Optimize Identity Management with Roles-Based Provisioning
The Roles Based Provisioning Module introduced RBAC features to Identity Manager. In this session, we will demonstrate how to combine this with the user access certification, role analytics and modeling of the Access Governance Suite.
The risks and challenges of computing across multiple environments have never been greater. Users are demanding personalized access to their information and resources from any device at any time. And now that the business owners have unprecedented flexibility, IT cannot ignore the need to keep access secure, compliant and portable. Join Rick Killpack from NetIQ as he reviews the challenges that organizations face delivering the "right access" to their employees, partners, and customers, as well as an approach that doesn't bloat IT's budgets.
Referent Alfred Koch (KPMG AG), informiert Sie über aktuelle und künftige Herausforderungen im Risikomanagement. Erfahren Sie, welche neuen Anforderungen sich aus der Novellierung der MaRisk ergeben, und was dies konkret für das Berechtigungsmanagement bedeutet.
Adam Loughran, Compliance and Security Management Principal for Novell, describes the certified and integrated technologies that Novell and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.
Organizations need to simplify the process of certifying to auditors that employees have appropriate access, but using spreadsheets to certify access can be both inefficient and time consuming. What is needed is an automated, repeatable, auditable and accurate end-to-end solution for access certification. Research has shown that organizations using an automated approach to access certification can reduce the time required to review employee access by up to 50 percent.
Join Ross Chevalier, Americas CTO, Novell and Amit Saha, Enterprise Security & Risk Management Practice Lead, Infosys as they discuss how Novell Access Governance Suite extends the value of customers' investment in identity management systems. Lean how Novell Access Governance Suite can work with your identity management system to "clean up" user access rights and roles throughout your enterprise, how Novell Access Governance Suite works with business roles for user access, either helping you create a role-based access system, or leveraging the business roles you already have in place, and how Novell Access Governance Suite leverages my organization's Novell identity management and user provisioning solutions. Part 3 of 3.
Join Ross Chevalier, Novell Americas CTO, as he discusses how to build the business case for implementing Novell Access Governance Suite. Learn what direct costs of compliance can be saved by implementing access governance processes, what business risks and costs can be avoided by using access governance, and how organizations actually improve their financial performance by leveraging access governance best practices. Part 2 of 3.
Join Ross Chevalier, Novell Americas CTO, as he discusses how to achieve sustainable compliance by Managing User Access with the Novell Access Governance Suite. Learn Access Governance fundamentals and importance, how Access Governance Complements Identity Management, effective methodologies for sustainably governing access and how Novell's Access Governance Suite solves your access governance problems. Part 1 of 3.
This demo of Novell Teaming beta code gives you a sneak peek into features of the highly anticipated upcoming release, like a new relevancy dashboard, robust search, custom forms, video tutorials, content and user tracking capabilities, and social networking features like miniblogs, tagging, sharing and more.
Check out this demo of the most exciting new features in GroupWise 8, including Home View innovations, integration with Novell Teaming, enhanced task management capabilities, a robust new contact management interface, and new tools to make your calendar more effective than ever before.
If you're concerned about reducing downtime, preserving data integrity, and ensuring disaster recovery, tune in to this 16-minute technical overview of the fault tolerance and high-availability capabilities available through Novell Open Enterprise Server 2 and Novell Cluster Services 1.8.
In this 11-minute demo, we continue our exploration of fault tolerance and high availability with a look at the actual process for installing Novell Cluster Services 1.8 and setting up Novell Open Enterprise Server 2 Linux clusters.
In this engineer-to-engineer session, you'll explore Novell iFolder 3.7 capabilities, including creating, sharing, and merging folders and resolving file conflicts. You'll also see the Web admin console and learn how to provision and manage users, create policies and balance server loads.
Watch this session to see a demonstration of the correlation and identity injection capabilities in Novell Sentinel. With these capabilities, you'll always know who is accessing what, when they're doing it and if they're authorized.
ZENworks Application Virtualization lets you convert applications that run on Microsoft Windows into self-contained virtual applications without having to modify your registry files. By applying ZENworks Application Virtualization you automatically increase user productivity in your organization and create a secure desktop environment.
ZENworks Configuration Management lets you remotely manage devices from a Web-based console without having your IT administrator visit every workstation or branch office allowing your business to reduce travel costs and focus more on business objectives.
ZENworks Configuration Management provides enterprise customers the fastest return on investment by saving time and resources every step of the migration process by maintaining and managing user-based applications and system settings.
ZENworks Configuration Management lets you create bundles to automate the distribution of applications, patches and operating system upgrades ensuring devices are always up-to-date. By applying the ZENworks bundle feature you allow your organization to reduce administrative effort and lower your total cost of managing desktops.
ZENworks Configuration Management policy features offers you a unique policy-based approach to automate software updates, endpoint security and migration. Through Policy-Driven automation you will be able to optimize the value of your IT assets and control IT costs.
Learn from Novell CFO Dana Russell how Access Certification is critical for your business. Discover how Novell technology can help you plan and review user access to key resources and provide an independent means to certify appropriate levels of user access.
This Novell Storage Manager demonstration illustrates how to get existing storage under control and managed by policy. It also shows how to seamlessly migrate user and group storage from a NetWare server to an Open Enterprise Server (Linux) server.
This Novell Storage Manager demonstration illustrates how to automate the full lifecycle of user and group storage. It shows the process of provisioning and de-provisioning storage based on a user's role within the organization.
This Novell SecureLogin demonstration illustrates how simple it is for users to begin enjoying single sign-on functionality across terminal, Web, Windows and Java-based applications. It also highlights how rapidly Novell SecureLogin can be deployed, and showcases a deployment scenario that enables fast user switching.
With Open Enterprise Server you can virtualize NetWare or Open Enterprise Server instances to gain efficiencies in your storage and print infrastructure. See how fast you can get a XEN VM up and running.
Check out the coolest new feature from Novell engineering! You can actually stop spinning up new Active Directory servers every time you add a business app. Leverage your existing infrastructure since DsfW makes eDirectory look like Active Directory!
The Access Governance Suite delivers user access certification and comprehensive roles management, allowing you to translate business processes into IT policies and entitlements that meet regulatory requirements.
The best-engineered and most interoperable Linux desktop is back–and in today's economy. Come learn about the latest applications, multimedia capabilities, and green IT enhancements of SUSE Linux Enterprise Desktop, and find out how this Linux desktop can help you lower costs in your environment.
Join experts from NTS to explore common deployment scenarios for SecureLogin. The presenters will highlight potential deployment problems and solutions for addressing them. The second session of this two-part series will cover SecureLogin deployments in “kiosk” mode.
Often called, "the Hummer of the IT industry," storage of unstructured data is a topic on everyone's minds. Speak to the team that developed Dynamic Storage Technology and hear about automated, policy-driven storage, and how you can put it to work in your environment.
If you're considering deploying Vista, or if you have to account for new Vista machines on your network, come hear from the experts that have made Open Enterprise Server Vista-ready. Common Internet Filing System (CIFS), Domain Services for Windows, and SAMBA will be discussed.
The clear trend in organizations is that more and more people are bringing their Macs to work. Can you connect them to your network reliably and securely? What about scalability and performance? Talk to the team that's developed the enhanced support for Apple Filing Protocol and hear the pros and cons of NetATalk.
With Open Enterprise Server 2 and the flexibility of Linux, a new question comes to mind: which file system will serve me best? Hear from the team that has worked with Novell Storage Services for decades, but what they have to say may surprise you. NTFS and Posix file systems will also be discussed.
In this session, participants will learn how to use the new Storage Manager 2.5 features for provisioning, managing network data, and creating and managing auxiliary storage policies. They'll also see the enhanced collaborative storage features, including file grooming, migrations and data archiving.
In this Webcast, Kent Erickson, Senior Vice President and General Manager of Novell Workgroup Solutions, and Ken Muir, Chief Technology and Strategy Officer for Novell Workgroup Solutions, outline Novell's view of collaboration market trends, our strategy for addressing them, and our unique ability to deliver collaboration solutions that drive innovation and growth for our customers.
Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. This presentation shows how to utilize Messaging Architects products with GroupWise 8.
The Scripting Driver can help you integrate unconnected systems, replace your current home-grown provisioning system, or utilize ready-to-deploy mixed-source solutions. In this session, you'll learn how to develop a simple syslog driver and see demonstrations of mixed-source solutions.
You've probably heard quite a bit about the next release of Teaming, but you may be looking for technical training to help get you started. Attend this session to equip yourself with the latest tools to ensure a fast, easy and problem-free deployment. You'll learn how to install the beta version of Novell Teaming. We will review pre-installation requirements, host and storage preparation, installation, integration with eDirectory and GroupWise, and configuration and customization best practices.
From low-cost, commodity hardware and consolidation opportunities to the wealth of open source software add ons, the benefits of Linux are significant. And because collaboration is an ideal platform for realizing these efficiencies, many customers are moving their back-end GroupWise systems to Linux. Join us to see how easy it can be, and get some expert advice on the best way to do so.
GroupWise 8 is the most user-focused release ever. With an emphasis on personal productivity, GroupWise 8 is full of features that help end users “get things done” wherever they are and whatever client platform they want to use. Attend this session to learn how to make the most of the latest Linux/Mac client enhancements and the best way to implement them in your organization.
Join experts from NTS to explore common deployment scenarios for SecureLogin. The presenters will highlight potential deployment problems and solutions for addressing them. The first session of this two-part series will cover Citrix deployments.
The Compliance Management Platform combines identity, access and security management technologies. This combination automates the process of granting users access to resources, while providing a real-time, holistic view of all network events enterprise wide.
See a demo of Novell Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.