More Related Content
Similar to The Identity-infused Enterprise (20)
The Identity-infused Enterprise
- 3. © Novell, Inc. All rights reserved.3
21st
Century Computing
The risks and challenges of computing across
multiple environments must be controlled.
Users should have unimpeded access to the
full computing services they need to do their
jobs right.
Computing should be secure, compliant
and portable.
- 4. © Novell, Inc. All rights reserved.4
Identity Is Always the Foundation
Mobile Devices
Personal Computers
Identity Foundation
- 5. © Novell, Inc. All rights reserved.5
Mobile Devices
Personal Computers
Identity Foundation
World Wide Web
Closed Networks
Identity Is Always the Foundation
- 6. © Novell, Inc. All rights reserved.6
Mobile Devices
Personal Computers
Identity Foundation
Virtualized Workloads
Traditional Workloads on
Dedicated Servers
World Wide Web
Closed Networks
Identity Is Always the Foundation
- 7. © Novell, Inc. All rights reserved.7
New Technologies
Mean New Flexibility
Virtualization Cloud
“Anything” as a Service Mobile devices
- 8. © Novell, Inc. All rights reserved.8
Regulations Require
More Control
RiskOperational
- 9. © Novell, Inc. All rights reserved.9
It's All about Balance
Control
Flexibility
- 10. © Novell, Inc. All rights reserved.10
The Identity-Infused Enterprise
Core to Enterprise Security and Compliance
User
Provisioning
Security
Monitoring and
Remediation
Log
Management
Compliance
Integration
Compliance
Assurance
Secure
Access Identity
Management
- 11. © Novell, Inc. All rights reserved.11
Identity Serves As the Building Block
Identify
Secure
Comply
- 12. © Novell, Inc. All rights reserved.12
Identity Serves As the Building Block
Identify
•Use identity as the basic
building block for people and
resources
•Improve efficiency while
lowering the total cost of
ownership
Novell Identity Manager and Access Manager products have a lower
five year total cost of ownership (TCO) than competitive products
because they are easier to configure, integrate, and administer.
Novell
Novell
Novell
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
24% more than Novell
23% more than Novell
25% more than Novell
All Figures Based on 5
Year Present Value
- 13. © Novell, Inc. All rights reserved.13
Integration with Security Protects the
Network
Secure
•Answer the basic questions:
“What happened? Who did
it? Should I care?”
•Feel confident in moving to
cloud based services
User Activity Monitoring
• Manage user access risk
• Monitor identity fraud
• Enterprise view
- 14. © Novell, Inc. All rights reserved.14
Leverage Compliance Investments to
Get Agile
•Increase agility – controls can
provide insight beyond just
assuring compliance
Comply
Continuous Compliance
•Management, monitoring and enforcement of IT
controls so you can mitigate risks before they impact
business objectives.
Control Flexibility
- 15. © Novell, Inc. All rights reserved.15
An Identity-Infused Enterprise moves at the
speed of business
Less than 20 percent of
enterprises know who has access
to appropriate resources
By 2012, 79 percent of CIO's will
leverage the cloud but are unsure of
data access and security
70 percent of enterprises want a
single view across all systems to
identity threats and violations
Rich information on user access,
privileges and provisioning activity
to answer any GRC questions
Enhanced security for cloud
computing model through extension
of enterprise policies to the cloud
applications
Centralized point of control for
unified policy-based management
across different systems – both ‘on
premise’ and in the cloud
With an Identity-Infused Enterprise
Flexible Architecture That Supports the Cloud
Novell customer survey with infosurv around identity and security challenges - 2009
Without Identity Foundation With Identity Foundation
- 17. © Novell, Inc. All rights reserved.17
IT Service
Management
IT Service
Management
IT Service
Management
Business Service
Management
Business Service
Management
Business Service
Management
Physical Virtual Cloud
The Customer Challenge:
Manage a Siloed Infrastructure
Governance and
Compliance
Governance and
Compliance
Governance and
Compliance
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Firewall
- 18. © Novell, Inc. All rights reserved.18
IT Service Management
Business Service Management
Governance and Compliance
Intelligent Workload Management:
From Silos to Services
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Build
Secure
Measure
Manage
Firewall
Physical Virtual Cloud
- 19. © Novell, Inc. All rights reserved.19
Isolated Identity Awareness
WorkloadIQ:
Integrating Identity into Management
Resource
Management
General
Purpose
Operating
System
Security and
Compliance
Management
Service
Management
Service
Management
Security and
Compliance
Management
Resource
Management
Custom,
Supported
Operating
System
- 20. © Novell, Inc. All rights reserved.20
Physical Virtual Cloud
WorkloadIQ: Lifecycle Activities