the identity-infused enterprise: intelligent, cloud-ready ...€¦ · the identity-infused...
TRANSCRIPT
![Page 1: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/1.jpg)
THE IDENTITY-INFUSED ENTERPRISE:
INTELLIGENT, CLOUD-READY, SECUREExecutive Briefing & Discussion July 22, 2010 Denver
1
![Page 2: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/2.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Welcome & Introduction – Joe MaglittaVideo Keynote – Ira Winkler Video Panel with Live Discussion Novell Presentation – Larry ChinskiCustomer Stories – Tim Spires, EST GroupPartner Presentation –Tim Spires, EST GroupClosing Remarks & Raffle Bonus Time – Demo and Experts
Agenda
2
![Page 3: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/3.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
• Phones to silent • Restrooms• Evaluations• Don’t be shy • Check out demos
Housekeeping
3
![Page 4: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/4.jpg)
JOE MAGLITTA ZIFF DAVIS ENTERPRISE
4
![Page 5: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/5.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1.
IDM key to cloud, on-premise control 2.
Tools can help, with proper planning, people policy, processes
3.
IDM intelligence enables good decisions around governance, risk management , compliance, access
4.
Log management key to securing enterprise network, cloud resources
Key Points/Assertions
5
![Page 6: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/6.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Most recognize need for better IDAM But many not investing smartly
for
new cloud era
Reasons
• No big-picture strategy, IDAM architecture • Weak links to business, IT processes • Lots of manual work• Add your issue/s here……
Good News, Bad News
6
![Page 7: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/7.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Security Spending: High Priority, Over Budget
Source: Ziff Davis Enterprise “CIO Insight”
Survey of 468 U.S. companies, June 2010
![Page 8: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/8.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Source: Ziff Davis Enterprise “CIO Insight”
Survey of 468 U.S. companies, June 2010
Budgets Rising…
8
![Page 9: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/9.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
…
Especially in Mids
9
![Page 10: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/10.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1.
IDM key to cloud, on-premise control 2.
Tools can help, with proper planning, people policy, processes
3.
IDM intelligence enables good decisions around governance, risk management , compliance, access
4.
Log management key to securing enterprise network, cloud resources
Key Points/Assertions
10
![Page 11: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/11.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
What’s New Solution look Like ?
Robust enterprise IDM foundation extended to cloud
Modular – fast payoff to meet today's needs, expandable tomorrow
User identity, access rights lens for all business and IT processes Well matched to compliance objectives,
audit report requirements
![Page 12: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/12.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Rethinking identity management often is the starting point for enterprises assessing cloud security
Charles Kolodgy, VP Security Products, IDC
Don't ever compromise any security goals or requirements just because you're moving to the cloud
Chenxi
Wang, Analyst, Forrester
It’s time for your IAM program to grow up and display the right foundation, architecture, governance, and organization for delivering real value.
Earl Perkins, Research VP, Gartner
Don’t Take Just My Word!
![Page 13: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/13.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Analysts Rate Novell as Leaders
Source: Gartner, Inc. “Magic Quadrant for Enterprise Single Sign-On.” Gregg Kreizman.
Source: Gartner, Inc. “Magic Quadrant for Security Information and Event Management.” Mark Nicolett, Kelly M. Kavanugh.
Source: Gartner, Inc. “Magic Quadrant for Web Access Management.” Ray Wagner, Earl Perkins, Perry Carpenter
Source: Gartner, Inc. “Magic Quadrant for User Provisioning.” Earl Perkins, Perry Carpenter.
The Novell offering in all of the identity, compliance and security markets are top rated in Gartner's Magic Quadrant analysis
![Page 14: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/14.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Source: Ziff Davis Enterprise BrandTrak
survey “Identity Management”
1,086 U.S. companies, Sept. 2009
Choosing Identity Management: What Matters…
![Page 15: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/15.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Choosing Access Control: What Matters…
Source: Ziff Davis Enterprise BrandTrak
survey “Identity and Access Management”
XXX U.S. companies, Sept. 2009
![Page 16: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/16.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
What key issues related to Identity and Access Management would you like to discuss today?
•
Issues Polling
![Page 17: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/17.jpg)
KEYNOTE:
IRA WINKLER
17
![Page 18: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/18.jpg)
PANEL DISCUSSION
18
![Page 19: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/19.jpg)
LARRY CHINSKI NOVELL
19
![Page 20: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/20.jpg)
TIM SPIRES, EST GROUP
20
![Page 21: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/21.jpg)
PARTNER PRESENTATION: EST GROUP
21
![Page 22: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/22.jpg)
Q AND A
22
![Page 23: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/23.jpg)
FINAL THOUGHTS
23
![Page 24: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/24.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1.
IDM key to control cloud, on-premise resources
2.
Tools can help, coupled with proper planning, people policy, processes
3.
IDM intelligence enables good decisions around governance, risk management , compliance, access
4.
Log management key to securing enterprise network, cloud resources.
Key Points/Assertions
24
![Page 25: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/25.jpg)
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
CLOSER LOOKS
• www.novell.co m/idm4launch
• Presentations: Look in your email
25
![Page 26: THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY ...€¦ · THE IDENTITY-INFUSED ENTERPRISE: INTELLIGENT, CLOUD-READY, SECURE Executive Briefing & Discussion July 22, 2010](https://reader033.vdocuments.us/reader033/viewer/2022050116/5f4d105d0fe00768ad5766c3/html5/thumbnails/26.jpg)
THANK YOU!
26