Your SlideShare is downloading. ×
The Identity-infused Enterprise
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

The Identity-infused Enterprise

1,889
views

Published on

Ben Goodman from Novell presentation from Gartner IAM event in November 2010

Ben Goodman from Novell presentation from Gartner IAM event in November 2010

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,889
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
40
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The Identity-infused Enterprise Identify, Secure, Comply Ben Goodman Technolgy Strategist, Identity and Security bgoodman@novell.com November 15, 2010
  • 2. © Novell, Inc. All rights reserved.2 Making IT Work As One™
  • 3. © Novell, Inc. All rights reserved.3 21st Century Computing The risks and challenges of computing across multiple environments must be controlled. Users should have unimpeded access to the full computing services they need to do their jobs right. Computing should be secure, compliant and portable.
  • 4. © Novell, Inc. All rights reserved.4 Identity Is Always the Foundation Mobile Devices Personal Computers Identity Foundation
  • 5. © Novell, Inc. All rights reserved.5 Mobile Devices Personal Computers Identity Foundation World Wide Web Closed Networks Identity Is Always the Foundation
  • 6. © Novell, Inc. All rights reserved.6 Mobile Devices Personal Computers Identity Foundation Virtualized Workloads Traditional Workloads on Dedicated Servers World Wide Web Closed Networks Identity Is Always the Foundation
  • 7. © Novell, Inc. All rights reserved.7 New Technologies Mean New Flexibility Virtualization Cloud “Anything” as a Service Mobile devices
  • 8. © Novell, Inc. All rights reserved.8 Regulations Require More Control RiskOperational
  • 9. © Novell, Inc. All rights reserved.9 It's All about Balance Control Flexibility
  • 10. © Novell, Inc. All rights reserved.10 The Identity-Infused Enterprise Core to Enterprise Security and Compliance User Provisioning Security Monitoring and Remediation Log Management Compliance Integration Compliance Assurance Secure Access Identity Management
  • 11. © Novell, Inc. All rights reserved.11 Identity Serves As the Building Block Identify Secure Comply
  • 12. © Novell, Inc. All rights reserved.12 Identity Serves As the Building Block Identify •Use identity as the basic building block for people and resources •Improve efficiency while lowering the total cost of ownership Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer. Novell Novell Novell Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) 24% more than Novell 23% more than Novell 25% more than Novell All Figures Based on 5 Year Present Value
  • 13. © Novell, Inc. All rights reserved.13 Integration with Security Protects the Network Secure •Answer the basic questions: “What happened? Who did it? Should I care?” •Feel confident in moving to cloud based services User Activity Monitoring • Manage user access risk • Monitor identity fraud • Enterprise view
  • 14. © Novell, Inc. All rights reserved.14 Leverage Compliance Investments to Get Agile •Increase agility – controls can provide insight beyond just assuring compliance Comply Continuous Compliance •Management, monitoring and enforcement of IT controls so you can mitigate risks before they impact business objectives. Control Flexibility
  • 15. © Novell, Inc. All rights reserved.15 An Identity-Infused Enterprise moves at the speed of business Less than 20 percent of enterprises know who has access to appropriate resources By 2012, 79 percent of CIO's will leverage the cloud but are unsure of data access and security 70 percent of enterprises want a single view across all systems to identity threats and violations Rich information on user access, privileges and provisioning activity to answer any GRC questions Enhanced security for cloud computing model through extension of enterprise policies to the cloud applications Centralized point of control for unified policy-based management across different systems – both ‘on premise’ and in the cloud With an Identity-Infused Enterprise Flexible Architecture That Supports the Cloud Novell customer survey with infosurv around identity and security challenges - 2009 Without Identity Foundation With Identity Foundation
  • 16. Appendix
  • 17. © Novell, Inc. All rights reserved.17 IT Service Management IT Service Management IT Service Management Business Service Management Business Service Management Business Service Management Physical Virtual Cloud The Customer Challenge: Manage a Siloed Infrastructure Governance and Compliance Governance and Compliance Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Firewall
  • 18. © Novell, Inc. All rights reserved.18 IT Service Management Business Service Management Governance and Compliance Intelligent Workload Management: From Silos to Services Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Secure Measure Manage Firewall Physical Virtual Cloud
  • 19. © Novell, Inc. All rights reserved.19 Isolated Identity Awareness WorkloadIQ: Integrating Identity into Management Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Security and Compliance Management Resource Management Custom, Supported Operating System
  • 20. © Novell, Inc. All rights reserved.20 Physical Virtual Cloud WorkloadIQ: Lifecycle Activities