The Best Defense is a Good Offense: Using Correlation to Actively Fend off Attacks
In most of today's enterprise IT departments, security teams are currently employing vulnerability management as well as intrusion detection and prevention techniques. We'll take a look at common aspects of both vulnerability management and intrusion detection systems, exploring the most common ways that these products and processes are configured.
The NetIQ team demos how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate your security across the enterprise and public cloud access, and increase executive visibility by providing your management with a comprehensive view.
To enhance the security of its IT environment, the Municipality of Siena implemented Novell Sentinel, Novell Identity Manager and Novell Access Manager. The solutions enabled the automation of IT systems monitoring and user management processes, ensuring greater levels of protection for personal data held by the Municipality.
Adam Loughran, Compliance and Security Management Principal for Novell, describes the certified and integrated technologies that Novell and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.
Following the introduction of stringent new legislation in Italy related to ensuring data privacy, Sony Italia needed the ability to maintain auditable records of all logins to systems containing personal data. Working with H4T, a Novell Partner, the company chose Novell Sentinel Log Manager as the most cost-effective and functional solution to meet the new legislative requirements.
Featuring: Jerry Shenk and Jason Arrington. According to the recently released SANS log management survey, many organizations are now able to collect logs from many new sources, including systems and applications. However, organizations still find it difficult to derive real value from their log files. In this Webcast, experts from SANS and Novell will provide some best practice scenarios that will enable organizations to easily derive more value from log data. Don't get stuck with gigabytes of nearly worthless log files, unleash the information that your log data contains to improve security and simplify your compliance efforts.
Security Information & Event Management (SIEM) and regulatory compliance have become mission critical priorities as well as arduous tasks. Novell, Wipro, and Dave Shackleford show you how partnering with an IT security service provider can help manage security complexity, and put you on a path to compliance while reducing operating costs.
Novell Sentinel Log Manager, released in August 2009, marks a new direction for Novell's Sentinel SIEM platform. In this review, SANS Analyst Jerry Shenk discusses how Sentinel Log Manager works as a standalone log management product against traditional pain points associated with log management, including collection, storage and reporting.
Join Leo Castro, Novell's Sr. Solution Manager for Compliance Management, for this brief Q&A session. Learn how SAP and Novell are teaming up to provide enterprises with integrated compliance solutions (audio only).
Watch this session to see a demonstration of the correlation and identity injection capabilities in Novell Sentinel. With these capabilities, you'll always know who is accessing what, when they're doing it and if they're authorized.
In this program leading experts from featured analyst firm, Gartner, Inc., and opinion leaders from Novell and Infosys, explore the emerging trends in SIEM and provide crucial advice on how to use SIEM to enhance your security and compliance programs.
See a demo of Novell Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.