the identity-infused enterprise: i loud-ready, s...for new cloud era 8% of security budget (gartner)...
TRANSCRIPT
THE IDENTITY-INFUSED ENTERPRISE:
INTELLIGENT, CLOUD-READY, SECURE
Executive Briefing and Discussion September 23, 2010 Cleveland
1
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Introduction, Reality Check – Joe Maglitta
Video Keynote – Ira Winkler
Video Panel with Live Discussion
Customer Presentation: Mark Pfefferman
Novell Presentation – Steve Lewis
Partner Presentation – Jeff Chang
Closing Remarks & Raffle
Bonus Time – Demo and Experts
Agenda
2
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
• Phones to silent
• Restrooms
• Evaluations
• Don’t be shy
• Check out demos
Housekeeping
3
MICHAEL KRIEGER ZIFF DAVIS ENTERPRISE
4
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Most see need for better IAM …
…but many not investing smartly for new cloud era
8% of security budget (Gartner)
Reasons
• No big-picture strategy or architecture
• Not maximizing spend
• Lots of manual work
• (Your issue/s here…)
REALITY CHECK #1 Good News, Bad News
5
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Security Spending: High Priority, Over Budget % Overspend 2009
Source: Ziff Davis Enterprise “CIO Insight” Survey of 468 U.S. companies, June 2010
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Source: Ziff Davis Enterprise “CIO Insight” Survey of 468 U.S. companies, June 2010
Security Budgets Rising…
7
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
… Especially in Midsized Orgs
8
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Rethinking identity management often is the starting point for enterprises assessing cloud security
Charles Kolodgy, VP Security Products, IDC
Don't ever compromise any security goals or requirements just because you're moving to the cloud Chenxi Wang, Analyst, Forrester
It’s time for your IAM program to grow up and display the right foundation, architecture, governance and organization for delivering real value. Earl Perkins, Research VP, Gartner
REALITY CHECK #2 Don’t Take Just My Word...
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
What’s New Solution look Like ?
Robust enterprise IDM foundation
extended to cloud
Modular – fast payoff to meet today's
needs, expandable tomorrow
User identity, access rights lens for all
business and IT processes
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Do Your Homework
Source: Gartner, Inc. “Magic Quadrant for Enterprise Single Sign-On.” Gregg Kreizman.
Source: Gartner, Inc. “Magic Quadrant for Security Information and Event Management.” Mark Nicolett, Kelly M. Kavanugh.
Source: Gartner, Inc. “Magic Quadrant for Web Access Management.” Ray Wagner, Earl Perkins, Perry Carpenter
Source: Gartner, Inc. “Magic Quadrant for User Provisioning.” Earl Perkins, Perry Carpenter.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Source: Ziff Davis Enterprise BrandTrak survey “Identity Management” 1,086 U.S. companies, Sept. 2009
Identity Management: What Matters…
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
THINK BIG
START SMALL
Bottom Line
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
Q: What key IAM issues
would you like to discuss today?
•
Issues Polling
KEYNOTE IRA WINKLER
15
PANEL DISCUSSION
16
STEVE LEWIS NOVELL
17
CUSTOMER SUCCESS STORY HAVI GLOBAL
18
JEFF CHANG Identropy
19
Q & A
20
FINAL THOUGHTS
21
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
1. IDM key to control cloud, on-premise resources
2. Tools can help, coupled with proper planning, people policy, processes
3. IDM intelligence enables good decisions around governance, risk management , compliance, access
4. Log management key to securing enterprise network, cloud resources.
Key Points/Assertions
22
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
CLOSER LOOKS
• www.novell.com/idm4launch
• Presentations: Look in your email
23
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
This document is the property of Ziff Davis Enterprise and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of
this document is prohibited. If you are not the intended recipient, please contact Ziff Davis Enterprise at 212-503-5766 and destroy all copies of this document.
THANK YOU!
• Be sure to check out the demos ...
• Please return your completed evaluation form to the registration desk …
24
THANK YOU!
25