Date post: | 12-May-2015 |
Category: |
Documents |
Upload: | sharath-kumar |
View: | 635 times |
Download: | 2 times |
Delivering seamless computing through Intelligent Workload Management
Rod GrigsonDirector Field Marketing Asia Pacific Japan
Colombo, Sri Lanka
© Novell, Inc. All rights reserved.2
21st Century Computing
The risks and challenges of computing across multiple environments must be eliminated.
Users should have unimpeded, secure and compliant access to the full computing services they need to do their jobs right.
Computing should be secure, compliant, and portable.
123
© Novell, Inc. All rights reserved.3
New Technologies Mean New Flexibility
Virtualization Cloud Computing
Software as a Service Mobile Devices
© Novell, Inc. All rights reserved.4
Cloud Computing Adds Security Challenges
“Everyone is focused on how to get your
information into the cloud, but you also need to focus on how do you get your data out …
You've got to look at the security of the information and who has responsibility for what.”
Steve Hassell, CIO of Emerson Electric, The Wall Street Journal on October 12,
© Novell, Inc. All rights reserved.5
The Truth About IT
Approximately 70% of the digital universe is created by individuals, but
enterprises are responsible for 85% of the security, privacy,
reliability, and compliance.
Source:
© Novell, Inc. All rights reserved.6
Workload
Application
Middleware
Operating System
Workload: The (New) IT Paradigm
A workload is an integrated stack of application, middleware, and operating system that accomplishes a computing task
A workload is portable and platform agnostic– it can run in physical, virtual or cloud computing environments
A workload or a collection of workloads makes up a business service, which is what the end user consumes
Intelligent Workload Management
© Novell, Inc. All rights reserved.8
Novell® Identity Manager
Novell® Access Manager
Novell® Roles Based Provisioning Module
Novell® Access Governance Suite
Novell Privileged User Manager
Novell® SecureLogin®
Novell® Cloud Security Service
How Novell Delivers Intelligent Workload ManagementBuild Secure Manage MeasureSUSE® Linux Enterprise Server
SUSE® Studio
SUSE® Linux Enterprise JeOS
Novell® ZENworks® Configuration Management
SUSE® Appliance Toolkit
Novell® Workshop
Novell® Business Service Manager
Novell® Business Service Level Manager™
Novell® Business Experience Manager™
Novell® myCMDB™
Novell® Sentinel™
Novell® Sentinel™ Log Manager
Novell Compliance Automation Solution
PlateSpin® Migrate
PlateSpin® Orchestrate
Novell® ZENworks® Configuration Management
PlateSpin® Recon
PlateSpin® Protect
PlateSpin® “Atlantic”
PlateSpin® “BlueStar”
Novell® “Workbench”
© Novell, Inc. All rights reserved.9
45,000
Registered Users
50,628
Registered Users
4,249
ISV Users
222,703
TotalAppliances
1,000
Average Builds / Day
400
Average Testdrives
/ Day
1,000,000
TopApplianceDownloadRequests
Industry's Best (Dec 09)
Novell Solutions
© Novell, Inc. All rights reserved.11
Data CenterEnd-UserComputing
Three Focus Areas
Identity and Security
© Novell, Inc. All rights reserved.12
Data Center Solutions
Enterprise Linux Servers
Virtualization and Workload Management
Business Service Management
Virtualization Host PlatformBuild Clouds and Provision ServicesCloud Management and MonitoringAssessments and Virtual Capacity ManagementServer ConsolidationDisaster Recovery
Configuration Management System
Service Impact Management
Existing CMDB Advanced Analytics
Real-Time SLA Management
UNIX to Linux Migration
Linux for Mainframes
Red Hat to SUSE® Linux Enterprise Migration
Mission-Critical Computing
© Novell, Inc. All rights reserved.13
End-User Computing Solutions
Collaboration Endpoint Management
Personal and Team Productivity
Collaboration Data Management
NetWare Server Consolidation on Linux
Endpoint Configuration management
Endpoint Security Management
IT Asset Management
© Novell, Inc. All rights reserved.14
Identity and Access Management• User Provisioning
and Management
• Roles Management
• Simplified Secure Access
• Compliance Assurance
• Enterprise Compliance Automation for SAP
• Privileged User Management
ComplianceManagement
• Security Monitoring and Remediation
• Log Management
• Cloud Security
Security Management
Identity and Security Solutions
© Novell, Inc. All rights reserved.15
© Novell, Inc. All rights reserved.16
Making IT Work As One™
Unpublished Work of Novell, Inc. All Rights Reserved.This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.