web design
to render the application to
user and application
interfaces. Includes
capabilities for media,
multichannel user interfaces,
and web parts and rich
experiences on the web.

Application Caching and


Scalability

Custom Development

High Performance Computing


Web Interfaces
Standards-Oriented Web
Internet
Applications

Component and
Service
Composition

Multimedia Support

Developer Composition
End User Composition
LOB Application Components
Business Productivity
Infrastructure Integration
Composite Deployment and
Management

Microsoft Confidential for internal use only

Office Professional
Visual Studio
Windows Workflow
Foundation
Windows Server
SQL Server
System Center

Composite applications
compose the data and
processes of existing
packaged systems with new
business-specific requirements
to deliver synthesized
solutions that more quickly
and directly meet the needs of
business users. These
extended line-of-business
(LOB) solutions can be

P a g e | 26

modified more easily in


response to changing business
needs and seamlessly
integrated into information
Application Messaging Integration
Development
Application Orchestration and
Messaging Transformation
Development
Visual Studio
.NET Framework
FTP, Fax, Email

Enterprise
Integration

Development
Platform

Application Frameworks and


Development Tools
Application Customization

Microsoft Confidential for internal use only

SQL Server
Visual Studio

Development and
management tools to
integrate disparate systems
across IT environments.
Automation of processes
across organizational,
datacenter, and cloud
boundaries by integrating
applications, data sources,
and devices. Application
Integration can occur at
presentation layer, business
logic layer, or data layer.
Interoperability in a complex
enterprise environment is
based on industry standards
and patterns like SOA, EAI,
B2B, ESB , Web Services,
SWIFT, HL7, HIPAA, etc.
Frameworks, tools, and
environments for the
development and
customization of applications
with maximum efficiency,
effectiveness, quality, and
reuse of components and
architectures.

P a g e | 27

Application Portfolio Management


and Rationalization
Application Planning and
Management
Application
Lifecycle
Management

Quality Enablement

Office Professional
Visual Studio

Version Control and Configuration


Dev Ops Lab Environment

Application lifecycle
management (ALM) is the
marriage of business
management to software
engineering made possible by
tools that facilitate and
integrate requirements
management, architecture,
coding, testing, tracking, and
release management.

Datacenter Management and Virtualization

Core IO

Dev Ops

Datacenter
Management
and
Virtualization

Software and configuration


Library Maintenance
Workload Deployment and
Provisioning
Patch and Update Process
Asset Management
Resource Capacity Management
and Consolidation
Resource Virtualization
Resource Pooling
Service Monitoring and Control
Services Compliance
High Availability

Microsoft Confidential for internal use only

System Center
Windows Server
Windows Azure

Data Center Management and


Virtualization describes how
customers should maintain
and manage the hardware and
software assets in the data
center in order to minimize
the management efforts while
maximizing the performance.
It focuses on the maintenance
and monitoring of all software
including Operating System
and image deployment,
application deployment and
other business applications
with updation and patching. It
also helps maintain an
inventory to manage all assets
and resources across physical,
virtual, and heterogeneous
environments to be used as
and when required. It includes
the metering and

P a g e | 28

Charge Back Process


Virtualization Security

measurement of the IT
resources and services
consumed by the tenant
business group. It also
describes data center
performance factors like
health monitoring, capacity
Server OS Protection

Forefront
Intelligent Application
Gateway
Internet Security &
Acceleration Server
System Center
Windows Server

Server Security describes how


customers should protect and
secure server infrastructure at
the data center from viruses,
SPAM, malware and other
unauthorized intruders. It
focuses on protecting the
Operating Systems and the
network while providing
security and remediation to all
the applications and user
accessing those applications,
either on-premises or
remotely.

Forefront
Internet Security &
Acceleration Server
System Center
Windows Server
Windows
Windows AppFabric

Networking describes how


customers should manage the
network and related
configurations to ensure
optimized utilization of
network resources with an
uninterrupted business

Server Application Protection


Network Protection

Server
Security

Secure Remote Access


Service Isolation and
Segmentation

DNS Availability

Networking

DHCP Infrastructure
Network Allocation and QoS
WAN Optimization

Microsoft Confidential for internal use only

P a g e | 29

WAN Monitoring
Transport Service Configuration

continuity. This covers the


configuration and
maintenance of network
protocols as well as concepts
like caching, bandwidth

Storage

Storage Availability
Storage Access
Data Indexing and Search
Data Classification
Storage Management and
Allocation
Server Backup and Recovery
Data Archiving
Data Deduplication

Microsoft Confidential for internal use only

Forefront
Internet Security &
Acceleration Server
System Center
Office SharePoint
Server
Windows
Windows Server
Windows Storage
Server

Storage describes how


customers can categorize,
allocate, retrieve, and secure
the business related
information in order to ensure
quicker access and better
protection of data while
making optimal utilization of
resources. It covers
management of the data
discovery, classification, and
allocation onto suitable
location (disks, storage arrays
or clusters) as driven by the
business policies. This also
includes securing the data by
means of backup and
recovery, with additional
protection for sensitive
information. The complete lifecycle management for data,
like archival, de-duplication
and deletion of data ensures
an optimal utilization of
valuable resources and high
return on investments.

P a g e | 30

Client Image and Deployment


Client Operating System Policy

Exchange Server
Forefront
Intelligent Application
Gateway
Application
Compatibility Toolkit
Application
Virtualization
Deployment Toolkit
Desktop Optimization
SharePoint Server

Data Center Management and


Virtualization describes how
customers should maintain
and manage the hardware and
software assets in the data
center in order to minimize
the management efforts while
maximizing the performance.
It focuses on the maintenance
and updation of all software
including Operating System,
images, and other business
applications. It also helps
maintain an inventory to
manage all assets across
physical, virtual, and
heterogeneous environments.
It also describes server
performance factors like
health monitoring, capacity
management, virtualization,
and adherence to compliance
policies. It also includes
implementation of clustering
or load management to ensure
all-time availability of all the
server services.

Forefront

Device Security describes how

Roaming User Profiles

Device Deployment and Management

Client Backup and Recovery


Client Application Deployment
and Control
Client Application Virtualization
Application Compatibility

Device
Management
and
Virtulization

Desktop Patch Management


Desktop Monitoring
Client Configuration Compliance
Client Asset Management
Mobile Device Provisioning
Device Management
Mobile Use of LOB Apps
Mobile Device Security Policy
Mobile Software Management
Mobile Remote Access
Client Malware Protection

Microsoft Confidential for internal use only

P a g e | 31

Client Lockdown
Client Encryption
Internet Security and
Acceleration
Windows
Windows Server
System Center
Windows Intune

Identity and Security Services

Device
Security

Identity and
Access

Identity Provisioning and Access


Management
Identity Federation
Authentication
Authorization
Directory Services

Microsoft Confidential for internal use only

Forefront
Hyper-V Server
Windows
Windows Azure
Windows Server

customers can protect the


various devices from malicious
intruders and unauthorized
access. It includes protection
against malware for all client
devices using firewall, host
intrusion prevention system or
vulnerability shield, with
provisions of recovery and
remediation. It helps provide
secure access modes for users
to access business
applications, and encryption of
critical information to secure it
from intruders.
Identity and Access describes
how customers can check and
control the access to business
related information, and keep
track of authorized users
accessing business
applications while filtering
unwanted access requests. It
covers validation of users by
means of authentication and
authorization, and advanced
security like password and
group management. It also
includes user-provisioning
based on certificates or smart
cards, and management of
external users and partners by
means of identity federation.
Access to line-of-business
applications as guided by
corporate policies helps
ensure business confidentiality

P a g e | 32

while supporting anywhere


Protect Data at Rest

Forefront
Intelligent Application
Gateway
SQL Server
System Center
Opalis
Windows Phone
Windows Server

Information Protection and


Control describes the methods
and policies of protecting all
kinds of data that exist in the
organization. It includes
defining the policies for
information protection and its
auditing and reporting to
ensure a safe work
environment across the
organization. It also covers the
discovery, classification, and
protection of data stored on
the servers, transmitted
through corporate network via
e-mails, or data which is in use
by the users on their local
systems.

Forefront
Intelligent Application
Gateway
Internet Security &
Acceleration Server
System Center
Windows Server

IT Process and Compliance


describes the guidelines about
how to plan, develop, deploy,
and support IT services and
solutions while ensuring high
reliability and availability. It
includes planning about
alignment of IT with business
and defining policies and
reliability definitions for the IT
services. It also covers ontime delivery and deployment
of project plans to ensure

Protect Data in Motion


Protect Data in Use
Information Protection

IT Process and Compliance

Information
Protection and
Control

Information Protection Reporting

Services Alignment
Policy Planning
Reliability Planning

IT Process and
Compliance

Project Planning
Services Testing and Delivery
Services Deployment
Operation and SLAs

Microsoft Confidential for internal use only

P a g e | 33

Incident Management
Security Monitoring and
Reporting
Problem Management
Change and Configuration
Management
Team Accountability and
Management
Risk and Vulnerability
Management
Self Service
Service Automation and
Orchestration
Data Sovereignty

Microsoft Confidential for internal use only

smooth operations including


health and service monitoring.
Security management,
problem management, change
and configuration control,
service ownership and
accountability along with
compliance controls contribute
to efficient management of IT
processes.

P a g e | 34

Вам также может понравиться