Successfully reported this slideshow.
Novell ®   Cloud Security Service Reducing Risk by Securing the Cloud‏ <ul><ul><li>Anita Moorthy </li></ul></ul><ul><ul><l...
<ul><li>SaaS adoption is projected to  increase three-fold  to US$14 Billion by 2012, according to Gartner. </li></ul><ul>...
<ul><li>Why Novell Cloud Security Service (NCSS)? </li></ul><ul><li>What Is NCSS and How Does It Work? </li></ul><ul><li>H...
Source: Gartner Saas Trends 2007-2012 SaaS Adoption Growing  US$8B in ’09 to US$14.7B in ’12 With CRM, content/communicati...
User data/ permissions Systems/ tools Directory Apps IT Department Users <ul><li>Enterprise Challenge </li></ul><ul><li>Mu...
<ul><ul><li>DuPont:  “When a sales person leaves the company, it takes 10 days to de-provision their account in SalesForce...
<ul><li>Why Novell Cloud Security Service (NCSS)? </li></ul><ul><li>What Is NCSS and How Does It Work? </li></ul><ul><li>H...
NCSS is a Web-based identity and access solution that enables an enterprise to  manage a multi-SaaS  environment and enfor...
How Does NCSS Work? Enterprise 1 NCSS handles both use cases: A user directly logging into a cloud service or user logging...
<ul><li>Active security services for annexing cloud services into an enterprise, including  </li></ul><ul><ul><li>Federate...
<ul><li>Automatic  identity federation </li></ul><ul><li>Single sign-on  to SaaS applications securely and automatically <...
<ul><li>Why Novell Cloud Security Service (NCSS)? </li></ul><ul><li>What Is NCSS and How Does It Work? </li></ul><ul><li>H...
<ul><li>High Security </li></ul><ul><ul><li>Firewall safe </li></ul></ul><ul><ul><li>Automated alerts </li></ul></ul><ul><...
<ul><li>Intangibles </li></ul><ul><li>Only vendor to offer identity and access solutions for both sides of the cloud </li>...
Q&A
 
<ul><li>Unpublished Work of Novell, Inc. All Rights Reserved. </li></ul><ul><li>This work is an unpublished work and conta...
Upcoming SlideShare
Loading in …5
×

Securely access and audit the cloud

1,421 views

Published on

Published in: Technology
  • Be the first to comment

Securely access and audit the cloud

  1. 1. Novell ® Cloud Security Service Reducing Risk by Securing the Cloud‏ <ul><ul><li>Anita Moorthy </li></ul></ul><ul><ul><li>Senior Solutions Manager, Cloud security </li></ul></ul>
  2. 2. <ul><li>SaaS adoption is projected to increase three-fold to US$14 Billion by 2012, according to Gartner. </li></ul><ul><li>“ SaaS sprawl ” is causing IT administration and security nightmare for enterprises. </li></ul><ul><li>Enforcing consistent policies for internal and cloud applications is key to effective governance. </li></ul><ul><li>Novell ® Cloud Security Service allows organizations to extend its internal policies , roles and workflow and manage a multi-SaaS environment consistently. </li></ul><ul><li>Novell is a leading provider of identity and security solutions and has been for over 20 years. </li></ul>Key Takeaways
  3. 3. <ul><li>Why Novell Cloud Security Service (NCSS)? </li></ul><ul><li>What Is NCSS and How Does It Work? </li></ul><ul><li>How Is NCSS Different? </li></ul>Agenda
  4. 4. Source: Gartner Saas Trends 2007-2012 SaaS Adoption Growing US$8B in ’09 to US$14.7B in ’12 With CRM, content/communication and collaboration leading the way.
  5. 5. User data/ permissions Systems/ tools Directory Apps IT Department Users <ul><li>Enterprise Challenge </li></ul><ul><li>Multiple usernames/passwords </li></ul><ul><li>Multiple identity silos </li></ul><ul><li>Disparate administration tools </li></ul><ul><li>Challenge in timely deprovisioning accounts of ex-employees </li></ul>User data/ permissions User data/ permissions User data/ permissions User data/ permissions User data/ permissions Creating IT Administration Nightmare
  6. 6. <ul><ul><li>DuPont: “When a sales person leaves the company, it takes 10 days to de-provision their account in SalesForce.com. Until then, the sales person has access to his account. This is a real problem.” </li></ul></ul><ul><ul><li>International Fragrances & Flavors: At an executive briefing told us, “We cannot use SaaS until it uses our identity management systems.” </li></ul></ul><ul><ul><li>“ What’s keeping us from getting more large enterprise customers? Trust.” –David Carroll, Salesforce.com evangelist </li></ul></ul>And Concerns Over Security
  7. 7. <ul><li>Why Novell Cloud Security Service (NCSS)? </li></ul><ul><li>What Is NCSS and How Does It Work? </li></ul><ul><li>How Is NCSS Different? </li></ul>Agenda
  8. 8. NCSS is a Web-based identity and access solution that enables an enterprise to manage a multi-SaaS environment and enforce its policies, roles and workflows in the cloud. Novell ® Cloud Security Service (NCSS) Simplified Single Sign-on Enterprise-directed Provisioning/Deprovisioning Leveraging Enterprise-defined Identities & Roles Security Montioring/Compliance Reporting Inspecting WRT Specific Tenants Enterprise with any credentials system Cloud vendor with NCSS User Identity and Roles Compliance Events
  9. 9. How Does NCSS Work? Enterprise 1 NCSS handles both use cases: A user directly logging into a cloud service or user logging into their enterprise system first.
  10. 10. <ul><li>Active security services for annexing cloud services into an enterprise, including </li></ul><ul><ul><li>Federated authentication and provisioning, role mapping, and audit event routing </li></ul></ul><ul><li>Connectors to </li></ul><ul><ul><li>SaaS and PaaS providers </li></ul></ul><ul><ul><li>Enterprise identity systems </li></ul></ul><ul><li>3. Deployment, configuration and monitoring tools for service management of NCSS by cloud providers </li></ul><ul><li>4. Per-enterprise view and management of their use of SaaS and PaaS, and the connections to their internal systems </li></ul>NCSS Dashboard “ Risk Meter” NCSS Key Features
  11. 11. <ul><li>Automatic identity federation </li></ul><ul><li>Single sign-on to SaaS applications securely and automatically </li></ul><ul><li>Enforce your internal policies, roles and workflows in the cloud </li></ul><ul><li>Keep sensitive information behind the firewall </li></ul><ul><li>Zero day start/stop </li></ul><ul><li>Get detailed audit logs from your cloud applications </li></ul><ul><li>Manage all your SaaS applications via a single dashboard interface </li></ul><ul><li>Reduce IT costs from better SaaS administration </li></ul><ul><li>Supports multiple industry standards </li></ul>Benefits
  12. 12. <ul><li>Why Novell Cloud Security Service (NCSS)? </li></ul><ul><li>What Is NCSS and How Does It Work? </li></ul><ul><li>How Is NCSS Different? </li></ul>Agenda
  13. 13. <ul><li>High Security </li></ul><ul><ul><li>Firewall safe </li></ul></ul><ul><ul><li>Automated alerts </li></ul></ul><ul><li>Ease of Use and Management </li></ul><ul><ul><li>Audit report </li></ul></ul><ul><ul><li>Intuitive management dashboard interface </li></ul></ul><ul><li>Integration with On-premise Infrastructure </li></ul><ul><ul><li>Leverage existing identity infrastructure </li></ul></ul><ul><ul><li>Extend enterprise roles, policies and workflows into the cloud </li></ul></ul><ul><ul><li>Future integrations with SIEM, workflows, usage data </li></ul></ul><ul><ul><li>Support for multiple industry standards </li></ul></ul>Competitive Advantages
  14. 14. <ul><li>Intangibles </li></ul><ul><li>Only vendor to offer identity and access solutions for both sides of the cloud </li></ul><ul><li>Foundational block for an enterprise intelligent workload management strategy </li></ul><ul><li>Financially stable vendor: US$1B cash—able to build and buy </li></ul><ul><li>Extensive network of ISVs </li></ul><ul><li>24x7 Worldwide support </li></ul>Competitive Advantages
  15. 15. Q&A
  16. 17. <ul><li>Unpublished Work of Novell, Inc. All Rights Reserved. </li></ul><ul><li>This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. </li></ul><ul><li>General Disclaimer </li></ul><ul><li>This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners. </li></ul>

×