the identity-infused enterprise: i loud-ready, s...for new cloud era 8% of security budget (gartner)...

Post on 13-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

THE IDENTITY-INFUSED ENTERPRISE:

INTELLIGENT, CLOUD-READY, SECURE

Executive Briefing and Discussion September 23, 2010 Cleveland

1

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Introduction, Reality Check – Joe Maglitta

Video Keynote – Ira Winkler

Video Panel with Live Discussion

Customer Presentation: Mark Pfefferman

Novell Presentation – Steve Lewis

Partner Presentation – Jeff Chang

Closing Remarks & Raffle

Bonus Time – Demo and Experts

Agenda

2

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

• Phones to silent

• Restrooms

• Evaluations

• Don’t be shy

• Check out demos

Housekeeping

3

MICHAEL KRIEGER ZIFF DAVIS ENTERPRISE

4

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Most see need for better IAM …

…but many not investing smartly for new cloud era

8% of security budget (Gartner)

Reasons

• No big-picture strategy or architecture

• Not maximizing spend

• Lots of manual work

• (Your issue/s here…)

REALITY CHECK #1 Good News, Bad News

5

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Security Spending: High Priority, Over Budget % Overspend 2009

Source: Ziff Davis Enterprise “CIO Insight” Survey of 468 U.S. companies, June 2010

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Source: Ziff Davis Enterprise “CIO Insight” Survey of 468 U.S. companies, June 2010

Security Budgets Rising…

7

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

… Especially in Midsized Orgs

8

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Rethinking identity management often is the starting point for enterprises assessing cloud security

Charles Kolodgy, VP Security Products, IDC

Don't ever compromise any security goals or requirements just because you're moving to the cloud Chenxi Wang, Analyst, Forrester

It’s time for your IAM program to grow up and display the right foundation, architecture, governance and organization for delivering real value. Earl Perkins, Research VP, Gartner

REALITY CHECK #2 Don’t Take Just My Word...

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

What’s New Solution look Like ?

Robust enterprise IDM foundation

extended to cloud

Modular – fast payoff to meet today's

needs, expandable tomorrow

User identity, access rights lens for all

business and IT processes

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Do Your Homework

Source: Gartner, Inc. “Magic Quadrant for Enterprise Single Sign-On.” Gregg Kreizman.

Source: Gartner, Inc. “Magic Quadrant for Security Information and Event Management.” Mark Nicolett, Kelly M. Kavanugh.

Source: Gartner, Inc. “Magic Quadrant for Web Access Management.” Ray Wagner, Earl Perkins, Perry Carpenter

Source: Gartner, Inc. “Magic Quadrant for User Provisioning.” Earl Perkins, Perry Carpenter.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Source: Ziff Davis Enterprise BrandTrak survey “Identity Management” 1,086 U.S. companies, Sept. 2009

Identity Management: What Matters…

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

THINK BIG

START SMALL

Bottom Line

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

Q: What key IAM issues

would you like to discuss today?

Issues Polling

KEYNOTE IRA WINKLER

15

PANEL DISCUSSION

16

STEVE LEWIS NOVELL

17

CUSTOMER SUCCESS STORY HAVI GLOBAL

18

JEFF CHANG Identropy

19

Q & A

20

FINAL THOUGHTS

21

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

1. IDM key to control cloud, on-premise resources

2. Tools can help, coupled with proper planning, people policy, processes

3. IDM intelligence enables good decisions around governance, risk management , compliance, access

4. Log management key to securing enterprise network, cloud resources.

Key Points/Assertions

22

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

CLOSER LOOKS

• www.novell.com/idm4launch

• Presentations: Look in your email

23

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of

this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.

THANK YOU!

• Be sure to check out the demos ...

• Please return your completed evaluation form to the registration desk …

24

THANK YOU!

25

top related