Submit Search
Upload
The Identity-infused Enterprise
•
0 likes
•
933 views
Novell
Follow
Ben Goodman from Novell presentation from Gartner IAM event in November 2010
Read less
Read more
Technology
Report
Share
Report
Share
1 of 21
Download now
Download to read offline
Recommended
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
Novell
CL100.pdf
CL100.pdf
Novell
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
Novell
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
Novell
BSM201.pdf
BSM201.pdf
Novell
Novell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
Novell
Get your house on order
Get your house on order
Dekkinga, Ewout
Novell Tour Europe and South Africa 2012
Novell Tour Europe and South Africa 2012
Werner Luetkemeier
Recommended
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
Novell
CL100.pdf
CL100.pdf
Novell
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
Novell
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
Novell
BSM201.pdf
BSM201.pdf
Novell
Novell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
Novell
Get your house on order
Get your house on order
Dekkinga, Ewout
Novell Tour Europe and South Africa 2012
Novell Tour Europe and South Africa 2012
Werner Luetkemeier
Desktop as a service (daas)
Desktop as a service (daas)
johndorian555
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
SATYAVEER PAL
Going to the Cloud
Going to the Cloud
José Ferreiro
21st Century SOA
21st Century SOA
Bob Rhubart
Security in a Cloudy Architecture
Security in a Cloudy Architecture
Bob Rhubart
Isc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
Bob Rhubart
Broadview Networks Cloud Computing Brochure
Broadview Networks Cloud Computing Brochure
dshetterly
Brochure Virtualization
Brochure Virtualization
bryanpsu
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
Protecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
Managing change in the data center network
Managing change in the data center network
Interop
Challenges faced by small and medium business
Challenges faced by small and medium business
Nevales Networks
Simplifying Systems Management
Simplifying Systems Management
Dell World
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
Cisco Canada
Azaleos Overview
Azaleos Overview
Azaleos Corp.
Running SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
Vertical Solutions
The VDI InfoSec Conundrum
The VDI InfoSec Conundrum
VirtualTal
Deadly Sins Bcs Elite
Deadly Sins Bcs Elite
Jon G. Hall
Future of productivity hau lu
Future of productivity hau lu
Microsoft Singapore
Novell Access Governance Suite
Novell Access Governance Suite
Novell
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Novell
More Related Content
What's hot
Desktop as a service (daas)
Desktop as a service (daas)
johndorian555
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
SATYAVEER PAL
Going to the Cloud
Going to the Cloud
José Ferreiro
21st Century SOA
21st Century SOA
Bob Rhubart
Security in a Cloudy Architecture
Security in a Cloudy Architecture
Bob Rhubart
Isc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
Bob Rhubart
Broadview Networks Cloud Computing Brochure
Broadview Networks Cloud Computing Brochure
dshetterly
Brochure Virtualization
Brochure Virtualization
bryanpsu
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
Protecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
Managing change in the data center network
Managing change in the data center network
Interop
Challenges faced by small and medium business
Challenges faced by small and medium business
Nevales Networks
Simplifying Systems Management
Simplifying Systems Management
Dell World
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
Cisco Canada
Azaleos Overview
Azaleos Overview
Azaleos Corp.
Running SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
Vertical Solutions
The VDI InfoSec Conundrum
The VDI InfoSec Conundrum
VirtualTal
Deadly Sins Bcs Elite
Deadly Sins Bcs Elite
Jon G. Hall
Future of productivity hau lu
Future of productivity hau lu
Microsoft Singapore
What's hot
(20)
Desktop as a service (daas)
Desktop as a service (daas)
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
Going to the Cloud
Going to the Cloud
21st Century SOA
21st Century SOA
Security in a Cloudy Architecture
Security in a Cloudy Architecture
Isc2conferancepremay15final
Isc2conferancepremay15final
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
Broadview Networks Cloud Computing Brochure
Broadview Networks Cloud Computing Brochure
Brochure Virtualization
Brochure Virtualization
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Protecting Data in the Cloud
Protecting Data in the Cloud
Managing change in the data center network
Managing change in the data center network
Challenges faced by small and medium business
Challenges faced by small and medium business
Simplifying Systems Management
Simplifying Systems Management
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
Azaleos Overview
Azaleos Overview
Running SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
The VDI InfoSec Conundrum
The VDI InfoSec Conundrum
Deadly Sins Bcs Elite
Deadly Sins Bcs Elite
Future of productivity hau lu
Future of productivity hau lu
Viewers also liked
Novell Access Governance Suite
Novell Access Governance Suite
Novell
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Novell
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday Problems
Novell
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
Improve Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux Environments
Novell
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Novell
Viewers also liked
(6)
Novell Access Governance Suite
Novell Access Governance Suite
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday Problems
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
Improve Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux Environments
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Similar to The Identity-infused Enterprise
Security Management in the Cloud
Security Management in the Cloud
GaryArdito
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
IBM Security
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
Security in Cloud Computing
Security in Cloud Computing
Ashish Patel
Pulse 2014.mobile first.security
Pulse 2014.mobile first.security
Sreeni Pamidala
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
Insights into cyber security and risk
Insights into cyber security and risk
EY
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
Cloud native patterns antipatterns
Cloud native patterns antipatterns
Martin Stemplinger
Hi600 ch08_text_slides
Hi600 ch08_text_slides
ljmcneill33
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
Presentation cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
Similar to The Identity-infused Enterprise
(20)
Security Management in the Cloud
Security Management in the Cloud
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
Security in Cloud Computing
Security in Cloud Computing
Pulse 2014.mobile first.security
Pulse 2014.mobile first.security
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Insights into cyber security and risk
Insights into cyber security and risk
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Cloud native patterns antipatterns
Cloud native patterns antipatterns
Hi600 ch08_text_slides
Hi600 ch08_text_slides
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Presentation cloud security the grand challenge
Presentation cloud security the grand challenge
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
More from Novell
Filr white paper
Filr white paper
Novell
Social media class 4 v2
Social media class 4 v2
Novell
Social media class 3
Social media class 3
Novell
Social media class 2
Social media class 2
Novell
Social media class 1
Social media class 1
Novell
Social media class 2 v2
Social media class 2 v2
Novell
LinkedIn training presentation
LinkedIn training presentation
Novell
Twitter training presentation
Twitter training presentation
Novell
Getting started with social media
Getting started with social media
Novell
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
Novell
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Novell
Workload iq final
Workload iq final
Novell
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
Novell
Accelerate to the Cloud
Accelerate to the Cloud
Novell
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
Novell
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
Iaas for a demanding business
Iaas for a demanding business
Novell
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Novell
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
Novell
Whats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise Server
Novell
More from Novell
(20)
Filr white paper
Filr white paper
Social media class 4 v2
Social media class 4 v2
Social media class 3
Social media class 3
Social media class 2
Social media class 2
Social media class 1
Social media class 1
Social media class 2 v2
Social media class 2 v2
LinkedIn training presentation
LinkedIn training presentation
Twitter training presentation
Twitter training presentation
Getting started with social media
Getting started with social media
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Workload iq final
Workload iq final
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
Accelerate to the Cloud
Accelerate to the Cloud
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Iaas for a demanding business
Iaas for a demanding business
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
Whats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise Server
Recently uploaded
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
blackmambaettijean
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Recently uploaded
(20)
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
The Identity-infused Enterprise
1.
The Identity-infused Enterprise Identify, Secure,
Comply Ben Goodman Technolgy Strategist, Identity and Security bgoodman@novell.com November 15, 2010
2.
© Novell, Inc.
All rights reserved.2 Making IT Work As One™
3.
© Novell, Inc.
All rights reserved.3 21st Century Computing The risks and challenges of computing across multiple environments must be controlled. Users should have unimpeded access to the full computing services they need to do their jobs right. Computing should be secure, compliant and portable.
4.
© Novell, Inc.
All rights reserved.4 Identity Is Always the Foundation Mobile Devices Personal Computers Identity Foundation
5.
© Novell, Inc.
All rights reserved.5 Mobile Devices Personal Computers Identity Foundation World Wide Web Closed Networks Identity Is Always the Foundation
6.
© Novell, Inc.
All rights reserved.6 Mobile Devices Personal Computers Identity Foundation Virtualized Workloads Traditional Workloads on Dedicated Servers World Wide Web Closed Networks Identity Is Always the Foundation
7.
© Novell, Inc.
All rights reserved.7 New Technologies Mean New Flexibility Virtualization Cloud “Anything” as a Service Mobile devices
8.
© Novell, Inc.
All rights reserved.8 Regulations Require More Control RiskOperational
9.
© Novell, Inc.
All rights reserved.9 It's All about Balance Control Flexibility
10.
© Novell, Inc.
All rights reserved.10 The Identity-Infused Enterprise Core to Enterprise Security and Compliance User Provisioning Security Monitoring and Remediation Log Management Compliance Integration Compliance Assurance Secure Access Identity Management
11.
© Novell, Inc.
All rights reserved.11 Identity Serves As the Building Block Identify Secure Comply
12.
© Novell, Inc.
All rights reserved.12 Identity Serves As the Building Block Identify •Use identity as the basic building block for people and resources •Improve efficiency while lowering the total cost of ownership Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer. Novell Novell Novell Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) Competitive Set Average (Oracle, CA, IBM, Courion) 24% more than Novell 23% more than Novell 25% more than Novell All Figures Based on 5 Year Present Value
13.
© Novell, Inc.
All rights reserved.13 Integration with Security Protects the Network Secure •Answer the basic questions: “What happened? Who did it? Should I care?” •Feel confident in moving to cloud based services User Activity Monitoring • Manage user access risk • Monitor identity fraud • Enterprise view
14.
© Novell, Inc.
All rights reserved.14 Leverage Compliance Investments to Get Agile •Increase agility – controls can provide insight beyond just assuring compliance Comply Continuous Compliance •Management, monitoring and enforcement of IT controls so you can mitigate risks before they impact business objectives. Control Flexibility
15.
© Novell, Inc.
All rights reserved.15 An Identity-Infused Enterprise moves at the speed of business Less than 20 percent of enterprises know who has access to appropriate resources By 2012, 79 percent of CIO's will leverage the cloud but are unsure of data access and security 70 percent of enterprises want a single view across all systems to identity threats and violations Rich information on user access, privileges and provisioning activity to answer any GRC questions Enhanced security for cloud computing model through extension of enterprise policies to the cloud applications Centralized point of control for unified policy-based management across different systems – both ‘on premise’ and in the cloud With an Identity-Infused Enterprise Flexible Architecture That Supports the Cloud Novell customer survey with infosurv around identity and security challenges - 2009 Without Identity Foundation With Identity Foundation
16.
Appendix
17.
© Novell, Inc.
All rights reserved.17 IT Service Management IT Service Management IT Service Management Business Service Management Business Service Management Business Service Management Physical Virtual Cloud The Customer Challenge: Manage a Siloed Infrastructure Governance and Compliance Governance and Compliance Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Firewall
18.
© Novell, Inc.
All rights reserved.18 IT Service Management Business Service Management Governance and Compliance Intelligent Workload Management: From Silos to Services Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Secure Measure Manage Firewall Physical Virtual Cloud
19.
© Novell, Inc.
All rights reserved.19 Isolated Identity Awareness WorkloadIQ: Integrating Identity into Management Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Security and Compliance Management Resource Management Custom, Supported Operating System
20.
© Novell, Inc.
All rights reserved.20 Physical Virtual Cloud WorkloadIQ: Lifecycle Activities
Download now