Sunteți pe pagina 1din 11

4622070.

app 7/24/08 11:32 AM Page a

www.novell.com
Business White Paper
IT MANAGEMENT SOFTWARE

Securing and Managing Your


Enterprise: An Integrated
Approach
4622070.app 7/24/08 11:32 AM Page 1

Securing and Managing Your Enterprise: An Integrated Approach

Table of Contents: 2 . . . . . Simplifying Management


Across the Enterprise

2 . . . . . Choosing Integration

4 . . . . . Realizing the Potential of


Policy-driven Automation

4 . . . . . Addressing Governance,
Risk and Compliance

6 . . . . . Using Key Capabilities

9 . . . . . Planning Your Deployment:


Best Practices and
Project Milestones

10 . . . . . Growing Your Enterprise


through Integration
and Automation

p. 1
4622070.app 7/24/08 11:32 AM Page 2

Simplifying Management
Across the Enterprise

Many IT administrators Your organization has a dizzying number we provide a set of policy-driven components
see security and systems of platforms, directories, systems and appli- to automate routine security and resource
management as separate cations—all requiring your attention and management issues.† These components are
functions. Most IT administration. You know you need to man- completely integrated, working together to
departments still age this complex infrastructure correctly, address the management challenges your IT
reflect this division. or your diverse resources will cease to be department faces. It’s a solution that allows
assets, and instead become a serious drain you to spend your time and resources on
on administrative time and budget. And even what really matters—growing your business.
worse, if the management program you
deploy isn’t comprehensive, unsecured Choosing Integration
devices can expose your systems to
Many IT administrators see security and
significant security issues.
systems management as separate functions.
This is because, in the past, systems man-
So how you can you integrate and automate
agement has included tasks such as physical
fragmented management tasks while address-
device inventory tracking, device configuration
ing a full range of governance, risk and com-
and provisioning, software license monitoring,
pliance (GRC) issues? You can choose the
patch installation and upgrade deployment;
security and system management solution
whereas, security management has included
from Novell . It’s a solution that helps you
®
identity access management and the ability
secure and manage your enterprise from the
to prevent threats, intrusion and malware.
desktop to the data center—and you benefit
almost immediately as you lower costs,
Most IT departments still reflect this division.
reduce complexity and mitigate risk.
One group is concerned with system manage-
ment questions such as, “How do I deliver
In theory, the formula for achieving these
application X to device Y?” and a separate
benefits is straightforward:
group is concerned with security management
Integration + Policy-driven Automation = questions like, “Which users of device Y
Simplicity should be granted access to application X?”

In reality, such a formula can be difficult to This two-group approach doesn’t reflect
deploy—and this is where Novell can help. the dependencies that exist between security
_______________________________ We implement the formula through a com- and systems management. The following
† These components are listed mon, enterprise policy store that ensures diagram shows the intricacy of these
at the end of this paper. uniform execution and consistency. Then, dependencies:

p. 2
4622070.app 7/24/08 11:32 AM Page 3

Securing and Managing Your Enterprise: An Integrated Approach www.novell.com

In an integrated system,
the upgrade would be
deployed automatically in
response to the security
warning, keeping both
teams productive and
protecting the system
at the same time.

Figure 1. Historically, system management and security have been viewed as separate functions, but as this
diagram shows, there are numerous dependencies—a strong argument for the superiority of an integrated approach.

Failing to address these dependencies can because they are unaware of the potential
lead to situations where both the security breach. In an integrated system, the upgrade
and systems management teams are doing would be deployed automatically in response
their jobs, but many problems are not to the security warning, keeping both teams
addressed because the groups don’t work productive and protecting the system at the
together effectively. For example, an intrusion same time.
detection tool operated by the security man-
agement group notes anomalous activity at a Another example of the efficiency of an
user endpoint, indicating a potential security integrated system is a security monitoring
breach. The security team is completely system detecting a user, without clearance,
unaware, however, that the systems manage- attempting to access sensitive data. In this
ment group already has an upgrade available case, business policy would be automatically
to prevent the breach. The systems manage- enforced to modify the user’s access pending
ment group, in turn, has the upgrade, but is an internal review.
delaying its deployment in favor of other tasks

p. 3
4622070.app 7/24/08 11:32 AM Page 4

Addressing Governance,
Identity and system management from Risk and Compliance
Novell provides a comprehensive solution Identity and system management from
for addressing governance, risk and Novell provides a comprehensive solution
for addressing governance, risk and
compliance (GRC). compliance (GRC):

Identity-driven Security Realizing the Potential of It puts governance in the hands of


and Resource Manage- Policy-driven Automation the people who know what their
ment reduces the burden employees need. You will no longer
The absence of integrated security and
on your IT staff, helping have IT departments creating business
systems management programs is not
them stay focused on policies for your users based on software
the only challenge your enterprise faces.
building your enterprise. parameters instead of company objectives.
Your IT department may be spending valu-
It mitigates risk. With automated
able resources manually performing tedious,
workflows in place, steps aren’t forgotten
time-consuming processes that could be
and resources are secure and accessible.
automated easily with an identity-based
Disgruntled employees won’t be able to
security and system management solution.
cause system damage because access
was terminated in one database but
Transferring a user to a new group is a typi-
missed in another.
cal example. Often, when users are moved
It transforms corporate and regulatory
to new assignments, they must be granted
compliance. Automated policies and
new access rights, have their previous rights
reports can change compliance from an
removed and be provided with a new seat
overwhelming, seemingly impossible job,
license. Since security management must
into a set of processes that are simple
remove previous rights and systems man-
to implement and track.
agement must provide a new license, setting
up new group members involves an e-mail
Governance
exchange between the group leader and two
separate IT departments. But that’s just the With the right governance system in place,
minimum—transferring users might also you can simplify IT management and reduce
require higher-level approvals, either for the overall costs.
access rights or the license. And an admin-
istrator might have to manually change the Simplify IT Administrative and
access list and activate the seat license, Maintenance Burdens
which adds more time to the process (in Identity-driven Security and Resource
addition to any delays experienced if an Management reduces the burden on your
approving manager is too busy to reply IT staff, helping them stay focused on
or is out of the office). building your enterprise. By making access
rights dependent on your business policies,
The costly manual elements of this process governance is no longer restricted by soft-
can be eliminated by integrating security and ware capabilities. Business units can make
systems management. When an employee decisions about which individuals have access
changes departments, the new manager to which resources, allowing IT to function
simply submits a request via the company as it should—in the role of implementer.
portal, a workflow sequence is initiated and
the employee can become productive Since rights can be assigned based on policy
almost immediately. with Identity-driven Security and Resource

p. 4
4622070.app 7/24/08 11:32 AM Page 5

Securing and Managing Your Enterprise: An Integrated Approach www.novell.com

Management, the rights-distribution process words), helpdesk calls associated with Eliminating manual
can be automated (with the option for semi- password resets can be reduced anywhere tasks translates directly
automated or manual workflows). This elimi- from 30 to 90 percent. into cost savings for IT
nates an enormous amount of tedious and organizations by reducing
error-prone manual labor. And when security Risk the number of hours
management and systems management required to equip users
Today’s organizations don’t want to assume
are integrated, workflows can provide the with the correct machines
unnecessary risk. That’s why many of them
appropriate machine images and capabilities and the appropriate
are turning to Identity-driven Security and
to users’ desktops, laptops or mobile access rights.
Resource Management.
devices. An integrated system also provides
their access rights, which eliminates even
Improve Risk Management
more work. The end result is enhanced
Security is a huge component of risk
IT efficiency and a better experience for management for IT organizations, with
your end users. sensitive data protection and disruptive
exploit prevention topping the list of chal-
To further simplify administrative processes lenges. But Identity-driven Security and
and reduce the governance burden, an Resource Management ensures a fully
inheritance feature is available to automati- coordinated response to all types of
cally grant a specific set of resources and security-related exploits.
rights to all the employees in a particular
supervisor’s work group or business unit. To protect sensitive data, Identity-driven
Security and Resource Management auto-
Reduce Costs matically ensures that access to sensitive data,
Eliminating manual tasks translates directly applications and other computing resources
into cost savings for IT organizations by is granted only to authorized individuals.
reducing the number of hours required to
equip users with the correct machines and It can also help you improve risk manage-
the appropriate access rights. ment through integrated security and event
monitoring. It aggregates and correlates
Improved visibility into asset usage, specifi- the masses of security-related data that are
cally the usage of software licenses, can also continuously generated by network devices,
save your business money. Armed with reports displays an integrated real-time view of
that integrate licensing, installation and usage network status and triggers automated
data in one place—and with detailed infor- responses by other system components
mation about desktops, servers and other such as deprovisioning an account or
network assets enterprisewide—IT managers upgrading software.
can precisely tailor licenses to real needs,
avoiding unnecessary fees for software Finally, Identity-based system management
that isn’t used. eliminates security loopholes. It can retire
unused software and hardware resources,
Costs associated with password management and protect your system’s many endpoints.
can also be reduced via Identity-driven Endpoint security management protects
Security and Resource Management. data through whole-disk encryption for lap-
Through a combination of single sign-on tops and prevents users from transferring
(which reduces the likelihood that users sensitive data to USB or Bluetooth-based
will forget their password) and self service memory devices.
(which allows users to reset their own pass-

p. 5
4622070.app 7/24/08 11:32 AM Page 6

Identity-based security Compliance Automate Data Center Management


and system management System management can help you look
When it comes to security, you can’t just
provides an integrated, forward to increased virtual machine use
assert that your systems are safe, you have
automated, secure and a compelling “do-more-with-less”
to be able to prove it. And that’s why you
solution for the day-to- scenario. When data center management
need Identity-based Security and Resource
day administration and is automated, it is possible to reconfigure
Management.
management of your IT physical and virtual machines to meet
resources. It provides demand. For example, servers can be
Enhance Regulatory Compliance
reliability, flexibility and reconfigured to handle the requirements
Regulatory compliance, as it relates to
scalability for your IT of a financial system at the end of the
security, has two components:
department, business month, or to handle higher-than-average
units and individual Web traffic during a sales promotion.
users enterprisewide. Implementing security policies and
procedures such as access control, Ensure Consistency Across
integrated security/event monitoring and Systems and Processes
endpoint security management. You can achieve consistency across
Providing documented proof that the processes–one of the central principles of
organization is complying with its stated the Information Technology Infrastructure
policies and procedures Library (ITIL). ITIL is a collection of best
practices for IT management in 11 functional
When access requests and other security areas: helpdesks, incidents, problems,
matters are handled via e-mail, not only can change, configuration, releases, availability,
providing proof of compliance be difficult, capacity, finance, service level agreements
but simply documenting the process can (SLAs) and continuity. And because Identity-
seem mpossible. In contrast, when you driven Security and Resource Management
automate security-related procedures with adheres to the ITIL standards, you can be
a centralized, policy-driven engine, you can sure you will get optimum performance
easily track employees and resources, ensure from your IT resources.
consistent enforcement of laws and regula-
tions (such as HIPAA and SOX) and provide Identity-based security and system manage-
full documentation as part of the process. ment provides an integrated, automated,
secure solution for the day-to-day adminis-
Additional Benefits tration and management of your IT resources.
There are many other reasons to deploy It provides reliability, flexibility and scalability
for your IT department, business units and
identity-based security and system
individual users enterprisewide. Implementing
management.
the Identity-driven Security and Resource
Management solution doesn’t require a
Increase User Productivity
“big-bang” initiative–it can be achieved in
Manual provisioning and lack of integration
small, manageable steps. The following
can create downtime for users, which depletes
section outlines the key capabilities required
your organization’s profit margins. Your
for success in the various functional areas.
enterprise needs to ensure that users have
fast, uninterrupted access to the data and
functions they need. Both the automated
Using Key Capabilities
provisioning and single sign-on (SSO) We recognize organizations may already
features enhance user productivity. have some of these capabilities in place;

p. 6
4622070.app 7/24/08 11:32 AM Page 7

Securing and Managing Your Enterprise: An Integrated Approach www.novell.com

however, we have built our own offerings


based on open standards, including con-
Visibility into assets, and particularly into
nectivity with Web services functionality. licensed applications, can enable you to
This approach enables Novell products to
integrate with pre-existing tools and legacy
make better decisions regarding licensing
systems. But regardless of the systems you needs and can result in significant
are currently running, the capabilities listed
below are central to your success.
cost reductions.
Discover Provision The authoritative source
approach mandates that
Discovery/Asset Management Centralized Policy Engine
data can only be changed
An IT team cannot manage a device if it A centralized engine ensures consistency
by a single, designated
doesn’t know the device exists. Visibility across your enterprise and reduces your
source. This ensures
into assets, and particularly into licensed IT department’s administrative burden.
that line-of-business and
applications, can enable you to make better Key capabilities in the Centralized Policy
data owners are certain
decisions regarding licensing needs and can Engine category include:
their data is accurate.
result in significant cost reductions. The first
step for improving security and resource Association of access rights with user
management is discovering which systems roles as defined by business units
within your network need to be secured and Dynamic assignment and automatic
managed. Key capabilities in the Discovery/ modification of access rights based on
Asset Management category include: changes in user roles
Automatic, manual or mixed assignment
Automatic network device recognition of roles and rights
and discovery Reports organized by roles, by rights
Routine application discovery associated with specific roles, and by
Application suite recognition users associated with specific roles
Continuous machine image and application
version visibility Integrated Identity Store
Software reconciliation licensing and The authoritative-source approach Novell
purchasing data importation assumes when multiple data sources are
involved helps resolve political disputes over
Manage data ownership. Most systems take a last-
Configuration Management commit approach that allows critical data to
In an optimized system, device application be controlled by whatever source last wrote
delivery is integrated with user access rights to the database. In contrast, the authoritative
provisioning. Key capabilities in the Configur- source approach mandates that data can
ation Management category include: only be changed by a single, designated
source. This ensures that line-of-business
Change control for remote management and data owners are certain their data is
and application update deployment accurate. Key capabilities in the Integrated
Patch control for remote security patch Identity Store category include:
management
Integration with security monitoring system Connectivity with multiple data stores to
to enable automated responses to exploits build “one view” of the user

p. 7
4622070.app 7/24/08 11:32 AM Page 8

Compliance auditing Authoritative-source approach to resolving Integrated management console for


is becoming a part of conflicting data administration of identity and access
everyday IT adminis- Bi-directional connection with systems management administration
tration. You need to (so business processes can be integrated,
ensure you have the and IT departments can have flexibility in Access
functions required to meet designating authoritative data sources)
Access Management
regulators’ demands and Real-time detection and response to
Sophisticated access management is crucial
facilitate compliance. enable a proactive (preventive) approach
for reducing security risk and achieving
to security issues
regulatory compliance. Key capabilities in
Policy violation detection involving the
the Access Management category include:
inappropriate use of two or more connected
systems by one individual
Web- and client-based single sign-on
Total enforcement of business policy,
Endpoint device authentication that includes
even on super administrators and other
desktops, laptops and mobile devices
trusted users
Support for federation to internal and
external partners
Password Management
Adherence to industry/open standards
To deploy a single sign-on system, your
Protection of private user information
company needs enterprisewide password
Secure processes for transmitting changes
management. Key capabilities in the
in access rights over the Internet
Password Management category include:
User access events and changes in
access rights reporting
Availability of user self service through
the Web without logging into the network
Secure
Ability to implement password policies
on an enterprisewide basis Security Management
Password synchronization on an enterprise- The security data you need is available,
wide basis (including legacy systems) but for you, the challenge is evaluating that
Single sign-on using advanced authenti- data and effectively responding to the threats
cation options, such as biometrics, it presents. Key capabilities in the Security
smart cards and tokens Management category include:

Workflow Data aggregation from multiple, disparate


Efficient, user-friendly workflow that auto- sources
mates processes as much as possible (while Data correlation based on time, location,
allowing human intervention) can significantly user, group and process—or more
increase productivity and reduce your IT complex needs
department’s administrative burden. Key Pre-designed and custom reporting
capabilities in the Workflow category include: Event-based design
Automated response to security exploits
User-friendly design tools for creating and
managing workflow requests Compliance, Dashboard, Reports
Detailed, automated documentation tool and Auditing
Dynamic routing of workflow and approvals Compliance auditing is becoming a part of
to the right role/person based on defined everyday IT administration. You need to ensure
organizational information you have the functions required to meet reg-
Ability to delegate approval authority ulators’ demands and facilitate compliance.
Automatic escalation of requests to an Key capabilities in the Compliance, Dashboard,
alternative approver if time elapses Reports and Auditing category include:

p. 8
4622070.app 7/24/08 11:32 AM Page 9

Securing and Managing Your Enterprise: An Integrated Approach www.novell.com

Active dashboards that show compliance Align IT to Business When you automate
and risk status the provisioning of
❑ Adopt a process model to govern the
Focus on policy violations and anomalies, data center resources,
project, such as ITIL or Cobit.
not all data you can better meet
❑ Obtain executive sponsorship.
Reports for both business and IT the constantly changing
❑ Involve IT executives in business
managers needs of your business.
discussions.
Integration of siloed data to enable
understanding of true system status
Evaluation and Design
Endpoint Security Management ❑ Determine if pre-existing conditions need to
You can now protect your systems’ most be addressed before the project launches.
vulnerable areas—the endpoints. Endpoint ❑ Develop a solution roadmap of what the
security management provides integrated enterprise will look like after the project
security at the endpoint for USB, wireless, is completed.
data and application control. Key capabilities ❑ Include line-of-business units (such as
in the Endpoint Security Management cate- HR or accounting) that own applications
gory include: in the request for proposal (RFP) creation.
❑ Define the business processes to be
Ability to prevent unauthorized USB devices automated.
Data encryption on endpoints to protect ❑ Map your existing enterprise data model.
against theft
Location awareness for wireless security Proof of Concept
Policy-based management for security ❑ Focus on access to legacy or siloed
policies applications.
❑ Identify vendor customization requirements.
Orchestrate ❑ Consider paying for a more detailed proof
Data Center Automation of concept (POC) proposal—with the price
When you automate the provisioning of data credited toward the final purchase.
center resources, you can better meet the ❑ Define success factors based on business
constantly changing needs of your business. requirements, not technical minutiae.
Key capabilities in the Data Center Automation
category include: Production Preparation, Pilot and
Rollout
Ability to adapt to workload requirements, ❑ Set realistic organizational timeline
hardware health and business policies expectations.
Integrated management of physical and ❑ Make sure the solution you choose can
virtual machines support roll-back.
❑ Create a centralized identity vault.
Planning Your Deployment: Best ❑ Find project champions within user groups
Practices and Project Milestones and train them first.
To simplify deployment, your IT department
Installation Sequence
needs definitive goals. With the following
best practices and suggested milestones, ❑ Install software.
you can begin to implement Identity-driven ❑ Set up connected systems.
Security and Resource Management and ❑ Activate the software.
transform your vision of an integrated, effi- ❑ Configure password management.
cient enterprise into a reality. ❑ Configure entitlements.

p. 9
4622070.app 7/24/08 11:32 AM Page 10

www.novell.com

❑ Configure audit and reporting. return on investment (ROI) and to build


❑ Configure workflow and user applications internal support for the project.
based on business policies. ❑ Focus on the total cost of the project Contact your local Novell
over time, not just the cost of software Solutions Provider, or call
Novell at:
Documentation or support.
❑ Ensure documentation addresses audit 1 800 714 3400 U.S./Canada
and compliance needs. Growing Your Enterprise 1 801 861 1349 Worldwide

❑ Automate documentation production. through Integration and 1 801 861 8473 Facsimile
Automation
Novell, Inc.
Additional Comments Governance, risk and compliance are major 404 Wyman Street
challenges for today’s IT organizations. The Waltham, MA 02451 USA
❑ Identity and access management projects
will succeed if taken in stages. Novell approach to this challenge, Identity-
❑ Not all technologies may be initially driven Security and Resource Management,
required; most are ultimately used, provides an integrated, automated, policy-
with very little shelfware. driven solution. In addition to specifically
❑ Avoid solutions that disrupt existing addressing GRC issues, the Novell solution
systems during deployment. can reduce costs, support business goals,
❑ Align early-stage deliverables with primary enhance user productivity and promote
business drivers to achieve quick-win consistency across your entire enterprise.

Identity-driven Security and Resource Management Components


Novell ZENworks Asset Management
® Provides discovery for all enterprise resources, with reports that integrate licensing,
installation and usage data

Novell ZENworks Configuration Management Provides policy-driven automation for software setup, updates, healing and migration

Novell Identity Manager Translates business policies into IT controls and compliance mandates across all
connected systems

Novell Access Manager™ Secures corporate Web resources while providing for a consistent policy-based
authentication and access experience

Novell Sentinel™ Integrates identity-managed systems with other IT resources to ensure business policy
is followed

Novell ZENworks Orchestrator Automates provisioning of physical and virtual data center resources to meet changing
needs

Learn more about how Novell can help you secure and manage your enterprise at:
www.novell.com/innovationline

462-002070-002 | 07/08 | © 2008 Novell, Inc. All rights reserved. Novell, the Novell logo, the N logo and ZENworks are registered
trademarks, and Novell Access Manager and Sentinel are trademarks of Novell, Inc. in the United States and other countries.

*All third-party trademarks are the property of their respective owners.

S-ar putea să vă placă și