SlideShare a Scribd company logo
1 of 24
Download to read offline
Novell Access Governance Suite
                 ®



Overview and Business Case


Ross Chevalier
CTO Americas, President Novell Canada
Novell, Inc / rchevalier@novell.ca
Making IT Work As One              ™




2   © Novell, Inc. All rights reserved.
Reduce Cost
    Manage Complexity
    Mitigate Risk




3   © Novell, Inc. All rights reserved.
Our Conversation Today

    •   Quick Access Governance Review
    •   Motivating Factors
    •   Opening Questions
    •   Cost Containment
    •   Cost Avoidance
    •   Risk Avoidance
    •   Positive Financial Impact
    •   Call to Action



4   © Novell, Inc. All rights reserved.
Risk to the Enterprise is Rising

       Security Breaches
       Compliance Violations
       Growth Challenges




                                                      Identity Theft
                                                      Privacy Concerns


                           Significant Risk, Cost and Exposure
5   © Novell, Inc. All rights reserved.
Growing Risk, Growing Regulations

                                          Gramm-Leach-Bliley
      PCI-
      DSS                                   Basel II
       Sarbanes-
                                                  FISMA
       Oxley
              HIPAA                             HSPD-12


6   © Novell, Inc. All rights reserved.
“Governance, Risk and Compliance
     (GRC) remains an intensely human
     effort. Two-thirds of budget are
     earmarked for people-related
     expenses (services plus head count).”

                                            – AMR
                                          Research




7   © Novell, Inc. All rights reserved.
Access Governance is Dynamic

              Exceptions and                                 Access Requests
                  Conditions                                 and Changes




     Provide Visibility                                             Regular
         for Modeling                       Continuous              Review and
                                          Access Lifecycle          Certification
                                           Management


               Metrics for
          Management and                                      Access Rights
             Maintenance                                      Remediation
                                                              and Validation

8   © Novell, Inc. All rights reserved.
The Complete Identity Picture




9   © Novell, Inc. All rights reserved.
Role of Identity Management
     Automation and Validation




10   © Novell, Inc. All rights reserved.
Motivating Factors

     •   Government Regulation
     •   External Auditor Pressure
           –   “The Ding List”
     •   Reduce Direct Expense
     •   Organizational Impact
     •   Increasing Accountability and Engagement
     •   Manual models consistently fail




11   © Novell, Inc. All rights reserved.
Some Opening Questions...

     •   Business Model
           –   B2B, B2C, Multinational
     •   Annual Revenue
     •   Employee Count
     •   Business unit manager engagement
           –   Review and re certification
     •   Number of annual access reviews
           –   Number of users reviewed per review cycle
           –   Number of unique certification reviews
     •   Is the data easy to understand?
     •   Is there rubber-stamping?

12   © Novell, Inc. All rights reserved.
Regulatory Scope Assessment

     •   Financial Reporting
           –   SOX, CA 52-313, Turnbull, LSF, Transparency Directive, JSOX,
               MAR
     •   Industry Mandated Initiatives
           –   Basel II, GLBA, FERC/NERC, FFIEC, FISMA, HIPAA/HITECH,
               ITAR
     •   Privacy Mandates
           –   PCI, State Based (CA 1386, MA Privacy 201), Country Based
               (Pipeda)




13   © Novell, Inc. All rights reserved.
Cost Containment

     •   Compliance Audit Cost
           –   Internal Staff Costs
           –   External Fees
     •   Corporate Loss of Productivity
           –   Can be significant
     •   Staff Reduction/Redeployment
           –   Put the right people on the right tasks




14   © Novell, Inc. All rights reserved.
Cost Containment Example


                                                                                                Expense
                                                                                   Automation   Savings
        Cost Containment             Department        Function           Cost     Reduction    Annually
        Compliance Audit
             Cost                          Audit    25 Applications     $250,000      25%       $62,500

                                                       150 BU,
       Corporate Loss of                            Certification and
          Productivity                 Business    Access Reviewers       $90         50%       $202,500

                                          IT      7 FTEs doing data
                                     Compliance gathering, assessment
          Staff Reduction            and Security    and reporting        $55         33%       $264,264

                 Total                                                                          $529,264




15   © Novell, Inc. All rights reserved.
Cost Avoidance

     •   Fines and Penalties
     •   Operational Impact
           –   Response and Notification
           –   Customer Revenue Loss
           –   Customer Replacement Cost
           –   Service Availability
           –   Brand




16   © Novell, Inc. All rights reserved.
Cost Avoidance Example

       Cost Avoidance                                                                          Potential
       (Loss of 100,000                                                                         Cost to
     Customer Records) Actual Loss              Unit Cost          Impact      Inherent Risk   Business
      Fines and Penalties
     (SOX, Privacy, PCI et.
               al.)                                               $1,000,000       33%         $330,000
      Operational Impact –
         Response and
          Notification        100,000              $50            $5,000,000       33%         $1,650,000
      Operational Impact –
      Customer Revenue
              Loss              7000        $54/mth x 12 months   $4,536,000       33%         $1,496,880
      Operational Impact –
           Customer
       Replacement Cost
          (Marketing)           7000              $280            $1,960,000       33%         $646,800
      Operational Impact –    System        $23,000/hr revenue
       Service Availability Outage 6 hrs.         loss            $138,000        100%         $138,000
      Operational Impact –
             Brand                                                $3,000,000       33%          $990,000
             Total                                                                             $5,251,680




17   © Novell, Inc. All rights reserved.
Risk Avoidance

     •   Inappropriate access to systems and data
     •   Aged entitlements and entitlement creep
     •   Orphaned accounts and entitlements
          –   “User” gone but access remains
     •   Reduces data entry errors
     •   Manage data location/copies
     •   Breach preparedness




18   © Novell, Inc. All rights reserved.
Positive Financial Outcomes

     •   Reduction in operational costs going forward
     •   Reduction in “firedrill effects”
     •   Increased corporate confidence
          –   Reduces the “are you sure?”
          –   Creates real-time reporting and dashboards
     •   Better positioned for future demand




19   © Novell, Inc. All rights reserved.
Call to Action

     •   Visit the Access Governance Suite (AGS) table (#A14)
         in IT Central to view a demo
     •   Work with your Novell Client Executive, Product Sales
                                            ®



         Specialist or Novell Partner to:
          –   Arrange an private AGS assessment using these tools
          –   Build your corporate business case based upon the report
          –   Secure budget to proceed
          –   Engage with the first phase of the Access Governance Project
               >   Measure consistently
               >   Keep the loop closed and feedback coming
               >   Strengthen the case for follow-on phases



20   © Novell, Inc. All rights reserved.
Time for Questions




21   © Novell, Inc. All rights reserved.
Novell                            ®


     Making IT
     Work As One™
     + Reduce Cost
     + Manage Complexity
     + Mitigate Risk




22   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

What's hot

Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonSalmon Limited
 
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...Tavant Technologies Inc.
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollmenttreyreeves1953
 
Net@Work Client Presentation with Security
Net@Work Client Presentation with Security Net@Work Client Presentation with Security
Net@Work Client Presentation with Security Ray Glass
 
The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...XO Communications
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto SolutionHPDutchWorld
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
Ibm puresystems deck for tcs abhed_11102012
Ibm puresystems  deck for tcs abhed_11102012Ibm puresystems  deck for tcs abhed_11102012
Ibm puresystems deck for tcs abhed_11102012abhedk
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Business and IT Compliance Strategy
Business and IT Compliance StrategyBusiness and IT Compliance Strategy
Business and IT Compliance StrategyAllyn McGillicuddy
 
Crossideas Segregation of Duty Approach
Crossideas Segregation of Duty ApproachCrossideas Segregation of Duty Approach
Crossideas Segregation of Duty ApproachMarco Venuti
 
End Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationEnd Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationBluehusker
 
Admin On Demand
Admin On DemandAdmin On Demand
Admin On Demandbondjoac
 

What's hot (19)

Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
 
JSoft Corporate presentation
JSoft Corporate presentationJSoft Corporate presentation
JSoft Corporate presentation
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollment
 
Net@Work Client Presentation with Security
Net@Work Client Presentation with Security Net@Work Client Presentation with Security
Net@Work Client Presentation with Security
 
The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Ibm puresystems deck for tcs abhed_11102012
Ibm puresystems  deck for tcs abhed_11102012Ibm puresystems  deck for tcs abhed_11102012
Ibm puresystems deck for tcs abhed_11102012
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Business and IT Compliance Strategy
Business and IT Compliance StrategyBusiness and IT Compliance Strategy
Business and IT Compliance Strategy
 
Mind Chips Consulting Offerings
Mind Chips Consulting   OfferingsMind Chips Consulting   Offerings
Mind Chips Consulting Offerings
 
EW Consultants Services
EW Consultants ServicesEW Consultants Services
EW Consultants Services
 
Crossideas Segregation of Duty Approach
Crossideas Segregation of Duty ApproachCrossideas Segregation of Duty Approach
Crossideas Segregation of Duty Approach
 
Master Epm
Master EpmMaster Epm
Master Epm
 
End Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationEnd Solutions Ltd CIO presentation
End Solutions Ltd CIO presentation
 
Admin On Demand
Admin On DemandAdmin On Demand
Admin On Demand
 
Healthcare overview
Healthcare overviewHealthcare overview
Healthcare overview
 

Viewers also liked

The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsNovell
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsNovell
 
Improve Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux EnvironmentsImprove Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux EnvironmentsNovell
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Novell
 

Viewers also liked (7)

The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday Problems
 
Improve Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux EnvironmentsImprove Your Compliance across UNIX and Linux Environments
Improve Your Compliance across UNIX and Linux Environments
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
 

Similar to Novell Access Governance Suite

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!Michele Hudnall
 
Caveo Corporation 10
Caveo Corporation 10Caveo Corporation 10
Caveo Corporation 10Hans Olo
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...Compuware APM
 
Safewall - Staying ahead of the threat
Safewall - Staying ahead of the threatSafewall - Staying ahead of the threat
Safewall - Staying ahead of the threatVincent Kwon
 
How To Develop a Value Proposition That SELLS
How To Develop a Value Proposition That SELLSHow To Develop a Value Proposition That SELLS
How To Develop a Value Proposition That SELLSLeveragePoint Innovations
 
Loma Emerging Technology Conference
Loma Emerging Technology ConferenceLoma Emerging Technology Conference
Loma Emerging Technology Conferencelkelleher001
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
 
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk IqFinding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk IqJoe Oringel
 
Business Value of App Structural Quality
Business Value of App Structural QualityBusiness Value of App Structural Quality
Business Value of App Structural QualityCAST
 
Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Global Business Events
 
Continuous Auditing D.French
Continuous Auditing D.FrenchContinuous Auditing D.French
Continuous Auditing D.FrenchDan French
 
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation Anatoly Levenchuk
 
FRaCT Webinar Deck
FRaCT Webinar DeckFRaCT Webinar Deck
FRaCT Webinar DeckTeradata
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 

Similar to Novell Access Governance Suite (20)

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
 
Caveo Corporation 10
Caveo Corporation 10Caveo Corporation 10
Caveo Corporation 10
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
 
Spendkey Service Overview
Spendkey Service Overview Spendkey Service Overview
Spendkey Service Overview
 
Q insure
Q insure Q insure
Q insure
 
Safewall - Staying ahead of the threat
Safewall - Staying ahead of the threatSafewall - Staying ahead of the threat
Safewall - Staying ahead of the threat
 
How To Develop a Value Proposition That SELLS
How To Develop a Value Proposition That SELLSHow To Develop a Value Proposition That SELLS
How To Develop a Value Proposition That SELLS
 
Loma Emerging Technology Conference
Loma Emerging Technology ConferenceLoma Emerging Technology Conference
Loma Emerging Technology Conference
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk IqFinding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
 
Business Value of App Structural Quality
Business Value of App Structural QualityBusiness Value of App Structural Quality
Business Value of App Structural Quality
 
Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...
 
Why Managed Services
Why Managed ServicesWhy Managed Services
Why Managed Services
 
Continuous Auditing D.French
Continuous Auditing D.FrenchContinuous Auditing D.French
Continuous Auditing D.French
 
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
 
FRaCT Webinar Deck
FRaCT Webinar DeckFRaCT Webinar Deck
FRaCT Webinar Deck
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 

More from Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadNovell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Novell Access Governance Suite

  • 1. Novell Access Governance Suite ® Overview and Business Case Ross Chevalier CTO Americas, President Novell Canada Novell, Inc / rchevalier@novell.ca
  • 2. Making IT Work As One ™ 2 © Novell, Inc. All rights reserved.
  • 3. Reduce Cost Manage Complexity Mitigate Risk 3 © Novell, Inc. All rights reserved.
  • 4. Our Conversation Today • Quick Access Governance Review • Motivating Factors • Opening Questions • Cost Containment • Cost Avoidance • Risk Avoidance • Positive Financial Impact • Call to Action 4 © Novell, Inc. All rights reserved.
  • 5. Risk to the Enterprise is Rising Security Breaches Compliance Violations Growth Challenges Identity Theft Privacy Concerns Significant Risk, Cost and Exposure 5 © Novell, Inc. All rights reserved.
  • 6. Growing Risk, Growing Regulations Gramm-Leach-Bliley PCI- DSS Basel II Sarbanes- FISMA Oxley HIPAA HSPD-12 6 © Novell, Inc. All rights reserved.
  • 7. “Governance, Risk and Compliance (GRC) remains an intensely human effort. Two-thirds of budget are earmarked for people-related expenses (services plus head count).” – AMR Research 7 © Novell, Inc. All rights reserved.
  • 8. Access Governance is Dynamic Exceptions and Access Requests Conditions and Changes Provide Visibility Regular for Modeling Continuous Review and Access Lifecycle Certification Management Metrics for Management and Access Rights Maintenance Remediation and Validation 8 © Novell, Inc. All rights reserved.
  • 9. The Complete Identity Picture 9 © Novell, Inc. All rights reserved.
  • 10. Role of Identity Management Automation and Validation 10 © Novell, Inc. All rights reserved.
  • 11. Motivating Factors • Government Regulation • External Auditor Pressure – “The Ding List” • Reduce Direct Expense • Organizational Impact • Increasing Accountability and Engagement • Manual models consistently fail 11 © Novell, Inc. All rights reserved.
  • 12. Some Opening Questions... • Business Model – B2B, B2C, Multinational • Annual Revenue • Employee Count • Business unit manager engagement – Review and re certification • Number of annual access reviews – Number of users reviewed per review cycle – Number of unique certification reviews • Is the data easy to understand? • Is there rubber-stamping? 12 © Novell, Inc. All rights reserved.
  • 13. Regulatory Scope Assessment • Financial Reporting – SOX, CA 52-313, Turnbull, LSF, Transparency Directive, JSOX, MAR • Industry Mandated Initiatives – Basel II, GLBA, FERC/NERC, FFIEC, FISMA, HIPAA/HITECH, ITAR • Privacy Mandates – PCI, State Based (CA 1386, MA Privacy 201), Country Based (Pipeda) 13 © Novell, Inc. All rights reserved.
  • 14. Cost Containment • Compliance Audit Cost – Internal Staff Costs – External Fees • Corporate Loss of Productivity – Can be significant • Staff Reduction/Redeployment – Put the right people on the right tasks 14 © Novell, Inc. All rights reserved.
  • 15. Cost Containment Example Expense Automation Savings Cost Containment Department Function Cost Reduction Annually Compliance Audit Cost Audit 25 Applications $250,000 25% $62,500 150 BU, Corporate Loss of Certification and Productivity Business Access Reviewers $90 50% $202,500 IT 7 FTEs doing data Compliance gathering, assessment Staff Reduction and Security and reporting $55 33% $264,264 Total $529,264 15 © Novell, Inc. All rights reserved.
  • 16. Cost Avoidance • Fines and Penalties • Operational Impact – Response and Notification – Customer Revenue Loss – Customer Replacement Cost – Service Availability – Brand 16 © Novell, Inc. All rights reserved.
  • 17. Cost Avoidance Example Cost Avoidance Potential (Loss of 100,000 Cost to Customer Records) Actual Loss Unit Cost Impact Inherent Risk Business Fines and Penalties (SOX, Privacy, PCI et. al.) $1,000,000 33% $330,000 Operational Impact – Response and Notification 100,000 $50 $5,000,000 33% $1,650,000 Operational Impact – Customer Revenue Loss 7000 $54/mth x 12 months $4,536,000 33% $1,496,880 Operational Impact – Customer Replacement Cost (Marketing) 7000 $280 $1,960,000 33% $646,800 Operational Impact – System $23,000/hr revenue Service Availability Outage 6 hrs. loss $138,000 100% $138,000 Operational Impact – Brand $3,000,000 33% $990,000 Total $5,251,680 17 © Novell, Inc. All rights reserved.
  • 18. Risk Avoidance • Inappropriate access to systems and data • Aged entitlements and entitlement creep • Orphaned accounts and entitlements – “User” gone but access remains • Reduces data entry errors • Manage data location/copies • Breach preparedness 18 © Novell, Inc. All rights reserved.
  • 19. Positive Financial Outcomes • Reduction in operational costs going forward • Reduction in “firedrill effects” • Increased corporate confidence – Reduces the “are you sure?” – Creates real-time reporting and dashboards • Better positioned for future demand 19 © Novell, Inc. All rights reserved.
  • 20. Call to Action • Visit the Access Governance Suite (AGS) table (#A14) in IT Central to view a demo • Work with your Novell Client Executive, Product Sales ® Specialist or Novell Partner to: – Arrange an private AGS assessment using these tools – Build your corporate business case based upon the report – Secure budget to proceed – Engage with the first phase of the Access Governance Project > Measure consistently > Keep the loop closed and feedback coming > Strengthen the case for follow-on phases 20 © Novell, Inc. All rights reserved.
  • 21. Time for Questions 21 © Novell, Inc. All rights reserved.
  • 22. Novell ® Making IT Work As One™ + Reduce Cost + Manage Complexity + Mitigate Risk 22 © Novell, Inc. All rights reserved.
  • 23.
  • 24. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.