Professional Documents
Culture Documents
com
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
(v15, 07 Oct 09)
IT CAPACI TY
Waste of capacities
Cloud View
No undersupply Reduce oversupply Actual Load TIME Allocated IT capacities
Load Forecast
IT CAPACI TY
Commodity Market
CSC Proprietary and Confidential Data 5
Private Cloud
Hybrid Cloud
LAN
Federal Cloud
Community Clouds
to make your business processes and applications more agile, competitive and cost-effective.
Business-First Approach
Cloud-enable business workloads from the top down Turnkey business operations and custom applications expertise
Preferred by the worlds most security-conscious enterprises Able to adapt to dynamic regulatory climate
Service delivery excellence backed by customer-centric SLAs Proven integrity and accountability
Platform, vendor and service neutral Future-proof implementations built to scale Orchestrated and integrated solutions
Data Protection
Client Authentication at time of provisioning Supports LDAP , Active Directory , NIS and NIS + CSC Audit Log Assurance : Portal and API Every access is logged Key shielded data encryption Client controlled IAM Enable compliance with internal policies and industry standards Full suite of internet protection technology and services Dedicated network segregation SIEM ( security information and event management ) direct McAfee anti - virus is standard Qualys vulnerability scanning for compliance is value add service Provide for a strong defence to mitigate risk
Client data isolated logically and physically Network virtualization and firewall policy Hypervisor isolation for network adapters VMWare isolation features VLAN separation and layers Network IDS logically separated
Network Security
Build in protection without adding cost Personnel security clearances Multi factor authentication Limited access to physical boxes all logged Meets regional government standards Full CTP Transparency as a Service CSC passion for security begins in the cloud enabled data centers
CSC Proprietary and Confidential Data 10
Current State
Target State
Business Modernization
11
High
Benefits
13
Benelux
UK China
Global roll-out of services Provisioning enabled through Gateway Common Cloud Fabric Multi-level services with SLA accountability Orchestrated Automation SEI CMMI, ITIL, ISO standards
Malaysia
14
Business Process
Software
CloudProtection for Mail and Web CloudIAM TaaS CloudExchange CloudLab PaaS for Spring, Force, Azure and Cordys CloudCompute CloudDesktop CSC Hosting CSC Utility Storage
Platform
Dev and Test Platform as a Service Utility Services CSC Cloud Lab
Infrastructure
15
16
SaaS in Action Today Business Relevance Real - time Residential Mortgage 70 , 000 + users restructuring solutions for major US Accessing 10M + loans Globally Integrated Project 16 , 000 users banks Management suite Management Solutions 5 , 000 global projects 3 , 500 Integrated Risk 17 clients with over Suite of specialized applications for Supporting over 250 , 000 managed concurrently for users health insurance industry lives from , multiple Compliance Assessment Suite 15 Clients 200 users self - insured clients conducting 12 + million Legal Case management suite 47 clients supporting transactions , 000 firms access for 80 per month
17
Software as a Service
CloudExchange
Infrastructure as a Service
Cloud enabled CSC IP ePMO XSP RiskMaster Cloud Enabled ISV apps Legal Solutions Suite (FSS) I-Store SaaS application development SaaS enablement
CloudLab
18
In general, existing solutions on the market only cover the operational functions of purchasing New CSC Cloud SaaS SRM Solution complements SAP/ERP in areas that are uncovered but crucial for the purchasing top management both at the strategic level and at the analytical level. Built on Force.com integrated with SAP
CSC Proprietary and Confidential Data 19
30,000 user migration from Lotus Notes to BPOS Handle secure business and personal loan data via the Web 20,000 employees in 20 countries moving from Exchange to BPOS-S Assessment of how to best reduce IT infrastructure footprint Trusted Cloud for Google Apps
CSC Proprietary and Confidential Data 20
Technology
Biotechnology
Transforms business processes into agile, innovative and cost-efficient workloads. Harmonizes transaction security and provides comprehensive transparency of control. Delivers services confidently based on measurable SLAs with innovation and architectural excellence.
21
22
23
30,000 user migration from Lotus Notes to BPOS 8,000 Notes applications being retired or migrated to Microsoft
KEY BENEFITS
Improved business flexibility Greater financial predictability Improved employee productivity THEIR CHALLENGE, OUR CSC SOLUTION Operates in more that 20 countries 20,000 employees CSC moving users from on-premise Exchange to BPOS-S KEY BENEFITS: Cost reduction Improved productivity CAPEX to OPEX
Technology Company
24
THEIR CHALLENGE Launch the Virgin Money business model and brand in the U.S. Handle secure business and personal loan data via the web Scale to meet mission-critical performance demands
Launch and deliver turnkey hosting and Cloud services for VirginMoneyUS.com
End user satisfaction with performance and availability Flexibility without compromising security Significant cost savings leveraging CSC Trusted Clouds scale and depth
25
THEIR CHALLENGE, OUR SOLUTION CSC Trusted Cloud for Google Apps Solution architecture and design Integration with the citys identity management system Migration of live and archive e-mail data Setup and training for city trainers and administrators KEY BENEFITS Significantly improved user experience and productivity Dramatically lowered operational costs
A larrge Biotechnology company turned to a CSC Cloud Adoption Assessment to find out how to: Reduce their IT infrastructure footprint Adopt new collaborative capabilities Avoid costly upgrades
Biotechnology
CSC Proprietary and Confidential Data 26