• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

The Identity-infused Enterprise

on

  • 2,238 views

Ben Goodman from Novell presentation from Gartner IAM event in November 2010

Ben Goodman from Novell presentation from Gartner IAM event in November 2010

Statistics

Views

Total Views
2,238
Views on SlideShare
2,237
Embed Views
1

Actions

Likes
0
Downloads
39
Comments
0

1 Embed 1

http://wwwstage.provo.novell.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    The Identity-infused Enterprise The Identity-infused Enterprise Presentation Transcript

    • The Identity-infused Enterprise Identify, Secure, Comply Ben Goodman Technolgy Strategist, Identity and Security bgoodman@novell.com November 15, 2010
    • Making IT Work As One ™ 2 © Novell, Inc. All rights reserved.
    • 21st Century Computing The risks and challenges of computing across multiple environments must be controlled. Users should have unimpeded access to the full computing services they need to do their jobs right. Computing should be secure, compliant and portable. 3 © Novell, Inc. All rights reserved.
    • Identity Is Always the Foundation Mobile Devices Personal Computers Identity Foundation 4 © Novell, Inc. All rights reserved.
    • Identity Is Always the Foundation Mobile Devices World Wide Web Personal Computers Closed Networks Identity Foundation 5 © Novell, Inc. All rights reserved.
    • Identity Is Always the Foundation Mobile Devices World Wide Web Virtualized Workloads Personal Computers Closed Networks Traditional Workloads on Dedicated Servers Identity Foundation 6 © Novell, Inc. All rights reserved.
    • New Technologies Mean New Flexibility Virtualization Cloud “Anything” as a Service Mobile devices 7 © Novell, Inc. All rights reserved.
    • Regulations Require More Control Operational Risk 8 © Novell, Inc. All rights reserved.
    • It's All about Balance Control Flexibility 9 © Novell, Inc. All rights reserved.
    • The Identity-Infused Enterprise Core to Enterprise Security and Compliance User Log Provisioning Management Secure Compliance Access Identity Assurance Management Security Compliance Monitoring and Integration Remediation 10 © Novell, Inc. All rights reserved.
    • Identity Serves As the Building Block Comply Secure Identify 11 © Novell, Inc. All rights reserved.
    • Identity Serves As the Building Block Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer. Identify Novell 24% more than Novell Competitive Set Average (Oracle, CA, IBM, Courion) • Use identity as the basic Novell 25% more than Novell building block for people and resources Competitive Set Average (Oracle, CA, IBM, Courion) • Improve efficiency while lowering the total cost of Novell 23% more than Novell ownership Competitive Set Average (Oracle, CA, IBM, Courion) All Figures Based on 5 Year Present Value 12 © Novell, Inc. All rights reserved.
    • Integration with Security Protects the Network Secure User Activity Monitoring • Manage user access risk • Monitor identity fraud • Answer the basic questions: • Enterprise view “What happened? Who did it? Should I care?” • Feel confident in moving to cloud based services 13 © Novell, Inc. All rights reserved.
    • Leverage Compliance Investments to Get Agile Comply Continuous Compliance • Increase agility – controls can •Management, monitoring and enforcement of IT provide insight beyond just controls so you can mitigate risks before they impact assuring compliance business objectives. Control Flexibility 14 © Novell, Inc. All rights reserved.
    • With an Identity-Infused Enterprise Flexible Architecture That Supports the Cloud Without Identity Foundation With Identity Foundation Less than 20 percent of Rich information on user access, enterprises know who has access privileges and provisioning activity to appropriate resources to answer any GRC questions By 2012, 79 percent of CIO's will Enhanced security for cloud leverage the cloud but are unsure of computing model through extension data access and security of enterprise policies to the cloud applications 70 percent of enterprises want a Centralized point of control for single view across all systems to unified policy-based management identity threats and violations across different systems – both ‘on premise’ and in the cloud An Identity-Infused Enterprise moves at the speed of business 15 © Novell, Inc. All rights reserved. Novell customer survey with infosurv around identity and security challenges - 2009
    • Appendix
    • The Customer Challenge: Manage a Siloed Infrastructure Internal Cloud (On-Premise) External Cloud (Off-Premise) Governance and Governance and Governance and Compliance Compliance Compliance Business Service Business Service Business Service Firewall Management Management Management IT Service IT Service IT Service Management Management Management Physical Virtual Cloud 17 © Novell, Inc. All rights reserved.
    • Intelligent Workload Management: From Silos to Services Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Governance and Compliance Secure Firewall Business Service Management Measure IT Service Management Manage Physical Virtual Cloud 18 © Novell, Inc. All rights reserved.
    • WorkloadIQ: Integrating Identity into Management General Resource Purpose Management Operating System Security and Resource Service Service Compliance Management Management Management Management Security and Custom, Compliance Supported Management Operating System Isolated Identity Awareness 19 © Novell, Inc. All rights reserved.
    • WorkloadIQ: Lifecycle Activities Physical Virtual Cloud 20 © Novell, Inc. All rights reserved.