Top Banner
THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010 Denver 1
26

THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

Jul 16, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

THE IDENTITY-INFUSED ENTERPRISE:

INTELLIGENT, CLOUD-READY, SECUREExecutive Briefing & Discussion July 22, 2010 Denver

1

Page 2: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Welcome & Introduction – Joe MaglittaVideo Keynote – Ira Winkler Video Panel with Live Discussion Novell Presentation – Larry ChinskiCustomer Stories – Tim Spires, EST GroupPartner Presentation –Tim Spires, EST GroupClosing Remarks & Raffle Bonus Time – Demo and Experts

Agenda

2

Page 3: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

• Phones to silent • Restrooms• Evaluations• Don’t be shy • Check out demos

Housekeeping

3

Page 4: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

JOE MAGLITTA ZIFF DAVIS ENTERPRISE

4

Page 5: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

1.

IDM key to cloud, on-premise control 2.

Tools can help, with proper planning, people policy, processes

3.

IDM intelligence enables good decisions around governance, risk management , compliance, access

4.

Log management key to securing enterprise network, cloud resources

Key Points/Assertions

5

Page 6: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Most recognize need for better IDAM But many not investing smartly

for

new cloud era

Reasons

• No big-picture strategy, IDAM architecture • Weak links to business, IT processes • Lots of manual work• Add your issue/s here……

Good News, Bad News

6

Page 7: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Security Spending: High Priority, Over Budget

Source: Ziff Davis Enterprise “CIO Insight”

Survey of 468 U.S. companies, June 2010

Page 8: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Source: Ziff Davis Enterprise “CIO Insight”

Survey of 468 U.S. companies, June 2010

Budgets Rising…

8

Page 9: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Especially in Mids

9

Page 10: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

1.

IDM key to cloud, on-premise control 2.

Tools can help, with proper planning, people policy, processes

3.

IDM intelligence enables good decisions around governance, risk management , compliance, access

4.

Log management key to securing enterprise network, cloud resources

Key Points/Assertions

10

Page 11: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

What’s New Solution look Like ?

Robust enterprise IDM foundation extended to cloud

Modular – fast payoff to meet today's needs, expandable tomorrow

User identity, access rights lens for all business and IT processes Well matched to compliance objectives,

audit report requirements

Page 12: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Rethinking identity management often is the starting point for enterprises assessing cloud security

Charles Kolodgy, VP Security Products, IDC

Don't ever compromise any security goals or requirements just because you're moving to the cloud

Chenxi

Wang, Analyst, Forrester

It’s time for your IAM program to grow up and display the right foundation, architecture, governance, and organization for delivering real value.

Earl Perkins, Research VP, Gartner

Don’t Take Just My Word!

Page 13: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Analysts Rate Novell as Leaders

Source: Gartner, Inc. “Magic Quadrant for Enterprise Single Sign-On.” Gregg Kreizman.

Source: Gartner, Inc. “Magic Quadrant for Security Information and Event Management.” Mark Nicolett, Kelly M. Kavanugh.

Source: Gartner, Inc. “Magic Quadrant for Web Access Management.” Ray Wagner, Earl Perkins, Perry Carpenter

Source: Gartner, Inc. “Magic Quadrant for User Provisioning.” Earl Perkins, Perry Carpenter.

The Novell offering in all of the identity, compliance and security markets are top rated in Gartner's Magic Quadrant analysis

Page 14: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Source: Ziff Davis Enterprise BrandTrak

survey “Identity Management”

1,086 U.S. companies, Sept. 2009

Choosing Identity Management: What Matters…

Page 15: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Choosing Access Control: What Matters…

Source: Ziff Davis Enterprise BrandTrak

survey “Identity and Access Management”

XXX U.S. companies, Sept. 2009

Page 16: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

What key issues related to Identity and Access Management would you like to discuss today?

Issues Polling

Page 17: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

KEYNOTE:

IRA WINKLER

17

Page 18: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

PANEL DISCUSSION

18

Page 19: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

LARRY CHINSKI NOVELL

19

Page 20: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

TIM SPIRES, EST GROUP

20

Page 21: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

PARTNER PRESENTATION: EST GROUP

21

Page 22: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

Q AND A

22

Page 23: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

FINAL THOUGHTS

23

Page 24: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

1.

IDM key to control cloud, on-premise resources

2.

Tools can help, coupled with proper planning, people policy, processes

3.

IDM intelligence enables good decisions around governance, risk management , compliance, access

4.

Log management key to securing enterprise network, cloud resources.

Key Points/Assertions

24

Page 25: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

CLOSER LOOKS

• www.novell.co m/idm4launch

• Presentations: Look in your email

25

Page 26: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010

THANK YOU!

26