Project Portfolio Management

Solution Implementer Guide

Recap Discussions to Date

Solution Guidance

• Phase 1

• Phase 2

• Phase 3

Customize the Capability Requirements

Next Steps

Engagement Approach

Solution areas

Business strategy

Industry

Audience

Horizontal

1. Understand business needs and priorities

2. Discuss range of potential solution capabilities

1. Present relevant integrated capabilities

2. Position the Integrated Capability approach

Integrated Capability Analysis > Projects, architecture, products

Solution road map

Integrated Capability Analysis

Ensure target business capabilities cover process improvement priorities

Translate business capabilities into required infrastructure capabilities

Assess current infrastructure maturity

Determine gaps to target integrated capabilities

Build a road map for integrating capabilities and implementing solutions

Specify required platform architecture, technologies, and services

Baseline the Microsoft

®

platform road map

Integrated Capability Support for Priority Business Capabilities

Business Driver

ALIGN

INVESTMENTS

WITH BUSINESS

STRATEGY

MEASURE

CORPORATE

PERFORMANCE

Phase 1

Communicate business strategy effectively by using diagrams, charts, and written descriptions, and then collect, update, and manage initiative requests and related information via common productivity tools and business drawing tools, and then storing information in centralized and categorized libraries

Collect project investment requests and establish a system to rank and assess them via a centralized managed list or spreadsheet tool

Prove investment worth by defending investment positioning via spreadsheet or list-based models that use objective formulas for scoring

Report corporate effectiveness or failure via project reports that are created from standardized templates in common productivity applications, and are stored in centralized locations

Get early performance information regarding projects via on-demand time-phased reports, charts and health indicators, and status reports that are created in common productivity applications

Identify and collect information about project risks and issues via managed-list repositories or automated surveys that capture data specific to the risk

Phase 2

Collect and objectively prioritize business drivers, and then drive consensus among executives via a business driver collection tool and a pair-wise comparison matrix

Identify and select project investment requests by scoring that is aligned with business drivers via a

Web-based portfolio inventory tool

Select investments based on rational decisions rather than emotions via structured portfolio optimization analysis, by using what-if scenarios to identify tradeoffs and select the optimal portfolio under varying budgetary and business constraints

Make KPIs and underlying performance data available organization-wide via integration from across various project repositories for a consolidated view of information regarding the scoring of business initiatives

Make better decisions by standardizing work effort reporting via customized reports that show metrics such as progress and track actuals by percentage of work complete, actual work done, and work remaining; and that show budget vs. forecast built from multi-dimensional "cubes" from the database

Identify and fix problems at a project level by using risk mitigation via a Web-based risk management tool that associates risks and issues with tasks and projects, so that teams can collaborate on specifying probability and impact, assigning ownership, and tracking progress to manage risk more efficiently

Phase 3

Provide organizational control and action according to business strategy via a portfolio management system that prioritizes initiatives for the upcoming planning period; uses the Business

Alignment Framework to optimize budgets and recommend portfolios; employs sophisticated optimization algorithms to determine the optimal project or program portfolio under varying budget and business constraints; and uses advanced portfolio analytical techniques

Enable a rationalized approach to choose which investments have the highest return and alignment to business strategy via investment maps to effectively evaluate competing investments from multiple perspectives, by using methodologies such as the

Business Alignment Framework to optimize budgets and recommend portfolios; and sophisticated optimization algorithms to determine the optimal project or program portfolio under varying budget and business constraints

Enhance the business value of the portfolio, to ensure that the mix of investments aligns to established business strategy via performing advanced portfolio optimization analysis such as

Efficient Frontier modeling, to identify and break constraints and gain more business value from the portfolio; providing enterprise-wide integration across various project repositories; and transferring information about the scoring of business initiatives to ERP systems

Automate action on trends, alerts, and performance via portfolio dashboards and scorecards that show the contribution of the portfolio, for decision-making through trend and performance analysis

Transmit work effort to LOB and financial systems, pull metrics from financial systems, and combine the results in a comprehensive corporate reporting portal via integration packages that feed to and from project databases and push information into business intelligence portals and reporting applications

Build tools to support a comprehensive risk management program via risk dashboards that use heat maps to provide real-time data to identify risks, and workflow-based approaches to manage and aggregate risk, including change and approval processes for risk visibility, documentation, and mitigation

Integrated Capability Support for Priority Business Capabilities

Business Driver

MANAGE THE

COSTS OF

PROJECTS AND

PROGRAMS

Phase 1

Measure financial performance per project via spreadsheet-based reporting and analysis for measuring performance

Maintain a list of projects that is distributed to executives across the organization via a centralized managedlist repository, table, or spreadsheet to show the top-line status of projects

Track organization-wide budget performance via desktop spreadsheets that are stored in a centralized location

Phase 2

Track financial performance consistently across all projects and initiatives via server-enforced data entry rules in the project management system and enterprise-wide reporting dashboards to show actuals vs. forecasts

Eliminate duplicate work effort by making work performed and the results more visible via enterprise search that uses standardized keywords and portfolio views to show all current and proposed work and via graphical representations of project portfolios and initiative work

Select investments based on prioritized business value and budget via a portfolio selection system that uses a pair-wise comparison tool to objectively assign value to business drivers, provides cost-sensitive resource allocation based on business initiatives, and prioritizes initiatives for the upcoming planning period

Phase 3

Ensure that project financial data automatically flows into and from financial systems via a realtime integration framework that is built on standard Web services to enable connectivity, data access, and event handling between the project management system and other applications with a bi-directional feed to general ledger systems, to compare corporate accounting to project accounting

Reduce effort on low-value projects and programs via reports and scorecards for ratio analysis of cost

(spend) and benefits; tracking portfolio return on investment (ROI); dynamic assessment of the impact on the project or program portfolio; monitoring the performance of each investment to ensure realization of forecasted benefits; and ongoing alignment and portfolio optimization to enable selection of the right programs and to halt existing programs which allows pending programs to begin

Plan demand-management scenarios and make informed decisions about outsourcing via a portfolio management system that uses an efficient frontier analysis to identify and break constraints that prohibit achievement of an optimal portfolio; employs sophisticated optimization algorithms to determine the optimal project or program portfolio under varying budget and business constraints; and uses advanced portfolio analysis techniques

Integrated Capability Support for Priority Business Capabilities

Business Driver

OPTIMIZE

RESOURCE

ALLOCATION

ACROSS THE

ORGANIZATION

Phase 1

Assess capacity vs. demand on a skill level via spreadsheets or managed-list repositories to collect skill-set data

Assign resources as they're needed without formal processes via spreadsheets or project-oriented views of managed lists

Track resource performance per project manually via e-mail collaboration by enabling project managers and team members to send and receive task status information

Phase 2

Find the right people based on matching their skills, identify optimal project start dates, and assess when to delay projects via an enterprise project management system that centrally stores all resource information including assignments, usage, availability, and skills across the organization; and then selects resources from the enterprise resource database based on criteria such as availability, skills, and location

Select the right resource based on skill set and availability, make resource assignments centrally visible, and communicate effectively with resources via an enterprise project management tool that sends task reminders through e-mail; centrally stores all resource information including assignments, usage, availability, and skills; defines custom report templates; allows for online task delegation from leads to team members or peer-to-peer as needed through a Web-based portal; and offers customizable dashboards for resource allocation and availability

Automate resource tracking via an enterprise project management tool resource center that helps managers understand the impact of assigning a resource and gain control when they level resources; uses customizable time sheets to accommodate different organizational structures and processes; publishes assignment information on enterprise portals; allows team members to enter time reports directly from their e-mail client; and uses customizable report templates to communicate resource information

Phase 3

Understand organizational capabilities across work management scenarios, make headcount and outsourcing decisions, and normalize capabilities decisions from multiple sources via integration with an enterprise project management system that loads data to and from

HR systems to perform a strategic capabilities analysis

Make smart scheduling decisions about the planning horizon based on forecasted projects and programs via a portfolio management tool that offers cost-sensitive resource allocation based on business initiatives, and consolidates all investments in a central repository to help ensure that executives gain visibility, insight, and control across the entire portfolio, as they assess the capabilities of future work

Plan demand-management scenarios and make informed decisions about outsourcing via an enterprise project management tool resource center that builds custom reports to show resource allocation, so managers can assess the resource needs of the organization

Integrated Capability Support for Priority Business Capabilities

Business Driver

MAXIMIZE

PRODUCTIVITY

OF INDIVIDUALS

WORKING ON

PROJECTS

Phase 1

Increase worker productivity and the consistency of deliverables via custom templates in desktop productivity tools that support project execution; and then store deliverables in centralized locations

Enable project teams to understand a basic schedule and deadlines for work assignments via a project management tool or a managed list with a project-oriented view to create project plans and communicate easily with team members and other stakeholders

Phase 2

Collectively create, find, and store project artifacts in real time via project-specific Web-based portals that have an integrated portfolio of collaboration and communication services to connect with employees information, processes, and systems; to create, collect, update, and manage relevant resources in categorized libraries; and to integrate project data into enterprise-wide search results based on common metadata to make managed work more visible

Ensure that project schedules and deadlines are enforced via an enterprise project management tool with customizable time sheets; custom report templates and project views to monitor planned vs. actual schedules and the achievement of project milestones; collaborative publishing of assignment and status information on enterprise portals, including the communication of scheduling issues; and collection of actual work effort reports through Web-based or e-mail-based forms

Phase 3

Improve cross-team collaboration via making reports and data available through Web-based dashboards and shared workflow; searching for subject matter experts across the company and partners based on expertise and roles; and using development tools that support a consistent and compliant application life cycle that enables asset reuse

Provide a single interface to enter time information, and automatically post employee work data in billing systems via integration with an enterprise project management tool that collects data from various project repositories to offer a consolidated view, and provides customizable timesheets that gather billing and project information from various data sources

Agenda

Recap Discussions to Date

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the Capability Requirements

Next Steps

Sophistication of the Solution

ALIGN INVESTMENTS WITH BUSINESS STRATEGY

MEASURE CORPORATE

PERFORMANCE

MAXIMIZE PRODUCTIVITY OF

INDIVIDUALS WORKING ON

PROJECTS

MANAGE THE COSTS OF

PROJECTS AND PROGRAMS

Phase 1

Provides basic support for the most critical elements of the business driver

Phase 2

Provides adequate, typical support for critical and priority elements of the business driver

OPTIMIZE RESOURCE

ALLOCATION ACROSS THE

ORGANIZATION

Phase 3

Provides thorough, streamlined support for the business driver that enables differentiated levels of performance

Solution Guidance

PHASE

DEFINITION

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Phase Definition

For each business driver, list the business challenges, solution features, and business benefits for this solution phase. Use this information and the “Support for Priority Business Capabilities” slides to structure the conversation with IT professional(s) for capturing, refining, and baselining business problems and solution functionality priorities.

Mapping

The Optimization mapping indicates the maturity level required for each capability of the solution to fully support the features specified in this solution phase. Use the mapping as a starting point to determine appropriate maturity levels for the solution.

After mapping the solution, assess the gap between the current and desired infrastructure to:

• Understand the scope and sequencing of work required

• Organize a deployment road map

Technologies

Use the results of the Optimization mapping to determine the technologies required for the features and supporting capabilities specified in this solution phase.

Conceptual Architecture

Use this high-level, use case diagram to provide the “black box” definition of this solution phase. Customize to your solution definition during the integrated capability analysis.

Logical Architecture

Use this logical, component-level architecture view to show all software components and how they interact to support this solution phase. Tailor to fit your particular solution definition during the integrated capability analysis.

Note: Physical architecture is covered in the Architecture Guide also used during the integrated capability analysis.

Recap Discussions to Date

Solution Guidance

Phase 1

• Phase 2

• Phase 3

Customize the Capability Requirements

Next Steps

Phase 1

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Business Driver

ALIGN INVESTMENTS

WITH BUSINESS

STRATEGY

Needs

Define, prioritize, and communicate the actual business strategy

Consistently evaluate, rank, and rate competing investment requests

Ensure investments are properly aligned with business strategy

Business Capabilities

Communicate business strategy effectively by using diagrams, charts, and written descriptions, and then collect, update, and manage initiative requests and related information

Collect project investment requests and establish a system to rank and assess them

Prove investment worth by defending investment positioning

Report corporate effectiveness or failure

Get early performance information regarding projects

Identify and collect information about project risks and issues

MEASURE CORPORATE

PERFORMANCE

MANAGE THE COSTS

OF PROJECTS AND

PROGRAMS

OPTIMIZE RESOURCE

ALLOCATION ACROSS

THE ORGANIZATION

Use key performance indicators (KPIs) for corrective actions

Use early indicators of project performance to support decision making

Provide better visibility into and control of risk factors and issues

Predict financial performance

Gain visibility into work efforts across business units

Optimize initiatives to increase productivity with fewer resources

Build a skills inventory

Effectively allocate resources

Track resource performance

MAXIMIZE

PRODUCTIVITY OF

INDIVIDUALS

WORKING ON

PROJECTS

Share and find project artifacts

Ensure project leaders communicate clear objectives about work performance

Measure financial performance per project

Maintain a list of projects that is distributed to executives across the organization

Track organization-wide budget performance

Assess capacity vs. demand on a skill level

Assign resources as they're needed without formal processes

Track resource performance per project manually

Increase worker productivity and the consistency of deliverables

Enable project teams to understand a basic schedule and deadlines for work assignments

Phase 1

B S R D

Data Center Mgt &

Virtualization

Data Center

Services Server Security

Client

Services

Networking

Storage

Client Mgt &

Virtualization

Client Security

Identity

& Security

Services

Identity & Access

Information Protection &

Control

IT Process & Compliance

Workspaces

Portals

Collab

Social Computing

Project Mgt

Messaging

UC

IM/Presence

ECM

Enterprise

Search

Conferencing

Voice

Information Mgt

Process Efficiency

Compliance

Information Access

Interactive Experience &

Navigation

Dashboards

Reporting

& Analysis Analytics & Data Mining

Content

Creation

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

Database Dependencies

Integration Dependencies

Development Dependencies

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Services are available during server failure (via server clustering or hot spares). IT system (hardware, hypervisor, operating system, and application)-aware monitoring and reporting on the majority of applications are in place across the heterogeneous environment, with defined service-level agreements and manual remediation functionality. Some

Production server resources are virtualized. A virtualized server pool is being offered as services (minimal Private Cloud progress). The organization actively uses virtualization to consolidate servers for production workloads.

Multiple vendor products are used for firewall, Intrusion Prevention Systems, web security, gateway anti-virus, and URL filtering. Protection for select applications (such as email) is centrally managed.

Redundant Domain Name System servers exist in a single location and provide fault tolerance. Zone creation and record updates are automatic to support directory services.

Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite.

Users back up critical data locally according to corporate policy and by using the tool provided. When it is necessary, user state can be abstracted from the operating system image (such as for a session, virtual desktop infrastructure, or roaming profile).

Protection against malicious software is centrally managed for desktop systems and laptops and includes a host firewall. Non-PC devices are managed and protected through a separate process.

Most applications and services share a common directory for authentication; some point-to-point synchronization exists across different directories, applications, and repositories. Multiple application directory services exist to support multiple standards. Password policies are set within the directory service to enable life-cycle management.

There is a centralized access policy for business resources, with some standardization in the policy. Limited, simple provisioning and de-provisioning of user accounts, mailboxes, certificates, smart cards, and machines exists to control access.

Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and email).

Each IT service provides service-level or operational-level agreements. Incident and problem management processes are in place for each IT service. IT policies are documented for each IT service. Monitoring and reporting are centralized for protection against malicious software, protection of information, and identity and access technologies.

Monitoring, reporting, and auditing are in place for IT services. Processes to manage incidents and problems are in place for each IT service.

Workspaces are managed at the departmental level and are available from individual productivity applications.

Users have widgets to customize their views of information. Enterprise search is integrated with portals. Users and groups can publish content directly to some portals. Workflow for review and approval is built-in and automated. Multiple portals exist. Directory services, authentication, and authorization are not uniform across portals, requiring users to sign in multiple times; user management methods are redundant.

Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide. Communities, if present, are largely through email or are driven by forums

Teams plan, track, and share tasks in lists by using collaboration tools. Multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.

IT manages mailbox provisioning by using a single directory.

Users have secure access to an enterprise-managed online presence and instant messaging infrastructure from inside and outside the firewall. Peer-to-peer voice and video communications are based on a single directory. Online presence information (automatically refreshed user availability information based on communications, log-on, and calendar activities) is integrated into the email client.

Managed workspaces exist at the departmental level and are available from individual productivity applications.

Custom solutions developed by IT are used to deliver and manage key forms electronically. Form data and scanned paper-based content are stored in a custom data repository.

Most unstructured information from intranets, email, and content management repositories is indexed. Some structured content from databases, people, and expertise information is indexed.

A basic interactive search experience incorporates faceted and filtered information based on common or explicit metadata.

Diagrams are linked to data and shared as static web pages or as .pdf files. Users can search for reports and related unstructured documents, and they have access to data through connections managed by IT. Users create and manage basic team or corporate scorecards that may not use cascading metrics or take a balanced scorecard approach.

Users create and share information securely through dashboards that require manual updates.

IT provides access to common or sanctioned data sources as database connections, data feeds, or reports. End users perform ad hoc queries and data analysis by using spreadsheets or other analysis tools, and by pulling data from sources sanctioned by IT in addition to other non-sanctioned sources. Information workers share their analysis through the business intelligence portal.

IT manages reporting as a standalone application or function. Data is shared from a source library to which end users can apply basic filters.

Integration: Data silos are consolidated by using basic extract, transform, and load packages to combine, integrate, and cleanse raw data from diverse data sources.

Service Architecture: Accelerated adoption, management and reuse of web services to enable greater responsiveness to changes in the business environment.

Software Quality: Active development processes use modern tools and frameworks to support object-oriented, rapid development and help manage evolving application architectures.

Phase 1

Data Center Mgt &

Virtualization

Data Center

Services

Server Security

Networking

Storage

Client

Services

Client Mgt &

Virtualization

Identity

& Security

Services

Client Security

Identity & Access

Information Protection &

Control

IT Process & Compliance

Collab

Workspaces

Portals

Social Computing

Project Mgt

UC

Messaging

IM/Presence

Conferencing

Voice

Information Mgt

ECM

Process Efficiency

Compliance

Enterprise

Search

Information Access

Interactive Experience &

Navigation

Dashboards

Reporting

& Analysis

Content

Creation

Analytics & Data Mining

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

Database Dependencies

Integration Dependencies

Development Dependencies

PHASE

DEFINITION MAPPING

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

B S R D

Windows Server ® 2008/2008 R2; Microsoft ® Hyper-V ™ Server 2008/2008 R2; Microsoft System Center Configuration Manager 2007 R3/2012; Microsoft System Center;

Operations Manager 2007 R2/2012; Microsoft System Center Virtual Machine Manager 2008 R2/2012; Microsoft System Center Service Manager 2010/2012; Microsoft System

Center Orchestrator 2012; Opalis; Windows Azure ® Platform

Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Microsoft Forefront ® Threat Management Gateway 2010; Microsoft Internet Security and

Acceleration Server 2006; Microsoft Forefront Protection 2010 for Exchange Server; Microsoft Forefront Security for Exchange Server; Microsoft Forefront Endpoint Protection

2010/2012; Microsoft Forefront Protection 2010 for SharePoint; Microsoft Forefront Security for SharePoint; Microsoft Forefront Security for Office Communications Server

Windows Server 2008/2008 R2; Windows ® 7

Windows Server 2008/2008 R2; Windows 7; Microsoft Windows Storage Server 2008/2008 R2

Microsoft Deployment Toolkit 2008/2010; Windows Automated Installation Kit; Microsoft Diagnostics and Recovery Toolset ; Microsoft Virtual Desktop Infrastructure Suite;

Windows 7; Windows Server 2008/2008 R2; Microsoft Application Compatibility Toolkit 5.0/5.5; Microsoft Windows Server Update Services 2.0/3.0; Microsoft Desktop

Optimization Pack 2008 R2/2009 R2; System Center Configuration Manager 2007 R3/2012

Forefront Endpoint Protection 2010/2012; Windows 7; Windows Server 2008/2008 R2

Windows Server 2008/2008 R2

Windows Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Protection 2010 for Exchange Server;

Forefront Security for Exchange Server; Forefront Endpoint Protection 2010/2012; Microsoft SQL Server 2008/2008 R2

Microsoft Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager

2010/2012; Hyper-V Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server

2006; Forefront Endpoint Protection 2010/2012; Windows Server 2008/2008 R2; Microsoft Security Assessment Tool; System Center Virtual Machine Manager 2008 R2/2012;

System Center Data Protection Manager 2010/2012; Opalis; System Center Orchestrator 2012

Microsoft SharePoint ® Server 2010; Microsoft Office SharePoint Server 2007; Microsoft Office 2007/2010; Microsoft SharePoint Designer 2010; Microsoft Office SharePoint

Designer 2007; Microsoft SharePoint Online

SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; Office 2007/2010; SharePoint Online

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online

Microsoft Project 2010; Microsoft Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Microsoft Project Server 2010; Microsoft Office Project Server

2007; Microsoft Office Project Portfolio Server 2007; Office 2007/2010

Microsoft Exchange Server 2007/2010; Microsoft Outlook ® 2010; Microsoft Office Outlook 2007; Microsoft Exchange Hosted Encryption; Microsoft Exchange Hosted Archive

Microsoft Office Communications Server 2007 R2; Microsoft Lync ™ Server 2010; Microsoft Office Communicator 2007 R2; Microsoft Lync 2010; Microsoft Lync Online; Microsoft

Office Communications Online

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010

SharePoint Server 2010; Office SharePoint Server 2007; Microsoft SQL Server 2008/2008 R2; Office 2007/2010; Microsoft Visio ® 2010; Microsoft Office Visio 2007

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010

SQL Server 2008/2008 R2

Microsoft BizTalk ® Server 2009/ 2010; Microsoft Visual Studio Team System 2008/2010

Visual Studio Team System 2008/2010; Microsoft Expression ® Studio 3/4; Microsoft Silverlight ™ 4/5

Phase 1

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Phase 1

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Recap Discussions to Date

Solution Guidance

• Phase 1

Phase 2

• Phase 3

Customize the Capability Requirements

Next Steps

Phase 2

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Business Driver

ALIGN INVESTMENTS

WITH BUSINESS

STRATEGY

Needs

Define, prioritize, and communicate the actual business strategy

Consistently evaluate, rank, and rate competing investment requests

Ensure investments are properly aligned with business strategy

MEASURE CORPORATE

PERFORMANCE

MANAGE THE COSTS

OF PROJECTS AND

PROGRAMS

Use key performance indicators (KPIs) for corrective actions

Use early indicators of project performance to support decision making

Provide better visibility into and control of risk factors and issues

Predict financial performance

Gain visibility into work efforts across business units

Optimize initiatives to increase productivity with fewer resources

Business Capabilities

Collect and objectively prioritize business drivers, and then drive consensus among executives

Identify and select project investment requests by scoring that is aligned with business drivers

Select investments based on rational decisions rather than emotions

Make KPIs and underlying performance data available organization-wide

Make better decisions by standardizing work effort reporting

Identify and fix problems at a project level by using risk mitigation

Track financial performance consistently across all projects and initiatives

Eliminate duplicate work effort by making work performed and the results more visible

Select investments based on prioritized business value and budget

OPTIMIZE RESOURCE

ALLOCATION ACROSS

THE ORGANIZATION

MAXIMIZE

PRODUCTIVITY OF

INDIVIDUALS

WORKING ON

PROJECTS

Build a skills inventory

Effectively allocate resources

Track resource performance

Share and find project artifacts

Ensure project leaders communicate clear objectives about work performance

Find the right people based on matching their skills, identify optimal project start dates, and assess when to delay projects

Select the right resource based on skill set and availability, make resource assignments centrally visible, and communicate effectively with resources

Automate resource tracking

Collectively create, find, and store project artifacts in real time

Ensure that project schedules and deadlines are enforced

Phase 2

B S R D

Data Center Mgt &

Virtualization

Data Center

Services

Server Security

Client

Services

Networking

Storage

Client Mgt &

Virtualization

Client Security

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

There are multiple levels of service availability clustering or load balancing. Virtualization and management is used to dynamically move applications and services when issues arise with datacenter compute, storage and network resources. IT system (hardware, hypervisor, operating system, and application)-aware monitoring and reporting are in place with basic remediation. There are consolidated views of all management tools and consistent reporting across heterogeneous systems. The organization has a consolidated view of and a consolidated management process for heterogeneous virtual environments, including branch offices. Majority of production server resources are virtualized. A virtualized server pool is offered as a service (Private Cloud Exists). Several Compliance and cost savings strategies leverage that Private Cloud. (Auditing and Reporting, Policy

Management, Metering Usage, Process Automation etc.).

Remote access is secure, standardized, and available to end users across the organization. Protection for all collaboration applications (such as email, document sharing, and instant messaging) is centrally managed.

Desktop applications and system events are centrally monitored for critical desktop systems. Storage of user state is centralized, including retention policies that align with corporate mandates (security and policy).

Identity

& Security

Services

Identity & Access

Information Protection &

Control

A centralized, common-access policy is defined for business resources, applications, and information resources; entitlement is managed. A centralized, scalable directory works across geographies for all intranet applications and supports authentication and authorization. A single application directory service covers multiple standards and most applications. Multi-factor and certificate-based authentication are applied in high-risk scenarios, such as remote access or document signing. The federation and trust management infrastructure is standardized for applications and systems that cross boundaries. Provisioning and de-provisioning of user and super-user accounts, certificates, and smart cards is automated; access control is role-based.

IT Process & Compliance

Workspaces

IT policies are integrated across all IT services. Monitoring and reporting are integrated with individual areas for protection against malicious software, protection of information, and identity and access technologies. Monitoring, reporting, and auditing are integrated across IT services; some capabilities exist for event investigation, analysis, and forensics.

Problem management processes are integrated across IT services. Processes to manage incidents are integrated across IT services. Service-level and operational-level agreements are integrated across IT services. Management reviews operational health regularly. Some tasks are automated.

Workspaces are centrally managed, customizable, and reusable, and provide users the ability to collaborate through web browsers and mobile devices. Offline synchronization is supported.

Line-of-business applications and data are delivered through the portal for a few broad-use functions; data is typically read only. Users get targeted information based on their profiles, their roles in the organization & mobile devices being used. Portals (enterprise, departmental, and personal) are provisioned by IT and are deployed on a single productivity infrastructure. Governance policies are fully in place, including single sign-on supported by uniform directory services.

Collab

Portals

Social Computing

Project Mgt

UC

ECM

Messaging

IM/Presence

Conferencing

Voice

Information Mgt

Process Efficiency

Compliance

Enterprise

Search

Information Access

Interactive Experience &

Navigation

Dashboards

Reporting

& Analysis

Analytics & Data Mining

Content

Creation

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

Database Dependencies

Integration Dependencies

Development Dependencies

Task assignments, task splitting, delegation, and reporting are automated. Teams can plan against complex baselines. Project tasks and calendars are closely integrated with users’ online presence; teams can communicate with a single click; timely updates are available for accurate reporting. Collaboration happens across different mobile devices.

Portfolios are analyzed and proposals are selected based on alignment with business goals.

Traditional and new media content types are managed consistently in a single repository that has integrated workflow.

The organization uses basic workflow tools to process, review, and approve documents. Simple workflow routing is part of the collaborative workspace infrastructure.

Content is stored in a well-managed repository and disposition rules are appropriately applied. Content can be rapidly identified and preserved. Business relies heavily on outsourcing for review and processing of evidence.

Unstructured content from the web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed. Indexing processes incorporate browsing by people and ranking of expertise.

An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.

Diagrams are dynamically linked to data and shared using a web browser. Diagrams display real-time data from one or more sources; data can be refreshed automatically at specific intervals. Users create and manage personal or team dashboards and scorecards based on a balanced scorecard methodology that includes dynamic and cascading updates.

Data mining analysts use statistical and data mining software to analyze business data and build models to enable future decisions, predict trends, and find correlations in business attributes using a limited set of data mining algorithms and limited data volumes. End users can perform sophisticated analyses and build feature-rich business intelligence applications by using spreadsheet or other analysis tools.

End users subscribe to reports, but targeted subscription capabilities such as time stamps are limited or non-existent. User specify the device or format in which to receive reports (for example, inbox or email, phone, or Short Message Service text). IT manages reporting components and shared data sets to provide a highly interactive library and reporting environment in which end users can modify or edit source content, change the display, sort, apply filters, and customize reports after they are generated.

Design and Management: Formal data management and administration tasks related to installation, configuration, management, and maintenance of databases, user accounts, database availability, recovery, and reporting.

Enterprise Application Integration: Access to business services and information is aggregated into a set of dynamic, composite business applications, to gain more accurate and more comprehensive information.

User Experience: Investment in next-generation development tools occurs, which provide tight integration of various development tasks and offer the highest quality rich-user experience on multiple devices.

Phase 2

Data Center Mgt &

Virtualization

Data Center

Services

Server Security

PHASE

DEFINITION MAPPING

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

B S R D

Windows Server 2008/2008 R2; Hyper-V Server 2008/2008 R2; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System

Center Virtual Machine Manager 2008 R2/2012; System Center Service Manger 2010/2012; Opalis; Windows Azure ® platform; System Center Orchestrator 2012

Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006;

Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Microsoft Forefront Protection 2010 for SharePoint; Microsoft Forefront Security for

SharePoint; Microsoft Forefront Security for Office Communications Server; Forefront Endpoint Protection 2010/2012; Microsoft Forefront Unified Access Gateway 2010;

Microsoft Intelligent Application Gateway 2007

Networking

Storage

Client

Services

Client Mgt &

Virtualization

Deployment Toolkit 2008/2010; Windows User State Migration Tool 3.0/4.0; Diagnostics and Recovery Toolset; Virtual Desktop Infrastructure Suite; Microsoft Application

Virtualization 4.5/4.6; Microsoft Enterprise Desktop Virtualization; Windows 7; Windows Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Windows Server Update

Services 2.0/3.0; Desktop Optimization Pack 2008 R2/2009 R2; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System

Center Service Manager 2010/2012; Exchange Server 2007/2010; Windows Phone 7; Windows Mobile ® 6.1/6.5; Forefront Endpoint Protection 2010/2012; Windows Automated

Installation Kit; Microsoft System Center Mobile Device Manager 2008

Identity

& Security

Services

Client Security

Identity & Access

Information Protection &

Control

Microsoft Forefront Identity Manager 2010; Microsoft Identity Lifecycle Manager 2007 Windows Server 2008/2008 R2; Windows 7; Hyper-V Server 2008/2008 R2

IT Process & Compliance

Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager

2010/2012; Hyper-V Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Endpoint Protection

2010/2012; Windows Server 2008/2008 R2; Opalis; System Center Virtual Machine Manager 2008 R2/2012; System Center Data Protection Manager 2010/2012; System Center

Orchestrator 2012; Microsoft Security Assessment Tool

SharePoint Server 2010; Office SharePoint Server 2007; Office 2010 (including Microsoft SharePoint Workspace 2010); Office 2007; SharePoint Designer 2010; Office SharePoint

Designer 2007; Microsoft Office Groove ® 2007; SharePoint Online

SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; Office 2007/2010; SharePoint Online

Workspaces

Collab

Portals

Social Computing

Project Mgt

UC

ECM

Messaging

IM/Presence

Conferencing

Voice

Information Mgt

Process Efficiency

Compliance

Enterprise

Search

Information Access

Interactive Experience &

Navigation

Dashboards

Reporting

& Analysis

Content

Creation

Analytics & Data Mining

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

Database Dependencies

Integration Dependencies

Development Dependencies

Project Server 2010; Office Project Server 2007; Project 2010; Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; Office Project

Portfolio Server 2007

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online

SharePoint Server 2010; Office SharePoint Server 2007; Microsoft FAST ™ Search Server 2010 for SharePoint; Office 2007/2010

SharePoint Server 2010; Office SharePoint Server 2007; FAST Search Server 2010 for SharePoint; Windows 7

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Visio 2010; Office Visio 2007; Office 2007/2010

SQL Server 2008/2008 R2

BizTalk Server 2009/ 2010; Visual Studio Team System 2008/2010

Visual Studio Team System 2008/2010; Expression Studio 3/4; Silverlight 4/5

Phase 2

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Phase 2

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Recap Discussions to Date

Solution Guidance

• Phase 1

• Phase 2

Phase 3

Customize the Capability Requirements

Next Steps

Phase 3

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Business Driver

ALIGN INVESTMENTS

WITH BUSINESS

STRATEGY

Needs

Define, prioritize, and communicate the actual business strategy

Consistently evaluate, rank, and rate competing investment requests

Ensure investments are properly aligned with business strategy

MEASURE CORPORATE

PERFORMANCE

MANAGE THE COSTS

OF PROJECTS AND

PROGRAMS

Use key performance indicators (KPIs) for corrective actions

Use early indicators of project performance to support decision making

Provide better visibility into and control of risk factors and issues

Predict financial performance

Gain visibility into work efforts across business units

Optimize initiatives to increase productivity with fewer resources

OPTIMIZE RESOURCE

ALLOCATION ACROSS

THE ORGANIZATION

Build a skills inventory

Effectively allocate resources

Track resource performance

MAXIMIZE

PRODUCTIVITY OF

INDIVIDUALS

WORKING ON

PROJECTS

Share and find project artifacts

Ensure project leaders communicate clear objectives about work performance

Business Capabilities

Provide organizational control and action according to business strategy

Enable a rationalized approach to choose which investments have the highest return and alignment to business strategy

Enhance the business value of the portfolio, to ensure that the mix of investments aligns to established business strategy

Automate action on trends, alerts, and performance

Transmit work effort to LOB and financial systems, pull metrics from financial systems, and combine the results in a comprehensive corporate reporting portal

Build tools to support a comprehensive risk management program

Ensure that project financial data automatically flows into and from financial systems

Reduce effort on low-value projects and programs

Plan demand-management scenarios and make informed decisions about outsourcing

Understand organizational capabilities across work management scenarios, make headcount and outsourcing decisions, and normalize capabilities decisions from multiple sources

Make smart scheduling decisions about the planning horizon based on forecasted projects and programs

Plan demand-management scenarios and make informed decisions about outsourcing

Improve cross-team collaboration

Provide a single interface to enter time information, and automatically post employee work data in billing systems

Phase 3

B S R D

Data Center Mgt &

Virtualization

Data Center

Services

Server Security

Networking

Storage

Client

Services

Client Mgt &

Virtualization

Client Security

Identity

& Security

Services

Identity & Access

Information Protection &

Control

IT Process & Compliance

Workspaces

Portals

Collab

Social Computing

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Secure remote access is integrated with quarantine for compliance with corporate policy. Integrated perimeter firewall, Intrusion Prevention Systems, web security, gateway antivirus, and URL filtering are deployed with support for server and domain isolation.

Automatic server cleanup uses scavenging. Redundant Domain Name System servers exist in multiple locations and provide fault tolerance.

Critical data is backed up by taking snapshots using a centralized, application-aware system. Backup copies are stored separately at a physical location or by using a cloud-based service, with fully tested recovery or failover based on service-level agreements.

Desktop applications and system events are centrally monitored and reported, and trends are analyzed and integrated into incident management systems. A solution is in place to configure and update devices. All mobile access to internal systems is proxied through the messaging system. Mobile devices are managed by security policy provisioning

(such as personal identification numbers) and remote deletion. Mobile phones are used for over-the-air synchronization with email, calendar, and contacts. Mobile service configuration is automated and occurs over the air.

Protection against malicious software is centrally managed for desktop systems, laptops, and non-PC devices. Desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.

Persistent information protection helps to enforce policy on sensitive data across the enterprise, including data on mobile devices. Policy templates are used to standardize rights and control access to information.

Line-of-business applications are routinely surfaced through the portal and have the ability to write securely to back-end systems and to maintain data integrity. Information from multiple applications can be combined in dashboards.

Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs. This Content is accessible through multiple mobile devices.

Project and program portfolios are selected by using optimized algorithms. Teams routinely use frontier analyses, sensitivity analyses, business alignment assessments, and decision dashboards.

Project Mgt

UC

Messaging

IM/Presence

Conferencing

Voice

Information Mgt

ECM

Enterprise

Search

Process Efficiency

Compliance

Information Access

Interactive Experience &

Navigation

Dashboards

People can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time.

Reporting

& Analysis

Analytics & Data Mining

Users can search for unstructured documents and structured reports based on metadata and report content. IT manages data connections for users. Users also can connect to external data sources and combine them in a single report.

IT provisions the business intelligence portal infrastructure with advanced business intelligence capabilities that include search, dashboards, scorecards, alerts, social interaction, browser-based thin-client experience, exception highlighting, guided and predictive analysis, and advanced visualization. The workbench enables data preparation, cleansing, multivariate analysis, and a sophisticated set of data mining algorithms and tuning options (including additional extensibility options such as custom algorithms) to support data mining across huge data volumes.

Content

Creation

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

Database Dependencies

Integration Dependencies

Design and Management: Enterprise-wide standards and practices for discrete areas such as physical storage and capacity planning, performance and tuning, data integrity, and security.

Human Workflow: Business stakeholders can design, interact with, monitor, innovate, and automate critical business processes in a more defined, monitored, and reportable manner using workflows.

Software Quality: Adaptive methodologies and emergent design approaches are used to facilitate integrating a design with the development process.

Development Dependencies

Phase 3

B S R D

Data Center Mgt &

Virtualization

Data Center

Services

Server Security

Networking

Storage

PHASE

DEFINITION MAPPING

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006;

Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Forefront Protection 2010 for SharePoint; Forefront Security for SharePoint; Forefront

Security for Office Communications Server; Forefront Endpoint Protection 2010/2012; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007

Windows Server 2008/2008 R2; Windows 7; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Windows Server AppFabric (Caching);

System Center Operations Manager 2007 R2/2012

Windows Server 2008/2008 R2; Windows 7; Windows Storage Server 2008/2008 R2; System Center Service Manager 2010/2012; System Center Virtual Machine Manager 2008

R2/2012; System Center Data Protection Manager 2010/2012

Deployment Toolkit 2008/2010; Diagnostics and Recovery Toolset; Virtual Desktop Infrastructure Suite; Application Virtualization 4.5/4.6; Enterprise Desktop Virtualization;

Windows 7; Windows Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Windows Server Update Services 2.0/3.0; Desktop Optimization Pack 2008 R2/2009 R2;

System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager 2010/2012; System Center Mobile

Device Manager 2008; Exchange Server 2007/2010; Windows Phone 7; Windows Mobile 6.1/6.5; Forefront Endpoint Protection 2010/2012; Windows Embedded Device

Manager 2011; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Windows User State Migration Tool 3.0/4.0

Forefront Endpoint Protection 2010/2012; Windows 7; Windows Server 2008/2008 R2; Windows Phone 7; Windows Mobile 6.1/6.5; Forefront Threat Management Gateway

2010; Internet Security and Acceleration Server 2006

Client

Services

Client Mgt &

Virtualization

Client Security

Identity & Access

Identity

& Security

Services

Information Protection &

Control

IT Process & Compliance

Collab

Workspaces

Portals

Social Computing

Project Mgt

UC

ECM

Enterprise

Search

Reporting

& Analysis

Content

Creation

Messaging

IM/Presence

Conferencing

Voice

Information Mgt

Process Efficiency

Compliance

Information Access

Interactive Experience &

Navigation

Dashboards

Analytics & Data Mining

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

Database Dependencies

Integration Dependencies

Development Dependencies

Windows Server 2008/2008 R2; Forefront Endpoint Protection 2010/2012; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Forefront Threat

Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; System

Center Operations Manager 2007 R2/2012; SQL Server 2008/2008 R2

SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; Office 2007/2010; SharePoint Online

SharePoint Online; Office 2007/2010; SharePoint Server 2010; Office SharePoint Server 2007

Project Server 2010; Office Project Server 2007; Project 2010; Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; Office Project

Portfolio Server 2007

SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; Visio 2010; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007

SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007

SQL Server 2008/2008 R2

BizTalk Server 2009/2010; Visual Studio Team System 2008/2010

Visual Studio Team System 2008/2010; Expression Studio 3/4; Silverlight 4/5

Phase 3

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Phase 3

PHASE

DEFINITION MAPPING TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

Recap Discussions to Date

Solution Guidance

• Phase 1

• Phase 2

• Phase 3

Customize the Capability Requirements

Next Steps

Example: Steps to Customize the Solution

Customize the pre-defined solutions

(Phase 1, Phase 2, or Phase 3) by doing the following:

Understand your priorities

Choose a starting point

Adjust the mapping

Identify your top-priority business drivers

Identify the business capabilities in the Capability

Discussion Guide that match your priorities (see below)

Choose the phase (Phase 1,

Phase 2, or Phase 3) that corresponds to your priorities

Add, remove, or adjust capabilities

Example: Customized Solution Requirements

Example Solution Area: Phase 2

Data Center Mgt &

Virtualization

Server Security

Networking

B S

R D

A defined set of core standard images exists. There is a defined, end-to-end server deployment process that includes application compatibility testing.

Protection for select applications (such as e-mail) is centrally managed. Remote access is secure, standardized, and available to end users across the organization.

Zone creation and record updates are automatic to support directory services. Dynamic Host Configuration Protocol servers are aware of sub-networks.

Storage

Client Mgt &

Virtualization

Client Security

Storage is managed on server clusters or shared storage arrays. Transparent failover occurs if a storage node fails, with no interruption in availability.

The majority of the installed client base has a combination of current and recently released operating systems. A centralized store of user profiles supports the ability to apply policies.

All users are deployed as standard users, and users who require administrative access are given secondary accounts. Users are restricted from running applications that are considered harmful to the environment. Disk-level encryption is in place across all desktop systems and laptops.

Federation and trust are set manually per instance for select applications or systems across boundaries. Password policies are set within the directory service to enable lifecycle management.

Identity & Access ?

Information Protection &

Control

IT Process

& Compliance

?

Workspaces

Portals

Social Computing

Project Mgt

Messaging

IM/Presence

Conferencing

Voice

Information Mgt

Process Efficiency

Compliance

?

?

Data classification is contextual at select points and for select protocols in the network, and complements classification by end users. Data classification is both contextual and driven by end-users as data is created and used.

Individual business units align with the IT service portfolio. IT service costs, returns, capacity, availability, continuity, and integrity are reported. IT policies are documented for each IT service.

Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices. Offline synchronization is supported. Team members can simultaneously author, edit, and review content.

Publishers can direct content to specific audience targets. Portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity and role. Users get targeted information based on their profiles and roles in the organization.

Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide. Communities, if present, are largely through e-mail or are driven by forums.

Social feedback is generally limited to comments in e-mail, forums, or within individual documents.

Teams plan, track, and share tasks in lists by using collaboration tools. Multiple baselines exist. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.

The e-mail platform supports message encryption (S/MIME) to enable digital signatures. IT manages mailbox provisioning by using a single directory.

Users have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall. Peer-to-peer voice and video communications are based on a single directory. Multiple-party IM is managed by the enterprise.

A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications. The platform also has a single user interface, a single directory, and is available across organizational boundaries.

Call routing within an organization is based on identity and online presence. Server pools that are split across data centers or replicated provide resilience to data centers when disaster occurs.

Metadata includes social tags. Search indexing automates promotion of metadata to business applications and processes. Web content is dynamically presented to visitors based on real-time behavior analysis. Web sites are integrated with line-of-business systems to manage and deliver content in both locations.

All data from forms is captured and validated electronically. Paper-based content is scanned and key data is extracted by using character-recognition technology. Business processes are automated by using workflows and visual design tools.

Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including e-mail. Reporting occurs manually. Content is stored in a well-managed repository and disposition rules are appropriately applied.

Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed. Indexing processes incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience.

Information Access 

Interactive Experience &

Navigation

Dashboards

Analytics & Data Mining

Report Generation &

Distribution

Authoring

Multi-Device Support

User Accessibility

Interoperability

There is a single way to access all information, structured or unstructured, across the organization. Search-driven portals and applications provide content targets based on user context and interests.

Users can search for reports and related unstructured documents, and they have access to data through connections managed by IT. Diagrams are linked to data and shared as static Web pages or in PDF.

In addition to the IT-provisioned infrastructure for data mining activities, support by data mining analysts, and self-service capabilities for end users, is a powerful data mining workbench.

IT manages reporting components and shared data sets to provide a highly interactive library and reporting environment in which end users can modify or edit source content, change the display, sort, apply filters, and customize reports after they’re generated.

Content is efficiently reused without loss of context across applications that have different purposes. Templates are centrally manageable. Ideas, notes, and research gathered across Web productivity tools and conversations are easy to find and share.

Application user interfaces are customizable at the user and organizational levels for optimal flexibility in user experience and IT control. Documents can be viewed and edited through optimized modes (such as PC, phone, or browser) without significant formatting or data loss.

A broad ecosystem of third-party extensions further reduces usability challenges for people who require various accessibility accommodations. Solutions are developed to support process-led checks of user-created content and sites before publication

 Content is actively exchanged with and transformed by line-of-business systems through extensible markup language (XML)-based formats.

Example: Tips to Customize the Solution

Consider using an alternate maturity level that corresponds to your requirements

 Keep a capability if you are unsure whether you need it

Identify, document, and discuss how a capability may be relevant

Server Security helps protect and secure the server infrastructure at the data center from viruses, spam, malware, and other intrusions.

Networking helps manage the network and related configurations to ensure optimal utilization of network resources and business continuity.

Recap Discussions to Date

Solution Guidance

• Phase 1

• Phase 2

• Phase 3

Customize the Capability Requirements

Next Steps

Engagement Approach

Solution areas

Business strategy

Industry

Audience

Horizontal

1. Understand business needs and priorities

2. Discuss range of potential solution capabilities

1. Present relevant integrated capabilities

2. Position the Integrated Enterprise Platform approach

Integrated Capability Analysis => Projects, architecture, products

Solution road map

© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS,

IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.