Swimage Infrastructure Optimization


Infrastructure Optimization Model Overview

The vision of infrastructure optimization is to build an efficient, secure, and optimized information technology (IT) infrastructure and services in a logical sequence. An optimized IT infrastructure is built upon IT standards and ensures conformation to those standards. With each level of optimization, the IT infrastructure also brings about significant cost reduction, increased security, and improved availability and manageability.


Infrastructure Optimization Levels:


Optimization Level 1: Basic

The Basic IT infrastructure is characterized by manual, localized processes; minimal central control; and nonexistent or unenforced IT policies and standards for security, backup, image management and deployment, compliance, and other common IT practices. Overall health of applications and services is unknown due to a lack of tools and resources. Generally, all patches, software deployments, and services are provided manually.


Optimization Level 2: Standardized

The Standardized infrastructure introduces controls through the use of standards and policies to manage desktops and servers; to control the way machines are introduced into the network; and by using Active Directory service to manage resources, security policies, and access control. Customers in a Standardized state have realized the value of basic standards and some policies, yet still have room to improve. Generally, all patches, software deployments, and desktop service are provided through medium-touch with medium- to high-cost. These organizations have a reasonable inventory of hardware and software and are beginning to manage licenses. Security measures are improved through a locked-down perimeter, but internal security may still be a risk.

Optimization Level 3: Rationalized

The Rationalized infrastructure is where the costs involved in managing desktops and servers are at their lowest and processes and policies have been optimized to begin playing a large role in supporting and expanding the business. Security is very proactive and responding to threats and challenges is rapid and controlled. The use of zero-touch deployment helps minimize cost, the time to deploy, and technical challenges. The number of images is minimal and the process for managing desktops is very low-touch. These customers have a clear inventory of hardware and software and only purchase the licenses and computers they need. Security is extremely proactive with strict policies and control, from the desktop to server to firewall to extranet.

Optimization Level 4: Dynamic

Customers with a Dynamic infrastructure are fully aware of the strategic value that their infrastructure provides in helping them run their business efficiently and staying ahead of competitors. Costs are fully controlled; integration exists between users and data, desktops, and servers; collaboration between users and departments is pervasive; and mobile users have nearly on-site levels of service and capabilities regardless of location. Processes are fully automated, often incorporated into the technology itself, allowing IT to be aligned and managed according to business needs. Additional investments in technology yield specific, rapid, measurable benefits for the business. The use of self-provisioning software and quarantine-like systems for ensuring patch management and compliance with established security policies allows the Dynamic infrastructure organization to automate processes, thus helping improve reliability, lower costs, and increase service levels.

The implementation of Swimage in your company will assist moving their desktop configuration, management and deployment to a Dynamic Infrastructure Optimization Model by providing the following solutions:

Single Image per Operating System: Swimage limits the amount of images that must be maintained and configured. Additionally, roles and templates allow the single image to be deployed fully customized for every user’s business needs.

• Dynamic Patching: Swimage provides dynamic patching without requiring the image to be re-created. This ensures that the OS will be fully patched by the time a user logs in.

• Zero-Touch Deployments with Centralized reporting: Swimage provides zero-touch deployments that can be scheduled during off hours to minimize user impact.

• Single-Touch Deployments: Swimage provides a true single touch, light-touch deployment method allowing a single person to manage numerous simultaneous deployments while ensuring a consistent image is deployed fully configured for the user’s business needs.

• User Data Retention: Swimage automates user data retention and restoration ensuring minimal interruption to user productivity and eliminating lost work and productivity due to lost files.

• End User Communication: Using workflow engine, Swimage has the ability to send an email to the end user with the deployment information, such as scheduled deployment date, operating system that will be installed, applications that will be installed, etc. The email message is customizable as well.

• Endpoint Encryption Support:  Swimage has the ability to reimage an existing system that is encrypted with Endpoint Encryption without having to first decrypt the hard drive, thus saving the time needed to decrypt the hard drive prior to reimaging the system and re-encrypt the hard drive after deployment. In addition, will ensure the hard drive is secure during the entire deployment process.

Return to Swimage Training