Novell Home

Novell Cool Solutions

Tag Archives: risk management

Compliance and Reporting – An Identity Management Software Wish List



By:

November 10, 2010 11:45 am

Reads:257

Score:Unrated

Compliance. It’s THE driver for many organizations when considering identity management software and the reports this software is required to generate. Without accurate reporting and software that can be managed efficiently, IT professionals may find themselves under scrutiny from the agencies requesting compliance information and reports. We spoke with Ben Goodman of Novell about his …

+read more

Tags: , , ,
Categories: Expert Views, PR Blog

The Security-Compliance Divide



By:

September 16, 2010 2:13 pm

Reads:252

Score:Unrated

This week Forbes published an article by Novell CEO Ron Hovsepian discussing the need for an overarching corporate policy that addresses both security and compliance. From the article: Collaboration between the security and compliance departments can and should be felt across an organization, but two evolving areas where collaboration is most important are cloud computing …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog

Taking Pervasive Enterprise Security Up a Notch



By:

August 19, 2010 3:16 pm

Reads:155

Score:Unrated

Guest post: Jay Roxe, director of solution marketing, Identity and Security, Novell Despite some of the buzz in the blogosphere today (see links below),  Intel’s acquisition of McAfee makes sense.  I believe it’s premised on the need to provide security in the growing mobile space.  Intel has a chance to produce some differentiated technology for …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog

Top Identity Management Concerns for Today’s IT Professionals



By:

August 16, 2010 3:17 pm

Reads:412

Score:Unrated

Whether they’re working with partners, for clients or within their own enterprise, IT pros repeatedly face challenges keeping information, infrastructure and facilities safe. These challenges – or pain points – can take the form of setting up a consultant who requires read-only access to internal databases or granting employees access to the appropriate applications they …

+read more

Tags: , , , , , , , , ,
Categories: Expert Views, General, PR Blog

Intelligent Identity Infrastructure. Today.



By:

August 9, 2010 11:30 am

Reads:309

Score:Unrated

Guest Post: Ben Goodman, principal security specialist, Novell   In my last post, we discussed how Burton Group, at their Catalyst Conference, put forward a vision where user access privileges are “pulled” at the time of use to the application or service the user wants to consume. I argued that for such a paradigm to work, …

+read more

Tags: , , , , , , , , , , , , ,
Categories: Expert Views, General, PR Blog

Novell Identity and Security solutions not only work seamlessly together, they are leaders in their respective market categories



By:

July 14, 2010 10:50 am

Reads:345

Score:Unrated

guest post: Chase Jones, Solution Marketing Manager, Novell Gartner, Inc. recently released its 2010 edition of the Security Information and Event Management (SIEM) magic quadrant. This year, Gartner placed Novell Sentinel-our SIEM technology-in the leader’s quadrant. This is a significant accomplishment for two reasons: First, it reaffirms Novell’s commitment to the identity and security management …

+read more

Tags: , , , , , , , , ,
Categories: Expert Views, General, PR Blog

Serious ROI – Synovus Financial cuts IT costs by 80% with Novell Identity and Access Management solutions



By:

June 25, 2010 12:43 am

Reads:173

Score:Unrated

Synovus Financial (Synovus) uses Novell solutions to automate user management for their 6,700 employees and increase system security. The commercial and retail banking organization deployed Novell Identity Manager and Novell SecureLogin to reduce risk, lower costs and make it easier and more secure for employees to access applications. Like most businesses, secure financial management and …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog

Prevent Your Next Data Breach Using Log Management



By:

May 3, 2010 12:58 pm

Reads:218

Score:Unrated

Guest post – Ben Goodman, Principal Strategist, Identity & Security, Novell After long days and late nights, many attendees typically spend the last portion of Interop sleeping in, catching up on the crazy schedule and pace of the week’s events. Not so this year. Rather than sawing logs, a standing room-only crowd was discussing logs …

+read more

Tags: , , , , , , , , , , , ,
Categories: Expert Views, General, PR Blog

Hackers Steal Dalai Lama’s Emails



By:

April 8, 2010 2:10 pm

Reads:157

Score:Unrated

According to recent news, a sophisticated network of hackers operating out of China has launched cyber attacks against the computer systems of the office of the Dalai Lama and the United Nations, stealing Indian national security information, 1,500 e-mails from the Dalai Lama’s office and other sensitive documents. According to a new report, researchers at …

+read more

Tags: , , , , , ,
Categories: Expert Views, General, PR Blog

Novell on Aurora Breach – new threats to watch



By:

February 2, 2010 2:26 pm

Reads:132

Score:Unrated

Guest post – Brian Singer, Security Solutions Manager, Novell Security folks have been saying for some time now  that organizations need to take a long, hard look at how they think about information security. Now that intellectual property is the target of attacks, the stakes are higher. Organizations must start from the assumption that no …

+read more

Tags: , , , , , , ,
Categories: Expert Views, General, PR Blog

RSS

© 2014 Novell