Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Infrastructure Presentation

Avatar for glenpridgen glenpridgen
September 27, 2011

Infrastructure Presentation

Corporate Retreat General Infrastructure Presentation.

Avatar for glenpridgen

glenpridgen

September 27, 2011
Tweet

More Decks by glenpridgen

Other Decks in Technology

Transcript

  1. 2 - Confidential 2 - Confidential Agenda What is the

    Market, Opportunity & Risk How big is the IMS potential What are the market imperatives & Risk What is IMS Define our offerings Explain what we do Who should we target Who do we want us client How do we gain traction Our Messaging & Positioning Define the “Go-To” Mkt Strategy Sample Initiatives and Wins Questions and Comments
  2. 3 - Confidential 3 - Confidential Market Size  IMS

    is still nascent compared to ADM  Only 7% of an addressable $100 Billion Market as of 2007  Tremendous growth of 80% YoY since 2005  Today‟s India component size is only $7 Billion  Expectation of fourfold growth in next 5 years to $26 Billion Reality: Fairly Virgin compared to ADM but SWITCH have the momentum going in to bag sizeable deals along with multi- nationals who have been doing this forever *Source: McKinsey 2007 Report
  3. 4 - Confidential 4 - Confidential Avg. IT Spend as

    Percent of Revenues  Most corporations spend on avg. 3.6% of revenues on IT  Out of which 2.1% – 2.52% is IT Ops Spend  Some examples by industry Industry IT spend as % of Revenues Financial 6.7% Telco 6.5% Healthcare 4.5% Transportation 4.2% Insurance 3.6% Consumer Products 3.7% Utilities 2.5% Retail 1.8% Media 4.3%
  4. 5 - Confidential 5 - Confidential Market Imperatives  Address

    Operational cost that consumes 60-70% of IT Budget  Target routine monitoring, maintenance & fixing of IT infrastructure components, like:  Help Desk  Networks  End User Communication  Servers (Mid-range, Windows, Mainframes  Database  Storage  Savings of 50-60% on the Infra Ops spend
  5. 6 - Confidential 6 - Confidential Market Imperatives  Technology

    has matured enough offering buffer against perceived skill deficiency offshore  New tools and knowledge enabling predictability and quality  IMS in reality has always been outsourced now they are being offshored  Awareness of what is strategic vs. operational has modulated the control freaks & forced attitude change  Read all this as only one thing “COST…COST & COST”
  6. 7 - Confidential 7 - Confidential Risks  Disruptions to

    Infrastructure is far reaching and debilitating  There are real financial and customer costs  Security, data protection and operations maturity are threshold competencies expected  Regulatory Issues, financial fraud, confidential information, IP safeguards are a concern  Inability to solve complex problems  Inability to differentiate on the transformational level to deliver competitive advantage
  7. 8 - Confidential 8 - Confidential Service Offerings Full lifecycle

    solutions for our chosen markets Full Life-Cycle Services ADMS – Application Development, Testing, Maintenance & Support BI/DW– Business Intelligence, Data Warehousing Modernization – From Legacy to, Java and .Net Mobility – Handheld Applications Technology Services Infrastructure Consulting – Optimize for Agility, Risk, Cost Infrastructure Management – Management of Apps and Infra Assets Infrastructure Management Services Transaction Processing – Provide data processing services for various verticals Document Management – Provide paper-based scan and capture solutions Voice Services – Provide inbound and outbound voice (phone) services Business Process Outsourcing Services Strategic & Tactical Consulting
  8. 9 - Confidential 9 - Confidential Commodity/Offshore - Managed Platform

    Services - Managed Security Services - Managed DB Services - Managed Network Services - Managed Storage Services - Service Desk - RIM/RAM Transformational - SOI/HaaS/On-demand - Green IT - Infrastructure Optimization Services - Server Consolidation - Virtualization - High Performance Computing - BSM - Open Source Targeting Consulting - ITIL & ITSM Consulting - Infrastructure Readiness & Risk Assesement - DR Planning & Execution - Performance & Availability Consulting TRIAD IMS View Do IT with less ®
  9. 11 - Confidential 11 - Confidential Scope of Services Peek

    IT Service Management & Business Continuity assessment Assessment Scope Balance Scoring Metrics Modeling Dashboard ×  Service Desk   Incident   Problem   Change   Release   Configuration   Service Level   Workforce   Financial   IT Security   IT Availability   Business Continuity Practice   Green IT Transformation Data Center design & build Asset Performance & Capacity Baselining Energy Efficiency & Facilities “Greening” Data Center consolidation & migration planning Infrastructure & Application Rationalization NGDC Reference Architecture
  10. 13 - Confidential 13 - Confidential Infrastructure Management Apps Client

     Desktop & User Provisioning  Desktop Deployments  License Management  Break / Fix  Patch Management  Image Management  COTS Apps Monitoring & Mgmt  Custom Apps Monitoring & Mgmt  Application Servers  Authentication & Identity Management  UAT Applications Mgmt  Image Creation, Apps & DB Creation  Upgrades and Rollouts  MS Exchange Management  Capacity Planning, Performance Mgmt Infrastructure  Managed Database Services  Capacity Planning / Perf. Mgmt  HA Configuration  Backup and Recovery  Upgrade / Migration / Re-Org  Apps Specific DBA Support  SAN Provisioning & Management  Managed Network Services  Device Configuration Management  Bandwidth Management  Capacity Planning  LAN, VLAN Setup and Monitoring  Managed Security Services  Patch Management  Incident & Log Management  Vulnerability Management  Managed OS Services  Health & Availability Monitoring  User Management  Backup & Recovery, Patch Mgmt  File Systems & Share Management  Mainframe Services  Partition Management  Job/Batch Flow
  11. 14 - Confidential 14 - Confidential Infrastructure Management Apps Client

     Active Directory, Group Policy Objects  Microsoft Systems Mgmt Server  Adventnet ManageEngine, EMC  Service Management  Symantec Ghost, MS SMS  Altiris, MAXIMO  Oracle Apps, SAP, PSFT  Java, .Net, Oracle ADF, Sharepoint  Monitor CICS Regions & Transactions  WAS, WLS, OAS, IIS, JBoss, CICS  AD, CA SSO Server, Oracle IDM  Test Infra Check-in Check-out  Shavlik, BigFix  Microsoft Baseline Security Analyzer  LoadRunner, QALoad, JMeter  Messaging: JMS, MQ, Biztalk Infrastructure  Managed Database Services  Oracle  SQL Server  Sybase  DB2-UDB, DB2-390, ADABAS  MySQL  SAN: EMC, IBM, NetApp, Hitachi  Managed Network Services  Firewall/VLAN: Cisco PIX, Nokia  Sec: Checkpoint, NetScreen  UTM: Juniper, Fortinet  VOIP: Cisco, Avaya, Nortel  Managed Security Services  IDP: IBM ISS  FW: Checkpoint  AV: Trend Micro, Symantec, McAfee  VA Tools: Nessus, QualysGuard  Managed OS Services  Win2k, 2k3  Solaris, AIX, HP-UX, RHEL, SUSE  System i, System z, System p  Mainframe Services  MVS LPARS, VM Hosts & Guests  CA/Remote Console, Omegamon
  12. 15 - Confidential 15 - Confidential Client & Relation Desired

     Outsourcing success is predicated on trusted relationship  In a market with little differentiation, once threshold competency is established, the dialog revolves only around “cheapest”  Thus, we have to aim a notch higher differentiating ourselves  Our aim is to be the “go-to” vendor in any client relationship  Customers are looking beyond “faster, cheaper & better”  We have to establish a “beachhead”, execute well & concentrate on one customer at a time  Following slides try to articulate the “how”  Size (At this point is immaterial, only a rough marker)  Typically should have at least 150+ FTEs in their IT department  Would have an IT budget of around $25-$35 million  Labor would be around $15-$22 million of the cost  Increasing pressure on CIO to outsource
  13. 16 - Confidential 16 - Confidential Value drives outsourcing sales

    like location drives real estate sales…. Three analyst views of client value realized from outsourcing….
  14. 17 - Confidential 17 - Confidential Value drives outsourcing sales

    like location drives real estate sales…. … and a more recent Gartner view of client value realized from outsourcing
  15. 18 - Confidential 18 - Confidential …and client issues and

    objectives are the keys to creating client value Places to look for opportunities to create value for your client
  16. 19 - Confidential 19 - Confidential To be successful you

    must first understand your client‟s buying process… The Client‟s Buying Process •Where they are in the buying process •What they are doing now •What they are expecting from you •What you have missed if you are starting in the middle
  17. 20 - Confidential 20 - Confidential …and then align your

    sales activities with where the client is in their buying process The Client‟s Buying Process •Where they are in the buying process •What they are doing now •What they are expecting from you •What you have missed if you are starting in the middle Your Selling Process •What you should be doing in response •What you need to do to make up for what you have missed •How to decide whether you should continue to engage •How to evaluate your progress •What tools and techniques you should be using
  18. 21 - Confidential 21 - Confidential “Go-To” Market Play Book

     Establish Trust by offering higher value Transformation Consulting or via opportunistic event  Gain an initial entry via assessments  Once a beach head is established engage to establish protracted and sticky relationship  The goal is to become a preferred partner as opposed to just a vendor  So we are leading in through conversing on either On-Demand NGDC Architectures (Transformational) or via Performance resolution (Opportunistic)  Execute well and gain the reliability coefficient GOAL: Gain entry & trust to win multi-million, multi-year outsourcing contracts
  19. 22 - Confidential 22 - Confidential Sample Initiatives  Campaign

    for Consolidation & Virtualization sell via SOI already has been kicked off in the South East  Several conversations around Green IT & productivity improvements are gaining traction  Campaign targeting Healthcare around IDC-9 to IDC-10 underway  Campaign for complete outsourcing of Infra Ops is work in progress  Scoping “Open Source” entire infrastructure stack migrations
  20. 23 - Confidential 23 - Confidential WINS !!  CIT

    of course, huge win, establishes our much needed market reference.  Regulus, putting to practice what we preach and gets our house in order.
  21. 24 - Confidential 24 - Confidential Francis Bacon: “Hope is

    a good breakfast … but it is a bad supper” Questions and Comments!
  22. 25 - Confidential 25 - Confidential Exploring Potential: Identify potential

    opportunities early… establish yourself as an advisor… lay the foundation for a consultative sale What Your Client is Doing •Understanding how their business environment is changing •Refining business strategies (model, products, markets, structure, operations , partners, etc.) in response to those changes •Identifying and prioritizing business issues (strategic issues, operational issues, infrastructure issues, new opportunities, desired transformations) What You Should Be Doing •Understanding your client‟s business environment (economy, industry, structure, competitors, etc.) •Understanding your client‟s business (SWOT, products, customers, etc.) •Building relationships (management, business, technical, administrative) •Providing thought leadership/advice based on knowledge and experience Critical Question – Is There Real Potential? •Does the client have real needs (pain or gain)? •Are those needs acknowledged by appropriate level management? •Are they compelling (business imperative, value potential, cost)? •Is there sufficient motivation to act (urgency)? Critical Indicators of Success •Developed an informed understanding of the client‟s business issues •Gained access to and established rapport with the client‟s key business and technical leaders •Accepted as a valid and sought as a valuable trusted advisor •Have identified potential opportunities where outsourcing is relevant Sales Tools & Techniques •Corporate reports (Annual Report, Quarterly results, etc. •Investor information (especially presentations to analysts) •Company web site •Industry association reports •Analyst research (economic, industry, technical) •Media articles and reports •Industry journals •Business and consultant journals •Analytical models (strategic, competitive, alignment)
  23. 26 - Confidential 26 - Confidential Creating Preference: Shape the

    business solution to your advantage….link the benefits to the issues…create competitive preference What Your Client is Doing •Envisioning a business solution •Defining business requirements (objectives, capabilities, timing, etc.) •Refining/updating their business initiatives relative to the solution •Formalizing the initiative (responsibility, expected results, evaluation criteria, budget and schedule parameters, etc.) What You Should Be Doing •Understanding the linkages among the client‟s issues (“pain chains”) •Broadening the client‟s solution perspective (possibilities, other wins) •Shaping the envisioned business solution to your advantage (scope, scale, benefits, timing, sequencing, alternatives, options, etc.) •Building relationship and preference (alignment, confidence, trust) Critical Question – Is There A Valid Opportunity? •Have the business aspects of a solution been defined by the client? •Can the business solution be realized? Are the benefits sufficient? •Are the dependencies and risks understood and reasonable? •Has a responsible executive/manager been identified? Budget? •Are the client‟s decision makers and SMEs accessible and available? Critical Indicators of Success •Understand the client‟s desired business solution (vision, requirements) •Can link the solution benefits to the client‟s business issues •Identified the buying participants and understand their roles (people buy!) •Accepted as a viable potential business partner by key decision makers •Have confirmed that the solution is realizable and the benefits compelling Sales Tools & Techniques •Corporate reports (Annual Report, Quarterly results, etc. •Investor information (especially presentations to analysts) •Company web site •Industry association reports •Analyst research (economic, industry, technical) •Media articles and reports •Industry journals •Business and consultant journals •Analytical models (strategic, competitive, alignment)
  24. 27 - Confidential 27 - Confidential Qualifying the Opportunity: Decide

    early if you can win…if not, change the deal or get out… hope is not a strategy” What Your Client is Doing •Decomposing the business solution into projects and components •Deciding sourcing alternatives and strategies •Defining the purchasing process (steps, roles, consultants, selection criteria, etc.) •Selecting potential providers and issuing tenders (RFI, RFP, invitation, etc.) What You Should Be Doing •Analyzing and understanding the business issues, desired business solution, requested solution components, purchasing process, selection criteria •Developing an initial/draft solution/response •Analyzing buying participants, decision makers, and competitors •Developing your value proposition and differentiation (unique value) Critical Question – Should I Pursue This Opportunity? •Is there a consensus about the business solution and desired outcome? •Do you have the necessary capabilities and available resources? •Is the opportunity good business (profit or other value, risks)? •How does the client view you (preferred, viable, stalking horse)? •Can you win (technically, politically , financially) or change the game)? Critical Indicators of Success •Have or can obtain an understanding of client‟s business issues, business solution, key players, linkages, etc. •Are not disfavored by the desired solution or public buying process •Have strong internal sponsor and access to power •Understand the competitors and have identified differentiating client value Sales Tools & Techniques •Influencing the desired solution •Business capabilities •Value, priority •Scope, phasing, timing •Influencing the buying process •Steps, criteria •“Power” management •Competitor Analysis •Organization analysis •Power holders •Influence linkage •Obstacles •Sales coverage plan •Value Analysis
  25. 28 - Confidential 28 - Confidential Opportunity qualifying template often

    used in IBM‟s application outsourcing division
  26. 29 - Confidential 29 - Confidential Architecting the Deal: Converge

    the desired solution to your solution…gain internal client support… “sell” to all client buying participants What Your Client is Doing •Executing their defined purchasing process •Refining/revising their desired business solution based on supplier inputs •Evaluating proposed provider solutions •Evaluating provider desirability and commitment •Down-selecting providers to the preferred/viable set What You Should Be Doing •Developing your proposed solution – being creative, not just reactive •Validating your value proposition (value delivered) with client management •Differentiation your solution (unique value delivered) •Executing your sales coverage plan (updating and revising as necessary) •Gaining sponsor support Critical Question – Am I A Potential Winner? •Does your solution meet the client‟s needs (stated and unstated)? •Is your value proposition compelling (deliver sufficient value)? And, is it compelling relative to the competitions„ value propositions? •Is your differentiation compelling (create a propensity to buy)? •Does your solution have internal support? Power support? Critical Indicators of Success •Convergence between client‟s desired solution and your proposed solution •Explicit support of powerful decision makers •Discussions focused on capabilities to be delivered rather than cost/price •Negative players moved to neutral; neutral players moved to supportive; negative influencers neutralized Sales Tools & Techniques •Influencing the desired solution •Influencing the buying process •Competitor analysis •Sales Coverage Plan •Executive calls •Reference visits •Capability demonstrations •Delivery team qualifications •Delivery management involvement •Value proposition •Quantification •Schedule
  27. 30 - Confidential 30 - Confidential Gaining Agreement: Demonstrate you

    have the low risk, high value, reasonably priced alternative….build a compelling reason to buy around a critical issue What Your Client is Doing •Resolving concerns •Negotiating to their/joint advantage (selecting is their leverage) •Finalizing terms and conditions •Evaluating provider desirability and commitment •Selecting provider What You Should Be Doing •Resolving concerns •Negotiating to your/joint advantage (value proposition is your leverage) •Finalizing terms and conditions •Communicating the value of your solution •Communicating your value as a partner Critical Question – Can I Close The Deal? •Do you have an internal sponsor? A power sponsor? •Is your solution the preferred solution? •Are you the preferred provider? •Does the client have a compelling reason to buy from you? Critical Indicators of Success •Support of the powerful decision makers •Acceptance by even more powerful decision “sustainers” •Acknowledged value delivered by your solution •Acknowledged compelling reason to buy form you Sales Tools & Techniques •Value proposition •Preference development •Best risk alternative •Additional capabilities •Preferential treatment •Senior level managers •Experienced negotiators
  28. 31 - Confidential 31 - Confidential Key take-aways… •Client value

    is driven by client issues •Link to all levels of value: business issues, strategy issues, operational issues, infrastructure issues, transformational issues •Communicate the value – don‟t assume the client sees the linkage •Provider differentiation is deal specific •Don't confuse qualifiers with differentiators •Differentiation ↔ delivery of unique client value •Shape the solution and architect the deal to your advantage! •Know where your client is in their buying process …and engage accordingly •Align your selling activities with the client‟s buying process •Become a trusted advisor •Create competitive preference •Influence the evaluation process to your advantage! •Heed the “vital signs” at each phase of the selling process •Critical questions that help you decide to continue or disengage •Critical success indicators that mark your progress towards winning
  29. 32 - Confidential 32 - Confidential … and if you

    only do a few things these are the most important •Player-Pain analysis and linkage •Identifies the sources of value for the client •Allows you to link your solution benefits to the client‟s “value chains” •Competitor analysis •Not generic analysis, but an informed prediction of what you think each competitor will propose •Allows you to adjust your solution to create deal specific differentiation (unique client value) •Client organization and buying participant analysis •Defines the playing field for the deal •Allows you to align your selling activities for each buying participant with their vision, issues, priorities, role, power and preference