Download presentation
Presentation is loading. Please wait.
Published byThoralf Karlsen Modified over 6 years ago
1
Novell® Strategy for Intelligent Workload Management
Your Name Here Your Title Here Your Here December 23, 2009 Version 7.3 Updated November 30, 2009.
2
Agenda Market Dynamics Optimize Your Infrastructure
Intelligent Workload Management The Novell® Approach to Intelligent Workload Management Novell Solutions
3
Market Dynamics
4
21st Century Computing 1 The risks and challenges of computing across multiple environments must be eliminated. Users should have unimpeded, secure and compliant access to the full computing services they need to do their jobs right. Computing should be secure, compliant, and portable. 2 3
5
It's All About Balance Flexibility Control
6
New Technologies Mean New Flexibility
Virtualization Cloud Computing Software as a Service Mobile Devices
7
New Regulations Require More Control
Average cost per data breach is $6.6 million 285 Million records compromised in 2008 74 percent compromised by external sources 20 percent compromised by insiders 32 percent implicated business partners Increasing regulatory requirements Sarbanes-Oxley Basel II HIPAA PCI DSS Risk management is a growing concern in today's businesses. High-profile security breaches have dominated IT news in recent years, leading to public and painful disclosures that have dramatically affected brand image and the financial health of many public companies. From the boardroom to the data center, organizations are experiencing a crisis of trust. Customers are losing trust in the ability of businesses to keep their personal data safe. IT departments are losing trust in their own ability to meet business security and compliance mandates. CxOs and compliance officers are losing trust in the certifications they're required to submit because they have no way of confirming that security, identity, and access management controls are in place and properly followed. In addition to the increase in risk, compliance challenges are a reality of current business conditions. Today's businesses must comply with a complicated and growing set of industry and government regulations. Sarbanes-Oxley, Basel II, HIPAA, PCI-DSS and others add layers of administration and complexity to already complicated networks—layers that guarantee increased risk and increased difficulty in managing it.
8
How Much Will CIOs Use the Cloud?
0% 21-25% 3% 0% 55% of CIOs will not use the cloud in Only 21% will not use the cloud in 2012. 16-20% 10% 2% 11-15% 23% Percent of Enterprise Compute Workloads Running in the Cloud 6% 6-10% 26% 37% 0-5% 17% 55% 21% 0% Gartner 16% workloads virtualized in 2009 50% workloads virtualized 2012 0% 10% 20% 30% 40% 50% 60% Percent of Respondents In 2010 In 2012 Source: Goldman Sachs IT Spending Survey
9
Cloud Computing Adds Security Challenges
“Everyone is focused on how to get your information into the cloud, but you also need to focus on how do you get your data out … You've got to look at the security of the information and who has responsibility for what.” Steve Hassell, CIO of Emerson Electric, The Wall Street Journal on October 12, 2009
10
The Truth About IT Approximately 70% of the digital universe is created by individuals, but enterprises are responsible for 85% of the security, privacy, reliability, and compliance. Source: IDC
11
As a CIO, You Want To: Deliver a rapid ROI on every investment
Reduce CAPEX and OPEX Maximize flexibility and agility Retain control of your IT infrastructure Simplify management Be pragmatic
12
Optimize Your Infrastructure
13
Technology is Rapidly Evolving
Applications are now portable Portability requires security and management Applications The operating system is being redefined New software stacks are emerging System Platform Standards lead to commodization of the hardware Commodized h/w has led to a different consumption model – because lower in value chain. Leads to platformization Commoditization drives consolidation of players Parallel of what is happening to h/w is happening at the s/w layer Shifting from fixed cost to variable cost Moving from proprietary to standardized Hardware
14
Workload: The (New) IT Paradigm
Application Middleware Workload Operating System A workload is an integrated stack of application, middleware, and operating system that accomplishes a computing task A workload is portable and platform agnostic –it can run in physical, virtual or cloud computing environments A workload or a collection of workloads makes up a business service, which is what the end user consumes
15
How Workloads Build a Business Service
Database workload on physical hardware in legacy data center Application server virtualized in private cloud Example: SAP inventory report seen by user Presentation and graphics server running in public cloud We define a “workload” as everything from an integrated suite of software that includes the operating system, middle-ware and application to just the application itself. When you aggregate several workloads together, you create a business service that the end user consumes.
16
Extending the Enterprise to the Cloud
Internal Data Center GOVERNANCE AND COMPLIANCE Business Service Management IT Service Management Existing Internal Capacity
17
Extending the Enterprise to the Cloud
Internal Cloud (On-Premise) GOVERNANCE AND COMPLIANCE Business Service Management Business Service Management IT Service Management IT Service Management Existing Internal Capacity Virtualized Internal Capacity Firewall
18
Extending the Enterprise to the Cloud
Internal Cloud (On-Premise) External Cloud (Off-Premise) GOVERNANCE AND COMPLIANCE Business Service Management Business Service Management Business Service Management Software as a Service IT Service Management IT Service Management IT Service Management Platform as a Service Infrastructure as a Service Existing Internal Capacity Virtualized Internal Capacity New External Capacity Firewall
19
The New Building Blocks of IT...
Integrated stacks of applications, middleware and operating system constitute modern workloads. Intelligent workloads incorporating security, identity-awareness and demonstrable compliance are the new IT building blocks.
20
… Deliver Seamless Computing
Intelligent workloads optimize the use of enterprise resources. To achieve a seamless computing experience across physical, virtual and cloud computing environments, organizations require robust security, intelligent workloads, and an effective management framework.
21
Intelligent Workload Management
22
Intelligent Workload Management
Intelligent Workload Management enables IT organizations to manage and optimize computing resources in a policy-driven, secure and compliant manner across physical, virtual and cloud environments to deliver business services for end customers. Intelligent WORKLOAD Management
23
What Makes a Workload Intelligent?
Policy-driven Understands its security protocols and processing requirements Enables self-regulation and management according to business policy Performance-optimized Recognizes when it is at capacity Finds alternative computing capacity as required to optimize performance Identity-aware Identity and access controls move with the workload between environments Built-in log management and compliance reporting capabilities Real-time event tracking, monitoring and alerting Integrated Works with existing and new management frameworks Plugs into a business service management layer Anything not clear? Missing? 23
24
The Workload Lifecycle
+ Customized OS Intelligent Workload + Identity + Management Build Secure Manage Measure Slide 21: Intelligent Workload Management Strategy Our strategy is to become the industry leader in the new category of Intelligent Workload Management. Novell helps you deploy, manage, secure and monitor workloads internal to the enterprise and external in the “cloud computing” environment. We define a “workload” as everything from an integrated suite of software that includes the operating system, middle-ware and application to just the application itself. When you aggregate several workloads together, you create a business service that the end user consumes. Novell makes a workload “intelligent” by providing the ability to make workloads self-aware, by adding identity and management capabilities inside the workload, thus allowing customers to optimize their deployment and simplify management. Novell also provides the tools that enable ISV's and developers to build, deploy and manage intelligent workloads. This differentiates us from other IT companies in the marketplace. (AGAIN what about Build?) Both Intelligent and Standard Workloads Across Physical, Virtual, and Cloud Environments
25
Intelligent Workload Management Business Benefits
Ensures security and compliance Reduces IT labor cost in configuration, operations and monitoring Improves capital utilization, significantly reducing license costs Reduces provisioning cycle times Reduces end user IT support costs
26
The Novell® Approach to Intelligent Workload Management
27
Integrating Identity into Management
Resource Management Resource Management General Purpose Operating System Security and Compliance Management Service Management Service Management Customized Operating System Security and Compliance Management Identity-Managed Isolated Identity Awareness
28
How Novell Delivers Intelligent Workload Management
Build Secure Manage Measure SUSE® Linux Enterprise Server SUSE® Studio SUSE® Linux Enterprise JeOS Novell® ZENworks® Configuration Management SUSE® Appliance Toolkit Novell® Workshop Novell® Identity Manager Novell® Access Manager Novell® Roles Based Provisioning Module Novell® Access Governance Suite Novell Privileged User Manager Novell® SecureLogin® Novell® Cloud Security Service PlateSpin® Migrate PlateSpin® Orchestrate Novell® ZENworks® Configuration Management PlateSpin® Recon PlateSpin® Protect Novell® Cloud Manager PlateSpin® “BlueStar” Novell® “Workbench” Novell® Business Service Manager Novell® Business Service Level Manager™ Novell® Business Experience Manager™ Novell® myCMDB™ Novell® Sentinel™ Novell® Sentinel™ Log Manager Novell Compliance Automation Solution * Available by end of 2010
29
Novell Solutions Build Secure Manage Measure Enterprise Linux Servers
SUSE® Appliance Program Identity and Access Management Compliance Management Security Management Virtualization and Workload Management Endpoint Management Business Service Management
30
Smart Companies are Already Making Intelligent Workload Management a Reality
Organizations are already using Novell technology to build, secure, manage, and measure compliant environments that include many interoperating technologies and platforms. You can start implementing IWM today with current technology and solutions from Novell and its ecosystem of partners. Products now in the Novell pipeline will enable enterprises to deploy identity-aware, secure and compliant intelligent workloads. Unique position Platform and hypervisor agnostic Deep technical commitment to interoperability Possess the strong alliance partnerships required Winning portfolio Industry leading identity, security and compliance technology Resource management tools that work in physical, virtual and cloud environment Tools to build and maintain a customizable operating system. Delivering innovation today SUSE Studio & Appliance Toolkit Novell Cloud Security Service
31
Novell Solutions
32
Making IT Work As One Intelligent Workload Management Collaboration
People and Technology Working as One Intelligent Workload Management Collaboration Novell’s business is Making IT Work as One. As an infrastructure software company we do this by providing capabilities in two primary market categories: the new category of Intelligent Workload Management that I’ll describe in more detail shortly and Collaboration. Novell is aggressively pursuing a leadership position in Intelligent Workload Management because many of our technology assets coupled with emerging customer needs create a growth and leadership opportunity for us. To make IT work as one requires not just well managed IT but also the tools to access the information needed and to share it with each other. In order to support the people part of people and technology working as one, Novell offers collaboration solutions today and is innovating in user experience, through cockpit, and shared data management through Greentree. The traditional collaboration market is well served and highly competitive. By achieving a leadership position in Intelligent Workload Management we can capture new customers more easily and leverage that growing base to create new opportunities for our collaboration solutions as customers and partners continue to look for fewer, not more vendors. 32
33
Three Focus Areas End-User Identity and Security Computing Data Center
Slide 17: Your Needs, Our Capabilities [Keep it short. You will go into more detail further into the deck.] IT shops are complex, and there are a multitude of needs within and outside these departments. That's why we start with an assessment of the needs of common groups or organizations. Our solutions provide capabilities for customers and partners to address needs in three specific focus areas: the Data Center, End-User Computing, and Identity and Security. In line with reducing cost, complexity and risk, we believe the value of these three areas is in creating an agile data center, making end users more productive and achieving security you can trust.
34
Data Center Solutions Enterprise Linux Servers
Virtualization and Workload Management Business Service Management UNIX to Linux Migration Linux for Mainframes Red Hat to SUSE® Linux Enterprise Migration Mission-Critical Computing Virtualization Host Platform Build Clouds and Provision Services Cloud Management and Monitoring Assessments and Virtual Capacity Management Server Consolidation Disaster Recovery Configuration Management System Service Impact Management Existing CMDB Advanced Analytics Real-Time SLA Management Slide 20: Data Center Solutions—Detail Let's take a look at some of the offers and capabilities in each: Enterprise Linux Servers. While Novell embraces the mixed reality of your data center, we also offer an operating system platform if you're looking for a cost-effective solution to run your mission-critical applications. It's called SUSE Linux Enterprise. With SUSE Linux Enterprise, you can meet practically any data center need. You can migrate off of any expensive UNIX platforms or deploy applications on mainframes. And it's the only Linux platform endorsed by both Microsoft and SAP. Virtualization and Workload Management. Of course, a big challenge in your data center is managing all of your different workloads between both physical and virtual worlds, and delivering the business continuity and disaster recovery your users require. With our PlateSpin Workload Management solutions, you can drive new server consolidation initiatives, implement improved disaster recovery across physical and virtual workloads, and optimize your data center capacity. And finally, Business Service Management, or BSM. BSM links the business services to the underlying IT infrastructure. With these tools, you can measure your IT infrastructure performance to better meet service level agreements. With BSM, you can reduce IT outages by 50 percent or more; minimize the impact of configuration changes; and prevent IT service disruptions.
35
End-User Computing Solutions
Collaboration Endpoint Management Personal and Team Productivity Collaboration Data Management NetWare Server Consolidation on Linux Endpoint Configuration management Endpoint Security Management IT Asset Management Slide 24: End-User Computing Solutions—Detail Now let's look at what we provide to help you create a finely tuned End-User Computing environment where making people more productive and innovative is the focus. To start, our Collaboration solutions enable the new interactions today's business pace demands. This can be as simple as employing team workspace and social networking tools to drive team efficiency. Or it can be a robust solution that combines personal and team productivity tools with identity, security and management controls. These things all deliver a next-generation collaboration platform that's ready for prime-time enterprise pressures and performance. Next, we know that not all users require the same, costly tools. That's why our Enterprise Linux Desktop solutions give you exactly what you need for each person—whether CEO, cashier or helpdesk representative. And we offer these solutions across today's mix of devices: desktops, laptops, netbooks and thin clients. And last, our Endpoint Management solutions enable you to manage, track and secure all of your end-user devices and resources, regardless of location, inside or outside of your enterprise. With these solutions, you can reduce the cost of delivering, securing and managing a productive environment.
36
Identity and Security Solutions
Identity and Access Management Security Management Compliance Management User Provisioning and Management Roles Management Simplified Secure Access Security Monitoring and Remediation Log Management Cloud Security Compliance Assurance Enterprise Compliance Automation for SAP Privileged User Management 36
37
Novell® at a Glance Countries Years of Experience Partners
Million in Revenue FY 2009 Employees Inventions Million in Cash Customers
38
Global Customers Slide 30: Global Customers
This chart is but a small fraction of those customers that we do business with across multiple industries: government, education, health care, financial services, manufacturing, and retail to name a few. Small, medium and large companies around the world call Novell their IT infrastructure software company.
39
Industry’s Best Partners
Slide 31: Industry's Best Partners And as I said earlier, we don't deliver this value all by ourselves. In fact, we're privileged to call some of the most respected names in the IT industry Novell partners. Microsoft: Where nearly two years ago we created a relationship that delivers interoperability on your behalf. Accenture: Where we partner with them to deliver the next-generation data center based on open source technologies. SAP: Who calls SUSE Linux Enterprise the preferred Linux distribution for running SAP applications, and just certified our Compliance Management solution for their platform. IBM: Where we've had over a 20-year relationship delivering value in many dimensions, including our established leadership in Linux on the mainframe. Dell: A leading partner for our PlateSpin Workload Management and ZENworks Endpoint Management solutions HP: Who has made SUSE Linux Enterprise into a cornerstone of its mission-critical computing story while extending Linux ubiquity through the shipment of Linux as a preload across their desktop solutions. Intel and AMD: Where we have had long standing relationships to optimize their chipsets for Novell solutions. Lenovo, joining Dell, is another world-class PC vendor who's preloading SUSE Linux Enterprise Desktop VMware: Where we have collaborated to optimize SUSE Linux Enterprise for the ESX hypervisor and are cultivating the emerging software appliance marketplace. Cisco: Our Linux platform is certified to run on the new Cisco Unified Computing System. Atos Origin: A key services and implementation partner for Identity and Security Management And finally, our newest partner, ACS, who will be deploying Novell Data Center Management and Identity and Security Management solutions throughout their seven global data centers to support thousands of outsourced IT functions for their clients.
40
Industry’s Best Partners
Solution Providers (VADs/VARs) and System Integrators Training Partners Technology Partners (ISVs/IHVs) 4,200 certified ISV applications on SUSE® Linux Enterprise Slide 32: Industry's Best Partners—Detail Joining this trusted name of global strategic partners are 5,100 other partners who provide important value both regionally and locally to you. Including 3,200 solution providers, VARs, VADs, and industry resellers, over 600 training partners, and over 1,300 technology partners, both independent software and independent hardware vendors. And speaking of technology partners, we have over 3,500 ISV applications certified on the SUSE Linux Enterprise platform, ensuring that the mission-critical applications that you need to run your business are available on the most interoperable and best- engineered Linux.
41
Novell®: Charting a Path for the Future
Making IT Work As One™ Helping customers create their next generation IT strategy with Intelligent Workload Management Delivering solutions today to reduce cost, complexity and risk on virtually any platform
42
Making IT Work As One™ Slide : Novell® Making IT Work As One™
44
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.