Indacon is a Certified Microsoft Partner for the delivery of the Microsoft Solution Assessment program.
Considering the “software” as an asset to be enhanced and managed, the program aims to define an “ad-hoc” Technological Roadmap aligned with the business requirements/needs, which allows to maximize the investment of the company.
Description
The following picture describes the four phases on which the activity is based:
The collected data (ASSESS & DISCOVER), appropriately analyzed and processed, allows to define the picture of the current status as well as to define the requirements and the necessary activities (PLAN & DECIDE) to achieve the objectives (MIGRATE + OPTIMIZE).
Assess & Discover
Detailed inventory of the environment (infrastructures, applications and services /workloads currently in use);
Collection of information on processes, procedures and actual use of the software installed, with the assessment of specific needs by user type;
Identification of the company’s strategic needs and objectives;
Review and validation of data.
Plan & Decide The attention points emerged during the Assess & Discover phase are elaborated in order to plan the correct strategy to achieve the objectives:
Review and validation of the collected data;
Definition, based on an agreed priority scale defined by the needs expressed by the customer, of the evolutionary scenarios and of the guidelines for the optimization of the environment.
Migrate Definition of the organization’s Roadmap from a Microsoft Cloud perspective.
Optimize Measurement of progress assessed over time
Solution Assessment Types
As shown in the picture below, the service can focus on:
Workplace
Modernization
Cybersecurity
Infrastructure
Optimization
Data Optimization
Cloud Economics
Contract Optimization
GDPR
Benefits
Having a detailed picture of the situation and the appropriate recommendations to implement, it is possible to achieve at least the following benefits:
Better management and efficiency of the IT infrastructure, with consequent cost optimization
Better visibility of the hardware and software fleet
Reduction of the attack surface of “digital threats”: for example, by developing a rapid “response” that allows us to anticipate, and therefore avoid its “malevolent” effects
Reduction of the possibility of “data loss” and/or “data leak” (Data Loss Prevention and Data Leak Prevention);
Evaluation of the services and servers of the current IT infrastructure to highlight the possibility for a transition to Microsoft cloud environment.