THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD … · IDM key to cloud, on-premise control 2....

24
THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing and Discussion July 27, 2010 Tysons Corner 1

Transcript of THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD … · IDM key to cloud, on-premise control 2....

THE IDENTITY-INFUSED ENTERPRISE:

INTELLIGENT, CLOUD-READY, SECUREExecutive Briefing and Discussion July 27, 2010 Tysons

Corner

1

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Welcome & Introduction – Wayne RashVideo Keynote – Ira Winkler Video Panel with Live Discussion Novell Presentation – Bruce Esposito Customer Success Panel - Tami Kent-Green, BAE Systems & Steve Wallace, CSCPartner Presentation - TrivirClosing Remarks & Raffle Bonus Time – Demo and Experts

Agenda

2

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

• Phones to silent • Restrooms• Evaluations• Don’t be shy • Check out demos

Housekeeping

3

WAYNE RASH ZIFF DAVIS ENTERPRISE

4

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

1.

IDM key to cloud, on-premise control 2.

Tools can help, with proper planning, people policy, processes

3.

IDM intelligence enables good decisions around governance, risk management , compliance, access

4.

Log management key to securing enterprise network, cloud resources

Key Points/Assertions

5

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Most recognize need for better IDAM But many not investing smartly

for

new cloud era

Reasons

• No big-picture strategy, IDAM architecture • Weak links to business, IT processes • Lots of manual work• Add your issue/s here……

Good News, Bad News

6

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Security Spending: High Priority, Over Budget

Source: Ziff Davis Enterprise “CIO Insight”

Survey of 468 U.S. companies, June 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Source: Ziff Davis Enterprise “CIO Insight”

Survey of 468 U.S. companies, June 2010

Budgets Rising…

8

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Especially in Mids

9

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

What’s New Solution look Like ?

Robust enterprise IDM foundation extended to cloud

Modular – fast payoff to meet today's needs, expandable tomorrow

User identity, access rights lens for all business and IT processes Well matched to compliance objectives,

audit report requirements

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Rethinking identity management often is the starting point for enterprises assessing cloud security

Charles Kolodgy, VP Security Products, IDC

Don't ever compromise any security goals or requirements just because you're moving to the cloud

Chenxi

Wang, Analyst, Forrester

It’s time for your IAM program to grow up and display the right foundation, architecture, governance, and organization for delivering real value.

Earl Perkins, Research VP, Gartner

Don’t Take Just My Word!

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Analysts Rate Novell as Leaders

Source: Gartner, Inc. “Magic Quadrant for Enterprise Single Sign-On.” Gregg Kreizman.

Source: Gartner, Inc. “Magic Quadrant for Security Information and Event Management.” Mark Nicolett, Kelly M. Kavanugh.

Source: Gartner, Inc. “Magic Quadrant for Web Access Management.” Ray Wagner, Earl Perkins, Perry Carpenter

Source: Gartner, Inc. “Magic Quadrant for User Provisioning.” Earl Perkins, Perry Carpenter.

The Novell offering in all of the identity, compliance and security markets are top rated in Gartner's Magic Quadrant analysis

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Source: Ziff Davis Enterprise BrandTrak

survey “Identity Management”

1,086 U.S. companies, Sept. 2009

Choosing Identity Management: What Matters…

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

What key issues related to Identity and Access Management would you like to discuss today?

Issues Polling

VIDEO KEYNOTE:

IRA WINKLER, SECURITY EXPERT & AUTHOR

15

VIDEO PANEL DISCUSSION

16

BRUCE ESPOSITO NOVELL

17

CUSTOMER SUCCESS PANEL: Steve Wallace

Info Systems Architect Principle Leader CSC

Tami Kent-Green

Director IT Strategy & Architecture

BAE Systems

18

PARTNER COMMENTS: TRIVIR

19

Q AND A

20

FINAL THOUGHTS

21

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

1.

IDM key to control cloud, on-premise resources

2.

Tools can help, coupled with proper planning, people policy, processes

3.

IDM intelligence enables good decisions around governance, risk management , compliance, access

4.

Log management key to securing enterprise network, cloud resources.

Key Points/Assertions

22

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

CLOSER LOOKS

• www.novell.com /idm4launch

• Presentations: Look in your email

23

THANK YOU!

24