Download - IDC Says, Don't Move To The Cloud
IDC Says, "Don't Move To The Cloud"
Richard WhiteheadDirector, Intelligent Workload Management
August, 2010
Ben GoodmanPrincipal Strategist, Identity and Security
© Novell, Inc. All rights reserved.2
Security and identity and access management are critical to the success of physical, virtual and cloud computing.
Identity Is Critical
Don’t “move” to the cloud…unless you have an identity strategy!
IDC
© Novell, Inc. All rights reserved.3
21st Century Computing
The risks and challenges of computing across multiple environments must be controlled.
Users should have unimpeded access to the full computing services they need to do their jobs right.
Computing should be secure, compliant, and portable.
© Novell, Inc. All rights reserved.4
It's All About Balance
Flexibility Control
© Novell, Inc. All rights reserved.5
New TechnologiesMean New Flexibility
Virtualization
Cloud
“Anything” as a Service Mobile devices
© Novell, Inc. All rights reserved.6
Regulations RequireMore Control
RiskOperational
© Novell, Inc. All rights reserved.7
Percent of enterprise workloads that will run in physical, virtual and cloud environments by 2015Novell estimates based on IDC and Gartner data
You "Extend" to the Cloud…not “Move”
© Novell, Inc. All rights reserved.8
Intelligent Workload Management
© Novell, Inc. All rights reserved.9
Application
Middleware
OperatingSystem
Today•Integrated
The Evolution of Workloads
Future•Portable
•Platform-agnostic
© Novell, Inc. All rights reserved.10
Workloads Delivera Business Service
Workloads Business Service
Example: SAP inventory report seen by user
Database workloadon physical hardware in legacy data center
Application servervirtualized in private cloud
Presentation and graphics server in public cloud
© Novell, Inc. All rights reserved.11
IT Service Management
IT Service Management
Business Service Management
Business Service Management
IT Service Management
Business Service Management
The Customer Challenge:Manage a Siloed Infrastructure
Governance and Compliance
Governance and Compliance
Governance and Compliance
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Firew
all
Physical Virtual Cloud
© Novell, Inc. All rights reserved.12
IT Service Management
Business Service Management
Governance and Compliance
The Intelligent Workload Management Lifecycle: From Silos to Services
Internal Cloud (On-Premise) External Cloud (Off-Premise)
Build
Secure
Measure
Manage
Firew
all
Physical Virtual Cloud
© Novell, Inc. All rights reserved.13
Intelligent Workload Management
Intelligent workload management
enables IT organizations to manage
and optimize computing resources
in a policy-driven , secure and
compliant manner across physical,
virtual and cloud environments to
deliver business services for
end customers.
IntelligentWORKLOADManagement
WorkloadIQNovell’s differentiated approach to the intelligent workload management market
© Novell, Inc. All rights reserved.15
Data Center Computing Is ChangingIdentity Is at the Center of the Transformation
Intelligent Workload Management
Cloud(Public and Private)
Virtualization
Single-purposePhysical Systems
© Novell, Inc. All rights reserved.16
ResourceManagement
General PurposeOperating System
ServiceManagement
Security andComplianceManagement
Isolated Identity Awareness
ResourceManagement
Custom, supportedOperating
System
ServiceManagement
Security andComplianceManagement
Identity-Managed
WorkloadIQ: Integrating Identity into Management
© Novell, Inc. All rights reserved.Page 17
User�Provisioning
Security �Monitoring and �Remediation
Log�Management
Compliance �Integration
Compliance �AssuranceSecure�AccessIdentity �Management
The Identity-Infused EnterpriseCore to Enterprise Security and Compliance
© Novell, Inc. All rights reserved.Page 18
Help Customers Drive to Integrated Compliance while achieving theRight Balance of Controls and Processes
Identity-Infused Compliance
© Novell, Inc. All rights reserved.Page 19
Log Management
Security Monitoring and Remediation
User Activity Monitoring
• Real-time Monitoring•Historical Analysis•Automated Remediation
• Audit / Compliance Reporting•Collection, Storage, Analysis•Advanced Analytics•Appliance based Log Management
• Manage User Access Risk•Monitor Identity Fraud•Enterprise View
CISO
“Compliance is the Driver”
Identity-Infused SecurityHelp Customers Drive to Integrated Security while a chieving theRight Balance of Controls and Processes
© Novell, Inc. All rights reserved.20
WorkloadIQ: Business Benefits
Ensures security and compliance
Reduces IT labor cost
Improves capital utilization
Reduces provisioning cycle times
Lowers end user IT support costs
Increases user productivity
© Novell, Inc. All rights reserved.21
You Can Have Both with WorkloadIQ
Flexibility Control
© Novell, Inc. All rights reserved.22
Making IT Work As One ™
Unpublished Work of Novell, Inc. All Rights Reserve d.This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.