View
2.394
Download
0
Category
Tags:
Preview:
DESCRIPTION
Ben Goodman from Novell presentation from Gartner IAM event in November 2010
Citation preview
The Identity-infused EnterpriseIdentify, Secure, Comply
Ben GoodmanTechnolgy Strategist, Identity and Securitybgoodman@novell.com
November 15, 2010
© Novell, Inc. All rights reserved.2
Making IT Work As One™
© Novell, Inc. All rights reserved.3
21st Century Computing
The risks and challenges of computing across multiple environments must be controlled.
Users should have unimpeded access to the full computing services they need to do their jobs right.
Computing should be secure, compliantand portable.
© Novell, Inc. All rights reserved.4
Identity Is Always the Foundation
Mobile Devices
Personal Computers
Identity Foundation
© Novell, Inc. All rights reserved.5
Mobile Devices
Personal Computers
Identity Foundation
World Wide Web
Closed Networks
Identity Is Always the Foundation
© Novell, Inc. All rights reserved.6
Mobile Devices
Personal Computers
Identity Foundation
Virtualized Workloads
Traditional Workloads on Dedicated Servers
World Wide Web
Closed Networks
Identity Is Always the Foundation
© Novell, Inc. All rights reserved.7
New TechnologiesMean New Flexibility
Virtualization Cloud
“Anything” as a Service Mobile devices
© Novell, Inc. All rights reserved.8
Regulations RequireMore Control
RiskOperational
© Novell, Inc. All rights reserved.9
It's All about Balance
Control
Flexibility
© Novell, Inc. All rights reserved.10
The Identity-Infused EnterpriseCore to Enterprise Security and Compliance
UserProvisioning
SecurityMonitoring and
Remediation
LogManagement
ComplianceIntegration
ComplianceAssurance
SecureAccess Identity
Management
© Novell, Inc. All rights reserved.11
Identity Serves As the Building Block
IdentifySecure
Comply
© Novell, Inc. All rights reserved.12
Identity Serves As the Building Block
Identify
•Use identity as the basic building block for people and resources
•Improve efficiency while lowering the total cost of ownership
Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer.
Novell
Novell
Novell
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
Competitive Set Average (Oracle, CA, IBM, Courion)
24% more than Novell
23% more than Novell
25% more than Novell
All Figures Based on 5 Year Present Value
© Novell, Inc. All rights reserved.13
Integration with Security Protects the Network
Secure
•Answer the basic questions: “What happened? Who did it? Should I care?”
•Feel confident in moving to cloud based services
User Activity Monitoring• Manage user access risk• Monitor identity fraud• Enterprise view
© Novell, Inc. All rights reserved.14
Leverage Compliance Investments to Get Agile
•Increase agility – controls can provide insight beyond just assuring compliance
ComplyContinuous Compliance•Management, monitoring and enforcement of IT controls so you can mitigate risks before they impact business objectives.
Control Flexibility
© Novell, Inc. All rights reserved.15
An Identity-Infused Enterprise moves at the speed of business
Less than 20 percent of enterprises know who has access to appropriate resources
By 2012, 79 percent of CIO's will leverage the cloud but are unsure of data access and security
70 percent of enterprises want a single view across all systems to identity threats and violations
Rich information on user access, privileges and provisioning activity to answer any GRC questions
Enhanced security for cloud computing model through extension of enterprise policies to the cloud applications
Centralized point of control for unified policy-based management across different systems – both ‘on premise’ and in the cloud
With an Identity-Infused EnterpriseFlexible Architecture That Supports the Cloud
Novell customer survey with infosurv around identity and security challenges - 2009
Without Identity Foundation With Identity Foundation
Appendix
© Novell, Inc. All rights reserved.17
IT Service Management
IT Service Management
IT Service Management
Business Service Management
Business Service Management
Business Service Management
Physical Virtual Cloud
The Customer Challenge:Manage a Siloed Infrastructure
Governance and Compliance
Governance and Compliance
Governance and Compliance
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Firewall
© Novell, Inc. All rights reserved.18
IT Service Management
Business Service Management
Governance and Compliance
Intelligent Workload Management:From Silos to Services
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Build
Secure
Measure
Manage
Firewall
Physical Virtual Cloud
© Novell, Inc. All rights reserved.19
Isolated Identity Awareness
WorkloadIQ:Integrating Identity into Management
ResourceManagement
GeneralPurpose
OperatingSystem
Security andComplianceManagement
ServiceManagement
ServiceManagement
Security andComplianceManagement
ResourceManagement
Custom,SupportedOperating
System
© Novell, Inc. All rights reserved.20
Physical Virtual Cloud
WorkloadIQ: Lifecycle Activities
Recommended