Methodology for optimizing

The Core Infrastructure Optimization Model defines five essential capabilities required to build a more agile and effective IT infrastructure. These capabilities form the foundation of each maturity level within the model:

  1. Identity and Access Management
  2. Desktop, Device, and Server Management
  3. Data Protection and Recovery
  4. Security and Networking
  5. IT and Security Processes

In addition to these capabilities, the Core Infrastructure Optimization Model outlines four optimization levels for each capability: Basic, Standardized, Rationalized, and Dynamic.

Basic Level: Patching

At the Basic level, IT infrastructure is characterized by manual, localized processes, minimal central control, and the absence of consistent IT policies and standards. Security, backup, image management, compliance, and other practices are either non-existent or unenforced.

Key challenges at this level include:

  • Limited knowledge of the existing infrastructure and its inefficiencies.
  • Lack of tools and resources to monitor application and service health.
  • High costs associated with desktop and server management.
  • Reactive responses to security threats and manual delivery of patches, software deployments, and services.

At this stage, the IT infrastructure offers minimal support to business operations and fails to deliver meaningful benefits. However, moving to a Standardized Infrastructure can significantly reduce costs by:

  • Establishing enforceable standards, policies, and controls.
  • Mitigating security risks through a “defense-in-depth” strategy.
  • Automating manual tasks to save time and improve efficiency.
  • Adopting best practices like ITIL and SANS Institute guidelines.
  • Transforming IT from a burden into a strategic asset.

Standardized Level: Establishing Control

At the Standardized level, controls are introduced through standards and policies that govern desktop and server management. Tools like Active Directory are used to manage resources, security policies, and access control.

Key features of this level include:

  • Medium-cost and medium-touch delivery of patches, software deployments, and desktop services.
  • Improved security with a locked-down perimeter, though internal risks may still exist.
  • Basic inventory management for hardware, software, and licenses.

Organizations at this stage benefit from greater control over their infrastructure, enabling proactive policies and processes. Service Management concepts begin to take root, and IT evolves into a business asset rather than a cost center. Moving to a Rationalized Infrastructure allows for more advanced integration and strategic alignment.

Rationalized Level: Driving Business Benefits

The Rationalized level is marked by the lowest costs for managing desktops and servers, with optimized processes and policies that support business growth. Security is proactive, and responses to threats are swift and controlled.

Key advancements include:

  • Use of zero-touch deployment to minimize costs and deployment times.
  • Clear and efficient inventory management to purchase only necessary licenses and equipment.
  • Strict security policies extending across desktops, servers, firewalls, and extranets.

At this level, IT begins to deliver measurable business benefits. Organizations can confidently adopt new technologies to address business challenges, as the incremental costs are outweighed by the value they provide. Service Management is implemented selectively, with plans for broader adoption across IT.

Dynamic Level: IT as a Strategic Advantage

A Dynamic infrastructure represents the pinnacle of optimization, where IT is fully aligned with business objectives and serves as a competitive advantage. Costs are tightly controlled, and collaboration between users, data, and systems is seamless.

Key characteristics of this level include:

  • Comprehensive automation of processes, often embedded directly into the technology.
  • High service levels for mobile users, comparable to on-site capabilities.
  • Use of self-provisioning software and quarantine systems to enforce patch management and security compliance.
  • Measurable, rapid returns on additional technology investments.

At this stage, IT drives heightened service levels, competitive advantages, and the ability to tackle complex business challenges. Service Management is fully implemented, with service level agreements (SLAs) and operational reviews in place to ensure consistent performance.

By increasing the proportion of their infrastructure that operates at the Dynamic level, organizations can achieve greater efficiency, agility, and strategic value from their IT investments.