68

Bytes Magazine_Summer Autumn2011

Embed Size (px)

DESCRIPTION

Bytes of Software & Licensing news.

Citation preview

Page 1: Bytes Magazine_Summer Autumn2011
Page 2: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 03

The Bytes Software Asset Management 45 Day Trial• Reduce your license costs by up to 30%.• Understand what software & hardware is really installed on your network.• Fully managed trial, minimum input from you.• Fixed price, easy entry level.

Requires Little Input• We provide a fully-operational version of Snow License Manager to monitor a

specifi ed number of PCs.• You get access to a personalised SAM portal for the period to view your

company’s live hardware inventory and license usage information.• Complete assistance to help you access and use the information available.

Stage 1: Start-upProject briefi ng meeting; basic training; deployment of Snow agent.

Stage 2: Progress meetingDiscuss initial fi ndings; identify areas of interest; provide additional training.

Stage 3: FindingsKey project fi ndings; license savings available; input to business case for SAM.

Delivers Powerful OutputYou get a fast and detailed snapshot of the license situation in your organisation with reports showing: • License usage data.• License savings available for 45 day period.• License savings for 1 year across the entire business.• Details of the hardware monitored.

In 45 days you could have a complete picture of your software estate

To take part in our Software Asset Management trial contact your Bytes account manager or speak to the Bytes SAM team on 020 8786 1500

www.bytes.co.uk

Page 3: Bytes Magazine_Summer Autumn2011

welcomewelcometo bytes software services

welcomewelcomesummer/autumn 2011

industry newsindustry newsindustry news

featuresfeaturesfeatures

case studies

soft

war

e re

leas

es

welcomeinte

rvie

wswelcome

regularsregularsregulars

news desk

Welcome to the fi rst edition of ‘Bytes’. We hope that

this magazine will prove useful both as a source of

information prior to starting your IT projects and as a

reference to certain guidelines and rules surrounding the

increasingly complex world of software and licensing.

At Bytes Software Services we have had a busy and successful few years. Last year we won

THE Global Award from Microsoft for Best Licensing Reseller. It was gratifying and humbling

to know that we beat off every other Gold Licensing Supplier (some 3,000 globally) to win this

prestigious award. The award is testament to the great work we do with our customers and

Microsoft to ensure that everyone gets the maximum benefi t from their Microsoft products.

Increasingly though, we are providing our customers with software from a whole myriad of

software publishers including, Citrix, Oracle, Symantec, Sophos and IBM in an attempt to

consolidate procurement and identify technology consolidation. As managing software assets

becomes ever more important from a compliance and ease of administration perspective,

Bytes can become a trusted partner, helping to mitigate risk and reduce the admin burden for

organisations of all sizes. (See back page for further text about the vendors we work with and

the Bytes Vendor Team specialists).

We now have over 150 staff in the UK, all of whom are dedicated to software and software

services. Our view is that to provide the best possible advice and guidance on a complex

subject like software licensing, we should remain focused on just that one subject. We prefer

to be experts in our fi eld. So for non-licensing related solutions, we work with and recommend

best of breed partners who can assist our customers with all they might need (see our Partner

pages for further details). This focused strategy has paid off so far and allows us to concentrate

on delivering the best possible service to our clients.

Ultimately we want to help you to provide your organisations with great software and great value

for money. Please let us know how we are doing!

contact us Bytes Software Services,UK Head Offi ce, 15-17 Chessington Road, Ewell,Surrey, KT17 1TSphone - 020 8786 1500 fax - 020 8393 6622

BYTES 020 8786 1500 | 03

Neil MurphyManaging Director

Page 4: Bytes Magazine_Summer Autumn2011

04 | summer/autumn 2011

contents

contentscontents

industry newsindustry newsindustry news

soft

war

e re

leas

es

inte

rvie

wcontents

inte

rvie

wcontentscontents

inte

rvie

wcontentscontentsscontentscontents

inte

rvie

wcontentsscontents

inte

rvie

wcontents

regulars

industry newsindustry newsindustry newsindustry newsindustry news

soft

war

e re

leas

es

inte

rvie

w

regulars

news desk

news bytes p6 News Bytes All the latest news from Vendors

p15 News, Views & Events All the news of forthcoming events

p45 Bytes Portal All your software estate available in one place

p62 Bytes Licensing Services Introducing our UK and Global Software Licensing Experts

p63 Bytes SAM Services Here to help you manage the effi ency of your Software estate

p64 Bytes Learning Services Finding the right training course for you

p66 Vendor awards A little pat on the back for ourselves

regular bytesp3 Welcome Neil Murphy introduces our fi rst Bytes issue

p10 Microsoft Select & Core CAL licensing Changes The latest Microsoft Select and Core CAL licensing offerings

p29 Meet the Manufacturers Meet our Manufacturers at upcoming events

p36 Focus on Licensing Navigating from OCS to Microsoft Lync 2010

p40 Bytes Partnering How clients can benfi t from our partnering outlook and approach

p59 Try before you buy Take the opportunity to trail before you make that important purchase

p60 In the Hotseat An interview with Shaun Fröhlich from Microsoft UK

p67 Accreditations Our Vendors and the Bytes Strategy team that looks after them

cover bytes p10 Microsoft Select & Core CAL licensing Changes The latest Microsoft Select and Core CAL licensing offerings

p16 Take Control of your Desktop The end-to-end solution

p22 Clouds Are Taking Shape A closer look at Cloud, Offi ce365 and Cobweb

p26 Social Networking for Business Key questions answered by Websense

Page 5: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 05

features

case studiescase studies

James McNultyHead of Tesco Group IT Procurement

feature bytes

p16 Take Control of your Desktop The end-to-end solution

p22 Clouds Are Taking Shape A closer look at Cloud, Offi ce365 and Cobweb

p26 Social Networking for Business Key questions answered by Websense

p30 Keeping the Cloud Secure Data governance - the real issue

p47 ThinApp Application Virtualisation made simple

p50 Avoidable costs of Downtime The fi nancial impact of downtime

p52 Are you ready to Migrate? Consider the options before you move

p57 VMware Monitoring with Microsoft Manage your physical and virtual environment

Bytes have helped Tesco make signifi cant savings by effective and intelligent management of our licensing entitlements. They manage our global requirements, are able to keep us abreast of new and relevant licensing changes and apply these to our requirements ensuring we are always licensed in the best way possible”.

case studyp32 Mott MacDonald Delivering a global solution to a global business

Page 6: Bytes Magazine_Summer Autumn2011

news

Catch up on all the latest news from the IT world from

new product launches, latest software and licensing

updates to business acquisitions.

bytesLANDesk delivers new release of Service Desk management suiteLANDesk Software, a global leader in systems lifecycle management, endpoint security and IT service management recently announced LANDesk® Service Desk 7.4, a signifi cant upgrade to the LANDesk IT Service Management solution. Available today, the new release helps organisations alleviate pressure on the IT service desk with a user-centric approach to service provisioning and support.

“LANDesk Service Desk 7.4 is the next generation of our rich, mature and proven service management solution,” said Steve Daly, president and CEO of LANDesk Software. “This solution offers more out-of-the box capability than alternatives that require a piecemeal and costly approach to achieve this level of functionality and automation. It goes well beyond traditional ticketing and incident management, allowing IT departments to deliver real business value.”

news

The Attachmate Group Completes Acquisition of NovellThe Attachmate Group announced the completion of the acquisition of Novell, Inc., a leader in intelligent workload management, under the terms of the defi nitive agreement disclosed on November 22, 2010. Novell will now operate as two separate business units under the Novell® and SUSE® brand names and join Attachmate® and NetIQ® as holdings of The Attachmate Group.

The addition of Novell furthers the mission of The Attachmate Group and its ability to support customers’ strategic and tactical business requirements through innovative solutions, quality products, and exceptional service. The Attachmate Group product families now include complementary solutions that range across IT operations management; open source; end user computing and collaboration; host connectivity and legacy modernisation; security, identity and compliance management; virtualisation and cloud computing; and more.

06 | summer/autumn 2011

Page 7: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 07

bytesBecrypt achieves RSA Secured® Partner Program certifi cation to provide CESG-approved full disk encryption with DISK Protect Baseline that is interoperable with RSA SecurID® AuthenticationBecrypt helps meet growing requirement for CESG approved data security solutions.

Becrypt, a leading endpoint security specialist announced that Becrypt’s DISK Protect Baseline® data security solution has achieved interoperability certifi cation with RSA SecurID® two-factor authentication. DISK Protect Baseline is CESG-approved by the UK Government for use with restricted and confi dential data up to Impact Levels 3 and 4. This level covers virtually all data used within local government and the NHS and most of central government data.

The Becrypt DISK Protect Baseline data security solution utilises RSA SecurID authentication for pre-boot authentication of a fully encrypted PC hard drive. By requiring users to insert their RSA SecurID SID hybrid tokens into the USB port on the PC at start up, organisations are enforcing strong authentication and ensuring compliance. An optional feature also locks the PC if the RSA SecurID SID 800 token is removed from theUSB port.

The Enterprise Cloud Security Journey Begins with Trend MicroTrend Micro announced a new product designed specifi cally to provide enterprise-class data protection in the cloud. Trend Micro™ SecureCloud 1.1 is a hosted key-management and data-encryption solution designed to protect and control confi dential information that you deploy into public and private cloud-computing environments.

SecureCloud introduces a patented approach that overcomes traditional key management complexities with a hosted policy-based key-management service. This innovation gives your administrators peace of mind about data integrity by remotely authenticating servers when they request access to secure volumes. Effi cient and user-friendly, SecureCloud helps ensure regulatory compliance, plus it provides you the freedom to move between cloud vendors without being tied to any one provider’s encryption system.

New Symantec NetBackup™ 7.1Symantec is announcing Symantec NetBackup™ 7.1. Symantec NetBackup™ simplifi es the protection of information driven enterprises by automating advanced technologies and standardising operations across applications, platforms, and virtual environments. Integrated deduplication, replication, and patent-pending virtual machine protection helps customers improve storage effi ciency, infrastructure use, and recovery times through one console.

Key FeaturesIntegrated DeduplicationNetBackup now offers both client and target deduplication that can be deployed without additional servers. The new NetBackup deduplication client improves backup speeds by eliminating data at the source which means less data to move. For unique client demands, customers can choose to use target-side deduplication before writing data to disk.

Simple and Comprehensive Virtual Machine ProtectionSimplify how you protect information in virtual environments by standardising all backups through NetBackup. New VMware® and Microsoft® Hyper-V features increase both backup and recovery speeds and can perform backups with minimal impact to other virtual machines allowing you to perform backups based on your own needs.

Better Disaster Recovery with Global Data ProtectionEnable rapid recovery at alternate sites with both integrated and live replication features, including NetBackup catalog replication. Use NetBackup deduplication and replication to effi ciently move up to 80% less data between different sites with optimised replication. For critical applications use NetBackup RealTime to recover.

Free of charge upgrade: Available to existing customers with valid maintenance contracts contributing to the strength of the market.

cont...

Page 8: Bytes Magazine_Summer Autumn2011

cont...from page 07

RES Software Ships Virtual Desktop Extender - standalone reverse seamless now availableHot on the heels of receiving European and United States patent approval, RES Virtual Desktop Extender (VDX) is now available as a standalone product. VDX is a proven technology and is already used by a number of organisations. It enables enhanced interoperability with leading desktop virtualisation solutions, including Citrix XenApp and XenDesktop, VMware View and Microsoft Remote Desktop Services, in addition to niche profi le management solutions like AppSense Environment Manager. As a result, customers using a diverse mix of technologies at varying lifecycles in their terminal server and virtual desktop deployments, can easily merge local applications into users’ virtual desktops. For more information visit www.reverseseamless.com

Free 30 day trial of Microsoft BPOSThe Microsoft Business Productivity Online Standard Suite (BPOS) is a set of Microsoft hosted messaging and collaboration solutions including Microsoft Exchange Online, Microsoft SharePoint Online, Microsoft Offi ce Live Meeting, and Microsoft Offi ce Communications Online. These online services are designed to give your business streamlined communication with high availability, comprehensive security, and simplifi ed IT management.

BPOS is soon to be upgraded to Offi ce 365 streamlining the offering to include Offi ce Pro Plus, Exchange, Sharepoint and Lync. The seamlessness between off and on premise software, increased customisation and fl exibly all make the upgrade to Offi ce 365 more desirable.

To download your free 30 day trial visit http://www.bytes.co.uk/microsoft/offi ce365/

Microsoft Core CAL Licensing ChangesFrom 1st August 2011 Microsoft are including Lync Server Standard CAL and Forefront Enterprise Protection (FEP) into the Core CAL Suite. The main points to note are:

• Existing customers will automatically gain the license entitlement to these products.

• After 1st August 2011 there will be a pricing impact for renewals dependent on whether you have Core CAL &/or Pro Desktop.

• New Core CAL customers can benefi t from existing pricing prior to 1st August 2011.

• Existing Core CAL customers reviewing ECAL suite should work with their Bytes Account Manager and Microsoft business manager to discuss the impact of purchases prior to 1st August.

For full details on these changes and their possible impact on your business, please refer to the relevant article within this publication.

Citrix XenDesktop 5 Service Pack 1 XenDesktop 5 Service Pack 1 follows the December 2010 XenDesktop 5 release with bug fi xes and quality improvements for hosted VDI desktop deployments and adds recommended support for the new Microsoft Server 2008R2 SP1, Microsoft HyperV 2008R2 SP1, and Windows 7 SP1 platforms. In addition, This release will provide support for XenServer 5.6 SP2 with IntelliCacheTM which can reduce the load on central storage by as much as 90%, increasing performance while reducing TCO. Finally, XenDesktop 5 SP1 provides support and administrative tools to automatically manage new XenDesktop licensing options. This Service Pack will also include new tools to ease the migration from XenDesktop 4 deployments and a setup wizard for leveraging Citrix Provisioning Services to provision server-hosted virtual desktops in a XenDesktop 5 deployment.

08 | summer/autumn 2011

Page 9: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 09

news

Bytes Achieves Microsoft Gold Partner Certifi cation for Software Asset Management.Bytes is one of the fi rst UK LARs to be awarded the prestigious Microsoft Gold Partner certifi cation for SAM. This level of accreditation demonstrates Microsoft’s recognition of the depth of experience, capability and competency that Bytes and its specialists have in this area. “We are a safe pair of hands, recognised by Microsoft and other software vendors as an organisation that can deliver against the high standards they set in helping customers to better understand what software they own, what they have installed, what they are using and how to improve the procurement and management of this valued asset.” Said Chris Hibbert, Bytes SAM General Manager.

Bytes Achieves Specialist Partner status for Endpoint Management SolutionsBytes are proud to announce that they have completed the EndPoint Management (Altiris) Specialisation. The Endpoint Management Specialisation provides qualifi ed partners with recognition of their focused company commitment to selling Altiris Products and expertise in providing Altiris solutions and services to customers. Symantec Specialisations are designed for partners who are members of the Symantec Partner Program and who have proven expertise in a particular area of business. Specialisations have been developed to recognise that technical knowledge and expertise. Membership of a Specialisation provides access to tools and benefi ts which may not otherwise be available to partners, as well as making it easier for customers and other partners to identify those partners who have particular expertise and can meet/assist with their particular needs.

stop press

Adobe Creative Suite 5.5 launchThe recently launched Adobe® Creative Suite® 5.5 software keeps users ahead of the rapid proliferation of mobile devices. Users can develop rich interactive apps for Android™, BlackBerry®, and iOS. Design engaging browser content in HTML5, and create immersive digital magazines. This is no ordinary update as Adobe has added a lot of new and exciting features to many of its applications, particularly for designing and developing for the burgeoning mobile industry. Also new is the subscription model Adobe has installed for people who just want to use CS5.5 on a temporary basis.

Diskeeper CorporationThe creator of the well-known Diskeeper data performance software, has revealed the imminent release of Diskeeper 2011.

Five key benefi ts with new Diskeeper 2011 include:• Continually optimised read/write

speeds with no resource confl icts.• I/O activity reduced an average of

40%.• Backups 30% faster.• Overall system stability increased

30%.• System longevity extended an

average of 2½ additional years.

Mimecast Joins BlackBerry Alliance Program with First Always-On Continuity Service for BlackBerry EmailMimecast has joined the BlackBerry® Alliance Program as a BlackBerry® Alliance Select Member. Mimecast joins a select group of technology and brand leaders, recognised for promoting the highest level of innovation and contributing to the strength of the market.

The announcement follows the recent launch of Mimecast Services for BlackBerry® smartphones. The new service is the fi rst to enable enterprise IT managers to provide uninterrupted email access to BlackBerry smartphone users in the event of a Microsoft Exchange outage or BlackBerry® Enterprise Server failure. Until now, businesses have been limited in their range of continuity choices for the BlackBerry® solution, relying on SaaS services that require the availability of BlackBerry Enterprise Server or server replication solutions.

Mimecast has been providing continuity services to hundreds of thousands of email users around the world over the last seven years. Mimecast Services for BlackBerry is the fi rst extension of the company’s existing range of email disaster recovery services to mobile devices. With Mimecast, users are able to send and receive email and access their personal archive through a variety of mail clients including Microsoft Outlook (desktop), Mimecast Personal Portal (web) and BlackBerry smartphones in the event of scheduled or unplanned mail server outages or connectivity failures.

Page 10: Bytes Magazine_Summer Autumn2011

Headline Dates• After 30th June only Select Plus

Agreements can be signed. - Select enrolments can continue

to be created under live Select agreements.

- Any Select e-Agreements createdbefore 30th June have 30 days toacquire signature.

Following our recent 360° View of Microsoft Licensing event at St Martin’s Lane Hotel, London, I thought it would be benefi cial to document the retirement of the Select volume licensing programme and its migration to Select Plus. This is a general top line view, for further information on how this may affect your business please call your Bytes account manager or the new business team on the number below.

• 1 or 3 year Select renewals. - Allowed only for V2009 contracts. - Not permitted for V2010 contracts

(introduced Oct 2010).

All select Agreements will be retired by October 2013.

licen singfocus onlicensing

Select Plus vs Select

Select Plus replacing Select Agreement

ASPECT

Agreement - different format / naming convention

Initial order requirements

Average annual minimum consumption

Impact of insuffi cient consumption

Reinitiate pool after termination

Decentralised ordering

Duration

SELECT PLUS

MBSA + Select + Registration Forms

No

500 points per pool

Pool on hold

Yes, place 500+ point purchase order or qualifying EA, EAS or CASA

Any registration affi liate

Evergreen

SELECT

MBSA + Select + Enrollments

No

500 points per pool

Pool terminated

Yes, but only through an amendment

Only affi liates that meet enrollment minimum (750 points)

3 years, optional 1-year or 3-year renewal

10 | summer/autumn 2011

Mandi NicholsonBytes Sales Director

Page 11: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 11

cont...

licen singfocus on

Upward Re-Levellment *NEW*If a customer places an order which has enough points on to push them into the next price level, the new price level will be applied on THAT ORDER.

Compliance Check, Points Surplus / Defi cit *NEW*If a customer does not achieve the minimum requirement for their level but has exceeded their points requirement, any extra points will be rolled over to next year.

Select Plus: Points and Price Levels Per Annum

Select Enrolments are replaced with Affi liate Registration Forms

Annual Compliance Checks• Happens at agreement anniversary.• The price level changes one level for

that pool the following year.• The price level can only descend a

maximum of one level each year.• Level A customers must qualify for

the 500 point annual minimum to continue purchasing in that pool.

- If the customer does not meet the minimum, the pool is put on hold.

- One or more pools can be placed on hold.

- Once the 500 point minimum order is placed in the held Pool, the appropriate pricing level is applied based on the order and purchasing can resume for all affi liates.

Mastering The Dates• Agreement Anniversary. - Any day of the month. - It’s the date the Master

Agreement is processed and becomes effective.

- It’s the date used for compliance checks and, therefore, downward re-levellments.

• Affi liate Anniversary *NEW*. - Always the 1st of the month. - The month is selected by the

Affi liate at time of registration. - If no month is specifi ed on the

registration form, it will be set to the month the Affi liate is set up.

- All orders will eventually align and bill to this date.

• Order Anniversary *NEW*. - Along with Upfront and Affi liate

Anniversary, SA orders can also be split annually and billed on the Order Anniversary.

POINTS LEVEL

500 A

4,000 B

10,000 C

25,000 D

Select Plus Affi liateRegistration Form

• Business units, divisions or subsidiaries can acquire software under the Select Plus agreement by signing individual Affi liate Registration Forms.

• Points and Pricing are aggregated across all affi liates.

Select LicenseEnrollments

• Business units, divisions or subsidiaries can acquire software under the Select License agreement.

• Enrolling affi liates must commit to ordering a minimum of 750 points over the three years.

Select Plus - Key Changes to Remember• Less room for “optimistic”

forecasting. - Look at your pre-June 30th

options.• Less pain at renewal time due to

evergreen agreements. - Only any expiring SA will need to

be addressed.• Re-instatement of pools are

automatic. - Was previously a paperwork

exercise.• Existing agreements can be

migrated across. - Have a look if this needs to

happen for you.• Qualify for higher level at time of

order placement. - Credit for purchases at time of

procurement rather than annually. • Downward re-levelling only 1 tier at

a time. - More in line with Select, less

penalisation for customer who make bulk purchase year 1.

• Surplus points can roll over. - No wastage of points.• SA pro-rated at beginning of

agreement and available only in 25 – 36 month “chunks”.

- 3 payment options. - Easier to manage.

Page 12: Bytes Magazine_Summer Autumn2011

cont...from page 11

What is Core CAL Suite?The Core CAL is suite of CAL’s comprising of: • Windows Server CAL (File server). • Exchange – (E-mail). • SharePoint (Collaboration).• System Center Configuration Manager

(Software Distribution and Management Server).

It is important to note that these CAL’s can all be purchased individually without SA. If you are purchasing Core CAL under any volume licensing scheme it can only be purchased with SA.

licen singfocus on

Microsoft Core CAL Enhancements

I recently held a Webinar on the Microsoft Core CAL Suite enhancements and thought I would document the highlights here for you to consider. There is an opportunity to benefit from existing pricing prior to 1st August 2011, which we are happy to discuss further for your organisation. Please contact your Bytes account manager or the new business team to discuss your licensing options.

What is CAL?

A CALallows access to the services of a server.

A Standard CALallows access to a limited set

of Fundamental services of the server.

A Enterprise CALallows access to more advanced

services of the server.It “adds to” rather than includes the functionality of the Standard CAL.

Clients gets the basic functions.

Standard CAL

Enterprise CAL

Standard CAL

Clients gets more functions

Clients gets the basic functions.

BOTH CALs are required to give clients access to all

functions

12 | summer/autumn 2011

Zena Jeffery Bytes Divisional Sales Director

Page 13: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 13

licen singfocus onEnhancements to the Core CAL Suite

New Core CAL pricing and use rights 1st August 2011From a licensing perspective, Core CAL components are not available as standalone products under Enterprise Agreements. Consequently, Lync Server Standard CAL & Forefront Endpoint Protection were no longer available on Enterprise Agreement price lists from 1st June.

• Pricing for Core CAL will increase.• Pricing for the ECAL step-up from Core CAL will

decrease.• Pricing for full ECAL stack will remain unchanged.

Estimated EA price changes for Core CAL

Procurement Considerations: Select / Select Plus• Customers looking to renewal existing Core CAL SA or

make new purchases of Core CAL prior to 31st July will benefi t from current pricing.

• Customers with existing Core CAL prior to 31st July will automatically get the two new components at no extra charge.

• Select pricing is variable, Core CAL pricing after 1st August will increase and can change through-out the term of the Select / Select Plus contract.

• Customers with Core CAL prior to 31st July will also be able to purchase step-up licenses to ECAL from 1st August at the reduced amount.

• Pricing below is sample Band A Select / Select Plus – based upon Core CAL purchases made before 1st August 2011 compared to those made after.

Procurement Considerations: Enterprise or Enterprise Subscription• Customers looking to renew an existing or start a new EA

and are looking at Professional Desktop and / or Core CAL before 31st July will benefi t from current Core CAL pricing.

• Customers with existing Core CAL prior to 31st July 2011 will automatically get the two new components at no extra charge.

• EA pricing is fi xed at the beginning of the agreement.• Customers with Core CAL prior to 31st July 2011 under an

EA will be able to True-up additional users at the pre – 1st August 2011 price (until the agreement expires).

• Pricing below is sample B and A EA Pricing based upon Pro Desktop & Core CAL purchases made before 1st August 2011 compared to those made after.

SKU % Change (Estimate)

Professional Desktop L&SA +3%

Professional Desktop SA +3%

Core CAL L&SA +10%

Core CAL SA +14%

ECAL Suite Step-up from Core CAL -9%

Product Type Qty Unit £ 3 Year Total Aug Price Chge Saving

Core CAL L&SA 1000 £222.82 £222,820.00 10% £22.282.00

Core CAL SA 1000 £95.44 £95,440.00 14% £13,361.50

Product Type Qty Unit £ 3 Year Total Aug Price Chge Saving

Pro Desktop L&SA 1000 £664.32 £664,320.00 3% £19,929.60

Pro Desktop SA 1000 £398.16 £398,160.00 3% £11,944.80

Core CAL L&SA 1000 £177.48 £177,480.00 10% £17,748.00

Core CAL SA 1000 £85.32 £85,320.00 14% £11,944.80

information on how these changes will affect your organisation please speak to your Bytes account manager or a member of the new business team on 020 8786 1500.

further...

Core CAL Enhancements - Key Points to Consider• Lync Server Standard CAL and Forefront Enterprise Protection

(FEP) will be part of Core CAL from 1st August 2011.• Existing customers will automatically gain the license

entitlement to these products.• After 1st August 2011 there will be a pricing impact for

renewals dependent on whether you have Core CAL &/or Pro Desktop.

• New Core CAL customers can benefi t from existing pricing pre 1st August 2011.

• Existing Core CAL customers reviewing ECAL suite should work with their Bytes Account Manager and Microsoft business manager to discuss impact of purchases pre 1st August 2011.

Page 14: Bytes Magazine_Summer Autumn2011

Shrink your workload

with Microsoft Project 2010

The new and updated desktop features

The innovative Timeline view gives you a clear view of tasks, milestones and

phases. Expanded colour palettes and text effects highlight important dates to

make deliverables stand out, helping you share your plans more effi ciently.

Desktop features such as the familiar and intuitive Ribbon put your essential tools

and functions exactly where you need them, saving both time and effort. This

helps to create schedules with the right level of detail, to ensure your projects are

delivered on time, and to budget.

When it comes to creating your project plans and communicating them to any

number of different audiences, keep your workload to a minimum with Microsoft

Project 2010.

Excellent new server features

Server features include tools to support project plans and portfolio management,

enhanced visibility helps you quickly produce reports within the fl exible and

powerful structure. Projects can also be updated and edited via the Internet, and

integration with Microsoft Exchange Server 2010 allows you to intuitively update

tasks and timings to help you be more productive.

As a project manager, you know that creating schedules and project plans takes time. However, you can now shrink your workload considerably with the powerful server and desktop features in Microsoft Project 2010. Even if you’re communicating plans to different audiences, it’s now easier to create schedules for all their needs.

To fi nd out more about Microsoft Project 2010 and how it can benefi t your business, speak to your Bytes account manager on 020 8786 1500

14 | summer/autumn 2011

Page 15: Bytes Magazine_Summer Autumn2011

events

We have had a busy

schedule of events

recently, bringing you

news and information

on topics ranging from

virtualisation and

storage to security

and licensing and all

points in between!

Where possible we

have tried to host

events in landmark

buildings too, so that

we can add an extra

dimension of interest

for our guests.

Recent venues have included the Kensington Roof Gardens, St Martins Lane Hotel and the world famous London Gherkin.

Industry experts from many of our leading vendors as well as our own Bytes specialists have delivered informative presentations on a broad range of topics to ensure you are kept up to date with all the important industry developments. Please visit the events page of our website www.bytes.co.uk/events regularly for news of forthcoming activities.

Microsoft System Center,Bank London, March

Desktop VirtualisationKensington Roof Gardens, March

Licensing – CoreCAL changes, webinar, April

Microsoft Lync,Polycom EBC, London, April

Symantec Security,Kensington Roof Gardens, April

Microsoft 360°Licensing, St Martins Lane Hotel, London, May

Oracle Round Table The Gherkin, London, June

SMART GOV 2011, ExCel, London, June

Storage & Security in Virtualised Environments The Mint Leaf, London, June

would like to view the slides from any of the recent events listed, please visit www.bytes.co.uk/seminar_resources/index.php

if you...

viewsand events

BYTES 020 8786 1500 | 15

Page 16: Bytes Magazine_Summer Autumn2011

virtualisation

DesktopsHow to Take Control of your

Written by Matt Gallick - Bytes BDM, Virtualisation Dan Metcalfe - Bytes BDM, Emerging Technologies and Matt Compton - Bytes Symantec Business Manager

16 | summer/autumn 2011

Page 17: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 17

Step OneDiscovery with SnowDiscovery is a term that is used broadly within the IT industry and different vendors can mean something slightly different when referencing discovery.

To successfully manage software assets in a virtual environment a customer does not just need to understand what software is deployed but also where it is deployed, how it was deployed, who is using the software and how often the user(s) are using the software. Without this information a customer is at risk on two fronts:

1. Deploying software that is not really needed – Ultimately this will result if procuring software licensing and associated maintenance that is unnecessary.

2. Being under licensed for software that is deployed and is not being used, therefore an unnecessary risk.

The problem of tracking software is increased when applications are being virtualised. As well as tracking how the software is to be licensed, keeping a track of software and where it is in this dynamic involvement is a challenge that many customers have not considered.

Snow Software’s License Manager can help customers track and manage software in all environments including virtualised.

Key Considerations:• Identifying what is in use in the current environment.

• Which software applications are installed.• Which software applications are actually licensed.• Who uses what applications and when.• Comprehensive reporting of software

requirements.

1Whether you are migrating to

Windows 7, reducing pressure on

your service desk, making savings

on your hardware costs or are

embracing consumerisation - our

end-to-end solution for taking back

control of your desktop lifecycle

will help you make the right

decisions for your Users and IT

Administrators.

cont...

Here is our 6 Step Plan for helping you to deliver maximum value from your Desktop Virtualisation project, ensuring better management, better end-user experience and a combination of choice and fl exibility.

6 Steps To Controlling Your Desktop1. Discovery Phase - analysis of current PC estate.

2. Application Testing - check for compatibility issues.

3. Desktop Virtualisation - centralise the desktop.

4. User Personalisation - environment/profi les management.

5. Backup and Protect - secure critical user data.

6. Secure Virtual Desktops - anti-virus/malware protection.

Left to right:

Dan MetcalfeBytes BDM, Emerging Technologies

Matt ComptonBytes Symantec Business Manager

Page 18: Bytes Magazine_Summer Autumn2011

Testing with AppTitude is much more rigorous and much faster than manual testing and gives you a clear path forward. The simple traffi c light dashboard shows you the applications that should migrate easily and which will need further testing or remediation. The Intelligent Remediation™ advice shows you what the problem is and what you can do about it, with auto-fi xes where it makes sense. The Best Fit Analysis shows you which deployment options and delivery strategies will work best post your application compatibility project. Another great feature is the EffortCalculator™ which shows you how long your application migration program will take, how much it will cost and why – based on your real-world costs or their benchmarks from application compatibility analysis.

Knowing this critical information before you even start migrating makes a huge difference to the entire program.

Key Considerations:• Can the applications be deployed on Windows 7.• Will the applications run on a x64 platform.• Are the applications good candidates for application

virtualisation.• Manual testing is very time consuming and cumbersome.• Need for an automated compatibility testing tool.• Need for clear reporting of possible issues.

Step ThreeDesktop Virtualisation with CitrixToday, individual desktops are hard-coded combinations of OS, applications, and user settings, and managed one-by-one on an ongoing basis. Many IT organisations we speak to are looking at desktop virtualisation to upgrade their entire approach to desktop management. IT executives are looking for a better way to address the varying needs of enterprise users.

How does desktop virtualisation help?Desktop virtualisation replaces this hard-coded approach with a more fl exible design in which one moving part doesn’t have to disrupt any of the other moving parts when changes are needed. That means the device, OS, applications, and user settings are all shielded from each other. These components can then be managed independently which eliminates redundant data, workload, and management processes. IT assembles desktops dynamically based on business roles, and delivers these resources in a way that matches the users’ requirements - whether that means hosting them in the datacenter or placing them to their device.

Desktop Virtualisation – XenDesktopCitrix XenDesktop lets you deliver on-demand virtual desktop and applications anywhere your users work, to any type of device, bringing fl exibility and mobility to your workforce.

Step TwoApplication testing with App-DNAYou cannot rely on manual application compatibility testing as you prepare for a major application migration or an application management project. A manual process costs too much, takes too long and is not accurate enough. We suggest you consider AppTitude from AppDNA, it will get your applications to your destination in half the time and cost, with dramatically less user disruption.

App-DNA™ AppTitude™ application compatibility software platform automates pre-migration application testing and intelligently remediates compatibility issues, so you can use application intelligence to migrate and manage your application portfolio. It is called Application Migration Optimization™ and it gets you to your destination platform – whether it’s Windows 7, application virtualisation, 64-bit or a combination – faster, at lower cost and with minimal disruption to users and the business.

A solution for every Use CaseDifferent types of workers across the enterprise need different types of desktops. Some require simplicity and standardisation, while others require high performance and personalisation.

XenDesktop can meet these requirements in a single solution with their unique FlexCast™ delivery technology. With FlexCast™ you can deliver every type of virtual desktop - each specifi cally tailored to meet the performance, security and fl exibility requirements of each individual user.

cont...from page 17 2 3

18 | summer/autumn 2011

Page 19: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 19

Hosted Shared desktops provide a locked down, streamlined and standardised environment with a core set of applications, ideally suited for task workers where personalisation is not needed – or allowed. Supporting up to 500 users on a single server, this model offers a signifi cant cost saving. Hosted VDI, typically needed by offi ce workers, can be securely delivered over any network to any device. This option combines the benefi ts of central management with full user personalisation and can generally support up to 150 desktops per server. Streamed VHD provides centralised single-image management of the desktop. This approach offers an easy, low-cost way for customers to get started with desktop virtualisation by leveraging existing PC resources and keeping datacenter overhead to a minimum. It can also be ideal for government and university labs that use diskless PCs for maximum data security. Local VM desktops extend the benefi ts of centralised, single-instance management to mobile workers that need to use their laptops offl ine. When they are able to connect to a suitable network, changes to the OS, apps and user data are automatically synchronised with the datacenter. On-Demand Apps allows any Windows® application to be centralised and managed in the datacenter, hosted either on multi-user terminal servers or virtual machines, and instantly delivered as a service to physical and virtual desktops. Optimised for each user device, network and location, applications are delivered via a high speed protocol for use while connected or streamed via Citrix application virtualisation or Microsoft App-V directly to the endpoint for use when offl ine.

Key Considerations:• Centralised desktop and application delivery.• Categorise users into groups with similar needs.• Review analysis of applications and make design

decisions.• Design desktop virtualisation solution to accurately

address use cases.• Implement solution following best practise guidelines.

Step FourUser Virtualisation with AppSenseIn the same way that delivery of operating systems and applications to the user requires an infrastructure, so too must the user environment. The AppSense Virtualised User Infrastructure (UVI) manages everything specifi c to a user. This user environment contains user-based corporate policy, personalisation settings, user rights management and user-introduced applications. Infrastructure management tools optimise the user environment whilst enterprise-class reporting and auditing tools provide visibility into the user environment; ensuring users have the best working experience. The infrastructure delivers the user environment into virtual, physical and streamed desktops and applications - or combinations of those mechanisms - and also can apply the user environment across operating system versions (e.g. XP, Vista and Windows 7, Server 2008, 32/64 bit). For existing desktops, migration capabilities move employees into dynamically delivered standard desktops seamlessly.

Key Considerations:• Trade-offs between user customisation and corporate

policy.• Performance management needs addressing in a

centralised environment.• Application network access control and user rights

management.• Provide personalised, standardised consistent user

experience.• Allow for mobility between devices and application delivery

mechanisms.

4Hosted Shared Hosted VDI Streamed VHD Local VM On-Demand Apps

cont...

Page 20: Bytes Magazine_Summer Autumn2011

cont...from page 19

Step FiveBackup and Protection with SymantecSymantec Backup Exec 2010 delivers reliable Windows server backup and recovery designed for a growing business. You can protect more data while you reduce storage and management costs through integrated de-duplication and archiving technology. With this Windows server backup software, you can reduce business downtime, and ensure critical information on virtual or physical systems is always protected and restored in seconds.

Key Considerations:• Centralised data lends itself to enhanced security.• Mechanisms are available to leverage virtual environment

for backup and recovery.• Data is growing at an exponential rate and needs

protecting.• Backup windows are reducing along with the need for

constant access.• Need to have a comprehensive backup and recovery plan.

Step SixSecure Virtual Desktops with McAfeeAs the desktop evolves, security needs to bespecifi cally designed for these new systems, rather than added only as an afterthought. In standard VDI deployments, traditional endpoint security software is installed within each guest. Unfortunately, this leads to endpoint security activities, such as scheduled scans, on-access scans of email attachments, and signature and product updates that happen simultaneously. These concurrent operations accumulate and can max out the CPU and memory, bog down the network and create I/O bottlenecks.

Optimising security for virtual environmentsThe McAfee® Management for Optimised Virtual Environments (MOVE) platform, supporting Citrix XenDesktop, provides security management tailored to virtualised environments. Rather than running an endpoint security agent in each virtual machine (VM), MOVE Anti-virus (AV) delivers a virtual appliance that consolidates scanning processes and signature updates outside of the VMs, effi ciently protecting all virtualised desktops.

In McAfee and Citrix tests, implementing MOVE AV allows servers to run three times the number of virtual machines compared to traditional endpoint security implemented inside individual virtual machines. This higher VM density lowers the per-desktop cost of desktop virtualisation and allows VDI implementations to achieve the operational payoff required.

Key Considerations:• Corporate policy dictates use of anti-virus\malware

software. • Updating and scanning can cause performance problems• Security interfaces exist which allow offl oading of

protection.• Scanning at the virtual level reduces resource usage and

improves performance.

it is; our 6 step plan to desktop virtualisation and taking back control of your organisation’s desktop estate.

If you would like to talk about this in more detail or specifi cally about any of the vendor offerings here, please feel free to contact either Matt Gallick, Dan Metcalfe or Matt Compton at [email protected].

so there...

5 6

20 | summer/autumn 2011

Page 21: Bytes Magazine_Summer Autumn2011
Page 22: Bytes Magazine_Summer Autumn2011

cloud

CloudsAre Taking ShapeWith many types of Cloud Computing forming,

we look at the much anticipated Microsoft

Office365 and the Cobweb Cloud Computing

Platform.Written by Richard Best, General Manager Partner & Cloud Services, Bytes Software Services

Richard Best Bytes General Manager, Partner & Cloud Services

22 | summer/autumn 2011

Page 23: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 23

From talking to our customers and listening to the current industry hype, seemingly the only thing the Cloud cannot deliver en masse is confidence. Unfortunately a shortage of confidence goes hand in hand with the band-wagoners jumping on the Cloud gravy train. But get past the noise, look carefully, and there are some great companies delivering valuable services through the Cloud.

The Bytes Cloud Services team was established to do exactly that - help our customers to find valuable Cloud services easily.

Leveraging our Partner Eco-System (see the Partner Eco-System article in this magazine if you haven’t already) we’ve put together a raft of Cloud offerings with complimentary services available from our Partners.

Keeping confidence firmly in mind, we’ve made it a key part of our criteria that these offerings and services are tangible and are being delivered to customers with positive results.

That way we can be sure that we are helping our customers to deliver results to their organisations and not excuses.

We are currently talking to a lot of organisations who have heard the hype and want to know how the Cloud can help them make gains. Planning is an essential first step when considering a move to the Cloud, in whatever form – private, public or hybrid and to assist with this we have a number of packaged service options from our consulting partners to help customers understand what can be achieved, relative to them and how they should go about it.

One of our firm Cloud favourites at the moment is Storage. From a hybrid perspective, having the capability to de-duplicate and store data securely through a vehicle that can be scaled up or down as needed means that expensive on site solutions can be used for essential data rather than

Clouds

cont...

clogged up with everything the organisation produces. It’s a great example of how a low commit, inexpensive Cloud service can co-exist with and extend the life of on-premise solutions.

We believe that a move to the Cloud should be a smart choice, not a brave one and we are here to help. We have invited one of our Cloud partners, Content & Code, to cover the much anticipated release of Microsoft Office365 and our Cloud platform partner, Cobweb, to give an overview of what we believe is the best Cloud Computing Platform available today. However, if you would like to talk to us about how we can help your organisation take advantage of the Cloud, please get in touch with the team at [email protected]

Page 24: Bytes Magazine_Summer Autumn2011

Cloud Power? More like Cloud ValueWhere can solutions like Offi ce 365 make a difference to what your organisation wants to achieve?

Cloud Computing – a phenomenon that is driving monumental change in the way organisations run their IT operations. Pick up a recent copy of the Financial Times, Business Week, Bloomberg or the Observer, and you will undoubtedly come across an article about how ‘the Cloud’ will revolutionise the we way we work. Gartner predicts as early as 2012, 20% of businesses will own no IT assets, while IDC expects the global market for Cloud services to be worth $55b by 2014, an average yearly growth of 27% compared to 5% growth for traditional IT products, and have even stated that “selecting the right [Cloud] platform leader will be one of the most strategic decisions you’ll make for the next 20 years.”

Microsoft is amongst the leaders in the fi eld and is investing a great deal in it. Their recently launched Cloud Power campaign is hard to miss, with TV adverts running regularly and large print and outdoor ads displayed all over the country. It is based on the notion that Cloud can fundamentally change the way people do business and introduces Microsoft’s Cloud portfolio, which includes the soon-to-be-released Offi ce 365. The Suite offers Microsoft’s core business solutions delivered as a service, and consists of Exchange Online (email);

SharePoint Online (collaboration and document management); Lync Online (secure instant messaging, presence, video conferencing and document collaboration); and Offi ce Professional Plus & Web Apps (the ‘full fat’ locally-installed Offi ce client and Offi ce applications delivered through a browser).

Offi ce 365 will undoubtedly create a huge surge in organisations experimenting with the Cloud (the private beta was oversubscribed by about 30,000 organisations alone), particularly as many organisations are now reaching the crucial ‘refresh cycle’ in their IT estate. The pressure for organisations to at least consider a move to the Cloud is building rapidly. A senior IT professional in a large fi nancial institution recently told me that internally they recently had to build a business case for the senior level of their business that justifi ed why they would not be looking at Offi ce 365. So what’s all this hype about? And more importantly, how exactly will moving to the Cloud add value to your organisation?

Cloud computing will enable businesses to communicate and process information in a virtual world without physical interaction with a server. Benefi ts include: increased energy effi ciency, by outsourcing the hard drive functions on individual machines to giant, centrally-located server farms; reduced CAPEX expenditure on hardware and software; pay-as-you-go pricing options which give you predictability and fl exibility for all or part of your organisation; and little or no upfront costs, as consumption is billed as a utility or subscription. Productivity gains are also realised with greater fl exibility and availability of shared information, enabling increased collaboration from anywhere in the world; and immediate access to a broad range of applications.

Moreover, Cloud Computing offers the power of choice. Content and Code is experiencing a heavy demand from companies that need to operate programs which cannot be taken into the Cloud and therefore require their IT providers to offer a ‘hybrid’ solution which incorporates all the benefi ts of both on premise and Cloud Computing. We can now offer

them that fl exibility. Through our Cloud engagement process, which begins with a three day Discovery Workshop, we are able to clarify our clients’ business objectives, existing IT environment, skills, licensing and capability and in turn recommend whether Offi ce 365 or a mix Offi ce 365/on-premise IT (commonly called a ‘hybrid’ model) is most appropriate.

Before embarking on a Cloud project, these are the top fi ve steps I would recommend considering:

1) Clearly defi ned business goals. This is a critical factor in ensuring measurable benefi ts are derived out of a Cloud (or indeed any) IT solution.

2) Identify your legal and security information requirements. A move to the Cloud may involve changes to where your data is stored and its security. Being aware of these requirements will allow a vendor/partner to identify whether a Cloud service is suitable.

3) Understand your existing environment and current capabilities. There are infrastructure requirements/dependencies with certain Cloud services, such as bandwidth. Ensure you ask a Cloud vendor/partner for the infrastructure/IT dependencies of their Cloud service.

4) Ensure your project team has a senior sponsor. Cloud is a prominent topic in boardroom conversations these days, so ensure that you have a sponsor who can represent the project team at this level and drive the project if it encounters organisational hurdles.

5) Engage experience. Look to a Cloud partner who has experience in delivering Cloud services and works closely with the Cloud service provider directly. Use their experience to identify common project stumbling blocks and critical success factors.

To fi nd out more about beginning your Offi ce365 journey, please contact the Cloud Team at Bytes Software Services

Lewis IsaacsMicrosoft Online Services Business Manager, Content & Code

cont...from page 23

24 | summer/autumn 2011

Page 25: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 25

We considered a number of global

leading hosted email brands,

including Cobweb’s Hosted

Exchange. Ultimately it was our

feeling that Cobweb was the

preferred provider who could deliver

against our technical requirements.

Martyn EddinsIT Services Manager atMitchells & Butlers

The Cobweb approach has allowed us to deliver a cost-effective, yet tailored email service to all outlets without any large upfront expenditure.

with a number of highly accredited Service Providers who are delivering Cloud solutions to our Enterprise, Mid Market and SMB customers. No matter what stage of the journey you are at, the Bytes Cloud Services team can help you get the right result. Simply speak to your account manager or email us at [email protected]

we work...

Easy Cloud Adoption powered by CobwebCobweb has been delivering software from the Cloud since the late nineties and remains the largest Cloud provider in Europe of Microsoft collaboration software in Microsoft Exchange including CDI, BlackBerry Enterprise Server, SharePoint, Offi ce Communication Server, Email Archival and Dynamics CRM. This is combined with the provision of scalable and secure infrastructure and data management services from the Cobweb Cloud, which support business critical applications in a pay-as-you-go utility model. The service is underpinned with our unique hybrid Cloud layer for management, provisioning, transparent billing and our comprehensive professional services capability.

Cobweb’s Cloud Services have proven to help customers reduce the cost and complexity of delivering software and infrastructure and is accelerating the adoption of a service based IT model.

Key benefi ts of Cobweb Cloud Computing

• Eliminate High Capital Expenditure and move to a fi xed per-user-per-month cost model

• Considerably reduce the risks associated with upgrading existing legacy software

• Enhance the user experience, mobility and move towards unifi ed communications

• 24/7 x 365 Support with Guaranteed SLAs for enhanced business continuity

• ISO Certifi ed Data Security & Compliance

Initial requirements range from the need to reduce and maintain hardware at predictable costs, to wanting to improve service performance and communication platforms across the business.

Cobweb Cloud computing gives businesses the ability to centrally manage data, rapidly create and deploy new capabilities, whilst only ever paying for the services used. Messaging, collaboration and hosting are common entry points for businesses looking to transition to Software-as-a-Service (SaaS) model.

ROI can be proved with these ‘mature’ hosted services, the use of Cloud computing for ‘Infrastructure-as-a-Service’ (IaaS) for both customer facing services and internal systems simply becomes the logical next phase.

The Cobweb Cloud Computing Platform

Page 26: Bytes Magazine_Summer Autumn2011

security

Q: What are the advantages of Social Networking especially from the enterprise point of view?

A: When many people hear the term Web 2.0 they think it’s only about social networking, sharing personal updates on Twitter, or watching funny videos on YouTube. The reality is that many businesses have already discovered valuable uses for Web 2.0. Businesses that are still trying to block employee access to Web 2.0 sites are missing opportunities. However, they need to have the right security policies and technologies in place in order to allow safe use of Web 2.0. Web 2.0 can help improve collaboration and information exchange among employees. It can streamline communication and processes, provide market insights, allow businesses to interact directly with customers and key stakeholders, and can even be used for new ways to generate revenue.

Use of Web 2.0, like social networking and Twitter is ubiquitous among consumers, but more and more businesses are now taking advantage of Web 2.0 sites in new ways to interact with their

customers and partners. In fact, a survey conducted by Websense reveals that the 1300 IT managers in large companies around the world found that 95% of businesses already allow access to some types of Web 2.0 in the workplace and 30% report feeling pressure from C-level executives to allow more access to Web 2.0 sites.

Despite these risks, IT professionals can no longer simply block access to Web 2.0 since 62% of IT managers feel that Web 2.0 is necessary to their business, according to a Web2.0@work survey conducted by Websense, Inc.

Q: How can companies leverage Web 2.0 networking tools?

A: Ways that businesses benefit from Web 2.0 include:

• Improved collaboration and information exchange among employees

• Streamlined communication and processes

• Gain market insights and research by having a window into customers’ conversations

• Interact directly with customers and key stakeholders, and get involved in their conversations

• New ways to reach consumers to sell products and services, and generate revenue.

Q: Can Web 2.0 help businesses?

A: Yes, it helps. Below are just two examples of how businesses have successfully used Web 2.0. These show the benefits of Web 2.0 and prove that businesses can no longer simply say “No” to Web 2.0:

• Dell says Twitter has produced $1 million in revenue over the past year and a half through sale alerts. People who sign up to follow Dell on Twitter receive messages when discounted products are available at the company’s Home Outlet Store. They can click over to purchase the product or forward the information to others.

• Kimberly-Clark Corp. has an online community for users and potential users of its Scott personal care products. In 2008, the consumer products company began taking steps to analyse the data compiled by the Web 2.0 application. Kimberly-Clark now links data compiled on its community site with customer profile information, helping it identify its most loyal customers and market products to specific segments (such as parents whose children are ready to move from Huggies nappies to Pull-Ups).

Social Networking for business

Q&ABytes Security specialist Alison Sears speaks to the team at Websense to get answers to some key questions around business and Social Networking.

Alison Sears Business Development Manger – Security

26 | summer/autumn 2011

Page 27: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 27

Q: What kind of security measures should be adopted to securely use social networking sites for business?

A: IT managers can no longer simply say “No” and block Web 2.0. However, they need the right policies and security solutions in order to safely say “Yes.” Businesses need a secure Web gateway and data loss prevention (DLP) technology. They need real-time analysis and categorisation of specifi c Web content on a page so that they can block just the malicious or inappropriate content, not the entire page or site. They need the ability to detect dynamic threats “on the fl y” because Web 2.0 sites change constantly and can be compromised at any moment. Finally, they also need data loss prevention technology to prevent their intellectual property and confi dential data from being accidentally or intentionally shared on a Web 2.0 site or used in ways that it should not.

The right security solutions can allow IT to enable employee use of Web 2.0 without worry. The Websense Web Security Gateway provides real-time analysis and categorisation of specifi c Web content on a page which allows businesses to block just the inappropriate or malicious content, not the entire page or Web site. Only Websense, with the ThreatSeeker Network and the technology acquired from Defensio provides a Web 2.0 early threat outbreak detection and protection system by analysing content posted to Web 2.0, social networking and blogger networks as it’s posted that gives Websense customers protection from risks before they propagate.

Q: What are the disadvantages?

A: IT professionals appear overconfi dent in their security – There exists a dangerous security gap when it comes to Web 2.0 threats. They need to understand the unique risks associated with Web 2.0 and how to protect their networks and essential information

Businesses must balance the benefi ts of Web 2.0 with the potential information security risks. Because sites like wikis, blogs, mashups and social networking sites allow user-generated content, anybody can easily embed data-stealing spyware or post spam comments and links to malicious sites or inappropriate content.

Q: There is a perception that employees spend most of their time socialising rather than focusing on work. How can companies stop that while not putting a ban on social networking sites as such?

A: Social media has both positive and potentially negative aspects for enterprises. A survey conducted by The Social Development

Foundation of the Associated Chambers of Commerce and Industry (Assocham) say that employees at workplace spent on average an hour a day on sites like Orkut, Facebook, Myspace and Linkedin, leading to a loss in productivity of nearly 12.5%.

Productivity is only one issue affecting a company and yet this is often being allowed to overshadow other concerns such as having the right security. While it is important to have good productivity – blocking web 2.0 is not the answer. Companies need to stay competitive and attract the best employees and use the right tools for the job. With the right security and policy settings you can not only keep your company and its essential information safe, but you can empower your employees to use web 2.0 tools at the right times and for the right purposes. For example the marketing department may need to use facebook or twitter to promote the company and so have full access, while another department could be granted access to facebook for personal use during the lunch hour. This can all be managed easily with real-time security and a realistic internet access policy. The result is that employees are happy and productive, they can all do their jobs and more importantly the company is safe.

Q: What are the challenges for companies adopting social networking platforms?

A: Though many organisations already allow access to some types of Web 2.0, a dangerous security gap exists. The majority of respondents reported feeling confi dent in their organisation’s Web security, though they admit to not having the necessary security solutions to protect from all threat vectors. Additionally, a surprising number of respondents appear to be confused on what exactly constitutes Web 2.0 – and what they don’t know could put their organisations at risk. The Websense Web2.0@work survey revealed the following:

• 80% of respondents reported feeling confi dent in their organisation’s Web security, despite the fact that the numbers show they are ill-equipped to protect from Web 2.0 security threats:

- 68% do not have real-time analysis of Web content - 59% cannot prevent URL re-directs. - 53% do not have security solutions that stop spyware from

sending information to bots. - 52% do not have solutions to detect embedded malicious

code on trusted Web sites. - 45% do not have data loss prevention technology to prevent

company confi dential information from being uploaded to sites like blogs and wikis, hosted on unauthorised cloud computing sites, or leaked through spyware and phishing attacks.

• There is even confusion among IT professionals about what constitutes Web 2.0: Only 17% of respondents correctly identifi ed all the items in the survey that can be considered Web 2.0.

• Only half correctly identifi ed wikis, video uploading sites like YouTube and hosted software/cloud computing sites like GoogleDocs to be Web 2.0.

• 47% of respondents report that users in their organisation try to bypass their Web security policies.

on this article or Websense, please contact your Bytes account manager or Alison Sears on 020 8786 1500.

further info...

organisation’s Web security, despite the fact that the numbers organisation’s Web security, despite the fact that the numbers show they are ill-equipped to protect from Web 2.0 security

Page 28: Bytes Magazine_Summer Autumn2011
Page 29: Bytes Magazine_Summer Autumn2011

We’ve listed a small selection of some of the events being run by our manufacturers in the next few months. These events offer a perfect opportunity to meet the experts and also to network and swap ideas with peers. If you would like details of any other manufacturer events not listed here, please speak to your Bytes account manager who will be happy to assist you.

On Demand eSeminars A good range of ‘how to’ presentations from Adobe, giving a broad overview of Adobe products and how to get the best out of them. www.adobe.com/uk/events/presentations.html#1

Citrix Synergy 2011 – October 26th-28th 2011, Barcelona Citrix Synergy 2011 covers the full scope of virtual computing, from desktops to datacenters, and offers the inspiration, learning and relationship building you need to leverage its full potential. To register visit:www.citrixsynergy.com/barcelona/venue/register.html

Cloud Circle Forum: 7th July, 15th September & 24th November at Victoria Park Plaza, London The Cloud Circle is the UK’s fi rst independent Business and IT focused Cloud Computing Community. The Cloud Circle was founded to provide a free, dedicated on and offl ine information and networking resource for the drivers of and implementers of Cloud Computing. To register for either of these events and for more information on the Cloud Circle visit: www.thecloudcircle.com/user/register

IT Directors Forum: 12th – 15th October aboard Aurora, SouthamptonMimecast will be present aboard The IT Directors’ Autumn Forum this year. This is a senior level event specifi cally designed to address the increasing needs and demands of senior IT decision makers. The event helps shape delegates upcoming strategies by offering a blend of highly interactive fi rst class conference sessions, senior level face-to-face meetings with innovative solution providers and extensive networking opportunities with other delegates both formally and informally. For more information: www.itdf.com/Home.html

IP Expo: 19th – 20th October, Earls Court 2, LondonIP Expo is the biggest end-to-end IT infrastructure event in the UK. It receives visitors from both the private and public sectors and due to the quality of the keynote speakers and exhibitors, it’s of particular interest to those at board level, and those involved in IT strategy, management, implementation and infrastructure.To Register: www.ipexpo.co.uk/register

Acronis Weekly WebinarsAcronis runs regular weekly webinars on a range of topics. To view the schedule and register for events, visit:www.acronis.co.uk/pr/

For the comprehensive catalogue sorted by topic visit: www-950.ibm.com/events/

manufacturersmeet the

Citrix Synergy 2011 – October 26th-28th 2011, Barcelona Citrix Synergy 2011 covers the full scope of virtual computing, from desktops to datacenters, and offers the inspiration, learning and relationship building you need to leverage its full potential. To register visit:www.citrixsynergy.com/barcelona/venue/register.html

designed to address the increasing needs and demands of senior IT decision makers. The event helps shape delegates upcoming strategies by offering a blend of highly interactive fi rst class conference sessions, senior level face-to-face meetings with innovative solution providers and extensive networking opportunities with other delegates both formally and informally. For more information: www.itdf.com/Home.html

IP Expo: 19th – 20th October, Earls Court 2, LondonIP Expo is the biggest end-to-end IT infrastructure event in the UK. It receives visitors from both the private and public sectors and due to the quality of the keynote speakers and exhibitors, it’s of particular interest to those at board level, and those involved in IT strategy, management, implementation and infrastructure.To Register: www.ipexpo.co.uk/register

For the comprehensive catalogue sorted by topic visit: www-950.ibm.com/events/

LANDesk Mobility Management Seminar: 7th July 2011, Cabinet War Rooms, LondonDiscussion on best practices and practical ways to discover and manage all of your devices. For more info/registration - www.landesk.emeamarketing.net/lp/mobility_seminar/

VMware Forum 2011 – Edinburgh, Manchester, Dublin & London – May-June 2011The Forums are VMware’s fl agship end user events for virtualisation and cloud computing in the UK and Ireland. Designed both for current VMware customers and organisations starting their VMware virtualisation and cloud computing journey, these events offer delegates valuable insight into building and extending their virtualisation and cloud deployments. Hear how Trend Micro and VMware are partnering to revolutionise virtualised security: www.vmware.com/events

Vision: 4th - 6th October 2011- BarcelonaLearn best practices and network with peers amongst over 150 technical experts from Symantec, their partners and customers offering 120 technical breakout sessions and nearly 50 technical hands-on labs to deep dive into solution roadmaps, strategic product development insights, and to preview the latest IT solutions.To fi nd out more visit: www.symantec.com/vision

IA11: Protecting the UK in Cyberspace – 28th – 29th June 2011 Park Plaza, LondonIA11 is the Government’s leadership event for Cyber Security and Information Assurance. This is your chance to review the emerging threats and take stock of your responsibilities. Also, to engage in debate and share experiences with senior colleagues from across government, industry and academia. To register go to www.cesg.gov.uk/events

BYTES 020 8786 1500 | 29

Page 30: Bytes Magazine_Summer Autumn2011

security

While commercial pressures to move IT

resources to the Cloud mount, security

still remains the number one stumbling

block in the adoption of cloud services

by corporates, particularly in the area of

public cloud infrastructure.

According to research last year by

IDG Research Services, while nearly

half of large companies had enterprise

applications or business processes

running in the Cloud or planned to begin

migration in the next year, two thirds

did not have a Cloud security strategy.

Companies appear to be putting their

head in the sand when it comes to data

governance in the Cloud – with research

from Gartner indicating that 40% of

virtualisation projects take place without

the involvement of the security team.

With targeted attacks by cybercriminals

on Cloud providers on the rise, the

industry has been making moves to

address Cloud security provision,

including the forming of the Cloud

Security Alliance and the signing of the

Cloud Security Manifesto. Standards are

being agreed and guidelines drawn up,

and corporates are increasingly looking

for greater disclosure from their Cloud

partners.

But could it be that traditional attempts

to secure Cloud computing have been

focused on the wrong area? By throwing

all the responsibility on Cloud security

vendors, the issues don’t actually go

away – they just become someone

else’s issues. The real problem for

corporates looking to benefi t from the

Cloud is around data governance – it’s

the corporate’s responsibility to look after

their own data and it’s ultimately their

problem if sensitive data gets into the

public domain.

It’s an issue that has been and will

continue to be highlighted time and

again, as sensitive data falls into the

wrong hands. If you don’t know what

security measures have been put in

place by your Cloud hosting partner then

it’s impossible to say this will not happen.

Corporates have attempted to protect

themselves by mandating standards, and

conducting audits, but while there are

people involved in the process, there’s

always the danger that data could be

leaked form the inside.

The obvious answer is to encrypt all the

data that a corporate hands over for

hosting to a Cloud service provider. The

challenge then becomes about access

securesecuresecuresecureCloud security remains a headline issue for corporate IT departments, but have traditional vendors been taking the wrong approach? Trend Micro’s Andy Dancer says the real issue is around data governance.

Andy DancerChief Technical Offi cer, EMEA, Trend Microkeeping it

30 | summer/autumn 2011

Page 31: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 31

During the last 30 years, dramatic advances in technology - the development of the minicomputer, the rise of the personal computer, and the emergence of the Internet - have revolutionised the way information is created, stored, shared and used.

management, authenticating the identity

and integrity of Cloud servers as they

attempt to get at the data.

What’s the problem?

When resources move to the Cloud, the

traditional segmentation that exists within

a corporate environment disappears as

services are grouped together in order

to gain the effi ciencies from sharing

hardware resources. Highly sensitive

data that would have been locked away

in a secure environment now sits on

the same box as less sensitive data

that might only have been password

protected.

This new mishmash of services

introduces new risks to the corporate.

Firstly, the Chinese walls that

previously existed between different

departments like fi nance, personnel

and marketing have disappeared, and

these are essential for governance

and compliance. The separation of

duties that had been tied down and is

mandated in standards like the PCI Data

Security Standards and Sarbanes-Oxley

is all thrown up into the air again in the

Cloud.

Secondly, previously external facing

systems are now linked up to systems

which would normally be internal. This

means your corporate website is now

running alongside your payroll system

on effectively the same physical server

- you’d never have done that historically

but in the new world you do. And looking

a little wider, where different companies

are sharing Cloud infrastructure, data

from one company is sitting alongside

data from another.

Finally, taking this into the public Cloud

space, with a consumer service like

Amazon EC2, the implications of pooling

all this data are huge. In a sense,

you are putting it all on a plate for the

cybercriminals, because once they

are inside this environment, they have

access to all the data, untraceable to the

source. And they don’t have to break

through the fi rewall, they can just sign up

and become a customer and attack it

from the inside.

Encrypting sensitive data not only

protects it from other customers but

also from rogue administrators trying to

access it from within the Cloud service

provider. But the actual encryption is not

the problem - standard AES Encryption

is a mature technology that’s been

deployed successfully for many years.

What you fi nd is that as soon as you

solve the data encryption challenge, you

come onto another challenge around

access management.

Who goes there?

The challenge of authenticating servers

is one that Trend Micro has been looking

at for a number of years now. There’s no

out-of-the-box answer because it’s not

straightforward like user authentication.

If you think about encryption for a laptop,

as someone turns the laptop on, you

would ask them to enter a pass phrase

and that would unlock the disk and allow

the operating system to boot up.

The trouble in the Cloud computing

world is everything’s much more

dynamic. Overnight you’ve only got one

web server, then in the morning when

people start coming in, you want to spin

up another three or four to deal with the

load. User intervention is also a problem.

When a user is on their laptop. they’ve

got an interface, and you can collect

data from them. But when a machine’s

spinning up out of a Cloud in the data

centre or in the public Cloud, there isn’t a

natural thing to get hold of.

So what you need is a system that

checks for two things – identity and

integrity. First of all, is this really your

machine, rather than someone else

pretending to be your machine?

Secondly, you need to know about the

integrity of the system - is there a fi rewall

in place, are the anti-virus signatures up

to date, when did you last check that

there wasn’t a piece of data-stealing

malware on the machine that is going to

steal the data as soon as you unlock it.

If you check those two items before you

release the keys to the box, then you can

be pretty sure that you’re protecting the

data. Introducing a key server brings the

added advantage of achieving separation

of duties. Either the Cloud service

provider is looking after your servers and

the security vendor is looking after your

key, or you bring the keys back in house

leaving only encrypted data in the hands

of your outsourcer.

So whose responsibility it is to secure

data in the Cloud? Ultimately, the

corporates will pay for it because it’s

their data that needs to be protected

and their responsibility. But there are a

lot of smaller businesses looking for the

benefi ts of Cloud deployment, and they’ll

just look to the service providers, who in

turn can offer it as a value-added service.

The service providers really like the

concept too because if a piece of

sensitive data ends up in the public

domain, they don’t want it coming back

to them, with a company claiming they

must have leaked it. The provider can

say that even if they had leaked the data,

there’s no way it could have come from

them because it’s encrypted and they

don’t have access to the encryption

keys.

Page 32: Bytes Magazine_Summer Autumn2011

case study

caseGlobal management,

engineering and development

consultancy, Mott Macdonald,

engaged Bytes Software

Services to get back on track

to save 750 staff hours per

year, improve security and

proactively manage their

software compliance.

studyAbout Mott MacDonald:Mott MacDonald’s uniquely diverse £1 billion global consultancy works across 12 core business areas. As oneof the world’s largest employee owned companies with over 14,000 staff, they have principal offi ces in nearly 50 countries and projects in 140. Their breadth of skills, services and global reach across all markets makes them uniquely placed to bring their customers:

• Holistic, innovative thinking• Global experience with local insight• World-expert practitioners• Multi-sector perspective

They use their experience and resources to help deliverprojects on any scale, to shape and implement development policies and programmes, as well as advance sustainability.

Manchester Civil Justice Centre The elegant court complex is an exemplar of an innovative and well-executed sustainable design. It is now offi cially our most-prolifi c award winner having scooped over 25 awards.

32 | summer/autumn 2011

Page 33: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 33

The Challenge:With over 14,000 employees spread over a global network covering 50 offices and projects in 140 countries, Mott MacDonald recognised the need for an effective Software Asset Management solution to enable them to keep control over their rapidly changing software portfolio.

Their current processes and technologies to manage their global software deployment were not providing them with the visibility and control they wanted and they soon recognised that this was exposing them to compliance issues and inefficient software deployment and removal.

Investment in an Altiris 6.5 system provided a partial solution towards achieving the levels of control they demanded. Configuration and maintenance issues were hampering the effectiveness of the investment and causing business interruption problems.

The Bytes Solution:Following a successful tender process, Mott MacDonald engaged Bytes Software Services to provide a SAM solution that would maximise their investment in Altiris 6.5 and enable them to reach the levels of control over their software estate that they needed.

The first step was to carry out an ‘Envisioning Workshop’ to provide a complete understanding of the SAM processes and technologies in place and agree an improvement plan for the business. The next step was to complete a full software and hardwareaudit and a review of all existing software policies, technologies and procedures. This information allowed us to assess the scope of the task and help prepare, prioritise and implement the right solution.

Bytes then initialised the ‘Altiris Improvement Project’ building a solution around the current Altiris 6.5 investment with a view to upgrading to an Altiris 7 system in the future. We redesigned and reconfigured a global solution to provide Mott MacDonald with a robust software management system that they could trust and control.

The BenefitsThe enhancements and reconfiguration of the existing Altiris 6.5 system significantly improved all aspects of Mott MacDonald’s global software management. The benefits delivered range from the significantand measurable time/money savings achieved from the faster system start-up times of the 14000 globalworkforce, to improved security from an improved patch management process. The efficient managementof patch deployment and smooth application package delivery also provided a significant reduction intechnical support issues to their newly created global service desk. On a global scale the time and cost savings for this element alone represented a huge return on their Software Asset Management investment.

Bytes Managed ServiceFollowing the successful implementation of the reconfigured Altiris 6.5 system, Bytes Software Services have been retained by Mott MacDonald to provide a full and ongoing Managed Service. This Bytes service ensures the SAM system is maintained and developed to continue to provide complete control, visibility and compliance over all aspects of the Mott MacDonald global software estate.

Bytes & Symantec (Altiris) Bytes are a Symantec Platinum Partner and it’s this strategic relationship with them and ourknowledge of the Altiris SAM solution that put us in a strong position to design an effective, secure and adaptable proposition to Mott MacDonald utilising their investment in Altiris 6.5.

Given Bytes’ expertise and experience in working with Symantec products and especially the Altiris suite on a global scale, Bytes were able to design, configure and successfully implement a robust solution that now meets all of Mott MacDonald’s infrastructure management requirements. Bytes’ technical expertise is coupled with robust project management to ensure successful delivery within very tight timescales and within a fixed budget.

Ryan HardcastleGlobal Asset Manager

Company: Mott MacDonaldIndustry: EngineeringCountry: 140 countriesRevenues: £1bn +Employees: 14,000

Bytes Solutions Provided:• Symantec Altiris 6.5• Symantec Service Desk 7• Bytes Software Asset Management• Bytes Managed Service

Key Benefits:• Significantly quicker PC start up times for over

14,000 employees• Improved patch management process which has

reduced security risks within the business and individual clients

• Software deployment, removal and upgrading in less than 2 hours

• Time savings now used to add value to the business

• Accurate inventories• Software compliance• Smooth operation of a Global Service Desk• Delegation of daily IT operations to regional teams• Significant cost savings moving forward as Mott

MacDonald are now in a position to re-distribute existing under-utilised software licenses

customer profile

Page 34: Bytes Magazine_Summer Autumn2011
Page 35: Bytes Magazine_Summer Autumn2011
Page 36: Bytes Magazine_Summer Autumn2011

licensing

Adam ThortonBytes Mid-Market Sales Manager

Navigatingfrom OCS to Microsoft Lync 2010

Following a very successful Bytes event

recently at the Polycom Executive Briefi ng

Centre (EBC) in London, I thought I

would put together a quick article simply

outlining the change from Microsoft OCS

to Lync 2010. In short, Microsoft® Lync™

Server 2010 is the next generation of

Microsoft® Offi ce Communications

Server 2007 R2.

36 | summer/autumn 2011

Page 37: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 37

The main benefi ts include:

• A single interface that unites voice communications, presence and instant messaging, and audio/video/web conferencing into a solution that can enhance and replace existing systems.

• A familiar user experience accessible through Microsoft® Offi ce, Microsoft SharePoint®, and Microsoft Exchange.

• A single identity that connects users to contacts inside and outside of the organisation.

• A consistent experience across PC, phone, web, or mobile that gives users the option to connect from many devices.

• Exceptional security and reliability that works with Active Directory® and Microsoft® Forefront®.

• Interoperability with existing systems for smoother deployment and migration.

• A rich platform for development, bringing unifi ed communications into custom solutions ranging from business workfl ows to line-of-business applications.

So what has changed and how is it now licensed?

New Branding (Fig. 1)The branding has changed from Offi ce Communications Server 2007 R2 to Lync 2010 with the following 3 components; Lync 2010 for client, and Lync Server 2010 Standard Edition or Enterprise Edition.

New License Types (Fig. 2)Lync Server 2010 on-premise is licensed in the Server / Client Access License (CAL) model. There are three types of licenses: (1) server licenses, (2) client access licenses and (3) external connector licenses.

Server LicensesA license must be assigned for each instance of the server software that is being used. Lync Server 2010 is sold in two editions:

• Lync Server 2010 Standard Edition.• Lync Server 2010 Enterprise Edition.

Client Access Licenses (CALs) To access Lync Server 2010 a Client Access License (CAL) is required. A CAL is not a software product; it is a license that gives a user the right to access the services of the server. There are three CALs for Lync 2010:

• Lync Server 2010 Standard CAL.• Lync Server 2010 Enterprise CAL.• Lync Server 2010 Plus CAL.

Enterprise CALs and Plus CALs are additive - they are sold as a supplement to the Standard CAL. This means that to enable Standard CAL features for a user, the user must be licensed with just the Standard CAL. To use either the

Enterprise CAL or the Plus CAL features, the user must be licensed with one Standard CAL and either one Enterprise CAL or one Plus CAL respectively and each CAL works with either the Standard Edition or Enterprise Edition of the Server.

External Connector LicensesAs with other Microsoft products licensed with CALs, External Connectors are also available. An External Connector licenses an unlimited number of clients to access

cont...

Server/Client Access License (CAL) Model

Fig. 1

Fig. 2

Fig. 3

Page 38: Bytes Magazine_Summer Autumn2011

automatically gain the license entitlement to these products (Fig. 4). After 1st August, there will be a pricing impact for renewals of c.+10% dependent on whether you have Core CAL &/or Pro Desktop. New Core CAL Agreement customers can benefi t from existing pricing if purchased or renewed prior to 1st August 2011.

Existing Core CAL customers reviewing ECAL suite should work with their Bytes Account Manager and Microsoft business manager to discuss purchasing before the changes on 1st August 2011.

Lync 2010 and the Microsoft Enterprise CAL AgreementOverall the cost for the step-up from Core CAL to Enterprise CAL will reduce by c.9% as Lync Server Standard CAL and Forefront Enterprise Protection (FEP) move from ECAL to Core CAL. There is also one other major aspect to be aware of regarding the eligibility of Plus CAL (Enterprise Voice). If your ECAL Agreement was signed BEFORE 1st October 2010 you WILL receive Plus CAL, however, if your agreement was signed AFTER 1st October 2010 you will need to purchase Plus CAL separately.

PricingThe pricing will vary depending on your current Microsoft agreement. Instead of printing prices that may be mis-leading we would prefer to give you a tailored quote based on your specifi c requirements. Please give us a call and we will be happy to help.

a server product on a single physical server. The clients licensed by an External Connector may not be employees of the organisation that owns the server and onsite contractors are considered employees. An External Connector license is for a specifi c server: if an organisation makes a server product available to external clients on multiple servers (such as multiple servers in a Web farm), each server requires its own External Connector license.

External Connectors are valuable for licensing products that serve an organisation’s customers or business partners, where it’s not practical for the organisation to purchase a CAL for every authorised user or device. For example, an organisation might use a Windows Server External Connector to license suppliers accessing the company’s extranet site.

Fig. 3 shows the components of the previous OCS CALs and how this has changed with Lync 2010 with the Enterprise CAL now split into Conferencing and Voice with enhanced feature sets.

As a result of this change, the Lync Server 2010 Plus CAL and its associated features will not be included with the Enterprise CAL (ECAL) Suite. Some voice-specifi c features previously offered with the Offi ce Communications Server (OCS) 2007 R2 Enterprise CAL will be discontinued and only offered in the new Lync Server 2010 Plus CAL.

It is worth noting that the overall cost for both Enterprise CAL and Plus CAL in Lync 2010 has not generally increased from the Enterprise CAL in OCS 2007 R2. Having two options simply allows fl exibility and a lower cost if only one is required.

Lync 2010 and the Microsoft Core CAL AgreementLync Server Standard CAL and Forefront Enterprise Protection (FEP) will be part of the Microsoft Core CAL Agreement from 1st August 2011. Existing customers will

cont...from page 37

we have the largest dedicated Software Licensing Team in the UK. For further information on how best to license and purchase Microsoft Lync 2010, please contact your account manager or call 020 8786 1500.

at Bytes...

Fig. 4

38 | summer/autumn 2011

Page 39: Bytes Magazine_Summer Autumn2011

Simple tools for managing complexity Create rich dashboards of information from across the organisation with Microsoft Visio 2010. It’s straightforward to produce and share simple representations from a variety of data resources so that complex decisions are easier to make.

With all the features you need to make complex data simpler. Microsoft Visio 2010 provides a wealth of features designed to simplify complexity:

• Connect with data sources to make diagrams dynamic and data-driven• Simplify complex diagrams to add clarity and ensure consistency across the

organisation• Logical groupings of features in the Ribbon to fi nd and access the tools you

need quickly• Quickly create professional and appealing diagrams with the rich gallery of

themes, Live Preview and a range of formatting tools• Create, monitor and model workfl ows with advanced templates that contain

SharePoint rules and logic• Pre-drawn, modern and intelligent templates, alongside automatic features

such as alignment and auto-size tools, help draw diagrams faster• Publish and share rich visual dashboards containing interactive Visio diagrams

and other application services.

Use your most current data to make informed decisions quickly by choosing Microsoft Visio 2010.

Keeping on top of what’s happening in your organisation can sometimes be a complex process. And with additional data being created all the time, a new approach to making sense of information is more critical than ever.

Complex data simplifi ed

If you would like further information about Microsoft Visio or to download a free trial, please speak to your Bytes account manager on 020 8786 1500

with Microsoft Visio 2010

BYTES 020 8786 1500 | 39

Page 40: Bytes Magazine_Summer Autumn2011

partners

Bytes has been active in the Partnering space for many years. In 1997 we commissioned a dedicated team to drive sales of licensing and software services into a channel of Partners, effectively to become a seconded software services arm to their businesses.

14 years on our Partner Team goes from strength to strength, our singular focus on software services makes us an ideal Partner without any fear of competing on other products and propositions. Consequently FY10/11 has been a record year for this part of our business!

In 2008 we evolved our Partner strategy to incorporate a new side to what we now describe as our Partner Eco-System. This new business sought to establish a group of Partner System Integrators (SI) whom we deemed to have a similar outlook and approach to quality and customer services. The purpose of this group was to enable us to offer our clients the highest calibre of capability in the deployment of the technologies made available through their licensing agreements, with the peace of mind that comes with a framework of established and trusted Partners.

Today with a plethora of successful deployments and even more satisfi ed Customers under our belts, Bytes is building a strong reputation as an organisation that can not only bring sense, clarity and cost control to software licensing but also excellence in the delivery of solutions that will drive true benefi t to Customers.

We’ve worked hard to fi nd great Partners at the top of their game! We regularly liaise with Vendors and Customers alike, seeking recommendations for Partners who are time and time again delivering great work and also, critically, have an appreciation for the value that can come from balanced, effective partnerships. Ongoing, we have regular meetings with Partners to discuss current projects, and upcoming work to ensure the general rhythm of the relationship is maintained and that our clients experience is cohesive and seamless. We regularly collaborate on events to ensure that we continue to keep our collective Customers in the know and able to leverage new technologies and opportunities. If you haven’t already attended one of these events we’d highly recommend you do!

If you’d like to know more about how our Partner Eco-System can help you unlock the true value in your licensing agreements, please read some of the pieces in this magazine written by our Partners or ask your Account Manager for more information about the spectrum of technologies that we can deliver and the Partners we engage with.

BytesWe were introduced

to Eurodata by our

Account Manager Nick

Ward at Bytes via their

Partner Eco-System. We

found the experience of

working with a company

like Eurodata in tandem

with our licensing

supplier through a

trusted framework like

their Eco-System to be

a very valuable one and

something that we’ll

defi nitely look to again in

the future when the need

arises.

partneringpartneringpartneringpartneringpartneringpartneringpartneringpartneringBytes has been active in the Partnering space for many years. In 1997 we partneringBytes has been active in the Partnering space for many years. In 1997 we Bytes has been active in the Partnering space for many years. In 1997 we partneringBytes has been active in the Partnering space for many years. In 1997 we commissioned a dedicated team to drive sales of licensing and software services partneringcommissioned a dedicated team to drive sales of licensing and software services commissioned a dedicated team to drive sales of licensing and software services partneringcommissioned a dedicated team to drive sales of licensing and software services into a channel of Partners, effectively to become a seconded software services partneringinto a channel of Partners, effectively to become a seconded software services into a channel of Partners, effectively to become a seconded software services partneringinto a channel of Partners, effectively to become a seconded software services arm to their businesses.partneringarm to their businesses.

14 years on our Partner Team goes from strength to strength, our singular focus partnering14 years on our Partner Team goes from strength to strength, our singular focus 14 years on our Partner Team goes from strength to strength, our singular focus partnering14 years on our Partner Team goes from strength to strength, our singular focus on software services makes us an ideal Partner without any fear of competing on partneringon software services makes us an ideal Partner without any fear of competing on on software services makes us an ideal Partner without any fear of competing on partneringon software services makes us an ideal Partner without any fear of competing on other products and propositions. Consequently FY10/11 has been a record year

partneringother products and propositions. Consequently FY10/11 has been a record year other products and propositions. Consequently FY10/11 has been a record year

partneringother products and propositions. Consequently FY10/11 has been a record year other products and propositions. Consequently FY10/11 has been a record year

partneringother products and propositions. Consequently FY10/11 has been a record year for this part of our business!

partneringfor this part of our business!

BytespartneringBytesBytespartneringBytesWe were introduced

partneringWe were introduced We were introduced

partneringWe were introduced

Annabelle Searl IT Administration Manager, Thomas Eggar, LLP

40 | summer/autumn 2011

Maggie PerryBytes Microsoft & Partner Business Manager

Page 41: Bytes Magazine_Summer Autumn2011

Platform Integration – Your Route to Effi ciency Gains

In the current climate, just about every organisation is looking to reduce costs and complexity in their existing IT environment and one of the most successful ways of doing this is through effective integration of existing systems. Recently we have seen three common themes driving the need for a standard approach to the integration of systems - ERP and back-offi ce consolidation, provision of timely and accurate data for Management Information and the need to support and govern system integration across multiple data centres and deployment models, to enable both the adoption of Cloud-based solutions and the ability to automate interactions with customers, suppliers & partners.

ERP platforms rarely stand alone and generally provide back-offi ce processing services across the full breadth of the business. As large organisations grow, the ERP footprint expands and often a ‘spaghetti’ of point-to-point integrations are developed to integrate operational systems with the back-offi ce. This often results in a complex ERP infrastructure that’s expensive to support and maintain and is infl exible in its ability to change to support the needs of the business. We’ve worked with a number of companies where they’ve seen an opportunity to reduce cost by consolidating and standardising their back-offi ce, but this is hampered by their ability to ‘unpick’ the ERP from the operational systems without having a signifi cant impact on the business. An integration platform can offer the ability to isolate the operational systems from this change, as well as provide the means for standardising on back-offi ce processing.

We’ve recently completed an ERP consolidation project for a major retail and hospitality company, using a middleware solution to provide a platform for systems integration. The solution enabled the organisation to gain a better view and understanding of their workforce, providing savings of up to £10m over the next four years, and, with more effective, timely inventory management across their premises, they are able to achieve further savings of £5m per year.

The need for accurate, up-to-date, Management Information and the availability of near real time data that can be analysed in a timely manner is also driving wider platform integration. Another of our other customers is using their integration platform and BI strategy to identify fraudulent activity faster, and is now reaping a return on investment of £2m per annum.

Likewise, better platform integration is helping customers to maximise the effi ciency gains from the Cloud. Hitachi Consulting has helped a number of organisations better leverage the cloud through platform integration, including helping a budget airline to realise a business vision with the potential to save their business millions of pounds a year in effi ciency gains and operational savings.

Platform Integration - Key Tips to consider:

• Think strategically but execute tactically. Make sure you’ve got a long term vision and roadmap for what you want to achieve, but grow and develop this within projects that are delivering to the needs of the business.

• Implement incrementally and demonstrate value early to get the buy-in from your colleagues in the business.

• Most importantly, make sure you have the necessary skills in place – either internally or externally. You need a broad experience in understanding the wider enterprise architecture, in-depth knowledge of SOA and middleware, and if you’re working with an external consultancy, ensure they have a proven track record and are focussed on designing the solution that’s right for you.

key tips partneringpartneringpartneringPlatform Integration – Your Route to partneringPlatform Integration – Your Route to Platform Integration – Your Route to partneringPlatform Integration – Your Route to Effi ciency Gains partneringEffi ciency Gains

In the current climate, just about every organisation is looking to reduce costs partneringIn the current climate, just about every organisation is looking to reduce costs In the current climate, just about every organisation is looking to reduce costs partneringIn the current climate, just about every organisation is looking to reduce costs and complexity in their existing IT environment and one of the most successful partneringand complexity in their existing IT environment and one of the most successful and complexity in their existing IT environment and one of the most successful partneringand complexity in their existing IT environment and one of the most successful ways of doing this is through effective integration of existing systems. Recently partneringways of doing this is through effective integration of existing systems. Recently ways of doing this is through effective integration of existing systems. Recently partneringways of doing this is through effective integration of existing systems. Recently we have seen three common themes driving the need for a standard approach to

partneringwe have seen three common themes driving the need for a standard approach to we have seen three common themes driving the need for a standard approach to

partneringwe have seen three common themes driving the need for a standard approach to the integration of systems - ERP and back-offi ce consolidation, provision of timely

partneringthe integration of systems - ERP and back-offi ce consolidation, provision of timely the integration of systems - ERP and back-offi ce consolidation, provision of timely

partneringthe integration of systems - ERP and back-offi ce consolidation, provision of timely and accurate data for Management Information and the need to support and

partneringand accurate data for Management Information and the need to support and and accurate data for Management Information and the need to support and

partneringand accurate data for Management Information and the need to support and and accurate data for Management Information and the need to support and

partneringand accurate data for Management Information and the need to support and

partneringpartneringpartnering

BYTES 020 8786 1500 | 41

cont...

David Sanderson Vice President, Enterprise IntegrationHitachi Consulting UK

We regularly liaise with Vendors, Partners and Customers which puts us in a very good position to recommend a suitable partner for your project; whether it is Virtualisation, Unifi ed Comms, Exchange, SharePoint, CRM or Cloud Services.

Page 42: Bytes Magazine_Summer Autumn2011

A view on the Virtual Market Place

The adoption of virtualisation as the de-facto standard platform for Wintel servers has completely changed the way that server infrastructure is now architected, deployed and managed. Initially, untrusted for production workloads, virtualisation proved its worth by powering ‘test and dev’ environments, quickly progressing to providing fl exible and cost effective disaster recovery platforms. Due to its tremendous success in these areas and fuelled by a wealth of features and capability, virtualisation is now considered as the fi rst choice for production workloads, which is underpinned by the likes of VMware who are leading the charge. Their Data Centre reliable Hypervisor, ESX, is now in its 7th generation, offering the ability to support bigger workloads than ever before.

The benefi ts of virtualisation are immense:• Rapid provisioning of servers.• Consistent operational environments / virtual hardware platform. • Highly available servers. • Accelerated retirement of legacy hardware.• Reduced physical server footprint - reduces data centre

space, power and cooling costs.• Simplifi ed backup, replication and disaster recovery. • Reduction in total cost of ownership.• Structured budget spend. • Reduces /controls server sprawl.

But despite all of these benefi ts, the migration of existing server platforms to a virtual infrastructure is one of the biggest challenges businesses face today.

In small to medium environments, the ability to migrate, either via Physical to Virtual “P2V”conversion or by reinstallation and data migration, has been reasonably successful.

In more challenging environments, with greater complexity, we generally fi nd that organisations have managed to migrate their simple server platforms, typically where the server/application ratio is 1:1. When applications are spread over a number of server hosts or have numerous interdependencies with other applications and resources, the typical migration methodologies start to become

challenging, leading the stalling of the migration project.

The root cause of this is a lack of understanding of the Application Layer and its relationship with its underlying Server Infrastructure. A typical “P2V” of a standalone server converts the Servers OS, Application(s) and Data all in 1 simple step allowing for a migration to be planned relatively easily. In the event that migration fails for whatever reason, the roll back is as simple as turning the original server back on. Where you have an Application Spread over multiple hosts, it is essential to understand fully what each host is doing and the implications to the Application and Business if a server is taken offl ine for a migration.

We have been engaged on many complex server migration projects and our experience has shown us that it is essential to assess your environment not only from the server platform and how it’s currently performing over a reasonable duration, but also it is necessary to fully understand the Application Layer and how that maps to its Server Platform Layer, Application Owners and Business Processes. With a full understanding of the Application and Server environment and the associated Business change management process it is possible to plan and execute highly complex server migration tasks in a de-risked way.

By adopting this approach and utilising GlassHouse’s Impact Analysis for Virtual Environments it is possible to accelerate the migration of existing physical server environments into a virtual world and all of the benefi ts that is brings.

cont...from page 41

Andy SoanesDirector of Service Management GlassHouse Technologies (UK)

42 | summer/autumn 2011

Page 43: Bytes Magazine_Summer Autumn2011

Collabora�ve Thinking

In our experience, customers consider migra�on and transi�ons for as variety of reasons:

• When facing a natural break point such as a significant version upgrade, hardware replacement, or a change in requirements

• Staff become hard to find or expensive

• As part of a larger integrated collabora�on roadmap

• When considering a move to a different service model, such as cloud or consolida�on

• As part of a reducing TCO

The careful planning of a migra�on project will ensure all business objec�ves are clearly defined and achievable within the agreed �meframes. Whether you’re considering migra�ng to a hosted, cloud or on-premise solu�on, the planning process is the most vital component to achieving a successful project. We work with world leading tool vendors to ensure your migra�on progresses smoothly with minimal disrup�on.

Our partnership with Quest So�ware and use of their Migra�on So�ware tools ensures maximum fidelity and unrivalled automa�on during user transi�ons. The combina�on of our exper�se in both Microso� and IBM technologies, and the Quest So�ware tool set, delivers the most cost effec�ve transi�on, with a great user experience.

Our focus on your business drivers combined with class leading skills, experience and tooling makes us the perfect fit for organisa�ons seeking a partner for a transi�on project. We leverage our 24 x 7 capability, allowing users to migrate users at any �me of day or night. Applicable does this to minimise user disrup�on and accelerate the transi�on, reducing the coexistence phase.

OFFER: Engage before 31.08.2011 and receive our Transi�on Planning Workshop for £3,500**Usual price £5,000, offer only available un�l 31.08.2011

For more informa�on contact your Bytes account manager

We work with customers in the cri�cal planning phase and share our experience to minimise disrup�on and achieve maximum return on investment as quickly as possible. We guide you through the important decisions you need to make to ensure a successful migra�on whether that’s from one technology to another or a significant in-line upgrade.

Applicable has been suppor�ng organisa�ons transi�oning to cloud, on-premise or hybrid email and collabora�on environments for more than 10 years. Our cer�fied exper�se in Microso� and IBM technologies ensures we are the perfect partner to support customers in the planning and execu�on of email migra�ons and transi�ons.

“Our skills, experience and approach mean customers are confident of a successful transi�on project which meets user expecta�ons; on �me and within budget.”

Alan Baldwin, Managing Director, Applicable

“User impact was the most important factor of our Exchange migra�on. The Quest migra�on so�ware ensured that the disrup�on to our users was as small as was technically achievable.”

Louise Catley, Programme Manager, Punch Taverns

WHY APPLICABLEApplicable works with world leading partners in the process of tangibly improving our customer’s performance through the deployment of global workforce collabora�on and messaging systems.

These systems are developed and implemented by Applicable’s specialist professional services and enabled by our best in class ITSM opera�ons.

• 11 years of delivering hosted and managed email, collabora�on and suppor�ng solu�ons to enterprise customers, in cloud, on-premise and hybrid

• 50,000 enterprise and SME seats under management

Microso� Gold Partner and IBM Premier Partner with long pedigree in both Domino and Exchange

• Only Quest cloud kit provider in the UK

• Long history of complex migra�ons

• 24x7 Migra�on capability

Follow us on Twi�er

@Appl1cable

BYTES 020 8786 1500 | 43

Page 44: Bytes Magazine_Summer Autumn2011
Page 45: Bytes Magazine_Summer Autumn2011

portal

I fi nd the Bytes Portal extremely easy to use, I mainly create orders or convert quotes to an order and the process is faultless. When I request a quote for software the response is very quick and orders are always processed straightaway. I wish all portals were the same!

It enables you to manage and track the

entire life cycle of your software assets

from point of purchase to decommission.

It has a unique and customisable

intelligence, as well as real data/views

that will help simplify the administration

of your global software licensing estate.

Below are some of the key functions of

the Portal:

On line Ordering

The Bytes Portal gives you direct access

to your current agreement information

and pricing tailored to your specifi c

contract parameters. Our product

search facility helps you quickly fi nd the

items you need and create quotations,

email these quotations to other people

in your organisation and easily convert

them to orders. The Portal offers

customisable views and access rights

so that components, for example the

ability to place orders, can be included or

excluded for specifi c users.

Manage Contracts and Renewals

The Portal offers a full contract

management system which you can use

to manage all the contracts and software

licenses in your estate. You can upload

your own data and documentation

for any type of contract across your

organisation. The Portal fl ags contracts

and licenses at 90, 60 and 30 days

prior to renewal or expiry and can be

confi gured to send reminder emails at

these intervals.

Discover and Manage Assets

The Bytes asset management service

provides you with the ability to actively

manage your organisation’s software

license and compliance positions.

Bytes

This modular service is designed to

deliver cost reductions by rationalising

support and maintenance contracts and

ensure cost avoidance through license

re-harvesting and contract renewal

management.

Manage Learning

Our online learning portal offers services

ranging from simple online booking

of a wide range of popular training

courses from many training providers,

to bespoke solutions developed for

your organisation. You can publish and

manage your own in house training

programs and curriculums and monitor

course registration, budget approval and

attendance.

Service Desk

The Portal service desk helps you

manage all of your communications with

Bytes sales, technical and administration

teams. It enables you to log and monitor

requests online which go directly to the

relevant personal with Bytes. The Service

Desk can be used as an auditable

way of tracking how Bytes and your

organisation are interacting and how

we are delivering against Service Level

Agreements (SLA’s) and response times.

Portal Development Services

Our Portal development services enable

secure seamless communication and

navigation between your own back

offi ce systems and the Bytes Portal. Our

in-house team have the skills to develop

and support solutions

to integrate with

your systems.

Gayle Core - Specsavers

about the Bytes Portal or to set up a user account, please speak to your Bytes account manager who will arrange this for you.

learn more...

BytesportalThe Bytes Portal brings together all elements

of your software estate into one system.

Emma MagalhaesBytes Portal Manager

BYTES 020 8786 1500 | 45

Page 46: Bytes Magazine_Summer Autumn2011
Page 47: Bytes Magazine_Summer Autumn2011

This article gives a broad overview of the technology, it’s features and benefi ts and also the main uses for ThinApp including; Simplify Windows 7 Migration, Eliminate Application Confl icts, Augment Security Policies and several others. If you would like to discuss any of the points mentioned, please contact me at [email protected]

What Is ThinApp?ThinApp is an agentless application virtualisation solution that decouples applications from their underlying operating systems to eliminate application confl ict and streamline application delivery and management.

How Does ThinApp Work?ThinApp virtualises applications by encapsulating application fi les and registry into a single ThinApp package that can be deployed, managed and updated independently from the underlying operating system (OS). The virtualised applications do not make any changes to the underlying OS and continue to behave the same across different confi gurations for compatibility, consistent end-user experiences, and ease of management.

How Is ThinApp Used?• Simplify Windows 7 migration - Migrate legacy

applications such as Internet Explorer 6 to 32- and 64-bit Windows 7 systems with ease by using ThinApp to eliminate costly recoding, regression testing and support costs.

• Eliminate application confl icts - Isolate desktop applications from each other and from the underlying OS to avoid confl icts.

• Consolidate application streaming servers - Enable multiple applications and “sandboxed” user-specifi c confi guration data and settings to safely reside on the same server.

• Reduce desktop storage costs - Leverage ThinApp as a component of VMware View to reduce desktop storage costs and streamline updates to endpoints.

• Augment security policies - Deploy ThinApp packages on “locked-down” PCs and allow end users to run their favorite applications without compromising security.

At a Glance

Designed to eliminate application confl icts and streamline management, VMware ThinApp™ simplifi es application virtualisation and reduces the cost and complexity of application delivery. As a key component of VMware View™, ThinApp adds application compatibility to virtual desktop environments and helps to reduce the management burden of desktop applications and images.

Key Benefi ts

• Simplify Windows 7 migrations.• Eliminate application confl icts.• Minimise costly recoding and regression testing.• Streamline application management.• Reduce IT support and helpdesk costs.• Strengthen endpoint security.• Increase workforce mobility.• Get integrated application assignment.

Application Virtualisation Made Simple

Sales &Executives

Partners & Contractors

KnowledgeWorkers

Task WorkersCall Centers

Physical PC ACE or Standalone

Blade PC Or Network Share

VDI or Thin Client

VMware ThinApp

VMwareThinApp

virtualisation

BYTES 020 8786 1500 | 47

Following on from some successful roll-outs of ThinApp within our

customer base, I wanted to share a little more detail on the value that it

can add to your desktop environment.

• Increase mobility for end users - Deploy, maintain and update virtualised applications on USB sticks for ultimate portability.

Matt Gallick – Bytes BDM, Virtualisation.

cont...

Page 48: Bytes Magazine_Summer Autumn2011

Key FeaturesWhat’s New in ThinApp 4.6• Microsoft Internet Explorer 6 support - ThinApp now

offers complete support for virtualising Microsoft Internet Explorer 6 (IE 6) that makes it easy to virtualize and deploy IE 6 application packages to 32- and 64-bit Windows 7 desktops.

• ThinDirect - This new feature gives end users the fl exibility to seamlessly run IE 6 on Windows 7 desktops alongside newer browsers such as IE 8, and allows administrator to confi gure Web pages with IE 6 dependencies to ensure that URLs always open in the right browser.

• Relink - Upgrade existing ThinApp packages to the new ThinApp 4.6 format quickly and easily without the need for associated project fi les.

• ThinApp Converter - ThinApp works with VMware vSphere™, VMware ESX® and VMware Workstation images to convert silently installed applications into ThinApp packages through a command-line interface that allows for automation of application conversion and management.

Agentless Application Virtualisation• Agentless architecture - Designed for fast deployment

and ease of management, ThinApp requires no agent code on target devices.

• Complete application isolation - Package entire applications and their settings into a single executable that runs independently on any endpoint, allowing multiple versions or multiple applications to run on the same device without any confl ict.

• Built-in security - Application packages run only in user mode, so end users have the freedom and fl exibility to run their preferred applications on locked-down PCs without compromising security.

Fast, Flexible Application Packaging

• Package once, deploy to many - Package an application once and deploy it to desktops (physical or virtual) running Windows XP, Windows Vista or Windows 7.

cont...from page 47

information or to purchase VMware products, call yourBytes account manager 020 8786 1500

for more...

• Three-step setup capture - Use a three-step process for pre and post-install system states to simplify application packaging and support applications that require a reboot during the installation process.

Fast, Flexible Application Delivery

• Application link - Confi gure relationships between virtualised applications, plug-ins, service packs, and even runtime environments such as Java and .NET.

• Application sync - Automatically apply updates over the Web to applications on unmanaged PCs and devices.

• Support for USB drives and thin clients - Deploy, maintain and update applications on USB storage drives and thin client terminals.

• Microsoft Windows 7 support - Deploy legacy applications on 32- and 64-bit Windows 7 systems and streamline application migration by avoiding costly, time-consuming recoding and regression testing.

Seamless Integration with Existing infrastructure

• Zero-footprint architecture - Plug ThinApp directly into existing IT tools without the need to add dedicated hardware or backend databases.

• Integration with management tools - ThinApp creates standard. MSI and EXE packages that can be delivered through existing tools from Microsoft, BMC, HP, CA, Novell, Symantec, LANDesk and others.

• Support for Active Directory authentication - Add and remove ThinApp users from Active Directory groups, and prevent unauthorised users from executing ThinApp packages.

• Integrated application assignment in VMware View Manager 4.5 - ThinApp packages can be assigned to individual desktops or pools of desktops in View Manager to allow for streamlined application deployment.

48 | summer/autumn 2011

Page 49: Bytes Magazine_Summer Autumn2011

information or to purchase VMware products, call yourBytes account manager 020 8786 1500

Page 50: Bytes Magazine_Summer Autumn2011

disaster recovery

downtim eOrganisations in the UK lose Over £2 billion a year by

Failing to Manage their Business-Critical Systems

The results of an independent report

commissioned by CA Technologies* reveals

that time taken to fix failed IT systems

costs the average organisation in

the UK £208,000 a year through

lost revenue – or over £2 billion

collectively.

The Avoidable Costs of

How will you avoid the financial impact of downtime?Downtime and associated costs are avoidable – organisations can tackle them through a re-evaluation of their disaster recovery strategy.

Having a disaster recovery plan to deliver total application availability does not have to cost a fortune.

Ensure optimum data availability with CA ARCserve ARCserve gives you the control you need to maximise revenue generation. It enables you to:

• Accelerate backup and recovery.• Minimise data loss and downtime.• Maximise availability of applications and data.• Speed up granular restore.• Increase business continuity.

50 | summer/autumn 2011

Page 51: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 51

downtim e

“ The smooth running

of IT is critical for many

organisations in today’s

fragile economic climate

and any degradation in

service not only impacts

employee productivity,

but can be very visible to

customers too”

extra control you gain with ARCserve for FREE! Call Bytes today on 020 8786 1500 to arrange your FREE 30 day trial!

trial the...

The survey was carried out across 1,808 organisations in 11 European countries. Across the 200 organisations questioned in the UK, each one suffers from an average of 27 hours of IT downtime a year, which equates to almost 300,000 hours across the UK. When business-critical systems are compromised, organisations in the UK estimate that their ability to generate revenue is reduced by 22%.

CA Technologies believes that much of this considerable cost to business and the economy can be avoided through better data protection strategies that focus on the speed of data recovery.

“The smooth running of IT is critical for many organisations in today’s fragile economic climate and any degradation in service not only impacts employee productivity, but can be very visible to customers too. With companies increasingly dependent on online services to generate revenue or provide an essential channel of customer communication, the fi nancial impact of outages is becoming a critical issue. Fortunately, much of this cost is avoidable - organisations can tackle it through a re-evaluation of their disaster recovery strategy. Doing so could have a direct impact on their fi nancial position and help them manage their emergence from the recession.” Chris Ross, VP, CA Technologies.

The report also reveals that post IT downtime (i.e. when IT systems are up and running), there is an additional delay of 11 hours per year at each organisation during which time data is still being recovered. Across the UK that’s another 120,000 hours when business operations aren’t fully operational. In this post-outage period when data recovery is taking place, company revenue generation is still hampered, down by an average of 16%.

Other key fi ndings from the survey included:

• Three quarters (76%) of the organisations surveyed said that the IT systems and applications effected by IT outages were mission critical.

• The departments most likely to suffer during downtime were operations (76%), fi nance (52%) and sales (39%).

Read the full report at www.arcserve.com/gb

*The survey was conducted by an independent research

fi rm Coleman Parkes

Page 52: Bytes Magazine_Summer Autumn2011

email strategy

Justin PirieCloud Strategist, Mimecast

migrate?migrate?are you ready to

“For the cloud, we’re all in,”

remarked Microsoft’s CEO

Steve Ballmer in March last

year. This quote is rapidly

becoming part of IT folklore,

but perhaps most importantly

it highlighted Microsoft’s

determination to shift from

client server to the Cloud.

Some might criticise it for

being a little late, but there’s

no denying that once the

Redmond behemoth sets

its big guns on a market,

everyone else had better

watch out.

52 | summer/autumn 2011

Page 53: Bytes Magazine_Summer Autumn2011

more about Mimecast or to get a copy of their Exchange Migration whitepaper, please contact your Bytes account manager on 020 8786 1500.

fi nd out...

The fi rst step for companies using older versions of Exchange is to get migration-ready. This means getting rid of the clutter of disparate applications that have built up over the years, including anti-spam, anti-virus, redundancy, archiving, and consolidating them in the Cloud. This is where Mimecast comes in, and where we’ve helped numerous customers cut costs and streamline the management of their email services. Once your data is archived in the Cloud, and you have a guarantee of email availability in case of downtime, you are ready to migrate.

Many CIOs are asking whether it’s possible to move to Offi ce 365 if they initially choose to migrate to Exchange 2010. The answer is yes. At Mimecast right now, the majority of our conversations are about companies migrating to Exchange 2010, with their data safely archived with Mimecast. We believe that Exchange 2010 with a ‘Just Enough On-Site’ infrastructure (and the rest in the Cloud) is the perfect stopping off point for a future move to Offi ce 365.

Does that mean you have to put all your eggs in one basket with Microsoft? No. You may decide to keep your data archived with a third party provider, perhaps with more favourable SLAs or simply for the ‘insurance’ factor of keeping it separate. There is no doubt that an ecosystem of third party Cloud suppliers will emerge around Offi ce 365 just as it has with Exchange. And the importance of that, in the end, is that nobody forces you to do anything. Assess the available options, and choose what’s best for you.

migrate?The fi rst step for companies using migrate?The fi rst step for companies using older versions of Exchange is to migrate?older versions of Exchange is to get migration-ready. This means migrate?get migration-ready. This means getting rid of the clutter of disparate migrate?getting rid of the clutter of disparate applications that have built up over migrate?applications that have built up over the years, including anti-spam, anti-migrate?the years, including anti-spam, anti-virus, redundancy, archiving, and migrate?virus, redundancy, archiving, and consolidating them in the Cloud. migrate?consolidating them in the Cloud. This is where Mimecast comes in, migrate?This is where Mimecast comes in, and where we’ve helped numerous

migrate?and where we’ve helped numerous customers cut costs and streamline

migrate?customers cut costs and streamline the management of their email

migrate?the management of their email services. Once your data is archived in

migrate?services. Once your data is archived in

This provides a bit of a quandary for the IT director or CIO. For one thing, BPOS was announced only a few months after Microsoft had launched its best ever on-premise Exchange server, Exchange 2010, which offered signifi cant performance advantages over Exchange 2007 and especially Exchange 2003. So even before BPOS burst onto the scene, users of Microsoft Exchange had a lot to think about.

And with BPOS, the situation got a little trickier. There’s often a sense with the Cloud it’s an all-or-nothing decision. With Microsoft announcing a fully hosted, Cloud-based, Exchange-based email service, many CIOs wondered – and continue to wonder – if they should leapfrog Exchange 2010 and go fully hosted, with BPOS or Offi ce 365.

The truth is there’s no mad rush. If you are a Microsoft Exchange customer and you like the idea, over time, of embracing Cloud technology, then you can do it how you want to, when you want to.

The adoption of Exchange 2010 is just beginning to quicken. According to Gartner, somewhere between 80% and 90% of Microsoft’s Exchange installed base worldwide is still on Exchange 2003 or Exchange 2007. Over the next twelve months or so, the signs are that there will be widespread migration from Exchange 2003/2007 to Exchange 2010. We believe that the adoption of Offi ce 365 will be slow to start with, as companies wait for the technology to mature and begin to get comfortable with the idea of using Cloud services.

BYTES 020 8786 1500 | 53

Cloud computing, in essence, means outsourcing IT services to third party vendors who then deliver those services over the internet. It allows IT departments to focus resources on areas of high value for the business, while offl oading commoditised but management-intensive or high risk applications – such as email – to Cloud vendors like Mimecast. It’s important to state up front that the cloud isn’t for everyone. Some companies like to keep all their IT on-site, perhaps because they believe an on-premise archive is more secure, or they have fears over the nascent nature of Cloud computing. Even so, the majority of IT departments today are under intense pressure to do more with less and Cloud computing

has already shown it has the potential to deliver on that

promise.

UK businesses have already shown a great deal of enthusiasm for

Cloud technology. In terms of email services, fi rms

have migrated to Mimecast, because they get reduced cost and complexity, and are

better equipped for eDiscovery.

Spearheading Microsoft’s charge to the Cloud has been BPOS (Business Productivity Online Suite), a

fully hosted Cloud service where Microsoft pretty much does everything. It manages the Exchange server out of the data centre, archives your data and delivers the whole package over the internet.

Outlook simply remains on your desktop.

BPOS will soon be replaced by Offi ce 365, which is based

on Exchange 2010 and adds a whole host of new functionality on top of BPOS.

Page 54: Bytes Magazine_Summer Autumn2011

sam

Page 55: Bytes Magazine_Summer Autumn2011

samThe need for SAM historically has been “sold” to organisations from a compliance perspective, but nowadays there is a heavy emphasis on the costs incurred through over provision of software, in addition to the risk inherent in being under-licensed. Every day we talk to organisations who feel overwhelmed by the effort involved in initiating and operating a robust SAM process and supporting technologies.

Critical to a successful SAM project is trustworthy data, which provides customers with the business intelligence to make strategic decisions about current and future IT investment that is streamlined and effi cient. Our carefully selected strategic partner, Snow Software, delivers this trustworthy data via the Software Recognition Service (SRS) which is a fundamental component of the SAM solution. SRS simplifi es administration, saves time and delivers

real-time trustworthy data from raw inventory data either from tools such as SCCM, Altiris and FrontRange or from Snow’s own inventory technology.

The service analyses installed software in a customer’s environment and identifi es software that requires a commercial licence, how the software is licensed, how often it is being used (if at all), if the software belongs to a suite of applications, such as Microsoft Offi ce 2007 Standard or Adobe Creative Suite 4 Design Premium. Upgrade and downgrade paths are also identifi ed, making it possible to automate upgrades fully and maximise the rights that customers have to the latest technology as part of their licence agreements.

All of the installed software discovered is categorised based on their function according to the UN standard UNSPSC (United Nations Standard Products and Services Code) e.g. backup, security, CAD etc. This enables customers to consolidate and rationalise the types of software in use across their organisation thereby reducing the number of vendors and applications that have to be supported and at the same time, rationalise and consolidate the number of software licensing and maintenance contracts that have to be managed. Which, in most cases, results in cost savings not only on software licences, but related support and management costs too.

the SAM options available to you, please give me, or the Bytes SAM Team, a call on 020 8786 1500.

to discuss...

We Turn Inventory Data intoBusiness Intelligence Every Day!

Software Asset Management (SAM) offers many

benefi ts to a business both for fi nancial control

and maintaining software licence compliance.

Because of the complexities of tracking and

managing software and its associated licensing,

we are fi nding many customers are unaware of

the potential cost savings that can be realised

from adopting Software Asset Management.

SAM

BYTES 020 8786 1500 | 55

Maria SingletonBytes - SAM LicensingPractice Manager

Page 56: Bytes Magazine_Summer Autumn2011
Page 57: Bytes Magazine_Summer Autumn2011

management

BYTES 020 8786 1500 | 57

VMware

with Microsoft® System Center

The nworks MP fully integrates with Microsoft System Center, providing a unifi ed view of your physical servers, virtual servers and applications - and enabling you to use System Center Operations Manager as your single management interface.

SituationIn the rush to reap the benefi ts of virtualisation, many organisations have not integrated VMware into their standard IT practices and procedures. Instead, the new technology is being managed as a separate entity. While this might be acceptable in the short term, the limitations of this approach are becoming apparent. For example, organisations no longer have full

Chuck Eames Senior Technical Consultant Convergent Computing

Veeam provides an incredibly easy way for enterprises to manage their VMware implementations via Microsoft System Center Operations Manager.

monitoringProtect your investments in Microsoft® System Center and

manage your physical and virtual environment from one console

with the Veeam nworks Management Pack™ for VMware.

Developed in close collaboration with Microsoft, the Veeam nworks Management Pack provides scalable, fault-tolerant and agentless VMware infrastructure monitoring and management directly in Microsoft System Center, eliminating the need for a separate monitoring framework.

Microsoft and VeeamVeeam is a Microsoft Gold Certifi ed Partner, a member of the System Center Alliance, and 2010 Microsoft Partner of the Year fi nalist for Systems Management. The nworks MP is listed in the Microsoft Pinpoint catalog, signifying that it has passed Microsoft’s MP best practice analysis and guidelines.

Technologies used• Microsoft System Center Operations Manager

2007 R2.• Microsoft System Center Operations Manager

2007 SP1.• Microsoft Operations Manager 2005 SP1.• Microsoft System Center Virtual Machine Manager

2008 R2.

Platforms Supported• vCenter Server 4.x Virtual Center 2.x• ESX 3.x and 4.x ESXi 3.5 and 4.x

solution

cont...

visibility of applications and services, and the network operations center (NOC) can’t provide 24x7 support for VMware like they do for the rest of the IT infrastructure.

As a result, some organisations have put a moratorium on further virtualisation - a situation commonly referred to as “VM stall.” To get things moving again, organisations need a way to bring VMware into System Center. Some consider deploying a separate monitoring framework for VMware and then connecting it to System Center, but this approach undermines efforts to standardise on System Center and introduces unnecessary expense.

Page 58: Bytes Magazine_Summer Autumn2011

SolutionTo protect investments and maintain the integrity of processes and policies built around System Center, a native System Center solution for VMware is needed - one that fully leverages System Center while bringing deep VMware domain expertise to the Operations Manager console. The nworks MP does both.

Enterprise strengthThe nworks MP provides continuous monitoring of enterprise VMware environments. It features a centrally managed, distributed architecture for horizontal “no limits” scalability and automatic failover and load balancing for high availability. Optimised, user-confi gurable data collection and publication methods and use of highly advanced features of Operations Manager deliver maximum information with minimal overhead.

Complete integrationThe nworks MP integrates fully with both VMware and System Center. It enables all System Center functionality - alerts, topology diagrams, dashboards, reporting, auditing, notifi cations, responses and automation - for all VMware components. It provides a detailed VMware health model, including metrics such as memory pressure and disk IOPS that are only available from Veeam. The nworks MP also includes a comprehensive knowledge base that serves as your VMware “expert in a box.”

While the nworks MP itself collects VMware data agentlessly, it also fully integrates data from Operations Manager agents running inside virtual machines - providing full end-to-end visibility of virtualised applications and services. The nworks MP is verifi ed by VMware as VMware Ready and is listed in the Microsoft Pinpoint catalog.

cont...from page 57

Proven architectureThe nworks MP has proven itself in nearly 700 enterprise deployments. It’s a scalable, reliable and mature solution that performs well with both VMware and System Center.

Benefi tsProtect your investments in System Center• Preserve the integrity of your unifi ed

Operations Manager console.• Maintain compliance with

established IT policies and practices.

Manage everything from a single console• Enable a complete view of the entire

IT infrastructure - physical and virtual.

• Identify the root cause of any problem and escalate it to the correct team.

With the Veeam nworks MP, we have a fi nely tuned IT environment, resulting in fewer performance-related issues. When an issue does arise, we receive an alert from the MP and resolve it quickly.

The nworks MP integrates VMware with Microsoft System Center, enabling comprehensive monitoring of heterogeneous virtual infrastructures that include both VMware and Microsoft Hyper-V™. The nworks MP brings VMware to the Operations Manager console, while the nworks PRO Pack (included with the nworks MP at no charge) automates performance optimisation for VMware using System Center Virtual Machine Manager.

• Speed problem resolution, minimise user impact and meet SLAs.

Eliminate additional monitoring frameworks• Avoid the expense of deploying,

integrating and maintaining another monitoring framework.

• Leverage your existing System Center expertise.

• Empower operators to monitor VMware with the tool they already know.

Jeff Pardi Manager for Enterprise Data Services Albany International LLC

58 | summer/autumn 2011

Page 59: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 59

Software vendors offer a

huge range of products and

solutions on a try before

you buy basis, below is a

small selection of some of

the most popular:

Offers a broad range of products on a trial basis, to view the current selection visit:www.adobe.com/uk/downloads/

For a 30 day evaluation of Becrypt software, register your interest here:https://www.becrypt.com/evaluationrequest

A comprehensive Trial centre, providing downloads of many Citrix products:www.citrix.com/site/SS/downloads/index.asp

Is offering a free 30-day trial on its SECURE Email and Web Gateways, visit:www.clearswift.com/act-now/evaluation

From trial downloads to cloud-hosted products, IBM developerWorks features software especially for developers: www.ibm.com/developerworks/downloads/

Trial versions of McAfee SaaS Endpoint Protection Suite & McAfee SaaS Total Protection + several others are available at: www.mcafee.com/us/downloads/downloads.aspx

To trial a broad selection of Microsoft software including Security Essentials and Internet explorer 9 visit: www.microsoft.com/downloads/en/default.aspx

To download a free trial of Offi ce365 go to: www.bytes.co.uk/microsoft/offi ce365

To register for a web demo or a free trial go to:http://snowsoftware.com/website1/1.0.1.0/11/2/

Put Sophos products to the test at:www.sophos.com/en-us/products/free-trials.aspx

Offers a comprehensive range of trialware on its site, listed under the following business headings: Security, Information & Risk Compliance, Storage, Infrastructure Operations and Business Continuity. For full details:www.symantec.com/en/uk/business/products/downloads/index.jsp

A good selection of Trend Micro products available to download here:http://downloadcenter.trendmicro.com/index.php?regs=uk

Download and evaluate VMware Desktop and Datacenter products from:https://www.vmware.com/tryvmware/

Live and video online demos + evaluation products available at:http://www.websense.com/content/evaluations.aspx

Beforebuy

tryYOU the most popular:

A broad range of Oracle products available for educational and trial purposes are available free of charge at: http://www.oracle.com/technetwork/indexes/downloads/index.html

Page 60: Bytes Magazine_Summer Autumn2011

interview

in thehotseatcompany. We fi gured there was a market selling fl oppy disks and listing paper as neither computer manufacturers nor stationery companies wanted to do that. When Hyline went out of business we set up Bytes - not knowing a thing about technology or business!

What is your current job title? Partner Sales Director, Microsoft UK

In a nutshell what does your current job entail? Microsoft sells its technology and services exclusively* through a channel of 3rd party Partners such as LARs, Systems Integrators and independent software vendors. I am responsible for managing our partnerships and sales with a few hundred of the most signifi cant UK Partners through a team of Partner Account Managers and Technologists. *>98%

What do you think was the single biggest & most benefi cial infl uence on IT in the last 20 years and why? There are plenty of tempting options to cite and I think Microsoft has a good “shout” in many ways but to my mind the clear answer is the internet for the way it has extended the reach and functionality of just about every technology. From my kids on Facebook, to simply and ubiquitously connected email, to commerce and research – the internet has spread technology adoption across all generations, consumer & business.

As a child what did you want to be when you grew up? A doctor (because I liked helping people and talking and that is what I thought doctors did!)

What was your fi rst job? I can’t remember! I was a paperboy and I had a regular holiday job in “House of Holland”. I was meant to be working in the warehouse but usually ended up on the sales fl oor as the Manager liked to have the warehouse to himself!

What was your fi rst job in IT & what year? It was at Bytes in 1982. A colleague of mine from our prior employer, Hyline Reprographics liked the idea of setting up a computer consumables

Shaun FröhlichPartner Sales Director, Microsoft

60 | summer/autumn 2011

Page 61: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 61

hotseat

What do you think will be the next ‘big thing’ in IT & why? What I’d like and what it will be are two different things. I’d like the day that we can have transporters to cut travel times and long car journeys but in this real world it has to be mobility or voice. In that 2-way shoot out I think voice and the integration of technologies that unify communications will prevail – just look at the Skype acquisition by Microsoft. I am clearly not the only one thinking that way.

What piece of technology could you not live without & why? I could live without all technology if I were to retire and live by the sea but whilst I am in the working world I’d rather not live without any of the key components, PC, phone, internet the lot. I know that is not answering your question but I need them all!

If you could have lunch with three famous people past or present who would you choose & why? I’m not into that question and skip past it when reading other interviews like this BUT I had a little think and

came up with a variation!

How cool would it be to answer some of the great mysteries? So I’d have lunch with George Mallory to fi nd out if he was indeed the fi rst man to summit Everest. There were reports at the time, 1924, that he was seen descending a route that guaranteed he would have had to summit fi rst. When they found his body in 1999, none of the evidence damaged nor justifi ed that theory. I’d also like to speak with the captain of the Marie Celeste to fi nd out what really happened there and whether anyone actually survived. Finally, although it’s a bit gruesome – I’d like to fi nd out the real identity of Jack the Ripper(!)

What was the last book you read? “What the dog” saw by Malcolm Gladwell – mostly a good read but not as good as Blink & Outliers

What is your greatest achievement? That’s a horrible question! I am proud of some business achievements and I am also proud of certain yachting & charitable accomplishments as well. My highest priority is to be a good parent and I’d like to think I’m heading the right way – just don’t ask my kids! To tease apart one’s life and quote just one – well I can’t do that – unless you’d accept a cheesy statement like “doing everything I do with all my heart, always looking to learn and to keep smiling whatever the weather”.

What are your hobbies? Sailing & racing, watching rugby with the Harlequins, eating, drinking and cooking too.

What is your favourite biscuit & why? A good old fashioned ginger nut – because you can get it out of the packet without destroying all the others, superior dunckability - it softens but won’t drop if you are quick and purposeful, it has a good fl avour hit with the lasting taste of ginger. Perfect!

If you were asking the questions for this piece, what single question would you ask? What do you most value about Bytes?

....and what is your answer to the above question? Their fabulous friendly and passionate team, their incredible operational excellence and the longevity of the management.

Mallory to fi nd out if he was indeed What is your favourite biscuit

Shaun FröhlichPartner Sales Director, Microsoft

Page 62: Bytes Magazine_Summer Autumn2011

BYTES SOFTWARE &LICENSING SERVICESUK and Global Software Licensing Experts

accurately predicted both now and years into the future. Bytes can make this a reality by analysing your IT infrastructure and comparing it to growing trends in the market, allowing us to recommend licensing agreements that are both cost-effi cient and fl exible enough to grow with your business.

Bytes International LicensingInternational companies with a global software requirement will benefi t from our specialist knowledge of international licensing. We are highly experienced in handling the myriad of different approaches to managing ICT systems internationally, helping you to overcome the technological and cultural barriers to local adoption. In order to gain you the best price possible, we can also use the foreign exchange markets to purchase the software in the most cost-effective currency.

The Bytes PortalEverything comes together through the BytesPortal, including:

The Service Desk – a quick and easy communication channel into Bytes.

Online Ordering – purchasing your software has never been easier, and the fl exible system is entirely tailored towards your company’s needs.

Contract and Maintenance Management – existing licences are tracked with a traffi c light system and warnings issued when the licence renewal dates are approaching. During each stage of the process the system feeds back information, which we can use to negotiate favourable rates for software renewals.

Bytes Software Licensing ServicesWith over 600 different vendors to choose from, and with over 20 years’ experience providing software solutions to businesses, Bytes is perfectly positioned to meet your software licensing needs. Amongst other benefi ts, Bytes utilise their purchasing power and strong relationships with software vendors to negotiate the best possible rates, whether it’s volume licensing or specialist software.

But we’re not simply about maximising your procurement budget. All of our team are experts in software licensing which enables us to provide you a truly focussed level of software licensing knowledge and support. We provide information about current software enhancements and

other announcements as they happen and can recommend the solutions from established and emerging technology vendors.

But of course, the key benefi t to you is how much we can save you. By analysing and assessing your current software usage (see our TLC offer below) we can re-shape your license model to fi t prevalent vendor discounting offers, and by using our intimate knowledge of vendor license

agreements we can maximise the right deal for all parties.

Imagine a situation in which your software

requirements are

Mandi NicholsonBytes Sales Director

“Bytes have helped Tesco make signifi cantsavings by effective and intelligent management of our licensingentitlements.They manage ourglobal requirements,are able to keep us abreast of new and relevant licensing changes and apply these to our requirements ensuringwe are always licensed in the best way possible”.James McNulty,Head of Tesco Group IT Procurement

62 | summer/autumn 2011

Page 63: Bytes Magazine_Summer Autumn2011

BYTES 020 8786 1500 | 63

BYTES SAM SERVICESSoftware Asset Management isn’t just about compliance, it’s importance in largecorporations for increasing performance and profi ts is becoming clear.

Software Asset Management has been a necessary consideration for large companies for the past ten years, and Bytes have been at the forefront of this industry since day one. Many companies claim to offer SAM, but very few prioritise it as a core service. We are a Microsoft Gold Partner for SAM and were instrumental in establishing the ISO19770 standard in 2007.

For companies that are using, or looking to use a Software Asset Management company, Bytes have three packages that will ensure your company is maximising the effi ciency of its software estate. Taking one package does not restrict you from utilising parts of another; in fact many of our clients will later pick and choose various products from within another service range because either their internal structure changes, or because they fi nd they waste less time, resources and money by outsourcing some of their SAM requirements to us.

1. A Software License Review (SLR): The fi rst package is a full software asset audit, which gives companies a clear picture of their current software portfolio status and a defi nitive account of software users. We can utilise your existing SAM software, such as Altiris, SCCM, LANdesk, to name but a few, or we can use our own system to conduct the review. Fundamentally this package is designed for customers that need to inventory their software assets either for compliancy reasons, or to ensure they are making full use of their software investment. In both instances it is imperative that a completely accurate picture is generated from the audit, and Bytes will provide you with exactly that.

2. Asset Management Platform (AMP):For a continual overview of your software portfolio, we can supply and implement one of the world’s most respected SAM platforms – Snow License Manager. Snow License Manager is fully ISO 19770 and ITIL compliant and comes highly recommend by us. This package principally involves supplying and implementing the software; however, we can also provide both technical support and assistance with system controls and data entry.

3. The Bytes Asset Management Service (AMS):For those who do not have the time or resources to manage their software portfolio, Bytes offer a fully managed SAM solution. From initial audit and installation of an Asset Management Platform, we can take total control over usage, licenses, vendor audits, procurement and end-of-life software. To augment this service we have created a bespoke online resource that allows you to monitor and control your software estate in real time. The Bytes Portal is easy to use, extremely practical and very cost-effective.

“ Throughout the SAM process, Bytesdemonstrated a tremendous level of knowledge and provided us with an extraordinary service. They’ve proved their value to the fi rm and have earned their place as one of our trustedbusiness partners”.Brian Lunnon,IT Manager, Martineau Johnson

Chris HibbertBytes SAM General Manager

SNOW LICENSE MANAGER OFFER!

Bytes are currently offering a full 45 day trial ofour favourite Asset Management Platform so you can assess for yourself just how good it is.To fi nd out more on this offer, see the inside front cover

Page 64: Bytes Magazine_Summer Autumn2011

Bespoke training

If you need something that’s not ‘off the shelf’, let us know what you are looking for and we can put together a training solution to fi t. Whether it’s a mix of technologies and vendors or the need for tailored on-site or off-site courses we can help.

eLearning

The most cost and time effective method of on-line training available. Whether it’s standalone or as part of a blended training solution, eLearning courses can provide the most fl exible solution. All our eLearning courses are provided by our training solutions partner, Arc IT Training.

Training Budget Services

To help our customers maximise their training budgets, we offer a range of services designed to fi t a variety of budgets and payment systems. Prepayment discounting and price freezing along with prepayment budget management are some of the payment methods offered.

In 2010 Bytes organised 2,786 courses across 400 companies, in both the UK and internationally. Our independent position, coupled with our extensive knowledge and close relationships with all major vendors, means that we can source the highest standard of courses covering all formsof software learning, management and personal development. We can cater for all requirements and budgets, utilising our buying power to offer our customers thebest rates.

Our Learning Solutions team was established in 2000 and continues to grow as the importance of software and management learning becomes recognised. Our experience, systems and partners, means that whatever the course you’re looking for, we’re confi dent we can fi nd it for you in less time and at lower cost.

The range of trainingcourses offered:• Vendor specifi c courses including

Microsoft, Oracle, Unix, VMware, Adobe, Citrix, Symantec, Cisco, Juniper, Novell, IBM, Lotus and many more.

• Management & Personal Development.

• Information Technology Areas including Virtualisation, Infrastructure, Networking, IT security, PC Maintenance, Software Licensing.

• Data & Telecommunications.• Project, Programme & Service

Management including Prince2 and ITIL.• Desktop Applications from Adobe,

Lotus, Microsoft to bespoke.

BYTES LEARNING SERVICESFinding the right training course for you and your organisationjust got easier!

Bytes offer a range of learning services tomeet our customer specifi c requirements:

Bytes Licensing Academy

We offer two courses: ‘Licensing Essentials’ and ‘SAM Best Practice’. The Bytes Licensing Academy has been developed for our customers to help understand the complexities of software licensing and software asset management. These half day courses - vendor-specifi c or generic - are run by Bytes and they are for both the novice and experienced.

Bytes have consistently provided us with an excellent service. It is invaluable for us to have a supplier with such impeccable professionalism”Brian Lunnon,IT Manager, Martineau Johnson

64 | summer/autumn 2011

Page 65: Bytes Magazine_Summer Autumn2011

Finding the right training course for you and your organisationjust got easier!

Page 66: Bytes Magazine_Summer Autumn2011

awards

A small selection of the

vendor awards that we have

won in the last few years.

&Key achievements

awardsawardsawardsawardswon in the last few years.

awardswon in the last few years.

awards • Microsoft Worldwide Partner of the Year

for License Delivery 2010.• Adobe Channel Partner of the Year

(Creative Suite) 2010.• Adobe Channel Partner of the Year

(Corporate) 2010.• Oracle Technology General Partner of

the Year 2009.• Microsoft Worldwide Partner of the Year

for License Delivery, 2008.• Winner of Centennial Partner of the Year

Award 2008.• Microsoft Worldwide Software Asset

Management Partner of the year and UK Licensing Delivery Partner of the Year, 2007.

• Bytes obtained the Acrobat Reseller of the Year award at the Adobe UK Channel Stars Awards 2007 event.

Bytes are proud to announce that our very own Hayley Mooney recently won the award for Outstanding contribution at the Symantec UK and Ireland 2011 Channel Excellence Awards.

The winners of the 2011 Channel Excellence Awards were chosen by a panel of judges from Symantec’s UK and Ireland channel team and were presented by Danny Dawes, Director, EMEA Managed Security Services, Symantec. The awards recognise Symantec partners in the UK and Ireland that successfully combine Symantec solutions with their own services to solve customers’ most complex business challenges.

Our go to market strategy enables us to deliver the full end-to-end solution to you our clients, taking away the pain of having to have several suppliers for the different components of the solution. Our comprehensive vendor portfolio means that our highly experienced and trained licensing experts are able to present the best solution every time.

The team is managed by Hayley Mooney and the other members are listed opposite. We have colour coded each so that you can see which vendor(s) they specialise in.

accred itations

66 | summer/autumn 2011

Our Vendor Strategy team is made up of a number of specialists who are dedicated to either specifi c Vendors or technology areas, and act as an overlay resource to the sales teams. They also manage all the “best of breed” vendors in terms of day-to-day contact, marketing, sales education etc.

Page 67: Bytes Magazine_Summer Autumn2011

Key achievementsaccred itations

Enterprise Partner

Silver Partner

Partner

Partner

Gold Partner

Silver Business Partner

Expert Solutions Provider

Silver Partner

Platinum Partner

Approved Corporate Reseller

Authorised Reseller

Registered Partner

Gold Partner

Red Hat Ready

Gold Partner

Gold Partner

Service Provider

Silver Partner

Gold Partner

Gold Partner

Gold Partner

Bronze Partner

Solution Provider

Certifi ed Partner

Premier Partner

Business Partner

Solutions Partner

Gold Partner

Gold Partner

Affi nity One Partner

Gold Partner

Authorised Licensing Centre (AL)& Elite Partner

Certifi ed Partner

Platinum Partner

Various

SpecialistSoftware

Large Account Reseller

Gold Certifi ed Partner(Volume Licensing & Software

Asset Management)

Silver Solution Advisor

Enterprise Partner

Business Partner

To speak to a specialist, please call 020 8786 1500.

Daniel Metcalfe Alison Sears Natasha Mungroo Matt Compton Maggie Perry Matt Gallick Sonal Parekh Nick Egginton

Gold Partner

Platinum Partner

BYTES 020 8786 1500 | 67

accreditations

Page 68: Bytes Magazine_Summer Autumn2011