The SI is a vendor-neutral systems engineering and integration company with proven methodologies necessary to effectively guide enterprises in successfully migrating legacy infrastructure to an optimal cloud environment.
The SI offers a comprehensive cloud brokerage product—called VanePoint™—designed to intelligently recommend cloud services to cloud consumers. VanePoint uses proprietary algorithms to match user-selected needs with Cloud Service Provider (CSP) products.
VanePoint provides a unique opportunity for CSPs and cloud users alike. CSPs are offered a sales channel for new consumers, exposure to new markets, and access to periodic reports that indicate how consumers are prioritizing cloud capabilities. Consumers are provided with an unbiased evaluation of products, a match based on user-selected needs, and an ease of procurement of cloud services.
Cloud Analytics & Migration Services
We leverage robust modeling, simulation and analysis capabilities and unique optimization tools to provide customers with the following deliverables:
- The flexibility to engage our services at any stage throughout the cloud migration process
- An assessment of existing IT infrastructure for private or public cloud migration feasibility
- A value-driven comparison and evaluation of cloud service providers utilizing VanePoint
- Customized and optimized hybrid private/public cloud configuration meeting IT enterprise needs
- Full life cycle planning and execution for acquisition, integration, transition, and operations and maintenance (O&M)
VanePoint walks a cloud consumer through a series of questions to establish user requirements. These requirements enable VanePoint to provide a refined set of cloud service providers that best fit a consumer’s needs.
System Workload Topology leverages IT metric collection data and analysis algorithms to isolate which enterprise IT applications, processes, and supporting services realize each cloud consumer’s business critical IT workloads (i.e., ERP, CRM, e-commerce, email, expense reporting, etc.).
System Utilization Analysis leverages IT metric collection data and analysis algorithms to determine each workload’s utilization rates (i.e., processing, storage, bandwidth, etc.). These results further refine cloud consumer’s user need requirements for each workload.
Analytic User Needs Assessment leverages workload specific requirements to enable the SI to show cloud consumers the optimal IT solution (i.e., public, private, hybrid, traditional data center, etc.) for each workload they seek to migrate onto a cloud based solution
Cloud Solution Cost Forecasting leverages workload utilization rates, CSP cost models, and nominal infrastructure costs to inform total cost of ownership comparisons between cloud solutions and traditional data centers (including software licenses, hardware purchases, power, space, & cooling costs, and IT O&M labor costs). Cloud Solution Cost Forecasting also compares multiple recommended cloud solution options.
Affordability Planning Assessment analyzes all workload cloud migration cost and schedule constraints in a holistic fashion to plan efficient adoption of cloud migrations to re-host business capability workloads to proposed cloud service provider solutions.
Cloud Solution Optimization Analysis continues to leverage IT metric collection and analysis algorithms to ensure efficient adoption of cloud services.
Cloud Migration Planning continuously refines a consumer’s Cloud Migration Plan to minimize costs and risks. The SI’s migration processes minimize system downtime thus minimizing user and mission impacts.
Trade Impact Assessment allows consumers to adapt to changing requirements, unexpected costs, and schedule slips to minimize cost, schedule and technical risk.
Operational Effectiveness Analysis uses IT metrics to ensure optimal and efficient use of compute resources. In addition, the SI offers network tuning as a means to utilize the cloud’s full potential.
Cloud Cyber Effectiveness Analysis uses IT metric collection to detect and troubleshoot anomalies, detect unwanted processes or applications (i.e., viruses, malware) and detect unexpected interfaces (i.e., intrusions).