SlideShare a Scribd company logo
1 of 21
Download to read offline
The Identity-infused
Enterprise
Identify, Secure, Comply
Ben Goodman
Technolgy Strategist, Identity and Security
bgoodman@novell.com
November 15, 2010
© Novell, Inc. All rights reserved.2
Making IT Work As One™
© Novell, Inc. All rights reserved.3
21st
Century Computing
The risks and challenges of computing across
multiple environments must be controlled.
Users should have unimpeded access to the
full computing services they need to do their
jobs right.
Computing should be secure, compliant
and portable.
© Novell, Inc. All rights reserved.4
Identity Is Always the Foundation
Mobile Devices
Personal Computers
Identity Foundation
© Novell, Inc. All rights reserved.5
Mobile Devices
Personal Computers
Identity Foundation
World Wide Web
Closed Networks
Identity Is Always the Foundation
© Novell, Inc. All rights reserved.6
Mobile Devices
Personal Computers
Identity Foundation
Virtualized Workloads
Traditional Workloads on
Dedicated Servers
World Wide Web
Closed Networks
Identity Is Always the Foundation
© Novell, Inc. All rights reserved.7
New Technologies
Mean New Flexibility
Virtualization Cloud
“Anything” as a Service Mobile devices
© Novell, Inc. All rights reserved.8
Regulations Require
More Control
RiskOperational
© Novell, Inc. All rights reserved.9
It's All about Balance
Control
Flexibility
© Novell, Inc. All rights reserved.10
The Identity-Infused Enterprise
Core to Enterprise Security and Compliance
User
Provisioning
Security
Monitoring and
Remediation
Log
Management
Compliance
Integration
Compliance
Assurance
Secure
Access Identity
Management
© Novell, Inc. All rights reserved.11
Identity Serves As the Building Block
Identify
Secure
Comply
© Novell, Inc. All rights reserved.12
Identity Serves As the Building Block
Identify
•Use identity as the basic
building block for people and
resources
•Improve efficiency while
lowering the total cost of
ownership
Novell Identity Manager and Access Manager products have a lower
five year total cost of ownership (TCO) than competitive products
because they are easier to configure, integrate, and administer.
Novell
Novell
Novell
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
24% more than Novell
23% more than Novell
25% more than Novell
All Figures Based on 5
Year Present Value
© Novell, Inc. All rights reserved.13
Integration with Security Protects the
Network
Secure
•Answer the basic questions:
“What happened? Who did
it? Should I care?”
•Feel confident in moving to
cloud based services
User Activity Monitoring
• Manage user access risk
• Monitor identity fraud
• Enterprise view
© Novell, Inc. All rights reserved.14
Leverage Compliance Investments to
Get Agile
•Increase agility – controls can
provide insight beyond just
assuring compliance
Comply
Continuous Compliance
•Management, monitoring and enforcement of IT
controls so you can mitigate risks before they impact
business objectives.
Control Flexibility
© Novell, Inc. All rights reserved.15
An Identity-Infused Enterprise moves at the
speed of business
Less than 20 percent of
enterprises know who has access
to appropriate resources
By 2012, 79 percent of CIO's will
leverage the cloud but are unsure of
data access and security
70 percent of enterprises want a
single view across all systems to
identity threats and violations
Rich information on user access,
privileges and provisioning activity
to answer any GRC questions
Enhanced security for cloud
computing model through extension
of enterprise policies to the cloud
applications
Centralized point of control for
unified policy-based management
across different systems – both ‘on
premise’ and in the cloud
With an Identity-Infused Enterprise
Flexible Architecture That Supports the Cloud
Novell customer survey with infosurv around identity and security challenges - 2009
Without Identity Foundation With Identity Foundation
Appendix
© Novell, Inc. All rights reserved.17
IT Service
Management
IT Service
Management
IT Service
Management
Business Service
Management
Business Service
Management
Business Service
Management
Physical Virtual Cloud
The Customer Challenge:
Manage a Siloed Infrastructure
Governance and
Compliance
Governance and
Compliance
Governance and
Compliance
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Firewall
© Novell, Inc. All rights reserved.18
IT Service Management
Business Service Management
Governance and Compliance
Intelligent Workload Management:
From Silos to Services
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Build
Secure
Measure
Manage
Firewall
Physical Virtual Cloud
© Novell, Inc. All rights reserved.19
Isolated Identity Awareness
WorkloadIQ:
Integrating Identity into Management
Resource
Management
General
Purpose
Operating
System
Security and
Compliance
Management
Service
Management
Service
Management
Security and
Compliance
Management
Resource
Management
Custom,
Supported
Operating
System
© Novell, Inc. All rights reserved.20
Physical Virtual Cloud
WorkloadIQ: Lifecycle Activities
The Identity-infused Enterprise

More Related Content

What's hot

Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
Brochure Virtualization
Brochure VirtualizationBrochure Virtualization
Brochure Virtualization
bryanpsu
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
Interop
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
Vertical Solutions
 

What's hot (20)

Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Broadview Networks Cloud Computing Brochure
Broadview Networks Cloud Computing BrochureBroadview Networks Cloud Computing Brochure
Broadview Networks Cloud Computing Brochure
 
Brochure Virtualization
Brochure VirtualizationBrochure Virtualization
Brochure Virtualization
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Challenges faced by small and medium business
Challenges faced by small and medium businessChallenges faced by small and medium business
Challenges faced by small and medium business
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
 
Azaleos Overview
Azaleos OverviewAzaleos Overview
Azaleos Overview
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
 
Future of productivity hau lu
Future of productivity hau luFuture of productivity hau lu
Future of productivity hau lu
 

Viewers also liked

Novell Access Governance Suite
Novell Access Governance SuiteNovell Access Governance Suite
Novell Access Governance Suite
Novell
 

Viewers also liked (6)

Novell Access Governance Suite
Novell Access Governance SuiteNovell Access Governance Suite
Novell Access Governance Suite
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday Problems
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Improve Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux EnvironmentsImprove Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux Environments
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
 

Similar to The Identity-infused Enterprise

Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
GaryArdito
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 

Similar to The Identity-infused Enterprise (20)

Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Cloud native patterns antipatterns
Cloud native patterns antipatternsCloud native patterns antipatterns
Cloud native patterns antipatterns
 
Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slides
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 

More from Novell

Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
Novell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
Novell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
Novell
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
Novell
 
Whats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise ServerWhats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise Server
Novell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
 
Whats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise ServerWhats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise Server
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

The Identity-infused Enterprise

  • 1. The Identity-infused Enterprise Identify, Secure, Comply Ben Goodman Technolgy Strategist, Identity and Security bgoodman@novell.com November 15, 2010
  • 2. © Novell, Inc. All rights reserved.2 Making IT Work As One™
  • 3. © Novell, Inc. All rights reserved.3 21st Century Computing The risks and challenges of computing across multiple environments must be controlled. Users should have unimpeded access to the full computing services they need to do their jobs right. Computing should be secure, compliant and portable.
  • 4. © Novell, Inc. All rights reserved.4 Identity Is Always the Foundation Mobile Devices Personal Computers Identity Foundation
  • 5. © Novell, Inc. All rights reserved.5 Mobile Devices Personal Computers Identity Foundation World Wide Web Closed Networks Identity Is Always the Foundation
  • 6. © Novell, Inc. All rights reserved.6 Mobile Devices Personal Computers Identity Foundation Virtualized Workloads Traditional Workloads on Dedicated Servers World Wide Web Closed Networks Identity Is Always the Foundation
  • 7. © Novell, Inc. All rights reserved.7 New Technologies Mean New Flexibility Virtualization Cloud “Anything” as a Service Mobile devices
  • 8. © Novell, Inc. All rights reserved.8 Regulations Require More Control RiskOperational
  • 9. © Novell, Inc. All rights reserved.9 It's All about Balance Control Flexibility
  • 10. © Novell, Inc. All rights reserved.10 The Identity-Infused Enterprise Core to Enterprise Security and Compliance User Provisioning Security Monitoring and Remediation Log Management Compliance Integration Compliance Assurance Secure Access Identity Management
  • 11. © Novell, Inc. All rights reserved.11 Identity Serves As the Building Block Identify Secure Comply
  • 12. © Novell, Inc. All rights reserved.12 Identity Serves As the Building Block Identify •Use identity as the basic building block for people and resources •Improve efficiency while lowering the total cost of ownership Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer. Novell Novell Novell Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) 24% more than Novell 23% more than Novell 25% more than Novell All Figures Based on 5 Year Present Value
  • 13. © Novell, Inc. All rights reserved.13 Integration with Security Protects the Network Secure •Answer the basic questions: “What happened? Who did it? Should I care?” •Feel confident in moving to cloud based services User Activity Monitoring • Manage user access risk • Monitor identity fraud • Enterprise view
  • 14. © Novell, Inc. All rights reserved.14 Leverage Compliance Investments to Get Agile •Increase agility – controls can provide insight beyond just assuring compliance Comply Continuous Compliance •Management, monitoring and enforcement of IT controls so you can mitigate risks before they impact business objectives. Control Flexibility
  • 15. © Novell, Inc. All rights reserved.15 An Identity-Infused Enterprise moves at the speed of business Less than 20 percent of enterprises know who has access to appropriate resources By 2012, 79 percent of CIO's will leverage the cloud but are unsure of data access and security 70 percent of enterprises want a single view across all systems to identity threats and violations Rich information on user access, privileges and provisioning activity to answer any GRC questions Enhanced security for cloud computing model through extension of enterprise policies to the cloud applications Centralized point of control for unified policy-based management across different systems – both ‘on premise’ and in the cloud With an Identity-Infused Enterprise Flexible Architecture That Supports the Cloud Novell customer survey with infosurv around identity and security challenges - 2009 Without Identity Foundation With Identity Foundation
  • 17. © Novell, Inc. All rights reserved.17 IT Service Management IT Service Management IT Service Management Business Service Management Business Service Management Business Service Management Physical Virtual Cloud The Customer Challenge: Manage a Siloed Infrastructure Governance and Compliance Governance and Compliance Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Firewall
  • 18. © Novell, Inc. All rights reserved.18 IT Service Management Business Service Management Governance and Compliance Intelligent Workload Management: From Silos to Services Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Secure Measure Manage Firewall Physical Virtual Cloud
  • 19. © Novell, Inc. All rights reserved.19 Isolated Identity Awareness WorkloadIQ: Integrating Identity into Management Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Security and Compliance Management Resource Management Custom, Supported Operating System
  • 20. © Novell, Inc. All rights reserved.20 Physical Virtual Cloud WorkloadIQ: Lifecycle Activities