Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you...
Transcript of Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you...
![Page 1: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/1.jpg)
Introducing Novell SecureLoginIntroducing Novell SecureLogin
Jesper OstergaardProtocom Development SystemsTeritory Manager, NordicMobile: +45 20 666 566Email: [email protected]
Protocom inside
![Page 2: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/2.jpg)
• Introduction to Novell SecureLogin4 Business challenges—password pandemonium4 SecureLogin: solves password management problems
• Implementing SecureLogin4 Project Management4 Things to watch out for.
• Demonstration
AgendaAgenda
![Page 3: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/3.jpg)
Novell Novell SecureLogin SecureLogin
OverviewOverview
![Page 4: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/4.jpg)
Password Administration ChallengePassword Administration Challenge
![Page 5: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/5.jpg)
Did you know…
• Each time an end-user calls the Help Desk, it costs the organization $25 to $50 (Giga)
• Annually, organizations spend $200-$300 per user on password management (Hurwitz Group)
• (IDC) Annual Help Desk time spent managing passwords for an average 5,000 user organization with…• 4-8 apps: 4,150 hours• over 20 apps: 10,700 hours
Password Management Problems: Password Management Problems: Help Desk & Administration CostsHelp Desk & Administration Costs
![Page 6: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/6.jpg)
User Productivity ChallengeUser Productivity Challenge
![Page 7: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/7.jpg)
Did you know…
• The average user scenario: 44 hours per year performing multiple login tasks to access 4 applications (Hurwitz Group)
• A 5,000 user organization loses 1,479 hours of productive time per month getting help with passwords (IDC)
• Over 70% of users have password problems at least monthly (IDC)
Password Management Problem: Password Management Problem: EndEnd--User ProductivityUser Productivity
![Page 8: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/8.jpg)
What about data security?
Password Management ProblemPassword Management Problem
•The cost of being offline•The cost of lost profits•The cost of lost customer confidence•The cost of litigation
![Page 9: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/9.jpg)
Did you know…
• In 1999, Fortune 1000 companies reported $45 billion in proprietary information loss (Price Waterhouse Coopers)
• 57% of security breaches were made by on-site employees/contractors accessing unauthorized resources (eWeek)
• On-site employees/contractors are the #1 threat to proprietary data security (Price Waterhouse Coopers)
Password Management Problem: Password Management Problem: Cost of Insecure DataCost of Insecure Data
![Page 10: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/10.jpg)
Are we Ready For Digital Law?Are we Ready For Digital Law?
• eSIGN Act
• Sarbanes-Oxley Act (North America) - requires CEOs and CFOs to vouch for accuracy of their company’s books
• HIPAA (North America) - Health Insurance Portability and Accountability Act; Gramm Leach Bliley Act (North America) - enforces privacy of consumer financial information from the Federal Trade Commission
• Data Protection Act of 1998 (European Union)
![Page 11: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/11.jpg)
PasswordPassword’’s As s As ““Proof of IdentityProof of Identity”” (POI)(POI)
• Passwords or PINs used by 99.9% of systems4 Simple to implement4 costly to maintain4 frustrating for users, helpdesk staff and alike.
• Security verse Convenience4 Strong passwords with letters and numbers, frequently
changing ironically lead to lowering of security.4 Easily Guessed4 Prone to sharing.
• Impossible to prove access “beyond reasonable doubt”
![Page 12: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/12.jpg)
What is Novell SecureLogin?What is Novell SecureLogin?
• Industry Leading Password Management Solution4World’s best Single Sign-on4 #1 market share leader (IDC)4 Advanced Authentication with NMAS
• Key Part of Secure Access Suite4 SecureLogin & NMAS PLUS4Web Portal Single Sign-on - iChain4 Password Redirection - NDS/AS
![Page 13: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/13.jpg)
Holistic ApproachHolistic Approach
SecureLogin is a holistic approach to all major Password
Management requirements.
![Page 14: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/14.jpg)
Individual Technical Solutions
Password management and reset costs
User productivitysuffers from resets
Weak passwords and decreased security
Employeesdissatisfied with IT
Passwordsynchronization
SingleSign-On
Self-ServicePassword Reset
PasswordRedirection
AdvancedAuthentication
Web/ PortalSSO
Passwordsynchronization
SingleSign-On
Self-ServicePassword Reset
PasswordRedirection
AdvancedAuthentication
Web/ PortalSSO
SecureLogin Password Management Suite
Holistic ApproachHolistic Approach
Business Problems
One Holistic Approach to Single Identity Management
![Page 15: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/15.jpg)
How it Works:How it Works:Login Experience Login Experience –– Before NSLBefore NSL
ApplicationApplicationServerServer
ClientClientWorkstationWorkstation
3) Provide Credentials
4) Application Starts
1) Launch Application
2) Credential Challenge
Login ID:
Password:
frank
*******
![Page 16: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/16.jpg)
How it Works:How it Works:Login Experience Login Experience –– With NSLWith NSL
ApplicationApplicationServerServer
eDirectoryeDirectory, , AD, LDAP, AD, LDAP, NT DomainNT Domain
ClientClientWorkstationWorkstation
4) NSL Requests
Secret from eDirectory
Login ID:
Password:
2) Launch Application
3) Credential Challenge
1) Authenticate to eDirectory
5) NSL Receives Secret from eDirectory,
Supplies it to the Application
![Page 17: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/17.jpg)
NSL 3.0 FeaturesNSL 3.0 FeaturesClientClient--side Featuresside Features
Comprehensive single sign-on:•Windows applications•Groupware & Client/server applications•Internet/intranet Web sites•Java applets/applications•Terminal Emulators•Citrix/Terminal Server•UNIX/ Telnet applications•Even DOS applications•No application changes required
Application integration options:• Wizards for simple application
Integration tasks• Advanced application integration tool
for complex tasks• Password policy enforcement
Deployment Options:• Client32, LDAP or ADSI• Client-only or Client-Server
configuration with SecretStoreTM
• Local cache for remote/disconnected
Other User Features:• NMAS SE built in• Screenlock for Win9x• Simple configuration tool for users
![Page 18: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/18.jpg)
NSL 3.0 Features, ContinuedNSL 3.0 Features, ContinuedServerServer--side Features & Administrationside Features & Administration
Server-side options, when implemented on eDirectory:
• SecretStore v3 Server• NMAS v2 Server
Administration tools:• ConsoleOne Administration for
eDirectory configurations• Script Editor administration for LDAP
configurations• Microsoft Management Console
administration for MS Active Directory
Administrative Capabilities:• Single point of management for deploying organization-wide application integration, password policies• Administrator sets overriding values for user options• SNMP monitoring of login events and performance• Non Repudiation• Separation of administrative and SSO responsibility
![Page 19: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/19.jpg)
eDirectoryIn-house App’s
Unix
Internet/intranet Web
MVS
Terminal Server/CitrixMainframe
AS/400
RoutersDOS & 16bit
Java
Win32 App’s
One Login
Single Sign-on
• Auto-detection, Wizard and Central Configuration• Manual Logins, Password Change, Invalid Password, Error
Messages can all be automated.• More emulators, web and win applications than any other
solution.• No Application Changes or other costly infrastructure.
SecureLogin SecureLogin –– Easy to ImplementEasy to Implement
![Page 20: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/20.jpg)
SecureLogin SecureLogin –– Fast ROIFast ROI
LANOne Login
• Uses existing Infrastructure• eDirectory, LDAP, NDS, SecretStore, AD, NT Domain• No new hardware• Leverages existing Disaster Recovery, Tape Backup,
Administration, Management and Auditing systems.• Customers already familiar with look and feel.• No need to change backend systems.• Can be implemented selectively
In-house App’s
Unix
Internet/intranet Web
MVS
Terminal Server/CitrixMainframe
AS/400
RoutersDOS & 16bit
Java
Win32 App’s
![Page 21: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/21.jpg)
SecureLogin SecureLogin -- Is FlexibleIs Flexible
LANOne Login
Works at Office, Home, or fully offline.
One Login
In-house App’s
Unix
Internet/intranet Web
MVS
Terminal Server/CitrixMainframe
AS/400
RoutersDOS & 16bit
Java
Win32 Apps
![Page 22: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/22.jpg)
PollPoll
How important is Access and Security to your organization?4 Very important4 Moderate importance4 Little to no importance4 Unsure
![Page 23: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/23.jpg)
PollPoll
What degree of interest do you see among in Biometrics, Smartcards, Tokens and/or Proximity cards?4 High degree of interest4 Moderate interest4 Little to no interest4 Unsure
![Page 24: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/24.jpg)
Value of Novell Value of Novell SecureLoginSecureLogin
![Page 25: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/25.jpg)
Value PropositionsValue PropositionsJustifying SecureLoginJustifying SecureLogin
1. Vastly reduce help desk costs due to password management resets.
2. Improve network security, absolutely and consistently, enforcing password security policy 100% of the time.
3. Significantly enhance end-user productivity and satisfaction.
![Page 26: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/26.jpg)
Do I need SecureLogin?Do I need SecureLogin?
• The problem for management4 Increasing help desk support costs4 Help desk overload -4 Concerns about protecting information4 Increasing User Authentication and Security Requirements both
internally and through legislation.
• The problem for end users:4 Too many IDs and Passwords4 Too much employee downtime because of password problems4 Fast access to information
![Page 27: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/27.jpg)
Leading QuestionsLeading Questions
•How many passwords does your typical end-user have to remember? (Most have 8-12)•How strong and secure are these passwords? (Most are weak and easy to guess, or written down in obvious places)•How much time and money does your IT staff spend on password resets? (Use the interactive ROI tool to determine this based on their own input—the results will be alarming)•Have you implemented password policies? If so, how well do your users adhere to them? (SecureLogin enforces this for you with no effort by the end-user)
![Page 28: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/28.jpg)
Regional HospitalRegional Hospital
• Main hospital with remote doctors offices across varying speed links
• 15 NetWare fileservers• 3 UNIX machines running HIS• Windows 95 and W2K corporate desktop• Client/server HIS• Reflection for Unix v5 primary emulator• Citrix based applications for remote offices
![Page 29: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/29.jpg)
High level requirementsHigh level requirements
• Wanted to increase level of user authentication for legislative requirements.
• Diverse environment with different requirements between different disciplines within the hospital in addition to external users.
• Had a shared PC environment and medical staff typically did not logout and shared their ID’s.
• Needed to increase security for mobile medical staff.• Wanted to use productivity and helpdesk savings resulting
from single sign-on to fund initial project and ongoing support.
![Page 30: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/30.jpg)
Case Study Case Study --Client with 2000 UsersClient with 2000 Users
Costs• Software $140,000• Project Management & Consulting $150,000• Ongoing consulting and training $30,000• Ongoing maintenance $21,000
Return on Investment (yearly)• Helpdesk Savings ($90pu) $180,000• User Productivity ($110pu) $220,000
-----------Annual Saving $400,000Ongoing Services $(51,000)
1st Year Savings $89,0002nd Year Savings $349,000
![Page 31: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/31.jpg)
Return On InvestmentReturn On Investment
• The typical user spends as much as 44 hours per yearperforming multiple login tasks to access 4 applications - A 1996 study by the Network Applications Consortium
• Most users can’t remember more than 3 passwords, yet are expected to remember 6 or more - Hurwitz Group, 2000
• More than 30% of help desk costs are password related - Giga, Renee Woo, March 2001
• Password management costs between US$200 and US$300 per user each year – IDC
![Page 32: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/32.jpg)
Typical ProjectTypical Project
• Project management4 Prepare business case with ROI4 Analyze business and user requirements and document system
constraints• User Groups including Unions• Which applications• Current application limitations• How users access the system - wards, surgery, back office etc.• What the business expects from the system (what the project
performance will be measured against)4 System architecture and Design documentation based on
requirements
Making single sign-on work is about 10% technology and 90% project management
![Page 33: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/33.jpg)
Typical ProjectTypical Project
• Consulting• Determine requirements for each application
– login rules, change password, invalid password processing etc.• Review disaster recovery plan• Tape backup strategy• Develop software release process• Establish test environment• Develop performance guidelines and milestones• Develop return on investment milestones• Implementation plan
– Test cutdown plan with pilot» 2 users at each business unit» one application per business unit» big bang ?
![Page 34: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/34.jpg)
Typical ProjectTypical Project
• Consulting /cont
• Software distribution process changes– system maintenance– most businesses evolve, so does the infrastructure and the need to
periodically review the system measuring the ROI• Security Review of applications and infrastructure
– generic accounts - RCONSOLE, routers, physical security systems etc.• Test and Pilot system
• Training– end-users– helpdesk– system designers– in-house application developers– security and auditing staff– Software distribution
• Post implementation– on-going helpdesk training
![Page 35: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/35.jpg)
How long should it take ?How long should it take ?
It will be different for each organization but work on at least 1-24 months (depending upon the complexity,
number of systems, size of organization and management acceptance).
![Page 36: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/36.jpg)
Implementation Time GuidesImplementation Time Guides
• 1-1000 users4 1 - 4 months
• 1000-2000 users4 6 months
• 2000+ users4 6-24 months
![Page 37: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/37.jpg)
Generic Time lineGeneric Time line
Project Definition
Requirements
Design/Eval/Plan
Training/Implementation
Support
Changes
![Page 38: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/38.jpg)
Things to avoidThings to avoid
• Not every application is suitable/cost effective for single sign-on
• Not every part of the organization will be able to use Advanced Authentication in every scenario – “emergency break the glass”
• Duplication of systems and data• Big Bang is simply not a good option - roll out apps in sets• Over extending your infrastructure - the system must be
reliable• Don’t be Locked in - all organizations environments change,
you need flexibility
![Page 39: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/39.jpg)
Things to DOThings to DO
• Make sure you have high level organizational support• You have a backout strategy as the #1 design goal• Funding for ongoing support of new product updates and
new corporate applications• Partner with one or more SSO specialist companies - it
will save you time and frustration• Essential to have the helpdesk and applications areas
fully trained and using the product every day
![Page 40: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/40.jpg)
Implementation/Ongoing ChallengesImplementation/Ongoing Challenges
• Training large group of users• Determining requirements and expectations for
each application upfront• Application consistency• Disaster Recovery Strategy - ‘break glass
scenario’• Constantly changing environment• Staff and helpdesk changes• Coping with user momentum for SSO to other
applications
![Page 41: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/41.jpg)
SummarySummary
• Vastly reduce help desk costs due to password management resets
• Improve network security and meet legislative authentication requirements, absolutely and consistently
• Significantly enhance end-user productivity and satisfaction
• Improve Competitiveness and technological advantage
![Page 42: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/42.jpg)
Where can I get more information?Where can I get more information?
• www.novell.com/products/securelogin4 Return on investment calculator4 Product brochures and information4 demonstration software
• Local Novell Account Manager4 Secure Access suite kit4 Presales assistance with SecureLogin specialist4 Product training4 Mutual lead generation activities
• Brainshare and Brainshare on Tour• [email protected]
![Page 43: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/43.jpg)
DemonstrationDemonstration
![Page 44: Introducing Novell SecureLoginatk-paivat.fi › 2003 › Ostergaard.pdf · 2014-05-17 · Did you know… • Each time an end-user calls the Help Desk, it costs the organization](https://reader033.fdocuments.in/reader033/viewer/2022042310/5ed7b3a369145f1e0038709a/html5/thumbnails/44.jpg)