Cloud-Ready Software for Securely Extending Enterprise Investments into the Cloud
|
|
- Gabriel Wilkins
- 7 years ago
- Views:
Transcription
1 I D C V E N D O R S P O T L I G H T Cloud-Ready Software for Securely Extending Enterprise Investments into the Cloud July 2010 Adapted from Worldwide Identity and Access Management Forecast Update and 2008 Vendor Shares by Sally Hudson, IDC # Sponsored by Novell Corporate responsibility for the security and integrity of IT is increasingly a concern regardless of whether the IT resources are internal or external to the enterprise. As systems have become increasingly open, and remote access is now commonplace, users are continually presented with opportunities to exploit security and policy weaknesses. Misuse and abuse of IT resources is sometimes intentional, but more often than not, it is unintentional. Unfortunately, the result is the same inadequate access controls and excessive user privileges have cost organizations literally millions of dollars in lost or misused data, loss of consumer confidence, and heavy fines for violating compliance regulations. We see these headlines in the news on a daily basis, and no CEO wants notoriety of that sort. A recent IDC survey of IT professionals across large, medium-sized, and small companies revealed that excessive privileges and poorly implemented access control have created more negative financial impact for organizations than any other security-related incident. As a result, organizations are looking to increase security and accountability for everything touching the IT domain. At the same time, organizations are looking to make IT more responsive to business needs. All of this is done with an eye toward cutting costs and achieving efficiency. Fortunately, now is the time for businesses to take advantage of both advanced technology and new delivery models to achieve security and compliance goals and optimize operations. Today, many emerging platforms promise the deployment, management, and efficient use of technology. Cloud computing in all its forms internal to the organization or external to the organization, or a hybrid of both can be implemented to save resources and maximize efficiencies, provided that key questions can be answered with regard to security, privacy, and access control issues. Fortunately, solutions are available, but providing a solid, secure, and flexible framework is central to achieving these goals. This paper examines how the ability to secure the cloud with identity and access management (IAM) technology enables IT organizations to manage and optimize computing resources in a policy-driven, secure, and compliant manner. In addition, this paper discusses the role that Novell plays in the important market of cloud security. Security in the Cloud World-class enterprises have found that identity and access management is a key factor in achieving compliance, increasing security, and streamlining business operations. IAM provides the who, what, when, where, and more recently, why of who has access to which resources within the organization. As businesses evaluate solutions to provide cost savings and increased business agility, larger numbers of companies are contemplating moving their business applications to the cloud or outsourcing IT infrastructure onto cloud-based platforms, or a combination of both. To ensure success, the cloud model must demonstrate the same levels of security and accountability found with on-premise enterprise IT. Transitioning to a cloud platform requires several key assurances, which IAM technology facilitates. IDC 984
2 Ideally, an identity-driven cloud platform should provide the following: Security Agility Risk mitigation Compliance Scalability These attributes must be effectively and dynamically managed. Fortunately, today, products and solutions are available to assist IT professionals and business managers in this continuous process. For IT departments, the ability to intelligently manage workloads across physical, virtual, and cloud environments is critical for delivering business services to end customers. The need for these capabilities will grow as organizations evolve their IT strategies toward cloud delivery models. The ability to control access to applications from the datacenter to the cloud will be vital in order to ensure risk management and compliance. An identity-driven cloud rests on a solid identity management framework, which in turn should be tuned to demonstrate high levels of security and compliance capabilities for traditional as well as new computing models. While only a small percentage of enterprises are computing in the cloud today, that number will grow exponentially in the coming years. Whether an organization is moving to the cloud or maintains an internal cloud, or a combination of both, it is crucial to know who is doing what before going anywhere. Questions surrounding who will own the responsibility for securing the cloud must be answered, and much of this rests on the ability to control how identities and access can/will be managed within the amorphous cloud environment. No single answer exists, but many approaches ultimately will converge in tandem with the growing maturity of the evolving cloud platform models. For enterprises to achieve a truly identity-driven cloud, a favored option would be to extend enterprise-class identity management capabilities into the cloud. This would allow enterprises to retain control of who has access to what throughout their entire resource landscape whether within the firewall or in a hosted environment. A critically important but often overlooked factor when implementing an intelligent identity framework, which is an automated, extensible, standards-based approach to identity design and deployment, is ease of use. An organization cannot benefit from an identity management framework if it requires too much effort and IT integration to work effectively. Ideally, business managers and IT professionals should work together to select the appropriate identity platforms from an ease-of-use and security/compliance effectiveness standpoint. The ease-of-use requirements should span initial deployment through expansion to include (or terminate the use of) new systems and identity services. The desired fluidity of an identity-driven framework demands the use of ongoing policy management and controls that can be readily accessed and understood by the business user. Ideally, an identity platform or ID-driven cloud will eventually consist of multiple security domains across disparate systems. The ability to easily and automatically enforce enterprise policy across all of these systems is crucial to security, compliance, and overall business health. Definitions Identity and access management is a comprehensive set of solutions used to identify users in a system (employees, customers, contractors, etc.) and control their access to resources within that system by associating user rights and restrictions with the established identity IDC
3 According to IDC's Worldwide Identity and Access Management Forecast Update and 2008 Vendor Shares report, IAM generated more than $3 billion in 2008 and is expected to reach almost $5 billion by This is exclusive of managed services. IDC research shows that government and industry compliance regulations are driving 85% of this market momentum. The first step organizations should take to protect today's diversified IT infrastructures is controlling user access. Regulations such as Sarbanes-Oxley (SOX), GLBA, PCI, FFIEC, and HIPAA place strict requirements on information privacy and security. Therefore, managing access to that information is an extremely important part of security and risk mitigation for corporations and government entities today. IDC research suggests that the following are among the most common sources of compliance failures: Unresolved segregation of duties (SoD) that inadvertently enables accounts with excessive access/privilege rights Failure to control the number of users with access to files in production and in network share files Failure to adequately reference and secure data in applications Inability to properly document manual processes and reconcile these processes to the IT systems used Failure to manage and deprovision orphan accounts in a timely manner Inability to adequately secure access to operating systems and databases that support corporate financial applications and transactions Failure to enforce security across various silos (e.g., SaaS, collaboration, business applications) (This is problematic due to different sets of credentials and policies in different organizations. Companies have a proclivity to maintain the silos [if it works, don't fix it mentality], but the need to enforce policy in a seamless, consistent manner is paramount to corporate security hygiene.) Failure to adequately implement access control to business applications running outside the core IAM platform To address the concerns on this list, organizations most often turn to password management, password self-service, and secure single sign-on (SSO) as the initial entry points to IAM. Further, password self-service allows users to set or unlock their own passwords, helping to reduce load and call volumes on the help desk a very significant savings in both time and resources for organizations. As companies successfully implement and derive benefits from the IAM components above, the natural course is to build out and extend the identity infrastructure to achieve a strong and flexible foundation for current and future needs. Vendors offering IAM framework foundations should be vetted for: Reliability Scalability Standards-based, easy interoperability Advanced tools that can simplify development and allow developers to easily create and customize enterprise workflows (e.g., single view, drag-and-drop formats, automation) Automated data cleansing 2010 IDC 3
4 Reporting and auditing Process automation to eliminate time-consuming, error-prone manual processing The ability to extend enterprise-compliant processes such as workflow approvals, identification of (SoD) violations and provisioning/deprovisioning into the cloud (This often involves integration with an enterprise-class security information and event management [SIEM] solution.) Solid network of tested integration partners As organizations move toward cloud platforms and SaaS delivery mechanisms, IDC believes that the same security infrastructure and GRC capabilities offered by IAM technologies will be extended to these next-generation computing platforms. IAM technologies will play a central role in offering security and compliance to cloud environments as they provide solutions to central questions (e.g., "How do I enforce policy across all my applications both traditional on premise and SaaS?") Benefits To be competitive in the 21st century, enterprises need a flowing, automated identity management system that allows for a strong security framework. This type of system must allow for easy implementation of new controls because the compliance landscape and the spectrum of security threats are constantly evolving and expanding. Today, customers in all market segments, including banking, financial, insurance, higher education, healthcare, government, and manufacturing, are looking at identity-driven platforms and frameworks to provide the following: More streamlined business processes Greater business agility Increased security Robust access management Security professionals are looking for solutions that provide preventive rather than reactive security. Because enterprises typically have fewer staff members and less time to deal with repairing security problems, state-of-the-art security solutions, once configured, must provide high levels of assurance with minimal maintenance requirements. In conjunction with this, IAM solutions should be centrally managed and monitored to avoid security/compliance breaches in off-premise or isolated departmental applications and processes. A seamlessly integrated workflow would span all this and allow business owners and senior administrators to approve and document changes in user access according to established provisioning rules and templates all with an enterprisewide view of user access privileges. The need for an enterprisewide view and centralized management approach is demonstrated by organizational downsizing today. Enterprises that are restructuring can take this as an opportunity to embrace leading-edge provisioning technology to ensure that closed accounts are removed as part of the ongoing provisioning/deprovisioning process. This both maintains higher levels of security and assists greatly in meeting compliance demands. In conjunction with this, there is also an increasing demand for role-based access and control (RBAC) software, which is used to group all of the tasks associated with a job function and ensures that administrators are granted only "least required privileges." IDC
5 By adopting this approach, systems architects can simplify provisioning, reconcile roles, do matching, and identify redundancies and anomalies within permissions assignments across the system. Reporting features within the software can be used to equal advantage by both auditors and system architects in support of management access control. Managed service providers (MSPs) also play a pivotal role in the overall IAM ecosystem. With the increasing reliance on these providers to provide identity services for large and potentially enormous pools of users, managing identities, scalability, and fault tolerance is key. Managed service providers today are beginning to implement automated identity-driven frameworks to ensure access control functions and will be using intelligent workload management techniques moving forward to ensure that customers have a continual, centrally managed, secure, and business-optimized service environment. Custom reporting capabilities are also necessary for these organizations to operate effectively on a large and ever-changing scale. Considering Novell's Intelligent Identity Management Novell Inc., headquartered in Waltham, Massachusetts, has been providing IAM technologies for the better part of a decade. The company recently launched its new Novell Identity Manager 4 family of products. This latest release has been architected with both enterprise organizations and cloud/managed service providers in mind. The software is made up of a family of products, each designed to meet the particular needs of the client base. Some specific examples are mentioned below: The Role Mapping Administrator module provides a single-pane view for all permissions, roles, and resources for a target system. This facilitates integration of the system provisioning policy and permissions with the enterprise roles. The integration between business roles and permissions serves to create a unified governing policy. The software includes a visual drag-anddrop approach to linking permissions to enterprise roles designed to simplify the user's ability to implement policy integration at the initial setup, as well as for ongoing maintenance. Novell supplies a modular policy framework called Package Manager that houses various loosely connected policy packets or building blocks. Initially, the content policy provided out of the box is geared more toward providing technical professionals with assistance. For example, Package Manager policies can be used to create new users in Active Directory and determine what they should be called, how they should be placed, etc., all within the Novell Identity Manager policy language. Other questions addressed are things such as determining urgent versus nonurgent application event alerts, password rules, dependency tracking, etc. There is a reporting engine with data warehouse, which can help in examining a user's current state, as well as approvals, to determine who did what, when, and how. For MSPs, ISVs, and large IT organizations, this modular approach aims to simplify change management and subsequently shorten time to value. The baseline policy content provided by Novell is collated from Novell's 10+ years of experience in the identity management market and is tailored to enable modification by third parties, MSPs, ISVs, etc. The automated system provides alerts on unintended effects of a policy change where a policy is deployed across multiple systems. Features include versioning, installation/removal, dependency tracking, meaningful package naming conventions, and other attributes that function together to enable an agile and intuitive approach to policy management throughout the enterprise. Detailed, real-time automated reporting allows for efficient allocation of business resources on an ongoing and as-needed basis IDC 5
6 Managed Service Providers Can Ensure Compliance and Security Within an Identity-Driven Cloud Finally, for those moving toward cloud computing, Novell Identity Manager 4 is available with technology embedded to extend to the virtualized environment. Novell is targeting MSPs with features such as improved scalability and fault tolerance, both of which are required to meet standard service-level compliance mandates such as SAS 70. Specifically, SaaS 70 compliance assertion, which is essential for SOX, HIPAA, GLBA, and other regulations, requires high availability with a backup plan in case of system failure. Novell has made many of these features available with the Identity Manager 4 family, as well as critical functions required for cloud support. Challenges and Opportunities Risk aversion is high across all industries today as organizations balance the need for business flexibility with the need to meet compliance regulations and avoid security breaches. Companies want to leverage their existing systems whenever possible, and they are looking to the cloud as a way of reducing costs and increasing agility. As cloud infrastructure platforms continue to evolve, the ability to deliver and integrate new software functionality into existing IT systems will be both necessary and appealing to IT consumers. Whether an organization is moving to the cloud or implementing an internal cloud, or both, Novell must immediately demonstrate the value of the intelligent workload management approach to meeting these goals. According to Novell, the intelligent workload management market enables IT organizations to manage and optimize computing resources in a policy-driven, secure, and compliant manner across physical, virtual, and cloud environments to deliver business services for end customers. IDC research shows that now more than ever, companies are looking to adopt proven technology solutions. While as an industry we are still in the early days of cloud development and deployment, this is not always easy, but it is increasingly possible to point to success stories. To compete effectively in this area, Novell must provide potential customers with tangible evidence of value-add with its intelligent workload management platform. A significant trend over the past 24 months has been the movement toward integrating traditional IAM technologies with SIEM and data loss prevention (DLP) solutions. This move is driven by customer demand and necessity in order to increase security, manage workloads, and achieve compliance. Novell's ability to provide a complete solution here should serve it well because it has a solid reputation in all three areas. Enterprise Considerations The emerging ecosystems arising from cloud-based platform adoption will result in a greater dependence on trust and identity concepts. This rests on ensuring identities, access management, and control all of which are critical to success in this market. As such, we believe IAM technologies and related services will continue to be adopted as IT enterprise professionals are increasingly looking to centralize their management and administration to eliminate silos and reduce risk. IDC return on investment (ROI) studies over the past several years reveal that IAM deployments can save and have saved thousands to millions of dollars per application deployed while serving to improve business efficiencies. Savings have been realized in lower compliance reporting costs, fewer manual processes, fewer calls to the help desk, and quicker identification and remediation of improper and unauthorized access. As enterprise IT continues to move toward a cloud-driven approach, it's important to note that IAM software inherently has many of the standards and technological requirements for supporting Web services implementations. These include SSO, SAML, LDAP, certificate authority (CA), etc. Enterprise organizations should be critically evaluating their existing identity frameworks now, not later, as failure to do so will result in poorly implemented business processes, increased risk, and potentially failed audits IDC
7 Conclusion Industries are looking to IAM technologies to solve the following issues: Maintain compliance with both government and industry regulations. Increase security, especially to prevent identity fraud and identity theft as well as to protect privacy and systems integrity. Auditability. This refers to who was accessing what information when within the system. Automated auditing and reporting capabilities have become part of the cost of doing business for the majority of organizations worldwide. Accountability. This includes access and permission rights; who granted them, when, and why. The granularity and the flexibility required today go beyond simple directory management; this is increasingly achieved via provisioning and other IAM products. Scalability. With more users accessing systems from different locations on an around-the-clock basis, the ability to scale is a critical function that should be determined prior to selecting an identity framework solution set. Achieve business agility through increased automation and user-friendly design. Novell has a significant customer base and continued to build momentum for its security, identity, and compliance management software in 2009 by expanding its partner ecosystem. IDC believes these are key components for future growth. A B O U T T H I S P U B L I C A T I O N This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee. C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests, contact the GMS information line at or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC. For more information on IDC, visit For more information on IDC GMS, visit Global Headquarters: 5 Speen Street Framingham, MA USA P F IDC 7
Migrating to Windows 7 - A challenge for IT Professionals
I D C T E C H N O L O G Y S P O T L I G H T Migrating to Windows 7? Technology Points to Consider September 2010 Adapted from Worldwide IT Asset Management Software 2009 2013 Forecast and 2008 Vendor Shares
More informationE l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s
I D C T E C H N O L O G Y S P O T L I G H T E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s M a nagement November 2013 Adapted from
More informationPrivileged Access Life-Cycle Management: How PALM Enables Security, Compliance, and Efficiency for Enterprise IT
I D C V E N D O R S P O T L I G H T Privileged Access Life-Cycle Management: How PALM Enables Security, Compliance, and Efficiency for Enterprise IT September 2009 Adapted from Worldwide Identity and Access
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Enabling a Diversified Cloud Strategy to Accelerate Innovation in the Future-Ready Enterprise December 2015 Adapted from Worldwide IDC Cloud FutureScape 2016:
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Intelligent Workload Management: Opportunities and Challenges Sponsored by: Novell Mary Johnston Turner Brett Waldman June 2010 Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
More informationHow can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
More informationI D C M A R K E T S P O T L I G H T. P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration
I D C M A R K E T S P O T L I G H T P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration September 2013 Adapted from IDC Maturity Model: Cloud A
More informationI D C T E C H N O L O G Y S P O T L I G H T. C a n S e c u rity M a k e IT More Productive?
I D C T E C H N O L O G Y S P O T L I G H T C a n S e c u rity M a k e IT More Productive? December 2015 Adapted from Worldwide Identity and Access Management Forecast, 2015 2019 by Pete Lindstrom, IDC
More informationThe Next Phase of Datacenter Network Resource Management and Automation March 2011
I D C T E C H N O L O G Y S P O T L I G H T The Next Phase of Datacenter Network Resource Management and Automation March 2011 Adapted from Worldwide Datacenter Network 2010 2015 Forecast and Analysis
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T AP M S a a S and An a l yt i c s S t e p U p t o Meet the N e e d s o f M odern Ap p l i c a t i o n s, M o b i le Users, a n d H yb r i d C l o ud Ar c h i
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Capitalizing on the Future with Data Solutions December 2015 Adapted from IDC PeerScape: Practices for Ensuring a Successful Big Data and Analytics Project,
More informationHow can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
More informationI D C T E C H N O L O G Y S P O T L I G H T. F l e x i b l e Capacity: A " Z e r o C a p i t a l " Platform w ith On- P r emise Ad va n t a g e s
I D C T E C H N O L O G Y S P O T L I G H T F l e x i b l e Capacity: A " Z e r o C a p i t a l " Platform w ith On- P r emise Ad va n t a g e s March 2014 Adapted from Attaching Support Services at the
More informationOptimizing Information Management in the Cloud
I D C E X E C U T I V E B R I E F Optimizing Information Management in the Cloud June 2011 Adapted from Cloud Storage Impacted by Datacenter Transformations and the Changing Role of IT by Laura DuBois,
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T E n t r y- L e ve l E n t e r p r ise Storage: Stepping Up t o B i g C h a l lenges October 2012 Adapted from The Appliance-ization of the Datacenter and Its Impact
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T U n i fied Cloud Management Increases IT- as- a - S e r vi c e Ag i l i t y November 2013 Adapted from VMware Unifies Cloud Management Portfolio with a Focus
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T E n t r y- L e ve l S olutions for Priva t e C l o u d Au t o m a t i o n D e l i ve r R a p i d R e t u r n s May 2012 Adapted from Worldwide Cloud Systems
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T L e ve r a g i n g N e x t - Generation Servi c e D e l i ve r y: T h e M o ve t o C l o ud Servi c e s November 2011 Adapted from CSC Innoventure 2011: Good Things
More informationSOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information
SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations
More informationCA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
More informationWorkload Automation Challenges and Opportunities
I D C E X E C U T I V E B R I E F Workload Automation Challenges and Opportunities May 2011 Sponsored by BMC Executive Summary Enterprise IT workload environments are becoming more complex, dynamic, and
More informationI D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s
I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive
More informationHow To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
More informationI D C A N A L Y S T C O N N E C T I O N. T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s
($B) I D C A N A L Y S T C O N N E C T I O N Rick Villars Vice President, Information and Cloud T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s August
More informationNEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
More informationI D C T E C H N O L O G Y S P O T L I G H T. W i n d ow s Serve r 2 0 0 3 E n d o f L i f e : An Opportunity t o E va l u a t e I T S tr a t e gy
I D C T E C H N O L O G Y S P O T L I G H T W i n d ow s Serve r 2 0 0 3 E n d o f L i f e : An Opportunity t o E va l u a t e I T S tr a t e gy February 2015 Adapted from Forced Migration: Windows Server
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N David Tapper Vice President, Outsourcing and Managed Services T h e B u s i n e ss Value of Managed Servi c e s i n Optimizing Productivi t y, D r i vi n g D ow
More informationIs Your Identity Management Program Protecting Your Federal Systems?
Is Your Identity Management Program Protecting Your Federal Systems? With the increase in integrated, cloud and remote technologies, it is more challenging than ever for federal government agencies to
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationSafeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
More informationIdentity and Access Management (IAM)
Identity and Access Management (IAM) Emerging risks a look beyond compliance October 2013 Page 0 Agenda Why we have to think about IAM differently 2 Emerging IAM solution options 8 Solution deployment
More informationC l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance
M A R K E T S P O T L I G H T C l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance October 2012 Adapted from Business Strategy: Supply Chain in the Cloud
More informationHelping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights
I D C E X E C U T I V E I N S I G H T S Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights May 2009 By Albert Pang, Research Director, Enterprise Applications
More informationI D C T E C H N O L O G Y S P O T L I G H T. P o r t a b i lity: C h a r t i n g t h e Path T ow ard the Open Hyb r i d C l o u d
I D C T E C H N O L O G Y S P O T L I G H T P o r t a b i lity: C h a r t i n g t h e Path T ow ard the Open Hyb r i d C l o u d September 2013 Adapted from OpenStack: Approaching Critical Mass by Gary
More informationOn-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges
I D C I - V I E W Mary Wardley Vice President, Enterprise Applications and CRM Software On-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges September 2007 Adapted from Worldwide
More informationSmart Identity Security: The Next Generation of Identity and Access Management
I D C V E N D O R S P O T L I G H T Smart Identity Security: The Next Generation of Identity and Access Management February 2006 Adapted from Worldwide Identity and Access Management 2005-2009 Forecast
More informationTaming IT Management Chaos
I D C T E C H N O L O G Y S P O T L I G H T Taming IT Management Chaos January 2009 Adapted from Datacenter Automation: Accelerating Market Maturity Through Investment in IT by Tim Grieser, IDC #213868
More informationWhite Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
More informationI D C V E N D O R S P O T L I G H T. F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage:
I D C V E N D O R S P O T L I G H T F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage: N ew T rends Impacting Enterprise Datacenters March 2014 Adapted from IDC Worldwide Storage Predictions
More informationI D C V E N D O R S P O T L I G H T. S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges
I D C V E N D O R S P O T L I G H T S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges September 2012 Adapted from Worldwide File-Based Storage 2011 2015 Forecast: Foundation
More informationU n i f yi n g H u m a n R e s o u rces for Greater B u s i n e s s Value
I D C T E C H N O L O G Y S P O T L I G H T U n i f yi n g H u m a n R e s o u rces for Greater B u s i n e s s Value March 2011 Adapted from IDC MarketScape: Worldwide Integrated Talent Management 2010
More informationIDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment Jennifer Koppy THIS IDC MARKETSCAPE EXCERPT FEATURES EMERSON NETWORK POWER IDC MARKETSCAPE FIGURE
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationI D C V E N D O R S P O T L I G H T. S e c u r i n g Cloud and Mobile W h i le Keeping E m p l o ye e s H a ppy
I D C V E N D O R S P O T L I G H T S e c u r i n g Cloud and Mobile W h i le Keeping E m p l o ye e s H a ppy January 2014 Adapted from Worldwide Security 2013 Top 10 Predictions by Christian A. Christiansen,
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T S o f tw a re Ap p l i a nces Ease Cloud Ap p l i c a t i o n D e p l o ym e n t January 2012 Adapted from Worldwide Software Appliance 2010 2014 Forecast: Entering
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T N i n e S t a r t - U p s a n d I n n o v a t o r s E x t e n d t h e C l o u d S y
More informationReal-Time Security for Active Directory
Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The
More informationBest Practices for Auditing Changes in Active Directory WHITE PAPER
Best Practices for Auditing Changes in Active Directory WHITE PAPER Table of Contents Executive Summary... 3 Needs for Auditing and Recovery in Active Directory... 4 Tracking of Changes... 4 Entitlement
More informationI D C V E N D O R S P O T L I G H T. W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization
I D C V E N D O R S P O T L I G H T W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization November 2015 Adapted from Worldwide Workload Management Software Market Shares, 2014:
More informationWhite paper. Business-Driven Identity and Access Management: Why This New Approach Matters
White paper Business-Driven Identity and Access Management: Why This New Approach Matters Executive Summary For years, security and business managers have known that identity and access management (IAM)
More informationI D C V E N D O R S P O T L I G H T. H yb r i d C l o u d Solutions for ERP
I D C V E N D O R S P O T L I G H T H yb r i d C l o u d Solutions for ERP November 2014 Adapted from Worldwide Enterprise Applications 2014 2018 Forecast and 2013 Vendor Shares by Christine Dover Sponsored
More informationRSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Lisa Rowan Program Director, HR and Talent Management Services Improving HR Through Business Process Outsourcing May 2009 In the very early days of HR business process
More informationCA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
More informationCloud Computing: The Need for Portability and Interoperability
I D C E X E C U T I V E I N S I G H T S Cloud Computing: The Need for Portability and Interoperability August 2010 By Jean Bozman, Research Vice President, Enterprise Servers and Gary Chen, Research Manager,
More informationI D C T E C H N O L O G Y S P O T L I G H T. I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l
I D C T E C H N O L O G Y S P O T L I G H T Optimizing Blade Ser ve r s f o r V irtualization: I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l August 2011 Adapted from IDC Blade Market Survey:
More informationIdentity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
More informationEstablishing a Mature Identity and Access Management Program for a Financial Services Provider
Customer Success Stories TEKsystems Global Services Establishing a Mature Identity and Access Management Program for a Financial Services Provider FINANCIAL SERVICES NETWORK INFRASTRUCTURE SERVICES INFORMATION
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T S u p p o r t i n g Softw a re Business Transformation w ith Sys t e m s D e s i g n e d for the Task November 2014 Adapted from Managing Business Model Transitions
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationI D C M A R K E T S P O T L I G H T. T a m i n g D a t a M a n a g e m e nt Costs in a " C l o u d y" I T W o rld
I D C M A R K E T S P O T L I G H T T a m i n g D a t a M a n a g e m e nt Costs in a " C l o u d y" I T W o rld June 2015 Adapted from IDC FutureScape: Worldwide Cloud 2015 Predictions by Mary Johnston
More informationImproving Small Business Profitability by Optimizing IT Management
I D C E X E C U T I V E B R I E F Improving Small Business Profitability by Optimizing IT Management Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More informationI D C T E C H N O L O G Y S P O T L I G H T. E n a b l i n g Quality I n n o va t i o n w i t h Servi c e
I D C T E C H N O L O G Y S P O T L I G H T E n a b l i n g Quality I n n o va t i o n w i t h Servi c e V i r t u a lization a nd Netw or k Virtualization December 2014 Adapted from Worldwide Automated
More informationSOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
More informationSOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management
SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management improving SAP security with CA Identity and Access Management The CA Identity and Access Management (IAM) suite can help you
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationHow To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
More informationSecuring Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T E t h e r n e t F a brics: The Foundation of D a t a c e n t e r Netw o r k Au t o m a t i o n a n d B u s i n e s s Ag i l i t y January 2014 Adapted from Worldwide
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationI D C T E C H N O L O G Y S P O T L I G H T. T h e F u t u r e of ITSM : Servi c e M a n a g e ment P l a t f o r m s f or D i gital Transformation
I D C T E C H N O L O G Y S P O T L I G H T T h e F u t u r e of ITSM : Servi c e M a n a g e ment P l a t f o r m s f or D i gital Transformation August 2015 Adapted from IDC Marketscape: Worldwide Service
More informationOperationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
More informationW H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures
W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures Sponsored by: HP Stephen Elliot April 2008 IDC OPINION Global Headquarters:
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationNetwork Management Services: A Cost-Effective Approach to Complexity
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N David Tapper Vice President, Outsourcing Services H ow M a n a g ed Servi c e s C a n Optimize the B u s i n e s s Value of M i crosoft and non - M i c r o s o f
More informationThe organization decided that creating a more robust approach to customerfacing identity management represented a strategic opportunity.
BUYER CASE STUDY BuyerPulse Buyer Case Study: McKesson Utilizing Open Source IAM: Benefits in Cost, Customization, and Integration Sally Hudson Susan Funke Chris Skall Global Headquarters: 5 Speen Street
More informationMaking the Business Case for HR Investments During Economic Crisis
I D C V E N D O R S P O T L I G H T Making the Business Case for HR Investments During Economic Crisis March 2009 Adapted from Putting Performance at the Hub of the Talent Universe by Lisa Rowan, IDC #214468
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationWHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
More informationLeveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
More informationInformatica Solutions for Healthcare Providers. Unlock the Potential of Data Driven Healthcare
S O L U T I O N S B R O C H U R E Informatica Solutions for Healthcare Providers Unlock the Potential of Data Driven Healthcare Informatica Solutions For Healthcare Providers Fundamental change in the
More informationI D C T E C H N O L O G Y S P O T L I G H T. L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation
I D C T E C H N O L O G Y S P O T L I G H T L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation July 2014 Adapted from The Network Virtualization Evolution in Telecom by
More informationCA Service Desk Manager
PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES
More informationTHE QUEST FOR A CLOUD INTEGRATION STRATEGY
THE QUEST FOR A CLOUD INTEGRATION STRATEGY ENTERPRISE INTEGRATION Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high
More informationData Center Solutions
Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying
More informationMSP Relevance. MSP Relevance. the Era of Cloud Computing. the Era of Cloud Computing. Brought to You By: A Channel Company White White Paper Paper
A Channel Company White White Paper Paper MSP Relevance MSP Relevance How How MSPs MSPs Can Can Stay Stay Relevant Relevant in in the Era of Cloud Computing the Era of Cloud Computing Brought to You By:
More informationProvide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
More informationIdentity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
More informationUniting IAM and data protection for greater security
E-Guide Uniting IAM and data protection for greater security There's been a new development in the information security world: content-aware identity and access management, an integration of two established,
More informationM A R K E T S P O T L I G H T. D u a l B e n e f i ts for Financial Ser vi c e s F i r m s : I n c r e a s e d Re ve nue a nd C o s t T a k e o ut
M A R K E T S P O T L I G H T Optimizing Document P r ocesses Provi d e s D u a l B e n e f i ts for Financial Ser vi c e s F i r m s : I n c r e a s e d Re ve nue a nd C o s t T a k e o ut July 2013 Adapted
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
More informationTest Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
More information