+ All Categories
Home > Documents > 20th March Session Four by Rod Grigson

20th March Session Four by Rod Grigson

Date post: 12-May-2015
Category:
Upload: sharath-kumar
View: 635 times
Download: 2 times
Share this document with a friend
Description:
Delivering Seamless Computing Through Intelligent Workload Management By Novell
Popular Tags:
18
Delivering seamless computing through Intelligent Workload Management Rod Grigson Director Field Marketing Asia Pacific Japan Colombo, Sri Lanka
Transcript
Page 1: 20th March Session Four by Rod Grigson

Delivering seamless computing through Intelligent Workload Management

Rod GrigsonDirector Field Marketing Asia Pacific Japan

Colombo, Sri Lanka

Page 2: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.2

21st Century Computing

The risks and challenges of computing across multiple environments must be eliminated.

Users should have unimpeded, secure and compliant access to the full computing services they need to do their jobs right.

Computing should be secure, compliant, and portable.

123

Page 3: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.3

New Technologies Mean New Flexibility

Virtualization Cloud Computing

Software as a Service Mobile Devices

Page 4: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.4

Cloud Computing Adds Security Challenges

“Everyone is focused on how to get your

information into the cloud, but you also need to focus on how do you get your data out …

You've got to look at the security of the information and who has responsibility for what.”

Steve Hassell, CIO of Emerson Electric, The Wall Street Journal on October 12,

Page 5: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.5

The Truth About IT

Approximately 70% of the digital universe is created by individuals, but

enterprises are responsible for 85% of the security, privacy,

reliability, and compliance.

Source:

Page 6: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.6

Workload

Application

Middleware

Operating System

Workload: The (New) IT Paradigm

A workload is an integrated stack of application, middleware, and operating system that accomplishes a computing task

A workload is portable and platform agnostic– it can run in physical, virtual or cloud computing environments

A workload or a collection of workloads makes up a business service, which is what the end user consumes

Page 7: 20th March Session Four by Rod Grigson

Intelligent Workload Management

Page 8: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.8

Novell® Identity Manager

Novell® Access Manager

Novell® Roles Based Provisioning Module

Novell® Access Governance Suite

Novell Privileged User Manager

Novell® SecureLogin®

Novell® Cloud Security Service

How Novell Delivers Intelligent Workload ManagementBuild Secure Manage MeasureSUSE® Linux Enterprise Server

SUSE® Studio

SUSE® Linux Enterprise JeOS

Novell® ZENworks® Configuration Management

SUSE® Appliance Toolkit

Novell® Workshop

Novell® Business Service Manager

Novell® Business Service Level Manager™

Novell® Business Experience Manager™

Novell® myCMDB™

Novell® Sentinel™

Novell® Sentinel™ Log Manager

Novell Compliance Automation Solution

PlateSpin® Migrate

PlateSpin® Orchestrate

Novell® ZENworks® Configuration Management

PlateSpin® Recon

PlateSpin® Protect

PlateSpin® “Atlantic”

PlateSpin® “BlueStar”

Novell® “Workbench”

Page 9: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.9

45,000

Registered Users

50,628

Registered Users

4,249

ISV Users

222,703

TotalAppliances

1,000

Average Builds / Day

400

Average Testdrives

/ Day

1,000,000

TopApplianceDownloadRequests

Industry's Best (Dec 09)

Page 10: 20th March Session Four by Rod Grigson

Novell Solutions

Page 11: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.11

Data CenterEnd-UserComputing

Three Focus Areas

Identity and Security

Page 12: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.12

Data Center Solutions

Enterprise Linux Servers

Virtualization and Workload Management

Business Service Management

Virtualization Host PlatformBuild Clouds and Provision ServicesCloud Management and MonitoringAssessments and Virtual Capacity ManagementServer ConsolidationDisaster Recovery

Configuration Management System

Service Impact Management

Existing CMDB Advanced Analytics

Real-Time SLA Management

UNIX to Linux Migration

Linux for Mainframes

Red Hat to SUSE® Linux Enterprise Migration

Mission-Critical Computing

Page 13: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.13

End-User Computing Solutions

Collaboration Endpoint Management

Personal and Team Productivity

Collaboration Data Management

NetWare Server Consolidation on Linux

Endpoint Configuration management

Endpoint Security Management

IT Asset Management

Page 14: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.14

Identity and Access Management• User Provisioning

and Management

• Roles Management

• Simplified Secure Access

• Compliance Assurance

• Enterprise Compliance Automation for SAP

• Privileged User Management

ComplianceManagement

• Security Monitoring and Remediation

• Log Management

• Cloud Security

Security Management

Identity and Security Solutions

Page 15: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.15

Page 16: 20th March Session Four by Rod Grigson

© Novell, Inc. All rights reserved.16

Making IT Work As One™

Page 17: 20th March Session Four by Rod Grigson
Page 18: 20th March Session Four by Rod Grigson

Unpublished Work of Novell, Inc. All Rights Reserved.This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.

General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.


Recommended