Professional Documents
Culture Documents
80%
51%
OF
CIOS
EMPLOYEES
GLOBALLY
29% 60%
1.4
GLOBAL
CONSUMERS
BILLION
ABOUT
80
the new
normal
Mobile
60
40
20
1995
1997
Desktop PCs
1999
2001
2003
Notebook PCs
2005
Tablets
2007
2009
2011
2013
Intelligent
Systems
1.7T
Retail
Manufacturing
Healthcare
Energy
Computing
Telecom
Consumer
$7 B
$16 B
$197 B
$3 B
$27 B
$908 B
$179 B
$356 B
System Revenue
212
75
50B
249834
22%
20%
5.5x higher
Cloud SW
growth than
packaged SW
15%
10%
4%
5%
0%
SaaS/PaaS
Revenue
Packaged
Software
Source #2: IDC Direction 2014, Transformation Everywhere How SaaS Gets Built, March 2014
Source #1: IDC Forecasts Worldwide Public IT Cloud Services Spending to Reach Nearly $108 Billion by 2017 as Focus Shifts from Savings to Innovation, 2013 )
connect customers
The
challenge of
mobility
NATIVE UX
MARKET
Empty
Full
Empty
Native Web
Full
Empty
Full
Cross-platform
Half
Half
Full
Universal app
Full
Full
Half
Native app
Solution on Azure
Comp plans or sales incentive developed to drive the right selling behavior
Appropriate partner margins to encourage channel to lead the change
Internal systems adapted and ready at launch Learn, Try, Buy clear on website
Channel and field ready with relevant offers and incentives tied to marquee industry event
Challenges
Core Competencies
Software+
Customer
workflows
As-a-Service
(Platform & Infrastructure
Management)
Balancing SaaS delivery with core software and solving customer problems.
ISVs are experiencing more challenges and burdens managing their own infrastructure
Core Competencies
Software+
Customer
workflows
Choosing the
Right Cloud
Platform
Choosing the right cloud platform is critical when expanding your business to the cloud and SaaS
Business Model
& Strategy
Application
Architecture
Complexity &
Customization
Target Market
Business Goals
Channel model
APIs
Tenancy
Operations
Easy on-boarding
DevOps
Performance
DevOps collaboration
Security/Compliance
Scalability
ALM
Versioning
18%
39%
41%
Cloud-based infrastructure
(Public Cloud)
Enhanced Managed Services
and Hosted Managed Services
Key Drivers
Co-location
ISV On-premises
Source: IDC Direction 2014, Transformation Everywhere How SaaS Gets Built, March 2014
39%
41%
Cloud-based infrastructure
(Public Cloud)
Microsoft Cloud OS
Customer
ISV On-premises
Source: IDC Direction 2014, Transformation Everywhere How SaaS Gets Built, March 2014
ONE
Microsoft
Consistent
Platform
Service
Provider
Multi-Tenant
Integrated Virtualization
Microsoft
Data platform
On-Premises
Common Identity
One
Consistent
Platform
Service
Provider
Unified Management
Flexible Deployment
Deliver a consistent platform to run your applications across on-premises, Microsoft public cloud, and service providers cloud
Microsoft Azure
Develop
Deploy
Manage
On-Premises
Monitor
Service Provider
Desktop Hosting
through RDS
Foundation for Hosting Service Provider Offers
Applications
Storage
Management
Windows
Server
2012 R2
Active Directory
Provides
the comprehensive,
platform
Virtualization with
Hyper-V
Multi-Tenancyhighly scalable
Availability
/ Scalability / Security
Compute
Storage (File/Block)
Network
OS &the
Application
Monitoring
Provides
cost efficient,
unified
management platform
kr
kr
chf
TL
$
Rp
$
24 x 7 x 365
280 years
1 billion
R
20 million
76
June 2013
250,000
Contextual awareness
Key app adoption
Azure
Data
IaaS
Windows VMs
Linux VMs
Storage
Networking
.NET
PaaS
Hyper-V
Web
Media
Visual
Studio
Mobile
Identity
Gaming
Cloud services
Data Analytics
System Center
Active Directory
Flexible controls,
measurements and
secure coding requirements
Physical security
Logical security
Data security
24-hour monitoring of
data centers
Multi-factor authentication,
including biometric
scanning for data
center access
Internal data center
network is segregated from
the external network
Role separation renders
location of specific
customer data unintelligible
to the personnel that have
physical access
Dedicated threat
management teams
proactively anticipate,
prevent and mitigate
malicious access
Threat management,
security monitoring, and
file/data integrity prevents
or detects any tampering
of data
Admin and
user controls
Rights Management
Services prevents file-level
access without the right
user credentials
Multi-factor authentication
protects access to the
service with a second factor
such as phone
S/MIME provides secure
certificate-based email
access
Data loss prevention
prevents sensitive data from
leaking either inside or
outside the organization
Cash
Flow
C-PIPE
Churn
Rate
CAC
CLTV
Source: Bessemer Venture Partners: 10 Rules Of Cloud Computing And SaaS
Assumptions
5-year model
$10k bookings in month 1
$2k monthly growth
5-year impact
Assumptions
5-year model
$10k bookings in month 1
$2k monthly growth
Expansion revenue of 2.5% to current customer base
Managing churn
Increase stickiness
Track and react to customer engagement
Contact your customers
Put top sales talent on cancellations
Consider longer-term contracts
Track and react to churn
Pay as You Go
Enterprise Agreement
Open Licensing
Resell Azure and maintain direct
customer relationships