SlideShare a Scribd company logo
1 of 18
Download to read offline
Securing Your Cloud Applications
with Novell Cloud Security Service
                                ®




Dale Olds, Distinguished Engineer
Ben Fjeldstet, Sr. Engineer
Tom Cecere, Product Strategy
Novell Cloud Security Service
March 24, 2010
Key Takeaways

             SaaS adoption is projected to increase three-fold to
             US$14 Billion by 2012, according to Gartner.
             “SaaS sprawl” is causing IT administration and
             security nightmare for enterprises.
             Enforcing consistent policies for internal and cloud
             applications is key to effective governance.
             Novell Cloud Security Service allows organizations
                              ®



             to extend its internal policies, roles and workflow and
             manage a multi-SaaS environment consistently.
             Novell is a leading provider of identity and security
             solutions and has been for over 20 years.
2   © Novell, Inc. All rights reserved.
Agenda

      Why Novell Cloud Security Service (NCSS)?
                                          ®




       What Is NCSS and How Does It Work?


       Demo


       How Is NCSS Different?




3   © Novell, Inc. All rights reserved.
SaaS Adoption Growing As Model
    Matures: $8B in ’09 to $14.7B in ‘12




       With Customer Relationship Management and
       Content/Communication and Collaboration
       leading the way
4   © Novell, Inc. All rights reserved.   Source: Gartner Saas Trends 2007-2012
Creating IT Administration Nightmare

                                          User data/
                                          permissions
                User data/                                                  User data/
                permissions                                                 permissions




         User data/                                                               User data/
         permissions                                                              permissions

                                                                 Users


       Enterprise Challenge
                                                                    Apps
          •                 IT Department
              Multiple usernames/passwords
          •   Multiple identity silos
          •   Disparate administration tools
          •   Challenge in timely deprovisioning accountsSystems/
                             Directory     User data/     of ex-employees
                                                   permissions      tools

5   © Novell, Inc. All rights reserved.
And Concerns Over Security

    •   DuPont: “When a sales person leaves the company, it
        takes 10 days to de-provision their account in
        SalesForce.com. Until then, the sales person has
        access to his account. This is a real problem.”

    •   International Fragrances & Flavors: At an executive
        briefing told us, “We cannot use SaaS until it uses our
        identity management systems.”

    •   “What’s keeping us from getting more large enterprise
        customers? Trust.” –David Carroll, Salesforce.com
        evangelist

6   © Novell, Inc. All rights reserved.
Agenda

      Why Novell Cloud Security Service (NCSS)?


      What Is NCSS and How Does It Work?


      Demo


      How Is NCSS Different?




7   © Novell, Inc. All rights reserved.
Novell Cloud Security Service (NCSS)
                            ®




    NCSS is a Web-based identity and access solution that enables an
    enterprise to manage a multi-SaaS environment and enforce its
    policies, roles and workflows in the cloud.


                                                      User Identity and Roles

                                                Simplified Single Sign-on
                                                Enterprise-directed Provisioning/Deprovisioning
       Enterprise with                          Leveraging Enterprise-defined Identities & Roles
                                                                                                   Cloud vendor
       any credentials
                                                                                                    with NCSS
           system
                                          Security Montioring/Compliance Reporting
                                          Inspecting WRT Specific Tenants


                                                       Compliance Events




8   © Novell, Inc. All rights reserved.
How Does NCSS Work?

           Enterprise                                                                  Relying Party
           User Store                                                                   Participant
                                                         Novell Cloud       2
                                                       Security Services
                                              NCS             IdP          SAML 1,
                                              Secure                       SAML 2,
           User Store                         Bridge                                   SaaS Application
                                                        AuthN Service      WS-Fed




                                                         User                       User Access
                                          1     Authentication                   SaaS Resources
                                                                                                  3




              NCSS handles both use cases: A user directly logging into a cloud
       1
              service or user logging into their enterprise system first.

9   © Novell, Inc. All rights reserved.
NCSS Key Features
     1. Active security services for annexing cloud services into an
        enterprise, including
            •   Federated authentication and provisioning,
                role mapping, and audit                      NCSS Dashboard “Risk Meter”
                event routing

     2. Connectors to
            •   SaaS and PaaS providers
            •   Enterprise identity systems

     3. Deployment, configuration
        and monitoring tools for
        service management of
        NCSS by cloud providers
     4. Per-enterprise view and management of their use of SaaS and
        PaaS, and the connections to their internal systems

10   © Novell, Inc. All rights reserved.
Demo of Novell Cloud Security Service
              ®
Benefits

     •   Automatic identity federation
     •   Single sign-on to SaaS applications securely and automatically
     •   Enforce your internal policies, roles and workflows in the cloud
     •   Keep sensitive information behind the firewall
     •   Zero day start/stop
     •   Get detailed audit logs from your cloud applications
     •   Manage all your SaaS applications via a single dashboard
         interface
     •   Reduce IT costs from better SaaS administration
     •   Supports multiple industry standards


12   © Novell, Inc. All rights reserved.
Agenda

       Why Novell Cloud Security Service (NCSS)?


       What Is NCSS and How Does It Work?


       Demo


       How Is NCSS Different?




13   © Novell, Inc. All rights reserved.
Competitive Advantages

                High Security
                      –   Firewall safe
                      –   Automated alerts
                Ease of Use and Management
                      –   Audit report
                      –   Intuitive management dashboard interface
                Integration with On-premise Infrastructure
                      –   Leverage existing identity infrastructure
                      –   Extend enterprise roles, policies and workflows into
                          the cloud
                      –   Future integrations with SIEM, workflows, usage data
                      –   Support for multiple industry standards
14   © Novell, Inc. All rights reserved.
Competitive Advantages

                Intangibles
                     –   Only vendor to offer identity and access solutions for
                         both sides of the cloud
                     –   Foundational block for an enterprise intelligent
                         workload management strategy
                     –   Financially stable vendor: US$1B cash—able to build
                         and buy
                     –   Extensive network of ISVs
                     –   24x7 Worldwide support




15   © Novell, Inc. All rights reserved.
Questions and Answers
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

What's hot

Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
 
Novell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for NonprofitsNovell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for NonprofitsNovell
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...InSync2011
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
 
CloudBees PaaS Presentation at Oakland JUG
CloudBees PaaS Presentation at Oakland JUGCloudBees PaaS Presentation at Oakland JUG
CloudBees PaaS Presentation at Oakland JUGCloudBees
 
Building a Service-driven Enterprise Cloud
Building a Service-driven Enterprise CloudBuilding a Service-driven Enterprise Cloud
Building a Service-driven Enterprise CloudNovell
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Novell
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementNovell
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
 
20th March Session Four by Rod Grigson
20th March Session Four by Rod Grigson20th March Session Four by Rod Grigson
20th March Session Four by Rod GrigsonSharath Kumar
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08gueste9924aa
 
SQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkSQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkEduardo Castro
 
Brochure Virtualization
Brochure VirtualizationBrochure Virtualization
Brochure Virtualizationbryanpsu
 
13 0001-01 meet cloud one
13 0001-01 meet cloud one13 0001-01 meet cloud one
13 0001-01 meet cloud oneBret Kramer
 
Spring, Java Web Apps to the cloud
Spring, Java Web Apps to the cloudSpring, Java Web Apps to the cloud
Spring, Java Web Apps to the cloudCloudBees
 
Hanu cloud computing expertise
Hanu cloud computing expertiseHanu cloud computing expertise
Hanu cloud computing expertiseHanu Software
 

What's hot (20)

Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
 
Novell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for NonprofitsNovell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for Nonprofits
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
 
CloudBees PaaS Presentation at Oakland JUG
CloudBees PaaS Presentation at Oakland JUGCloudBees PaaS Presentation at Oakland JUG
CloudBees PaaS Presentation at Oakland JUG
 
Building a Service-driven Enterprise Cloud
Building a Service-driven Enterprise CloudBuilding a Service-driven Enterprise Cloud
Building a Service-driven Enterprise Cloud
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration Management
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
 
20th March Session Four by Rod Grigson
20th March Session Four by Rod Grigson20th March Session Four by Rod Grigson
20th March Session Four by Rod Grigson
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08
 
SQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkSQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar Biztalk
 
Brochure Virtualization
Brochure VirtualizationBrochure Virtualization
Brochure Virtualization
 
13 0001-01 meet cloud one
13 0001-01 meet cloud one13 0001-01 meet cloud one
13 0001-01 meet cloud one
 
Open Stack China Trip Sz0922
Open Stack China Trip Sz0922Open Stack China Trip Sz0922
Open Stack China Trip Sz0922
 
Spring, Java Web Apps to the cloud
Spring, Java Web Apps to the cloudSpring, Java Web Apps to the cloud
Spring, Java Web Apps to the cloud
 
Hanu cloud computing expertise
Hanu cloud computing expertiseHanu cloud computing expertise
Hanu cloud computing expertise
 

Similar to Securing Your Cloud Applications with Novell Cloud Security Service

How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
Securely access and audit the cloud
Securely access and audit the cloudSecurely access and audit the cloud
Securely access and audit the cloudNovell
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...Novell
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs EliteJon G. Hall
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudCA API Management
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 

Similar to Securing Your Cloud Applications with Novell Cloud Security Service (20)

How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Securely access and audit the cloud
Securely access and audit the cloudSecurely access and audit the cloud
Securely access and audit the cloud
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 

More from Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Securing Your Cloud Applications with Novell Cloud Security Service

  • 1. Securing Your Cloud Applications with Novell Cloud Security Service ® Dale Olds, Distinguished Engineer Ben Fjeldstet, Sr. Engineer Tom Cecere, Product Strategy Novell Cloud Security Service March 24, 2010
  • 2. Key Takeaways SaaS adoption is projected to increase three-fold to US$14 Billion by 2012, according to Gartner. “SaaS sprawl” is causing IT administration and security nightmare for enterprises. Enforcing consistent policies for internal and cloud applications is key to effective governance. Novell Cloud Security Service allows organizations ® to extend its internal policies, roles and workflow and manage a multi-SaaS environment consistently. Novell is a leading provider of identity and security solutions and has been for over 20 years. 2 © Novell, Inc. All rights reserved.
  • 3. Agenda Why Novell Cloud Security Service (NCSS)? ® What Is NCSS and How Does It Work? Demo How Is NCSS Different? 3 © Novell, Inc. All rights reserved.
  • 4. SaaS Adoption Growing As Model Matures: $8B in ’09 to $14.7B in ‘12 With Customer Relationship Management and Content/Communication and Collaboration leading the way 4 © Novell, Inc. All rights reserved. Source: Gartner Saas Trends 2007-2012
  • 5. Creating IT Administration Nightmare User data/ permissions User data/ User data/ permissions permissions User data/ User data/ permissions permissions Users Enterprise Challenge Apps • IT Department Multiple usernames/passwords • Multiple identity silos • Disparate administration tools • Challenge in timely deprovisioning accountsSystems/ Directory User data/ of ex-employees permissions tools 5 © Novell, Inc. All rights reserved.
  • 6. And Concerns Over Security • DuPont: “When a sales person leaves the company, it takes 10 days to de-provision their account in SalesForce.com. Until then, the sales person has access to his account. This is a real problem.” • International Fragrances & Flavors: At an executive briefing told us, “We cannot use SaaS until it uses our identity management systems.” • “What’s keeping us from getting more large enterprise customers? Trust.” –David Carroll, Salesforce.com evangelist 6 © Novell, Inc. All rights reserved.
  • 7. Agenda Why Novell Cloud Security Service (NCSS)? What Is NCSS and How Does It Work? Demo How Is NCSS Different? 7 © Novell, Inc. All rights reserved.
  • 8. Novell Cloud Security Service (NCSS) ® NCSS is a Web-based identity and access solution that enables an enterprise to manage a multi-SaaS environment and enforce its policies, roles and workflows in the cloud. User Identity and Roles Simplified Single Sign-on Enterprise-directed Provisioning/Deprovisioning Enterprise with Leveraging Enterprise-defined Identities & Roles Cloud vendor any credentials with NCSS system Security Montioring/Compliance Reporting Inspecting WRT Specific Tenants Compliance Events 8 © Novell, Inc. All rights reserved.
  • 9. How Does NCSS Work? Enterprise Relying Party User Store Participant Novell Cloud 2 Security Services NCS IdP SAML 1, Secure SAML 2, User Store Bridge SaaS Application AuthN Service WS-Fed User User Access 1 Authentication SaaS Resources 3 NCSS handles both use cases: A user directly logging into a cloud 1 service or user logging into their enterprise system first. 9 © Novell, Inc. All rights reserved.
  • 10. NCSS Key Features 1. Active security services for annexing cloud services into an enterprise, including • Federated authentication and provisioning, role mapping, and audit NCSS Dashboard “Risk Meter” event routing 2. Connectors to • SaaS and PaaS providers • Enterprise identity systems 3. Deployment, configuration and monitoring tools for service management of NCSS by cloud providers 4. Per-enterprise view and management of their use of SaaS and PaaS, and the connections to their internal systems 10 © Novell, Inc. All rights reserved.
  • 11. Demo of Novell Cloud Security Service ®
  • 12. Benefits • Automatic identity federation • Single sign-on to SaaS applications securely and automatically • Enforce your internal policies, roles and workflows in the cloud • Keep sensitive information behind the firewall • Zero day start/stop • Get detailed audit logs from your cloud applications • Manage all your SaaS applications via a single dashboard interface • Reduce IT costs from better SaaS administration • Supports multiple industry standards 12 © Novell, Inc. All rights reserved.
  • 13. Agenda Why Novell Cloud Security Service (NCSS)? What Is NCSS and How Does It Work? Demo How Is NCSS Different? 13 © Novell, Inc. All rights reserved.
  • 14. Competitive Advantages High Security – Firewall safe – Automated alerts Ease of Use and Management – Audit report – Intuitive management dashboard interface Integration with On-premise Infrastructure – Leverage existing identity infrastructure – Extend enterprise roles, policies and workflows into the cloud – Future integrations with SIEM, workflows, usage data – Support for multiple industry standards 14 © Novell, Inc. All rights reserved.
  • 15. Competitive Advantages Intangibles – Only vendor to offer identity and access solutions for both sides of the cloud – Foundational block for an enterprise intelligent workload management strategy – Financially stable vendor: US$1B cash—able to build and buy – Extensive network of ISVs – 24x7 Worldwide support 15 © Novell, Inc. All rights reserved.
  • 17.
  • 18. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.