Download presentation
Presentation is loading. Please wait.
Published byHubert Reed Modified over 8 years ago
1
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management rwhitehead@novell.com August, 2010 Ben Goodman Principal Strategist, Identity and Security bgoodman@novell.com
2
© Novell, Inc. All rights reserved. 2 Security and identity and access management are critical to the success of physical, virtual and cloud computing. Identity Is Critical Don’t “move” to the cloud…unless you have an identity strategy! IDC
3
© Novell, Inc. All rights reserved. 3 21 st Century Computing The risks and challenges of computing across multiple environments must be controlled. Users should have unimpeded access to the full computing services they need to do their jobs right. Computing should be secure, compliant, and portable.
4
© Novell, Inc. All rights reserved. 4 It's All About Balance FlexibilityControl
5
© Novell, Inc. All rights reserved. 5 New Technologies Mean New Flexibility Virtualization Cloud “Anything” as a Service Mobile devices
6
© Novell, Inc. All rights reserved. 6 Regulations Require More Control Risk Operational
7
© Novell, Inc. All rights reserved. 7 Percent of enterprise workloads that will run in physical, virtual and cloud environments by 2015 Novell estimates based on IDC and Gartner data You "Extend" to the Cloud… not “Move”
8
© Novell, Inc. All rights reserved. 8 Intelligent Workload Management
9
© Novell, Inc. All rights reserved. 9 Application Middleware Operating System Today Integrated The Evolution of Workloads Future Portable Platform-agnostic
10
© Novell, Inc. All rights reserved. 10 Workloads Deliver a Business Service Workloads Business Service Example: SAP inventory report seen by user Database workload on physical hardware in legacy data center Application server virtualized in private cloud Presentation and graphics server in public cloud
11
© Novell, Inc. All rights reserved. 11 IT Service Management Business Service Management IT Service Management Business Service Management The Customer Challenge: Manage a Siloed Infrastructure Governance and Compliance Internal Cloud (On-Premise) External Cloud (Off-Premise) Firewall PhysicalVirtualCloud
12
© Novell, Inc. All rights reserved. 12 IT Service Management Business Service Management Governance and Compliance The Intelligent Workload Management Lifecycle: From Silos to Services Internal Cloud (On-Premise) External Cloud (Off-Premise) Build Secure Measure Manage Firewall PhysicalVirtualCloud
13
© Novell, Inc. All rights reserved. 13 Intelligent Workload Management Intelligent workload management enables IT organizations to manage and optimize computing resources in a policy-driven, secure and compliant manner across physical, virtual and cloud environments to deliver business services for end customers. Intelligent WORKLOAD Management
14
WorkloadIQ Novell’s differentiated approach to the intelligent workload management market
15
© Novell, Inc. All rights reserved. 15 Data Center Computing Is Changing Identity Is at the Center of the Transformation Intelligent Workload Management Cloud (Public and Private) Virtualization Single-purpose Physical Systems
16
© Novell, Inc. All rights reserved. 16 Resource Management General Purpose Operating System Service Management Security and Compliance Management Isolated Identity Awareness Resource Management Custom, supported Operating System Service Management Security and Compliance Management Identity- Managed WorkloadIQ: Integrating Identity into Management
17
© Novell, Inc. All rights reserved. Page 17 User Provisioning Security Monitoring and Remediation Log Management Compliance Integration Compliance Assurance Secure Access Identity Management The Identity-Infused Enterprise Core to Enterprise Security and Compliance
18
© Novell, Inc. All rights reserved. Page 18 Help Customers Drive to Integrated Compliance while achieving the Right Balance of Controls and Processes Identity-Infused Compliance
19
© Novell, Inc. All rights reserved. Page 19 Log Management Security Monitoring and Remediation User Activity Monitoring Real-time Monitoring Historical Analysis Automated Remediation Audit / Compliance Reporting Collection, Storage, Analysis Advanced Analytics Appliance based Log Management Manage User Access Risk Monitor Identity Fraud Enterprise View CISO “Compliance is the Driver” Identity-Infused Security Help Customers Drive to Integrated Security while achieving the Right Balance of Controls and Processes
20
© Novell, Inc. All rights reserved. 20 WorkloadIQ: Business Benefits Ensures security and compliance Reduces IT labor cost Improves capital utilization Reduces provisioning cycle times Lowers end user IT support costs Increases user productivity
21
© Novell, Inc. All rights reserved. 21 You Can Have Both with WorkloadIQ FlexibilityControl
22
© Novell, Inc. All rights reserved. 22 Making IT Work As One ™
24
Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.