SlideShare ist ein Scribd-Unternehmen logo
1 von 32
VIP CUSTOMER
STRATEGY SHARE
Find out what your peers
are talking about.
Insert Presenter’s Name (16pt)
Insert Presenter’s Title (14pt)
© Novell, Inc. All rights reserved.2
Welcome
• All audience members are on mute mode
• We welcome any questions at the end of the
presentation
© Novell, Inc. All rights reserved.3
Introduction
• Evolving market
• Changing role of the CIO & IT
• New CIO agenda
• Avenues to revenue enhancement
© Novell, Inc. All rights reserved.4
Trends – A Wider Vision
• Definition of Enterprise IT is changing
• CIO role is more strategic
• Increased focus on revenue generation
© Novell, Inc. All rights reserved.5
CIO Agenda
• Enhanced revenue and competitive advantage
– Facilitate Team Collaboration
– Foster Workforce Productivity
– Effectively leverage organizational knowledge
– Mitigate business risk
Facilitating collaboration &
enabling an adaptable workforce
© Novell, Inc. All rights reserved.7
Facilitating collaboration
82% of global CIOs either have implemented or have
planned implementation of technology to improve
employee collaboration
Information Week’s
Global CIO Survey 2012
© Novell, Inc. All rights reserved.8
So what are the challenges?
• Achieving user acceptance
• Introduce new ways of working
• Driving cultural change
• Control growing security exposure
© Novell, Inc. All rights reserved.9
The Novell solutions
• Novell Filr
• Novell Vibe
• Novell GroupWise
© Novell, Inc. All rights reserved.10
“We chose Novell Vibe because it has all of the
collaborative features we were looking for, at a
reasonable price, which is especially important for us
as a government organisation.”
Manuella Harrand-Tittse
Information Management Consultant
Municipality of Rijswijk, The Netherlands.
Fostering Productivity
© Novell, Inc. All rights reserved.12
Fostering productivity
77% of employees require access to work documents
outside of their office - especially those who work in
financial services (89%), professional services (96%)
and healthcare (70%).
Employee Survey Jun 2012
© Novell, Inc. All rights reserved.13
Fostering productivity
Nearly three-quarters of organizations deploying user-
focused BYOD report improvements in employee
productivity, customer response times and work
processes.
Dell BYOD survey Jan 2013
© Novell, Inc. All rights reserved.14
So what are the challenges?
• Security, data privacy and compliance
• Enterprise application mobility
• Enterprise file sharing and synchronisation
© Novell, Inc. All rights reserved.15
Organizations must deploy Enterprise File
Synchronisation and Sharing services to secure
enterprise information assets. Failure to provide these
capabilities will subject organizations to information
leakage threats caused by users who
move data through uncontrolled
personal cloud services.
Gartner, Feb 2013
Enterprise File Synchronization and
Sharing
© Novell, Inc. All rights reserved.16
So what are the challenges?
• Security, data privacy and compliance
• Enterprise application mobility
• Enterprise file sharing and synchronisation
• Supporting personal, mobile devices
• Mobile Printing
• Cost
© Novell, Inc. All rights reserved.17
The Novell Solutions
Novell ZENworks Application Virtualization
Novell Filr
Novell ZENworks Mobile Management
Novell iPrint
© Novell, Inc. All rights reserved.18
“Many employees need to be able to make calls and
access email from any location. Using Novell
ZENworks Mobile Management, we can manage
mobile devices easily and enforce the same strict
access and usage rules that apply to other council-
owned equipment.”
Ben Shirley
ICT Infrastructure Team Leader
North Devon Council , England.
Effectively leverage
Organizational Knowledge
© Novell, Inc. All rights reserved.20
Explosion of Data
90% of the world's data was created in the last 2 years
80% of data is unstructured and is growing at 15 times
the rate of structured data
Booz&Co 2012
By 2020 digital information will
increase to 40 trillion gigabytes
IDC, 2012
© Novell, Inc. All rights reserved.21
So what are the challenges?
• Understanding your data pools
• Distil knowledge from data
• Make information available
• Govern access and compliance
© Novell, Inc. All rights reserved.22
The Novell Solutions
• Novell File Reporter
• Novell Storage Manager
• Novell Dynamic File Services
• Novell Open Enterprise Server
Risk Mitigation
© Novell, Inc. All rights reserved.24
The German Bundeskriminalamt reported 4,644
incidents of Data security breaches already in 2011.
As a result, Banks are including comprehensive
technology- and information security risk assessments
as a key criteria when determining the financial
standing and credit rating of businesses
Handelsblatt Germany, May 7th 2013
© Novell, Inc. All rights reserved.25
So what are the challenges?
• A personalized working environment
• Ease of accessibility
• Identity-oriented access
• Increasing regulations
© Novell, Inc. All rights reserved.26
“With more than 2.800 devices throughout the city,
meeting all security- and compliance standards is a big
challenge.
With Novell ZENworks 11 we can realize all facets of
secure endpoint management, incl. Asset-,
Configuration- and Patch Management and sometimes
even Full Disk Encryption with one integrated set of
tools.“
Paul Pedron
Senior System Specialist
City of Fresno
© Novell, Inc. All rights reserved.27
How can Novell help?
Novell ZENworks
Configuration Management
Mobile Management
Endpoint Security Management
Full Disk Encryption
Asset Management
Patch Management
© Novell, Inc. All rights reserved.28
Novell helps you find the right balance
THANK YOU
801.861.7000 (Worldwide)
800.453.1267 (Toll-free)
Corporate Headquarters
1800 South, Novell Place
Provo, Utah 84606
Join us on:
www.novell.com
© Novell, Inc. All rights reserved.30
This document could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein. These changes may be
incorporated in new editions of this document. Novell, Inc. may make improvements
in or changes to the software described in this document at any time.
Copyright © 2013 Novell, Inc. All rights reserved.
All Novell marks referenced in this presentation are trademarks or registered trademarks of
Novell, Inc. in the United States. All third-party trademarks are the property of their respective
owners.
VIP Customer Strategy Share

Weitere ähnliche Inhalte

Was ist angesagt?

Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentationawrightKMBS
 
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeSEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeTOPdesk
 
Streamline Communications Support
Streamline Communications Support Streamline Communications Support
Streamline Communications Support UnifyCo
 
Agileise Corporate Slides
Agileise Corporate SlidesAgileise Corporate Slides
Agileise Corporate Slideslordnnud
 
It infrastructure
It infrastructureIt infrastructure
It infrastructurePlethora
 
[Slides] Infinys Cloud Manage Service
[Slides] Infinys Cloud Manage Service[Slides] Infinys Cloud Manage Service
[Slides] Infinys Cloud Manage ServiceAgusto Sipahutar
 
Albert Introduction
Albert IntroductionAlbert Introduction
Albert IntroductionnoHold, Inc.
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Enterprise Architecture Evolution at Verizon - May 2010
Enterprise Architecture Evolution at Verizon - May 2010Enterprise Architecture Evolution at Verizon - May 2010
Enterprise Architecture Evolution at Verizon - May 2010Nanda Taliyakula
 
Designing an IT Solution
Designing an IT SolutionDesigning an IT Solution
Designing an IT SolutionPhilippe Julio
 
Business Critical Communications
Business Critical CommunicationsBusiness Critical Communications
Business Critical CommunicationsUnifyCo
 
zones_intelligent_building_brochure
zones_intelligent_building_brochurezones_intelligent_building_brochure
zones_intelligent_building_brochureDavid Sidhu
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology OperationsIvanti
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Parallels Inc
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it wordsApixel IT Support
 

Was ist angesagt? (20)

Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
 
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeSEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
 
Streamline Communications Support
Streamline Communications Support Streamline Communications Support
Streamline Communications Support
 
Agileise Corporate Slides
Agileise Corporate SlidesAgileise Corporate Slides
Agileise Corporate Slides
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Excel Software
Excel SoftwareExcel Software
Excel Software
 
[Slides] Infinys Cloud Manage Service
[Slides] Infinys Cloud Manage Service[Slides] Infinys Cloud Manage Service
[Slides] Infinys Cloud Manage Service
 
Albert Introduction
Albert IntroductionAlbert Introduction
Albert Introduction
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Enterprise Architecture Evolution at Verizon - May 2010
Enterprise Architecture Evolution at Verizon - May 2010Enterprise Architecture Evolution at Verizon - May 2010
Enterprise Architecture Evolution at Verizon - May 2010
 
Designing an IT Solution
Designing an IT SolutionDesigning an IT Solution
Designing an IT Solution
 
Business Critical Communications
Business Critical CommunicationsBusiness Critical Communications
Business Critical Communications
 
Efficloud_Brochure
Efficloud_BrochureEfficloud_Brochure
Efficloud_Brochure
 
zones_intelligent_building_brochure
zones_intelligent_building_brochurezones_intelligent_building_brochure
zones_intelligent_building_brochure
 
LinkedIn Doc
LinkedIn DocLinkedIn Doc
LinkedIn Doc
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
 

Andere mochten auch

Andere mochten auch (8)

X17FJSF
X17FJSFX17FJSF
X17FJSF
 
ESSENS Marketing Plan 2017.
ESSENS Marketing Plan 2017.ESSENS Marketing Plan 2017.
ESSENS Marketing Plan 2017.
 
Nescafe Gold
Nescafe GoldNescafe Gold
Nescafe Gold
 
Nescafe Marketing Mix
Nescafe Marketing MixNescafe Marketing Mix
Nescafe Marketing Mix
 
Starbucks Strategy
Starbucks StrategyStarbucks Strategy
Starbucks Strategy
 
Marketing Plan of Cafe Coffee Day!
Marketing Plan of Cafe Coffee Day!Marketing Plan of Cafe Coffee Day!
Marketing Plan of Cafe Coffee Day!
 
Nescafe
NescafeNescafe
Nescafe
 
Marketing plan
Marketing planMarketing plan
Marketing plan
 

Ähnlich wie VIP Customer Strategy Share

Meeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.EMeeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.ENuvollo
 
Nuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.ENuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.ENuvollo
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVA
 
The Cloud Foundry Story
The Cloud Foundry StoryThe Cloud Foundry Story
The Cloud Foundry StoryVMware Tanzu
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudBart Blommaerts
 
Developing applications for the cloud
Developing applications for the cloudDeveloping applications for the cloud
Developing applications for the cloudBart Blommaerts
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems
 
Industry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessIndustry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessMichael Elder
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
32953 moylan non stop introduction for new customers
32953 moylan non stop introduction for new  customers32953 moylan non stop introduction for new  customers
32953 moylan non stop introduction for new customersgmazuel
 
Manivel_Rajendiran_16-Jun-2015
Manivel_Rajendiran_16-Jun-2015Manivel_Rajendiran_16-Jun-2015
Manivel_Rajendiran_16-Jun-2015Manivel R
 
How IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the CloudHow IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the CloudGlobal Knowledge Training
 
Cloud,beyond the hype, looking at the journey to Cloud
Cloud,beyond the hype, looking at the journey to CloudCloud,beyond the hype, looking at the journey to Cloud
Cloud,beyond the hype, looking at the journey to CloudChristian Verstraete
 
Linux Migration from Legacy Mainframe Application - Whitepaper
Linux Migration from Legacy Mainframe Application - WhitepaperLinux Migration from Legacy Mainframe Application - Whitepaper
Linux Migration from Legacy Mainframe Application - WhitepaperNIIT Technologies
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventNexon Asia Pacific
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Peter Bookman
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalityCitrix
 

Ähnlich wie VIP Customer Strategy Share (20)

Meeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.EMeeting Nuvollo - La passerelle-I.D.E
Meeting Nuvollo - La passerelle-I.D.E
 
Nuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.ENuvollo and La passerelle-I.D.E
Nuvollo and La passerelle-I.D.E
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave Wilkes
 
The Cloud Foundry Story
The Cloud Foundry StoryThe Cloud Foundry Story
The Cloud Foundry Story
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloud
 
Developing applications for the cloud
Developing applications for the cloudDeveloping applications for the cloud
Developing applications for the cloud
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 
Industry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessIndustry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average Business
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
32953 moylan non stop introduction for new customers
32953 moylan non stop introduction for new  customers32953 moylan non stop introduction for new  customers
32953 moylan non stop introduction for new customers
 
Manivel_Rajendiran_16-Jun-2015
Manivel_Rajendiran_16-Jun-2015Manivel_Rajendiran_16-Jun-2015
Manivel_Rajendiran_16-Jun-2015
 
How IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the CloudHow IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the Cloud
 
Cloud,beyond the hype, looking at the journey to Cloud
Cloud,beyond the hype, looking at the journey to CloudCloud,beyond the hype, looking at the journey to Cloud
Cloud,beyond the hype, looking at the journey to Cloud
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Linux Migration from Legacy Mainframe Application - Whitepaper
Linux Migration from Legacy Mainframe Application - WhitepaperLinux Migration from Legacy Mainframe Application - Whitepaper
Linux Migration from Legacy Mainframe Application - Whitepaper
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC Event
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionality
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

VIP Customer Strategy Share

  • 1. VIP CUSTOMER STRATEGY SHARE Find out what your peers are talking about. Insert Presenter’s Name (16pt) Insert Presenter’s Title (14pt)
  • 2. © Novell, Inc. All rights reserved.2 Welcome • All audience members are on mute mode • We welcome any questions at the end of the presentation
  • 3. © Novell, Inc. All rights reserved.3 Introduction • Evolving market • Changing role of the CIO & IT • New CIO agenda • Avenues to revenue enhancement
  • 4. © Novell, Inc. All rights reserved.4 Trends – A Wider Vision • Definition of Enterprise IT is changing • CIO role is more strategic • Increased focus on revenue generation
  • 5. © Novell, Inc. All rights reserved.5 CIO Agenda • Enhanced revenue and competitive advantage – Facilitate Team Collaboration – Foster Workforce Productivity – Effectively leverage organizational knowledge – Mitigate business risk
  • 6. Facilitating collaboration & enabling an adaptable workforce
  • 7. © Novell, Inc. All rights reserved.7 Facilitating collaboration 82% of global CIOs either have implemented or have planned implementation of technology to improve employee collaboration Information Week’s Global CIO Survey 2012
  • 8. © Novell, Inc. All rights reserved.8 So what are the challenges? • Achieving user acceptance • Introduce new ways of working • Driving cultural change • Control growing security exposure
  • 9. © Novell, Inc. All rights reserved.9 The Novell solutions • Novell Filr • Novell Vibe • Novell GroupWise
  • 10. © Novell, Inc. All rights reserved.10 “We chose Novell Vibe because it has all of the collaborative features we were looking for, at a reasonable price, which is especially important for us as a government organisation.” Manuella Harrand-Tittse Information Management Consultant Municipality of Rijswijk, The Netherlands.
  • 12. © Novell, Inc. All rights reserved.12 Fostering productivity 77% of employees require access to work documents outside of their office - especially those who work in financial services (89%), professional services (96%) and healthcare (70%). Employee Survey Jun 2012
  • 13. © Novell, Inc. All rights reserved.13 Fostering productivity Nearly three-quarters of organizations deploying user- focused BYOD report improvements in employee productivity, customer response times and work processes. Dell BYOD survey Jan 2013
  • 14. © Novell, Inc. All rights reserved.14 So what are the challenges? • Security, data privacy and compliance • Enterprise application mobility • Enterprise file sharing and synchronisation
  • 15. © Novell, Inc. All rights reserved.15 Organizations must deploy Enterprise File Synchronisation and Sharing services to secure enterprise information assets. Failure to provide these capabilities will subject organizations to information leakage threats caused by users who move data through uncontrolled personal cloud services. Gartner, Feb 2013 Enterprise File Synchronization and Sharing
  • 16. © Novell, Inc. All rights reserved.16 So what are the challenges? • Security, data privacy and compliance • Enterprise application mobility • Enterprise file sharing and synchronisation • Supporting personal, mobile devices • Mobile Printing • Cost
  • 17. © Novell, Inc. All rights reserved.17 The Novell Solutions Novell ZENworks Application Virtualization Novell Filr Novell ZENworks Mobile Management Novell iPrint
  • 18. © Novell, Inc. All rights reserved.18 “Many employees need to be able to make calls and access email from any location. Using Novell ZENworks Mobile Management, we can manage mobile devices easily and enforce the same strict access and usage rules that apply to other council- owned equipment.” Ben Shirley ICT Infrastructure Team Leader North Devon Council , England.
  • 20. © Novell, Inc. All rights reserved.20 Explosion of Data 90% of the world's data was created in the last 2 years 80% of data is unstructured and is growing at 15 times the rate of structured data Booz&Co 2012 By 2020 digital information will increase to 40 trillion gigabytes IDC, 2012
  • 21. © Novell, Inc. All rights reserved.21 So what are the challenges? • Understanding your data pools • Distil knowledge from data • Make information available • Govern access and compliance
  • 22. © Novell, Inc. All rights reserved.22 The Novell Solutions • Novell File Reporter • Novell Storage Manager • Novell Dynamic File Services • Novell Open Enterprise Server
  • 24. © Novell, Inc. All rights reserved.24 The German Bundeskriminalamt reported 4,644 incidents of Data security breaches already in 2011. As a result, Banks are including comprehensive technology- and information security risk assessments as a key criteria when determining the financial standing and credit rating of businesses Handelsblatt Germany, May 7th 2013
  • 25. © Novell, Inc. All rights reserved.25 So what are the challenges? • A personalized working environment • Ease of accessibility • Identity-oriented access • Increasing regulations
  • 26. © Novell, Inc. All rights reserved.26 “With more than 2.800 devices throughout the city, meeting all security- and compliance standards is a big challenge. With Novell ZENworks 11 we can realize all facets of secure endpoint management, incl. Asset-, Configuration- and Patch Management and sometimes even Full Disk Encryption with one integrated set of tools.“ Paul Pedron Senior System Specialist City of Fresno
  • 27. © Novell, Inc. All rights reserved.27 How can Novell help? Novell ZENworks Configuration Management Mobile Management Endpoint Security Management Full Disk Encryption Asset Management Patch Management
  • 28. © Novell, Inc. All rights reserved.28 Novell helps you find the right balance
  • 30. 801.861.7000 (Worldwide) 800.453.1267 (Toll-free) Corporate Headquarters 1800 South, Novell Place Provo, Utah 84606 Join us on: www.novell.com © Novell, Inc. All rights reserved.30
  • 31. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Novell, Inc. may make improvements in or changes to the software described in this document at any time. Copyright © 2013 Novell, Inc. All rights reserved. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States. All third-party trademarks are the property of their respective owners.

Hinweis der Redaktion

  1. This should be the holding slide at the beginning of the webinar, please insert presenter’s name and title
  2. Initial Welcome by host.Any instructions on how you wish the audience to participate should be outlined here and shared with the audience at this stage.
  3. Hello everyone, I’m speaker’s name. Thank you for taking the time to join our webinar today. Time is short and I do want to allow for any questions or comments you may have at the end, but I hope you will take some valuable insights from today’s session. On a daily basis at Novell, we talk to CIO’s and senior executives about the IT function, the market, and the current and emerging challenges and opportunities you face. We use this information to help shape our strategy, anticipate needs and develop innovative solutions which are both effective and reliable. But it occurred to us that this information isn’t just useful to us, it could also benefit you, our customers. So today I’m going to give you an overview of how we see the market evolving; how the role of the CIO, along with the IT function itself, is changing; what challenges and opportunities should be on your radar; and how we at Novell can partner you to achieve long term success.
  4. Smart IT is about staying ahead of the curve. It’s not just about focusing on where the ball is now, but about knowing where it is headed.Everyone is talking about BYOD, social media, the cloud, big data etc…but let’s take a step back for a second, and look at the broader picture. The definition of enterprise IT is changing. And with it, so is the function of the CIO. CIO’s are moving to a more strategic role. It’s becoming less about direct control and more about collaboration and influence. Less about managing IT risk and more about mitigating enterprise risk. Less about minimising cost and more about generating revenue. If we take a look at a recent Harvey Nash survey of CIO’s, 62% said that their CEO expects them to prioritise projects that 'make' money over projects that 'save' money, that’s up 24% on the 2012 figure. So the expectations businesses have of their CIO’s are shifting rapidly.But is this expectation realistic? Well if you consider the C-suite, CIO’s are actually in a unique position to capitalise on the potential business benefits which the vast changes in the IT environment have created. They are the only ones who hold a clear vision of both the needs of the organisation and the technological possibilities; they can and must act as a catalyst to reshape their organisation in the new digital age. In effect, the drivers of the CIO agenda are not simply byod, social media, the cloud, big data etc…but rather what these and other developments can deliver of value to the business…i.e. a greater ability to facilitate easy collaboration across global teams, better access to and understanding of business critical knowledge held within the organisation, and all of this in a secure, controlled environment.
  5. So let’s take a look at how this affects the CIO’s agenda.Increasingly the primary focus of the CIO has to be the impact of IT strategy on the bottom line. As I said earlier, CIO’s are now expected to look at ways not just to reduce cost, but to enhance revenue and ultimately drive competitive advantage. If we break it down, there are four main avenues open to you to achieve this: The first is to facilitate collaboration and enable an adaptable workforce. Creating an environment where the best combination of human capital available to your organisation can be assembled quickly into collaborative, virtual teams, regardless of geographic, cultural and organisational boundaries, means that your business can react much faster and more effectively to market demands.The second avenue to revenue enhancement open to the CIO is to foster workforce productivity. It might seem obvious but the more productive your workforce the better your returns. So the objective of the CIO, in terms of workforce productivity, has to be to increase the amount of time workers spend on revenue generating tasks by increasing and simplifying access to the tools and resources they require, wherever and whenever they need them.The third avenue is effective leverage of organizational knowledge. Capitalising on the knowledge base available to the business is about two things. You need to identify what knowledge is available to your organisation and what is its business value, then you must facilitate easy and secure access to that knowledge for your organisation.The final avenue to consider is to mitigate business risk. The CIO’s remit on risk management has extended in recent years beyond IT operational risk to include broader organisational risks; risks in the use and deployment of new technology; and most importantly strategic risk. Leveraging technology to enhance strategic risk taking is an area where CIO’s can bring substantial benefit to an organisation.Let’s now take a closer look at each of these areas and the challenges and opportunities they present.
  6. First Facilitating collaboration and enabling an adaptable workforce.
  7. According to Information Week’s Global CIO Survey 2012, 82% of global CIO’s either have implemented or have planned implementation of technology to improve employee collaborationAs corporations get bigger and more complex in their structure, it becomes increasingly difficult to take full advantage of the collaborative potential of their human resource. Capturing the knowledge and experience of your teams and leveraging it effectively is crucial to gaining competitive advantage. This is where IT strategy can play a crucial role.
  8. So what are the challenges?The first challenge you will face in the introduction of a truly collaborative capability across your organisation will be user adoption. Users expect the same kind of collaborative technologies they experience at home, with the same ease of access and functionality. There can also be a need for a culture shift, employees need to be prepared to adopt new ways of working, to share information and collaborate virtually with people they may not have met in person. The second big challenge in terms of collaboration is security. Sharing and collaborating more widely introduces exposure on many levels. Everything is increasingly digitally captured, recorded and stored making it more vulnerable to loss or theft. On the flip side, there are increasingly strict regulations around data privacy and security which must be adhered to.
  9. With the recently launched Novell Filr we have introduced secure adhoc sharing of enterprise data in a simple, user friendly and cost effective solution. Novell Filr avoids the risks of exposing corporate data to the potential security vulnerabilities of internet and cloud file sharing sites and it allows end users to access their home directories and network folders on any mobile device, as well as synchronize their files to their PC and Mac computers. You stay in control of file access, users are more productive, and security gaps with internet file sharing are plugged.Novell Vibe introduces sophisticated workflow and project management, supporting virtual teams across geographic, cultural and organisational boundaries.Novell Groupwise remains a reliable and secure core engine for email and calendar based standard collaboration and is one of the most cost effective solutions on the market, even when compared to the so called “free” cloud-based solutions.
  10. And you don’t have to take our word for it that Novell collaboration tools offer the combination of features and value for money you need. ManuellaHarrand-Tittse, Information Management Consultant at the Municipality of Rijswijk in the Netherlands told us that they chose Novell Vibe because it has all of the collaborative features they were looking for, at a reasonable price, which is especially important for them as a government organisation.
  11. The next CIO agenda item is fostering productivity. The advent of the mobile workforce has meant that the IT function’s ability to equip the employees to be productive wherever and whenever they need has a direct impact on productivity.
  12. According to a survey of 4000 employees from June of last year, 77% of respondents require access to work documents outside of their office - especially those who work in financial services (89%), professional services (96%) and healthcare (70%).
  13. According to another survey commissioned by Dell earlier this year, nearly three-quarters of organizations deploying user-focused BYOD report improvements in employee productivity, customer response times and work processes. And 3 out of 5 workers say they don't need to be in the office anymore to be productive.
  14. But along with improvements in productivity the move to mobility brings its own set of challenges.That employee survey I mentioned earlier found that over half of employees use unauthorised consumer based file sharing apps at work, which is not good news from a security, data privacy and compliance standpoint. So how do you ensure that only those who should see your data have access to it, whilst at the same time making it easier for those with permission to get their jobs done? The answer is to offer an effective enterprise level solution which offers the security you want and the flexibility your users demand.To supply such a solution there are a number of angles you need to cover. The first is mobilizing enterprise applications. In order to be able to work on the move, users require flexible and secure access to their enterprise applications. Not only can implementation of mobile applications improve productivity and increase efficiencies, but it can also deliver on employee satisfaction and talent retention.The second angle is file synchronization and sharing. Employees need to be able to quickly and easily access and share their files in a secure mobile context.
  15. In a report in February of this year Gartner advised that “organizations must deploy Enterprise File Synchronisation and Sharing services to secure enterprise information assets. Failure to provide these capabilities will subject organizations to information leakage threats caused by users who move data through uncontrolled personal cloud services.”
  16. So now you’ve supplied the applications and the files, you need to ensure that the mobile devices themselves can be supported and securely managed. The model of dictating the mobile device choices of their workforce is quickly losing traction with businesses which have identified that personal choice of device can not only increase productivity for their individual workers, but it can also save the business in terms of capital equipment outlay. Gartner even predicts that by 2017, half of employers will require employees to supply their own device for work purposes, which means CIO’s need to be prepared for that conversation.Another market demand detail which needs to be on your radar is mobile print. According to a study commissioned by Technavio in December 2012, mobile printing is the most requested functionality from the mobile workforce. The final big consideration when it comes to fostering productivity is of course cost. Without a cost effective solution any gains achieved by implementing the strategy will be eroded.
  17. How are we at Novell helping our customers to meet those challenges? Helping your business reap the rewards in productivity, whilst steering clear of the pitfalls, is a core focus for Novell.Novell ZENworks Application Virtualization helps you package and deploy applications quickly and easily, even during migrations.Novell Filr allows end users to securely access their home directories and network folders on any mobile device, as well as synchronize their files to their PC and Mac computers. IT stays in control of file access, users are more productive, and security gaps with internet file sharing are plugged.Novell ZENworks Mobile Management offers you device management that's secure, scalable and flexible enough to effectively support BYOD devices.Novell iPrint is a brand new solution which will be hitting the market this month. It allows you to set up a self-service printing environment where employees can print on demand. It brings “point and click” self-service print capabilities to users and gives you a single print solution to manage for every major platform—including Windows, Mac, Linux and most mobile devices.
  18. But what do our customers have to say? Ben Shirley the ICT Infrastructure Team Leader for North Devon Council in England explains that in their organisation many employees need to be able to make calls and access email from any location. Using Novell ZENworks Mobile Management, they can manage mobile devices easily and enforce the same strict access and usage rules that apply to other council-owned equipment.
  19. Now we’ve looked at helping our teams and our individuals work more effectively. Let’s take a look at how we can effectively leverage organizational knowledge.
  20. There has been a lot of noise around the explosion of big data and the implications for enterprise IT in terms of coping with the sheer variety, velocity and volume of data being thrown at them. 90% of the world’s data was created in the last two years and 80% of this data is unstructured. The IDC predicts that by 2020 we will have hit 40 trillion gigabytes of data.
  21. There is truth to the saying Knowledge is Power. And certainly getting to grips with the knowledge held by your organization is a definite route to competitive advantage. However, the first step in this process must be understanding what data pools you have available to you and being able to prioritise that data in terms of its value. An error repeatedly committed in the rush to exploit big data, is to spend resources on attempting to distill information from all of the data, when in fact only a minority of that information is of strategic use to the business. It is vitally important not to lose sight of the business need, big data management can be a huge drain on resources so trying to control all unstructured data is a mistake. Focus must be on quality data that is of value to the business decisions of the company.The other side of knowledge management, and something we touched on earlier, is the requirement to effectively share and offer access to that knowledge in a secure environment. Governance must be addressed in order to support the business in making good decisions and compliance must equally be addressed to ensure the company is insulated from any substantial risk.
  22. So how can Novell help you leverage the business critical knowledge within your organization?Optimizing your network-stored data starts with knowing exactly what data you have. Novell® File Reporter inventories file systems and delivers detailed storage intelligence so you can optimize and secure your environment for cost savings and compliance.With Novell Storage Manager, you can remove the headache from provisioning and managing storage, significantly lower your storage management costs, and keep users productive and happy.Novell Dynamic File Services allows you to define the file policies you want to enforce and ensure that your most critical files are stored and backed up by your fastest, top-grade systems, while low-level files that don’t need “star treatment” sit on less-expensive equipment. Open Enterprise Server provides all the enterprise networking file and print services today’s organizations rely on and need.
  23. CIO’s are no longer just concerned with IT operation risk, they are now expected to consider much broader organisational risks.
  24. A recent article in the German newspaper Handelsblatt reported 4,644 incidents of Data security breaches already in 2011.As a result, Banks are including comprehensive technology- and information security risk assessments as a key criteria when determining the financial standing and credit rating of businesses
  25. But what are the challenges CIO’s need to focus on?It’s essential to deliver a dynamically personalized working environment. Users should have easy access to those applications and files which they need and are authorized to use. But this needs to be secure and should be based upon user identity, profile and location.In terms of compliance it is vital to protect your company against security breaches by securing the data on all of your devices along with of course ensuring access to complete compliance reports at any time.
  26. Paul Pedron, Senior System Specialist with the City of Fresno explains that “With more than 2.800 devices throughout the city, meeting all security- and compliance standards is a big challenge. With Novell ZENworks 11 we can realize all facets of secure endpoint mainagement, incl. Asset-, Configuration- and Patch Management and sometimes even Full Disk Encryption with one integrated set of tools.“
  27. At Novell we take the security of your data seriously.Our suite of Zenworkssolutions allows you to protect and empower your workforce. Use Novell ZENworks Configuration Management to make sure users always have access to the resources they need regardless of where they work or what devices they useWith ZENworks Mobile Management you have mobile device management that's secure,scalable, and covers BYOD devices.ZENworks Endpoint Security Management offers Secure, identity-based protection for your endpoints.With ZENworks Full Disk Encryption you can protect the data on laptops and desktops at the push of a button.ZENworks Asset Management offers you a clear, accurate picture of all your hardware and software.And of course ZENworksPatch Management gives you the possibility of implementing a policy based approach to apply the right patches to the right system or device instantly.
  28. At Novell we understand that successful IT strategy means striking the right balance between productivity and security. In developing all of our solutions we first consider the business priorities and budget realities of our customers. Our objective is to see our customers succeed and that means taking the time to understand the challenges and opportunities you face so that we can create the innovative, reliable and cost effective solutions you demand.
  29. I would like to thank you for your time. I hope you have found our webinar productive and I welcome any questions.