The Identity-infused
Enterprise
Identify, Secure, Comply
Ben Goodman
Technolgy Strategist, Identity and Security
bgoodman@novell.com
November 15, 2010
© Novell, Inc. All rights reserved.2
Making IT Work As One™
© Novell, Inc. All rights reserved.3
21st
Century Computing
The risks and challenges of computing across
multiple environments must be controlled.
Users should have unimpeded access to the
full computing services they need to do their
jobs right.
Computing should be secure, compliant
and portable.
© Novell, Inc. All rights reserved.4
Identity Is Always the Foundation
Mobile Devices
Personal Computers
Identity Foundation
© Novell, Inc. All rights reserved.5
Mobile Devices
Personal Computers
Identity Foundation
World Wide Web
Closed Networks
Identity Is Always the Foundation
© Novell, Inc. All rights reserved.6
Mobile Devices
Personal Computers
Identity Foundation
Virtualized Workloads
Traditional Workloads on
Dedicated Servers
World Wide Web
Closed Networks
Identity Is Always the Foundation
© Novell, Inc. All rights reserved.7
New Technologies
Mean New Flexibility
Virtualization Cloud
“Anything” as a Service Mobile devices
© Novell, Inc. All rights reserved.8
Regulations Require
More Control
RiskOperational
© Novell, Inc. All rights reserved.9
It's All about Balance
Control
Flexibility
© Novell, Inc. All rights reserved.10
The Identity-Infused Enterprise
Core to Enterprise Security and Compliance
User
Provisioning
Security
Monitoring and
Remediation
Log
Management
Compliance
Integration
Compliance
Assurance
Secure
Access Identity
Management
© Novell, Inc. All rights reserved.11
Identity Serves As the Building Block
Identify
Secure
Comply
© Novell, Inc. All rights reserved.12
Identity Serves As the Building Block
Identify
•Use identity as the basic
building block for people and
resources
•Improve efficiency while
lowering the total cost of
ownership
Novell Identity Manager and Access Manager products have a lower
five year total cost of ownership (TCO) than competitive products
because they are easier to configure, integrate, and administer.
Novell
Novell
Novell
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
24% more than Novell
23% more than Novell
25% more than Novell
All Figures Based on 5
Year Present Value
© Novell, Inc. All rights reserved.13
Integration with Security Protects the
Network
Secure
•Answer the basic questions:
“What happened? Who did
it? Should I care?”
•Feel confident in moving to
cloud based services
User Activity Monitoring
• Manage user access risk
• Monitor identity fraud
• Enterprise view
© Novell, Inc. All rights reserved.14
Leverage Compliance Investments to
Get Agile
•Increase agility – controls can
provide insight beyond just
assuring compliance
Comply
Continuous Compliance
•Management, monitoring and enforcement of IT
controls so you can mitigate risks before they impact
business objectives.
Control Flexibility
© Novell, Inc. All rights reserved.15
An Identity-Infused Enterprise moves at the
speed of business
Less than 20 percent of
enterprises know who has access
to appropriate resources
By 2012, 79 percent of CIO's will
leverage the cloud but are unsure of
data access and security
70 percent of enterprises want a
single view across all systems to
identity threats and violations
Rich information on user access,
privileges and provisioning activity
to answer any GRC questions
Enhanced security for cloud
computing model through extension
of enterprise policies to the cloud
applications
Centralized point of control for
unified policy-based management
across different systems – both ‘on
premise’ and in the cloud
With an Identity-Infused Enterprise
Flexible Architecture That Supports the Cloud
Novell customer survey with infosurv around identity and security challenges - 2009
Without Identity Foundation With Identity Foundation
Appendix
© Novell, Inc. All rights reserved.17
IT Service
Management
IT Service
Management
IT Service
Management
Business Service
Management
Business Service
Management
Business Service
Management
Physical Virtual Cloud
The Customer Challenge:
Manage a Siloed Infrastructure
Governance and
Compliance
Governance and
Compliance
Governance and
Compliance
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Firewall
© Novell, Inc. All rights reserved.18
IT Service Management
Business Service Management
Governance and Compliance
Intelligent Workload Management:
From Silos to Services
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Build
Secure
Measure
Manage
Firewall
Physical Virtual Cloud
© Novell, Inc. All rights reserved.19
Isolated Identity Awareness
WorkloadIQ:
Integrating Identity into Management
Resource
Management
General
Purpose
Operating
System
Security and
Compliance
Management
Service
Management
Service
Management
Security and
Compliance
Management
Resource
Management
Custom,
Supported
Operating
System
© Novell, Inc. All rights reserved.20
Physical Virtual Cloud
WorkloadIQ: Lifecycle Activities
The Identity-infused Enterprise

The Identity-infused Enterprise

  • 1.
    The Identity-infused Enterprise Identify, Secure,Comply Ben Goodman Technolgy Strategist, Identity and Security bgoodman@novell.com November 15, 2010
  • 2.
    © Novell, Inc.All rights reserved.2 Making IT Work As One™
  • 3.
    © Novell, Inc.All rights reserved.3 21st Century Computing The risks and challenges of computing across multiple environments must be controlled. Users should have unimpeded access to the full computing services they need to do their jobs right. Computing should be secure, compliant and portable.
  • 4.
    © Novell, Inc.All rights reserved.4 Identity Is Always the Foundation Mobile Devices Personal Computers Identity Foundation
  • 5.
    © Novell, Inc.All rights reserved.5 Mobile Devices Personal Computers Identity Foundation World Wide Web Closed Networks Identity Is Always the Foundation
  • 6.
    © Novell, Inc.All rights reserved.6 Mobile Devices Personal Computers Identity Foundation Virtualized Workloads Traditional Workloads on Dedicated Servers World Wide Web Closed Networks Identity Is Always the Foundation
  • 7.
    © Novell, Inc.All rights reserved.7 New Technologies Mean New Flexibility Virtualization Cloud “Anything” as a Service Mobile devices
  • 8.
    © Novell, Inc.All rights reserved.8 Regulations Require More Control RiskOperational
  • 9.
    © Novell, Inc.All rights reserved.9 It's All about Balance Control Flexibility
  • 10.
    © Novell, Inc.All rights reserved.10 The Identity-Infused Enterprise Core to Enterprise Security and Compliance User Provisioning Security Monitoring and Remediation Log Management Compliance Integration Compliance Assurance Secure Access Identity Management
  • 11.
    © Novell, Inc.All rights reserved.11 Identity Serves As the Building Block Identify Secure Comply
  • 12.
    © Novell, Inc.All rights reserved.12 Identity Serves As the Building Block Identify •Use identity as the basic building block for people and resources •Improve efficiency while lowering the total cost of ownership Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer. Novell Novell Novell Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) 24% more than Novell 23% more than Novell 25% more than Novell All Figures Based on 5 Year Present Value
  • 13.
    © Novell, Inc.All rights reserved.13 Integration with Security Protects the Network Secure •Answer the basic questions: “What happened? Who did it? Should I care?” •Feel confident in moving to cloud based services User Activity Monitoring • Manage user access risk • Monitor identity fraud • Enterprise view
  • 14.
    © Novell, Inc.All rights reserved.14 Leverage Compliance Investments to Get Agile •Increase agility – controls can provide insight beyond just assuring compliance Comply Continuous Compliance •Management, monitoring and enforcement of IT controls so you can mitigate risks before they impact business objectives. Control Flexibility
  • 15.
    © Novell, Inc.All rights reserved.15 An Identity-Infused Enterprise moves at the speed of business Less than 20 percent of enterprises know who has access to appropriate resources By 2012, 79 percent of CIO's will leverage the cloud but are unsure of data access and security 70 percent of enterprises want a single view across all systems to identity threats and violations Rich information on user access, privileges and provisioning activity to answer any GRC questions Enhanced security for cloud computing model through extension of enterprise policies to the cloud applications Centralized point of control for unified policy-based management across different systems – both ‘on premise’ and in the cloud With an Identity-Infused Enterprise Flexible Architecture That Supports the Cloud Novell customer survey with infosurv around identity and security challenges - 2009 Without Identity Foundation With Identity Foundation
  • 16.
  • 17.
    © Novell, Inc.All rights reserved.17 IT Service Management IT Service Management IT Service Management Business Service Management Business Service Management Business Service Management Physical Virtual Cloud The Customer Challenge: Manage a Siloed Infrastructure Governance and Compliance Governance and Compliance Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Firewall
  • 18.
    © Novell, Inc.All rights reserved.18 IT Service Management Business Service Management Governance and Compliance Intelligent Workload Management: From Silos to Services Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Secure Measure Manage Firewall Physical Virtual Cloud
  • 19.
    © Novell, Inc.All rights reserved.19 Isolated Identity Awareness WorkloadIQ: Integrating Identity into Management Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Security and Compliance Management Resource Management Custom, Supported Operating System
  • 20.
    © Novell, Inc.All rights reserved.20 Physical Virtual Cloud WorkloadIQ: Lifecycle Activities