presentation

45
000000_1 proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Smart. Blueprint For Success Capturing New Business Leveraging BCDR Services

Transcript of presentation

Page 1: presentation

000000_1Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Smart.™

Blueprint For Success

Capturing New Business Leveraging BCDR Services

Page 2: presentation

000000_2Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Business Continuity andDisaster Recovery Services

Page 3: presentation

®000000_3Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

BCDR Appeal in Tough Economy

Risk Mitigation Beats the Alternative

Industry Compliance Regulations Mandate it

Drives Product Revenue and Customer Loyalty

3

Page 4: presentation

®000000_4Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

4

What are your customers saying?

More than 90% of companies that experience one week of data center downtime go out of business within 12 months. - National Archives and Records Administration

89% of IT managers test their disaster recovery/failover systems only once a year or not at all. - Brilliant Ideas LLC for Scalent Systems Inc.

4

Page 5: presentation

®000000_5Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

5

What are your customers saying?

70% of respondents said it would take at least four hours for their servers to recover completely from failure, including restored software, configuration and network and storage connectivity. - Brilliant Ideas LLC for Scalent Systems Inc.

More than 50% of those polled estimated it would take several days to bring their systems back up to full capacity. - Brilliant Ideas LLC for Scalent Systems Inc.

5

Page 6: presentation

®000000_6Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

6

Customer Benefits

Proven best practice delivery by BC/DR thought leaders and experts lower program cost and speed service delivery.

Detailed, holistic approach builds a rock solid business case for DR Solution deployment.

Business-focused Risk & Value assessments distance the IT Department from the requirements, radically improving the speed with which approvals for CapEx are made.

Best In Breed approach that covers all aspects of Business Continuity and Disaster Recovery

Page 7: presentation

®000000_7Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

A Methodology for All Hazards7

Occu

rrenc

es p

er Y

ear

infre

quen

tfre

quen

t 100,000

10,000

1,000

1/100

1/1,000

1/10,000

1/100,000Consequences

(Single Occurrence Loss)Low $ High $

Target Operational Excellence

Regular Break/Fix

Probable

Possible

All H

azar

ds H

ave

Equa

l Disr

uptio

nWorm

DiskFailure

BuildingFire

Network/ISPOutage

Terrorism/Civil Unrest

DataCorruption

ComponentFailure

Virus

NaturalDisaster

ApplicationOutage

PowerFailure

Page 8: presentation

®000000_8Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

8

How IMT, BC and DR Fit8

Here’s how the BC/DR Methodology views the relationship between Incident Management, Business Continuity and Disaster Recovery:

Page 9: presentation

®000000_9Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

9

BC/DR Assessment9

Identifies and ranks threats to the location(s) including:

Natural Hazards Site Vulnerabilities Security Threats Employee Safety Terrorism Current Mitigation Employee Well-Being

When completed, the BC/DR Assessment tells you“What’s at Risk.”

Page 10: presentation

®000000_10Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

10

BC/DR Assessment10

Page 11: presentation

®000000_11Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

11

BC/DR Assessment11

Page 12: presentation

®000000_12Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

12

BC/DR Assessment12

Page 13: presentation

®000000_13Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

13

B/AVA (Business & Application Value Analysis)

13

BVA: Grades impacts to Business Processes or Functions in terms of:

Daily, Weekly & MonthlyFinancialCustomer PerceptionBrandRegulatoryThen assigns Criticality Tier based on RPO/RTOs.

Page 14: presentation

®000000_14Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

14B/AVA (Business & Application Value Analysis)(continued)

14

AVA: Determines which n-Tiered Applications support which Processes or Functions, then each Application inherits highest Criticality Tier from supported Process or Function.

When the B/AVA is complete, you’ll know “What it’s Worth.”

Page 15: presentation

®000000_15Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

15B/AVA (Business & Application Value Analysis)(continued)

15

Page 16: presentation

®000000_16Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

16B/AVA (Business & Application Value Analysis)(continued)

16

Page 17: presentation

®000000_17Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

17

Process & Technology Mapping17

Process Mapping:

Visio drawings showing workflow for each Process or Function.

One for daily production workflow One for BC workflow

Page 18: presentation

®000000_18Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

18Process & Technology Mapping (continued)

18

Technology Mapping:

Visio drawings showing all Configuration Items (CIs) required for all processes in a Criticality Tier.

Excel matrices of all specs & hosted applications for each CI used in a Tier.

One each for daily production environments

One each for DR environments

Once Technology & Process Mapping is completed, you’ll know “Where it Lives.”

Page 19: presentation

®000000_19Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

19Process & Technology Mapping (continued)

19

Page 20: presentation

®000000_20Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

20Process & Technology Mapping (continued)

20

Page 21: presentation

®000000_21Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

21

Recovery & Continuity Tactics21

Based on Production and Recovery Target, we will design and assist with negotiating costs for varied recovery solutions, including:InternalCollocationHot-Site2nd Data Center

With Backup & Recovery Tactics Design complete, you’ll know “How You’ll Recover.”

Page 22: presentation

®000000_22Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

22

Recovery & Continuity Tactics22

Page 23: presentation

®000000_23Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

23

Recovery & Continuity Tactics23

Page 24: presentation

®000000_24Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

24

Recovery & Continuity Tactics24

Page 25: presentation

®000000_25Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

25

BC/DR Planning25

We will develop and deliver Incident Management Team (IMT), Business Continuity (BC), and Disaster Recovery (DR) Plans. Each Plan details, in simple language that’s easy to understand during an Event.

Once the BC/DR Planning phase is complete, you’ll know“Who’s Responsible.”

Page 26: presentation

®000000_26Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Plan TypesPlan Types26

BC/DR Plans cover three plan types, each with a specific focus and objective:

Page 27: presentation

®000000_27Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Plan TypesPlan Types27

Page 28: presentation

®000000_28Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Plan TypesPlan Types28

Page 29: presentation

®000000_29Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Plan TypesPlan Types29

Page 30: presentation

®000000_30Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Plan TypesPlan Types30

Page 31: presentation

®000000_31Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Competitive Landscape

There are three kinds of competition: In larger firms, you will run into IBM and

SunGard, and soon HP with the EDS acquisition

These firms have but one goal – get the customer on the hook for a 5 year “hot-site” hosting contract.

31

Page 32: presentation

®000000_32Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Competitive Landscape

There are three kinds of competition: There are always “do it yourself” plans one can

buy on the Internet

Do nothing approach (where most companies are today)

32

Page 33: presentation

®000000_33Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

How The IMSN Is Involved

IMSN is now set up to smooth both the pre-sales and delivery of this service offering to your customers.

IMSN is the conduit between these two parties:

Pre-sales and delivery resources

You and your customers on the other end

33

Page 34: presentation

®000000_34Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

How The IMSN Is Involved

IMSN provides protections from competition & margin erosion,

plus the simplicity of invoicing to your Ingram Micro account.

34

Page 35: presentation

®000000_35Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Target End Clients

Any firm with an annual IT budget of $10 million is definitely spending money on BCDR

Any firm with smaller budgets that is highly regulated needs BCDR (financial, healthcare, publicly traded)

All companies need some level of recovery capability and smaller project sizes are common between $20k to $75k

35

Page 36: presentation

®000000_36Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

On-boarding Steps All the Solution Provider needs to do is get an initial

appointment for an online sales call.

From there, sample deliverables are shared and discussed, scoping questions are asked and a proposal/SOW is generated and turned around within 24 hours.

The solution provider is expected to follow up with the prospect and drive the sales cycle, but any technical or presales questions are handled by a dedicated staff of experts.

36

Page 37: presentation

®000000_37Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

On-boarding Steps

Once a SOW is executed, the delivery team handles the entire engagement, including project management.

The solution provider is invoiced by phase from Ingram Micro according to the schedule determined in the SOW and usually invoices its client according to the same schedule with their own markup.

37

Page 38: presentation

®000000_38Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

How You Make Money Selling BCDR

All BCDR Services are priced with 20% margin that is protected from competition

Services can range from as low as $5,000 to $150,000

During the process of the engagement, recovery solutions are developed for large infrastructure projects that are approved by senior executive management

Recovery solutions usually include:

Servers, Virtualization, Storage, Replication, Networking, WAN acceleration appliances and professional services

38

Page 39: presentation

®000000_39Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Solution Provider Benefits

You will have detailed insight into every business process, its value to the business executives and every application and infrastructure component in order of its priority to the business.

39

Page 40: presentation

®000000_40Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Solution Provider Benefits

You will be able to sit at the table as the executives decide the tiers and value of their business processes – getting you in front of the top decision makers.

In short you will understand their business and they will know who you are - and realize that you understand their business

40

Page 41: presentation

®000000_41Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

41

Key qualifying questions41

1. Is your company prepared for any type of disaster that may strike the main worksite or data facilities?

2. Do you have a plan that covers both IT as well as the business for any interruption?

3. If yes, when was it last updated?

4. Do you have any business drivers, such as regulations, that require a comprehensive BC/DR plan?

Would you like to speak with subject matter experts that have advised Gartner and Forrester on the subject of BC/DR?

Page 42: presentation

®000000_42Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

42

What does this service cost?

B: Prepared $Custom Complete lifecycle using standard methodology and templates

B: Progressive $Custom Advanced lifecycle that meets highly custom requirements such as

deeper dives into process detail, scenario planning, deeper documentation of IT assets and more

Crisis Drop Team $Custom Team of crisis response experts that come on-site to assist in or

manage a recovery effort

42

Page 43: presentation

®000000_43Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

43

What does this service cost?

B: Compliant$8,400 Basic plan elements to meet regulatory compliance;

includes one specific regulatory language pack relevant to your organization, additional packs for ~$900

B: Protected $8,400 Basic plan elements and templates for organizations

not subject to regulations

43

Page 44: presentation

®000000_44Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

44

How to close business44

Contact the BCDR Desk at Ingram Micro:

Email: [email protected]

Call: (800) 456-8000 ext. 64803

What we need from you: What we expect from you is to follow up in getting us “at bat” with your client or prospect. We will do all the pre-sales work including estimating, writing SOWs, through delivery. All we need is the introduction and any help we need in getting back in front of them. We expect you know where they are in the buying cycle.

Page 45: presentation

000000_45Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.