THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED...
Transcript of THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED...
THE IDENTITY-INFUSED ENTERPRISE:
INTELLIGENT, CLOUD-READY, SECUREExecutive Briefing & Discussion July 22, 2010 Denver
1
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Welcome & Introduction – Joe MaglittaVideo Keynote – Ira Winkler Video Panel with Live Discussion Novell Presentation – Larry ChinskiCustomer Stories – Tim Spires, EST GroupPartner Presentation –Tim Spires, EST GroupClosing Remarks & Raffle Bonus Time – Demo and Experts
Agenda
2
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
• Phones to silent • Restrooms• Evaluations• Don’t be shy • Check out demos
Housekeeping
3
JOE MAGLITTA ZIFF DAVIS ENTERPRISE
4
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1.
IDM key to cloud, on-premise control 2.
Tools can help, with proper planning, people policy, processes
3.
IDM intelligence enables good decisions around governance, risk management , compliance, access
4.
Log management key to securing enterprise network, cloud resources
Key Points/Assertions
5
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Most recognize need for better IDAM But many not investing smartly
for
new cloud era
Reasons
• No big-picture strategy, IDAM architecture • Weak links to business, IT processes • Lots of manual work• Add your issue/s here……
Good News, Bad News
6
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Security Spending: High Priority, Over Budget
Source: Ziff Davis Enterprise “CIO Insight”
Survey of 468 U.S. companies, June 2010
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Source: Ziff Davis Enterprise “CIO Insight”
Survey of 468 U.S. companies, June 2010
Budgets Rising…
8
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
…
Especially in Mids
9
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1.
IDM key to cloud, on-premise control 2.
Tools can help, with proper planning, people policy, processes
3.
IDM intelligence enables good decisions around governance, risk management , compliance, access
4.
Log management key to securing enterprise network, cloud resources
Key Points/Assertions
10
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
What’s New Solution look Like ?
Robust enterprise IDM foundation extended to cloud
Modular – fast payoff to meet today's needs, expandable tomorrow
User identity, access rights lens for all business and IT processes Well matched to compliance objectives,
audit report requirements
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Rethinking identity management often is the starting point for enterprises assessing cloud security
Charles Kolodgy, VP Security Products, IDC
Don't ever compromise any security goals or requirements just because you're moving to the cloud
Chenxi
Wang, Analyst, Forrester
It’s time for your IAM program to grow up and display the right foundation, architecture, governance, and organization for delivering real value.
Earl Perkins, Research VP, Gartner
Don’t Take Just My Word!
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Analysts Rate Novell as Leaders
Source: Gartner, Inc. “Magic Quadrant for Enterprise Single Sign-On.” Gregg Kreizman.
Source: Gartner, Inc. “Magic Quadrant for Security Information and Event Management.” Mark Nicolett, Kelly M. Kavanugh.
Source: Gartner, Inc. “Magic Quadrant for Web Access Management.” Ray Wagner, Earl Perkins, Perry Carpenter
Source: Gartner, Inc. “Magic Quadrant for User Provisioning.” Earl Perkins, Perry Carpenter.
The Novell offering in all of the identity, compliance and security markets are top rated in Gartner's Magic Quadrant analysis
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Source: Ziff Davis Enterprise BrandTrak
survey “Identity Management”
1,086 U.S. companies, Sept. 2009
Choosing Identity Management: What Matters…
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Choosing Access Control: What Matters…
Source: Ziff Davis Enterprise BrandTrak
survey “Identity and Access Management”
XXX U.S. companies, Sept. 2009
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
What key issues related to Identity and Access Management would you like to discuss today?
•
Issues Polling
KEYNOTE:
IRA WINKLER
17
PANEL DISCUSSION
18
LARRY CHINSKI NOVELL
19
TIM SPIRES, EST GROUP
20
PARTNER PRESENTATION: EST GROUP
21
Q AND A
22
FINAL THOUGHTS
23
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1.
IDM key to control cloud, on-premise resources
2.
Tools can help, coupled with proper planning, people policy, processes
3.
IDM intelligence enables good decisions around governance, risk management , compliance, access
4.
Log management key to securing enterprise network, cloud resources.
Key Points/Assertions
24
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
CLOSER LOOKS
• www.novell.co m/idm4launch
• Presentations: Look in your email
25
THANK YOU!
26