INTERNAL COMPANY CONFIDENTIAL John Einhaus, Micro Focus NetIQ: Single Sign On and Advanced Authenticaion SUSE: Linux.

Slides:



Advertisements
Similar presentations
Govern the Flow of Data: Moving from Chaos to Control
Advertisements

Network Systems Sales LLC
McAfee One Time Password
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Desktop Central In IT Managers’ Perspective. Agenda Desktop Management Market About Desktop Central Features & Benefits Customer Details Technical Support.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Digital DNA Server Login People ®. Login People ˃ IT security vendor ˃ Patented Digital DNA ® technology innovation Digital DNA Server Multi-factor Authentication.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Lexmark Print Management
60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control Security Privacy.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
4/20/2017 CL606 SMB Reseller Keynote: Winning in SMB with Cloud The year of accelerating customer acquisition David Smith General Manager, WW SMB Microsoft.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Show me the money Succeeding with the recurring revenue model Mark Emanuelson Atlantic Technologies.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
The eHealth Services Capstone Project
Tiziano Ciceri Product Manager
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Getting Started with Chatter Nina Jameson Senior Business Analyst, ISU-ITS (office)
Riva – Sync Sugar directly to Microsoft Exchange Server-side sync | No plug-ins required Trevor Poapst VP Marketing and Sales Riva CRM Integration
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Access resources in a federation partner organization.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
ATTACHEDAPPS CONFIDENTIAL Powerfully simple tools to retain, manage and grow SMB customers. Client Messaging for Partners.
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco Sales Collaboration Platform Partner Introduction Speaker Name Speaker.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Total Enterprise Mobility Comprehensive Management and Security
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
PrinterOn Mobile Printing Platform
Cloud SaaS Integrates with Office 365 to Meet the Needs for Business Contact Management “Pobuca combined with Microsoft Office 365 and Azure Active Directory.
The power of common identity across any cloud
Power BI Security Best Practices
Andy Taylor Partner Program, RPost
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Add your services to Microsoft 365 Business
Company Overview & Strategy
Cloud Connect Seamlessly
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
An Office 365 Integration Enables Cloud-Based Digital Signatures Anytime and on Any Device “Thanks to IvSign and our Microsoft Office 365 integration,
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
NetIQ Access Manager v4.3 Sales Enablement
Microsoft Virtual Academy
Presentation transcript:

INTERNAL COMPANY CONFIDENTIAL John Einhaus, Micro Focus NetIQ: Single Sign On and Advanced Authenticaion SUSE: Linux

INTERNAL COMPANY CONFIDENTIAL Agenda NetIQ and Identity and Access Management –Authentication Observations –Integrated Products to Fit the Technology –How to ID the Opps SUSE –Highly Supported Linux for Public Sector Contacts

INTERNAL COMPANY CONFIDENTIAL A Few Authentication Observations Too Many Passwords. Passwords are not secure Access is an administration nightmare Access is a compliance nightmare One size does not fit all for every user One size does not fit all for every application One size does not fit all for every situation/location

INTERNAL COMPANY CONFIDENTIAL It’s a Security, Compliance Thing HR Finance Travel CRM Payroll BI Enablement Benefits Admin and Security: 8 x 100s End User: 8 login/passwords HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HRTravel Finance CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HR Finance Travel CRM Payroll BI Enablement Benefits HRTravel Finance CRM Payroll BI Enablement Benefits

INTERNAL COMPANY CONFIDENTIAL How do I Access My Apps? Legacy Systems Web Based Systems Cloud Apps From Different Devices –Desktop –Laptop –Tablet –Phone –Kiosk

INTERNAL COMPANY CONFIDENTIAL NetIQ Advanced Authentication Framework

INTERNAL COMPANY CONFIDENTIAL NetIQ Advanced Authentication Framework One authentication framework for everything –Reduces devices, management, infrastructures to one. –Costs Lower, Security and Scalability Higher. Centralized policy engine –Sales to Largest and Most Complex –Simple enough for part-time administrators –Granular policies specific to users, devices or locations. –Delegated administration and tracking of changes keeps policies secure. –Crosses all authentication methods, alleviating redundant work and inconsistent authentication.

INTERNAL COMPANY CONFIDENTIAL NetIQ Advanced Authentication Framework Flexible enough to go beyond passwords –Even without the need for multi-factor across the board, can give a higher level of protection for certain applications –Lets you tie different authentication types to specific applications or users. –Users that don't have to enter their own username and password will enjoy secure access that is fast and convenient. Event logging –Define which types of authentication events are logged for later retrieval. –Typical events types are successful / unsuccessful authentication attempts, changes in enrollment / configuration.

INTERNAL COMPANY CONFIDENTIAL How to make money with NetIQ Access Management Enhance your “Trusted Advisor” Status and Revenue Opportunities Target customers with Security and Compliance concerns –Health, SLED, Legal, Finance, Retail Attach to SaaS Apps: Office 365, Google, Salesforce… Attach to Mobile Usage Services: Deployment, New Connectors, AD Support

INTERNAL COMPANY CONFIDENTIAL SUSE ® at a Glance

INTERNAL COMPANY CONFIDENTIAL The only enterprise-class Linux platform that meets rigorous government requirements in physical, virtual and cloud environments. SUSE can help healthcare organizations: –Adapt to new technologies –Innovate –Increase performance and scalability of mission-critical applications at a reduced cost Sales Programs with steep discounts for: –Education –Government and Non-Profit Hospitals 11 SUSE in Public Sector FAC & OPS Workshop -

INTERNAL COMPANY CONFIDENTIAL How to make even more money! “Going for Gold” through Tech Data –Bring us opportunities and you will get a “deal reg” discount –NetIQ CloudAccess –Novell Mobility –SUSE SLES SUSE Partner Incentive Program –$ for Reseller Reps Going for Gold –Education, Marketing and Favorable Margins Through Tech Data

INTERNAL COMPANY CONFIDENTIAL PartnerNet Deal Registration Certifications Enablement Technical Support Product Downloads Marketing Material

INTERNAL COMPANY CONFIDENTIAL Q&A John Einhaus NetIQ Partner Executive Steve Curtiss Tech Data Solution Analyst Silvana Beliveau Tech Data Product Manager Dede Nedeleva Tech Data Licensing