SlideShare a Scribd company logo
1 of 30
WorkloadIQ ™ The intelligent way to build, secure, manage and measure workloads across physical, virtual and cloud environments Your Name Here Your Title Here Your Email Here August 19, 2010
21 st  Century Computing ,[object Object],[object Object],[object Object]
It's All about Balance Control Flexibility
New Technologies Mean New  Flexibility Virtualization Cloud “ Anything” as a Service Mobile devices
Regulations Require More Control Risk Operational
Physical, Virtual and Cloud Utilization Percent of enterprise workloads that will run in physical, virtual and cloud environments by 2015 Novell estimates based on IDC and Gartner data
Intelligent Workload Management
[object Object],[object Object],The Evolution of the Workload ,[object Object],[object Object],[object Object],Application Middleware Operating System
Workloads Deliver a Business Service Workloads Business Service Example:  SAP inventory report seen by user Database workload on  physical   hardware in a legacy data center Application server virtualized  in a private cloud Presentation and graphics server in a public  cloud
The Customer Challenge: Manage a Siloed Infrastructure IT Service Management IT Service Management IT Service Management Business Service Management Business Service Management Business Service Management Physical Virtual Cloud Governance and Compliance Governance and Compliance Governance and Compliance Internal Cloud  (On-Premise) External Cloud  (Off-Premise) Firewall
Intelligent Workload Management: From Silos to Services IT Service Management Business Service Management Governance and Compliance Internal Cloud  (On-Premise) External Cloud  (Off-Premise) Build Secure Measure Manage Firewall Physical Virtual Cloud
Intelligent Workload Management Intelligent workload management enables IT organizations to manage and optimize computing resources in a   policy-driven ,  secure  and   compliant  manner across physical, virtual and cloud environments to deliver business services for  end customers. Intelligent WORKLOAD Management
What Makes a Workload Intelligent? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The intelligent way to build, secure, manage and measure  workloads across physical,virtual and cloud environments
Data Center Computing Is Changing Identity Is at the Center of the Transformation Intelligent Workload Management Cloud (Public and Private) Virtualization Single-purpose Physical Systems
IDC Whitepaper: Intelligent Workload Management Enables Security from the Datacenter to the Cloud 2010 Security and identity and access management are  critical  to the success of physical, virtual and cloud computing. Identity Is Critical
WorkloadIQ: Integrating  Identity  into Management Isolated Identity Awareness Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Security and Compliance Management Resource Management Custom, Supported Operating System
Physical Virtual Cloud WorkloadIQ: Lifecycle Activities
WorkloadIQ: Products and Solutions
WorkloadIQ: Services Novell Services and Partners
WorkloadIQ: Technology Partners
WorkloadIQ: Case Studies Build HSBC uses  SUSE Linux Enterprise Server , a WorkloadIQ product, to improve operational efficiency and reduce overall IT costs. Walmart uses  SUSE Linux Enterprise Server , a WorkloadIQ product, to move to lower-cost commodity server hardware while improving the customer experiences. DFS uses  SUSE Linux Enterprise Server , a WorkloadIQ product, to ensure high availability and safety for its aircraft, while saving on licensing fees.
WorkloadIQ: Case Studies Secure Vancouver 2010 uses  Novell Identity Manager , a WorkloadIQ product, to ensure users have the correct access rights and that they're being enforced consistently across the infrastructure. Toll Brothers uses  Novell Access Manager  and  Novell Identity Manager , WorkloadIQ products, to increase security while reducing user management time and costs. Telecom Italia uses  Novell Sentinel , a WorkloadIQ product, to reduce workload and costs by almost 50 percent, and to achieve compliance.
WorkloadIQ: Case Studies Manage BCCard uses  PlateSpin Forge , a WorkloadIQ product, to protect its data and maintain availability of critical systems. Sussex Health Informatics Service uses  Novell ZENworks Configuration Management , a WorkloadIQ product, to enable full remote maintenance and automated software distribution, reducing costs and improving clinical care. Essent uses  PlateSpin Migrate , a WorkloadIQ product, to consolidate its servers and save approximately €2 million.
WorkloadIQ: Case Studies Measure Europo Assistance uses  Novell Business Service Management , a WorkloadIQ solution, to ensure better availability for key systems and to improve reliability of support. Gothaer Systems uses  Novell Business Service Management , a WorkloadIQ product, to ensure 24x7 available for critical systems, fix problems quickly and minimize downtime. The US Navy uses  Novell Sentinel , a WorkloadIQ product, to automate and centralize security monitoring.
WorkloadIQ: Business Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You Can Have Both Flexibility Control
Where Do I Start? Start  anywhere.  Grow  everywhere
Making IT Work As One ™
 

More Related Content

What's hot

When You Grow, The Cloud Grows
When You Grow, The Cloud GrowsWhen You Grow, The Cloud Grows
When You Grow, The Cloud GrowsRapidScale
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactivejerianasmith
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud ComputingCentriLogic
 
Managed Cloud Services
Managed Cloud ServicesManaged Cloud Services
Managed Cloud ServicesSirishaRihu
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationPT Datacomm Diangraha
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?RapidScale
 
Desktop Virtualization: Emerging Requirements and Solutions
Desktop Virtualization: Emerging Requirements and SolutionsDesktop Virtualization: Emerging Requirements and Solutions
Desktop Virtualization: Emerging Requirements and SolutionsEnterprise Management Associates
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud ComputingCentriLogic
 
Cloud migration
Cloud migrationCloud migration
Cloud migrationMark Swick
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
On-Premise vs Cloud Hosted Call Center
On-Premise vs Cloud Hosted Call CenterOn-Premise vs Cloud Hosted Call Center
On-Premise vs Cloud Hosted Call CenterCallCenterHosting
 
Cloud VDI And Its Benefits
Cloud VDI And Its BenefitsCloud VDI And Its Benefits
Cloud VDI And Its BenefitsYuvraj Jain
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentationddcarr
 
RapidScale CloudApps
RapidScale CloudAppsRapidScale CloudApps
RapidScale CloudAppsRapidScale
 
Vistara 3.1 - Delivering Unified IT Operations
Vistara 3.1 - Delivering Unified IT OperationsVistara 3.1 - Delivering Unified IT Operations
Vistara 3.1 - Delivering Unified IT OperationsVistara
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged InfrastructuresPeak 10
 
Innovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesInnovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesDell World
 
Cloud Computing and Data Center Futures
Cloud Computing and Data Center FuturesCloud Computing and Data Center Futures
Cloud Computing and Data Center FuturesMartin Hingley
 

What's hot (20)

When You Grow, The Cloud Grows
When You Grow, The Cloud GrowsWhen You Grow, The Cloud Grows
When You Grow, The Cloud Grows
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud Computing
 
Managed Cloud Services
Managed Cloud ServicesManaged Cloud Services
Managed Cloud Services
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Desktop Virtualization: Emerging Requirements and Solutions
Desktop Virtualization: Emerging Requirements and SolutionsDesktop Virtualization: Emerging Requirements and Solutions
Desktop Virtualization: Emerging Requirements and Solutions
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud Computing
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
On-Premise vs Cloud Hosted Call Center
On-Premise vs Cloud Hosted Call CenterOn-Premise vs Cloud Hosted Call Center
On-Premise vs Cloud Hosted Call Center
 
Cloud VDI And Its Benefits
Cloud VDI And Its BenefitsCloud VDI And Its Benefits
Cloud VDI And Its Benefits
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
 
Stefan Haase Cloud
Stefan Haase CloudStefan Haase Cloud
Stefan Haase Cloud
 
RapidScale CloudApps
RapidScale CloudAppsRapidScale CloudApps
RapidScale CloudApps
 
Vistara 3.1 - Delivering Unified IT Operations
Vistara 3.1 - Delivering Unified IT OperationsVistara 3.1 - Delivering Unified IT Operations
Vistara 3.1 - Delivering Unified IT Operations
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
 
Innovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesInnovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use cases
 
Cloud Computing and Data Center Futures
Cloud Computing and Data Center FuturesCloud Computing and Data Center Futures
Cloud Computing and Data Center Futures
 

Similar to Intelligent workload management across physical, virtual and cloud

VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
Cloud computing training | Cloud computing courses
Cloud computing training | Cloud computing coursesCloud computing training | Cloud computing courses
Cloud computing training | Cloud computing coursesCloud computing training
 
Debesys pasiekiami ranka - Jevgenijus Vinochodovas
Debesys pasiekiami ranka - Jevgenijus VinochodovasDebesys pasiekiami ranka - Jevgenijus Vinochodovas
Debesys pasiekiami ranka - Jevgenijus VinochodovasStrongPoint Baltics
 
Azure Operations Manager Suite
Azure Operations Manager SuiteAzure Operations Manager Suite
Azure Operations Manager SuiteAsaf Nakash
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company PresentationRapidScale
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDell Technologies
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeRH
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationSix Degrees
 
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...Louis Göhl
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationRapidValue
 
VMware Keynote
VMware KeynoteVMware Keynote
VMware KeynoteVMUG IT
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud StrategyAmit Gatenyo
 
Cloud as an Enabler for Business Innovation
Cloud as an Enabler for Business InnovationCloud as an Enabler for Business Innovation
Cloud as an Enabler for Business InnovationIBM Danmark
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private CloudVertical Solutions
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2Neermal Doolub
 

Similar to Intelligent workload management across physical, virtual and cloud (20)

VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Cloud computing training | Cloud computing courses
Cloud computing training | Cloud computing coursesCloud computing training | Cloud computing courses
Cloud computing training | Cloud computing courses
 
Debesys pasiekiami ranka - Jevgenijus Vinochodovas
Debesys pasiekiami ranka - Jevgenijus VinochodovasDebesys pasiekiami ranka - Jevgenijus Vinochodovas
Debesys pasiekiami ranka - Jevgenijus Vinochodovas
 
Azure Operations Manager Suite
Azure Operations Manager SuiteAzure Operations Manager Suite
Azure Operations Manager Suite
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Datacenter virtualization
Datacenter virtualizationDatacenter virtualization
Datacenter virtualization
 
VMware Keynote
VMware KeynoteVMware Keynote
VMware Keynote
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 
Cloud as an Enabler for Business Innovation
Cloud as an Enabler for Business InnovationCloud as an Enabler for Business Innovation
Cloud as an Enabler for Business Innovation
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2
 

More from Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 

Intelligent workload management across physical, virtual and cloud

  • 1. WorkloadIQ ™ The intelligent way to build, secure, manage and measure workloads across physical, virtual and cloud environments Your Name Here Your Title Here Your Email Here August 19, 2010
  • 2.
  • 3. It's All about Balance Control Flexibility
  • 4. New Technologies Mean New Flexibility Virtualization Cloud “ Anything” as a Service Mobile devices
  • 5. Regulations Require More Control Risk Operational
  • 6. Physical, Virtual and Cloud Utilization Percent of enterprise workloads that will run in physical, virtual and cloud environments by 2015 Novell estimates based on IDC and Gartner data
  • 8.
  • 9. Workloads Deliver a Business Service Workloads Business Service Example: SAP inventory report seen by user Database workload on physical hardware in a legacy data center Application server virtualized in a private cloud Presentation and graphics server in a public cloud
  • 10. The Customer Challenge: Manage a Siloed Infrastructure IT Service Management IT Service Management IT Service Management Business Service Management Business Service Management Business Service Management Physical Virtual Cloud Governance and Compliance Governance and Compliance Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Firewall
  • 11. Intelligent Workload Management: From Silos to Services IT Service Management Business Service Management Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Secure Measure Manage Firewall Physical Virtual Cloud
  • 12. Intelligent Workload Management Intelligent workload management enables IT organizations to manage and optimize computing resources in a policy-driven , secure and compliant manner across physical, virtual and cloud environments to deliver business services for end customers. Intelligent WORKLOAD Management
  • 13.
  • 14. The intelligent way to build, secure, manage and measure workloads across physical,virtual and cloud environments
  • 15. Data Center Computing Is Changing Identity Is at the Center of the Transformation Intelligent Workload Management Cloud (Public and Private) Virtualization Single-purpose Physical Systems
  • 16. IDC Whitepaper: Intelligent Workload Management Enables Security from the Datacenter to the Cloud 2010 Security and identity and access management are critical to the success of physical, virtual and cloud computing. Identity Is Critical
  • 17. WorkloadIQ: Integrating Identity into Management Isolated Identity Awareness Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Security and Compliance Management Resource Management Custom, Supported Operating System
  • 18. Physical Virtual Cloud WorkloadIQ: Lifecycle Activities
  • 20. WorkloadIQ: Services Novell Services and Partners
  • 22. WorkloadIQ: Case Studies Build HSBC uses SUSE Linux Enterprise Server , a WorkloadIQ product, to improve operational efficiency and reduce overall IT costs. Walmart uses SUSE Linux Enterprise Server , a WorkloadIQ product, to move to lower-cost commodity server hardware while improving the customer experiences. DFS uses SUSE Linux Enterprise Server , a WorkloadIQ product, to ensure high availability and safety for its aircraft, while saving on licensing fees.
  • 23. WorkloadIQ: Case Studies Secure Vancouver 2010 uses Novell Identity Manager , a WorkloadIQ product, to ensure users have the correct access rights and that they're being enforced consistently across the infrastructure. Toll Brothers uses Novell Access Manager and Novell Identity Manager , WorkloadIQ products, to increase security while reducing user management time and costs. Telecom Italia uses Novell Sentinel , a WorkloadIQ product, to reduce workload and costs by almost 50 percent, and to achieve compliance.
  • 24. WorkloadIQ: Case Studies Manage BCCard uses PlateSpin Forge , a WorkloadIQ product, to protect its data and maintain availability of critical systems. Sussex Health Informatics Service uses Novell ZENworks Configuration Management , a WorkloadIQ product, to enable full remote maintenance and automated software distribution, reducing costs and improving clinical care. Essent uses PlateSpin Migrate , a WorkloadIQ product, to consolidate its servers and save approximately €2 million.
  • 25. WorkloadIQ: Case Studies Measure Europo Assistance uses Novell Business Service Management , a WorkloadIQ solution, to ensure better availability for key systems and to improve reliability of support. Gothaer Systems uses Novell Business Service Management , a WorkloadIQ product, to ensure 24x7 available for critical systems, fix problems quickly and minimize downtime. The US Navy uses Novell Sentinel , a WorkloadIQ product, to automate and centralize security monitoring.
  • 26.
  • 27. You Can Have Both Flexibility Control
  • 28. Where Do I Start? Start anywhere. Grow everywhere
  • 29. Making IT Work As One ™
  • 30.  

Editor's Notes

  1. Risk management is a growing concern in today's businesses. High-profile security breaches have dominated IT news in recent years, leading to public and painful disclosures that have dramatically affected brand image and the financial health of many public companies. From the boardroom to the data center, organizations are experiencing a crisis of trust. Customers are losing trust in the ability of businesses to keep their personal data safe. IT departments are losing trust in their own ability to meet business security and compliance mandates. CxOs and compliance officers are losing trust in the certifications they're required to submit because they have no way of confirming that security, identity, and access management controls are in place and properly followed. In addition to the increase in risk, compliance challenges are a reality of current business conditions. Today's businesses must comply with a complicated and growing set of industry and government regulations. Sarbanes-Oxley, Basel II, HIPAA, PCI-DSS and others add layers of administration and complexity to already complicated networks—layers that guarantee increased risk and increased difficulty in managing it. There are two kinds of control needed - Operation control, Risk control Operational Patching Help Desk Performance Up-time Accessability Support Compatability Standardization Risk 285 Million records compromised in 2008 74 percent compromised by external sources 20 percent compromised by insiders 32 percent implicated business partners Continuing regulatory requirements Sarbanes-Oxley Basel II HIPAA PCI DSS Good guys gone bad Good guys wanting to be good Help desk bombarded when something goes wrong Enforcement side is being ratcheted up Attacks are far more advanced Attacker are far more organized Cyber espianage Aurora breach – Google Risk management HSBC news – good guys doing the right things - Good guys wanting to do the right things Advanced persistent threat Lose credibility Lose competitive advantage Connected and disconnected Location Device (corporate or personal)
  2. We define a “workload” as everything from an integrated suite of software that includes the operating system, middle-ware and application to just the application itself. When you aggregate several workloads together, you create a business service that the end user consumes .
  3. Anything not clear? Missing?
  4. Best identity solutions on the market Biggest set of assets to meet your needs today and in the future Broadest support for mixed IT environments Start anywhere and move around
  5. • Determine your business problem • Ask yourself if the solution will put you on the path • Start anywhere • Grow everywhere
  6. Slide : Novell ® Making IT Work As One™