Over the last few years, End User Computing (EUC) and the associated workspace mobility space have emerged to be transformational enterprise initiatives. Today’s workforce expects anytime and anywhere access to their applications, be it enterprise applications or user-installed applications (UIA), and everything in between. These expectations create newer opportunities, as well as newer challenges for the existing processes that are followed by enterprise and application architects. So what are the different facets of these challenges that the architects need to be aware of while analyzing and defining an enterprise application strategy? Let’s dive right in.
Application rationalization is the process of strategizing an available set of corporate applications along the key perspectives of business priority, packaging, delivery, security, management and consumption to achieve a defined business outcome. The tangible artifact(s) of an application rationalization process is a leaner collection of one or more application catalogs. An application catalog is a logical grouping of application taxonomies based on a user’s roles and responsibilities within an organization, as well as within the enterprise. For instance, a user belonging to the finance department will have access to a department-specific catalog housing financial applications, as well as access to a corporate catalog housing all corporate-issued applications. While a user from the IT department will not need access to key financial applications used by a user from the finance department, they will have access to an IT-specific application catalog that may include applications like infrastructure monitoring. With end-user mobility/computing pervading every aspect of workforce productivity within the enterprise, organizations intend to leverage their existing investments in various application delivery platforms including those from VMware, Citrix, Microsoft and other vendors. The application rationalization process is an enabler of application governance, management and operations leading to minimal applications sprawl within the enterprise.
Traditionally, managing legacy applications has been a time-consuming and complex process from the perspective of application packaging, provisioning and monitoring. Delivery of such applications has been equally— if not more—complex. Add to that the constraints of application conflicts when it comes to supporting different devices and integration with other applications. For instance, the requirement of integrating with the authentication process of an Identity Management (IDM) platform that all mission-critical applications need to support as part of the security directive coming from the Chief Information Security Officer’s (CISO) office.
So, first things first, we need to ask ourselves some of these key questions:
- What are these applications, and what are the business priorities of these applications?
- Do all these applications need to adhere to security directives and regulatory compliance directives such as HIPAA, PCI, etc., and if so, how soon?
- Have the non-adherence risks been assessed, and what are the exceptions?
- How do we package, provision, deliver, access, maintain, monitor and finally retire these applications?
What this means is that it is very important to make the available application catalog(s) lean in case they have become bulky over a given period of time due to inefficient Application Lifecycle Management (ALM) processes, mergers and acquisitions, emerging business priorities and other factors outside the control of enterprise, application and IT architects/leaders. Furthermore, the application portfolio(s) reflected in these collective catalogs need to be agile to support the ever-changing innovations in the areas of end-user mobility/computing, hybrid cloud, and the emerging Internet of Things-aware applications.
A pragmatic approach to application rationalization relies on a strong foundation of people, processes and technology platforms. It is recommended to start by identifying some of the key application classifications along the lines of Mission Critical (MC), Business Critical (BC) and User Critical (UC) applications, and map these classifications to your user segmentation along the lines of key roles and responsibilities within and across the organizations. An existing organizational level RACI (Responsible, Accountable, Consulted, and Informed) matrix may come in very handy as part of this process. The information in the table below reflects a sample of how this could be accomplished.
While the people and the processes parts may take multiple iterations, once these applications have been rationalized and the key stakeholders have been identified, we need to define an enterprise Application Management Architecture (AMA) to mature the EUC initiatives within an enterprise. The schematic below lists key components that help develop a mature Application Management Architecture.
What this means is that the AMA needs to address the following capabilities as illustrated in the schematic above:
- Application packaging and isolation. For instance, whether the applications are natively installed in the base image or whether they are virtualized.
- A unified application provisioning launch-pad for virtual, Web, Citrix XenApps, RDSH and SaaS applications.
- Real-time application delivery for just-in-time desktops that would abstract the desktop guest operating system (GOS) from the end-user applications.
- Unified authentication and application entitlement policy platform that supports Single Sign-on (SSO) and acts as a policy enforcement point (PEP) and a policy decision point (PDP).
- Application maintenance capability that enables flexible patch management.
- Application monitoring functionality that provides in-guest metrics for application performance monitoring.
- Most importantly, supporting EUC mobility by interoperating with virtual, hybrid cloud and mobile platforms.
Now let’s tie it all together. VMware’s End User Computing (EUC) Workspace Environment Management (WEM) Solution includes VMware’s EUC product portfolio in combination with VMware’s experienced Professional Services Organization (PSO). This platform accelerates application rationalization initiatives by additionally providing application isolation, real-time application delivery and monitoring for Citrix and VMware environments. It facilitates comprehensive governance of end-user management with dynamic policy configuration so you can deliver a personalized environment to virtual, physical and cloud-hosted environments across devices. It is your fast track approach to success for your Application Rationalization initiatives within your enterprise where not only the technology—but also the people and processes—are given high priority. For additional information please visit VMware.
Find out more about Application Rationalization from the perspectives of an Enterprise EUC strategy and BCDR (Business Continuity and Disaster Recovery) by attending the following sessions at VMworld 2015, San Francisco.
- EUC5909 – VMware’s End-User Computing (EUC) Strategy into 2015 and Beyond
- Wed 9/2 at 1:00 PM
- EUC5733 – Deep Dive on VMware Horizon 6 Cloud Pod Architecture Best Practices to Successfully Deploy a Highly Available Virtual Desktop Solution
- Wed 9/2 at 3:30 PM
TJ Vatsa is a Principal Architect and member of CTO Ambassadors at VMware representing the Professional Services organization. He has worked at VMware for the past 5+ years with more than 20 years of experience in the IT industry. During this time he has focused on enterprise architecture and applied his extensive experience in professional services and R&D to Cloud Computing, VDI infrastructure, SOA architecture planning and implementation, functional/solution architecture, enterprise data services and technical project management.
TJ holds a Bachelor of Engineering (BE) degree in Electronics and Communications from Delhi University, India, and has attained industry and professional certifications in enterprise architecture and technology platforms. He has also been a speaker and a panelist at industry conferences such as VMworld, VMware’s PEX (Partner Exchange), Briforum and BEAworld. He is an avid blogger who likes to write on real-life application of technology that drives successful business outcomes.