Designed to provide security and event monitoring with response and reporting capabilities, Sentinel has been fully integrated with Novell's platforms, including SUSE Linux Enterprise Server, and identity management solutions, Novell says. In addition, Sentinel from Novell is now offered in additional languages, including German, French, Spanish, Italian, and Portuguese.
Now, customers can easily streamline previously labour-intensive and error-prone processes and build a more rigorous, predictable security and compliance monitoring programme, the company says.
"All organisations are looking for help in coping with the huge amounts of information required to manage security and compliance challenges," says Armando Sacristan Medel, business solutions manager at SIA. "Sentinel provides a solid foundation that saves time, effort and money by consolidating, filtering and correlating data to create a single view of all relevant information. In our market, local language support is a clear sign of Novell's commitment to this technology."
By combining the security information and event management (SIEM) and identity and access management (IAM) functionality of two key Novell product lines, customers can now manage their compliance and security risks using a single, integrated audit infrastructure, Novell claims.
Elisabeth Conseil Colonna, business expert for security management at Telindus, explains: "Our customers are looking for an integrated solution; they do not have the time or the resources to manage and track multiple reporting mechanisms. The single, real-time dashboard provided by Sentinel from Novell gives users a composite view of all security and compliance events across their corporate network."
Acquired with e-Security in April, Sentinel from Novell is designed to integrate and monitor information and events from across an organisation's networked infrastructure, including data from identity and access management products and third-party systems and devices such as firewalls, routers, anti-virus, asset discovery/inventory, configuration management, intrusion detection systems, mainframes, network devices, vulnerability scanners, load balancers and others.
|