Novell is now a part of Micro Focus
This auditing and compliance session provides tips to improve your security and compliance efforts.
A look at how logs can assist you in determining compliance and finding new attacks as well as some of the typical pitfalls of logging that can lead to failures.
The team demos how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate your security across the enterprise and public cloud access, and increase executive visibility by providing your management with a comprehensive view.
To enhance security and streamline processes, GaVI used Novell Identity Manager and Novell Sentinel to automate user account management for 22,500 + users.
To enhance the security of its IT environment, the Municipality of Siena implemented Novell Sentinel, Novell Identity Manager and Novell Access Manager. The solutions enabled the automation of IT systems monitoring and user management processes, ensuring greater levels of protection for personal data held by the Municipality.
Adam Loughran, Compliance and Security Management Principal, describes the certified and integrated technologies that we and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.
Following the introduction of stringent new legislation in Italy related to ensuring data privacy, Sony Italia needed the ability to maintain auditable records of all logins to systems containing personal data. Working with H4T, a Partner, the company chose Sentinel Log Manager as the most cost-effective and functional solution to meet the new legislative requirements.
Join Jason Arrington, as he walks through the features of Sentinel Log Manager, including new features found in version 1.1.
Brian Singer talks with Randy Hardin, Lead Systems Engineer at the University of Dayton, about how they use Sentinel Log Manager to achieve compliance and enhance their security.
Featuring: Jerry Shenk and Jason Arrington. According to the recently released SANS log management survey, many organizations are now able to collect logs from many new sources, including systems and applications. However, organizations still find it difficult to derive real value from their log files. In this Webcast, experts will provide some best practice scenarios that will enable organizations to easily derive more value from log data. Don't get stuck with gigabytes of nearly worthless log files, unleash the information that your log data contains to improve security and simplify your compliance efforts.
Brian Singer, Jason Arrington and Pascal Oetiker highlight some of the innovative capabilities in Sentinel and where it’s headed in the future.
Security Information & Event Management (SIEM) and regulatory compliance have become mission critical priorities as well as arduous tasks. Dave Shackleford show you how partnering with an IT security service provider can help manage security complexity, and put you on a path to compliance while reducing operating costs.
Demonstration on how Sentinel and Sentinel Log Manager can keep your business safe from breaches.
Sentinel Log Manager, released in August 2009, marks a new direction for Sentinel SIEM platform. In this review, SANS Analyst Jerry Shenk discusses how Sentinel Log Manager works as a standalone log management product against traditional pain points associated with log management, including collection, storage and reporting.
Join Leo Castro, Sr. Solution Manager for Compliance Management, for this brief Q&A session. Learn how SAP and us are teaming up to provide enterprises with integrated compliance solutions (audio only).
In most of today's enterprise IT departments, security teams are currently employing vulnerability management as well as intrusion detection and prevention techniques. We'll take a look at common aspects of both vulnerability management and intrusion detection systems, exploring the most common ways that these products and processes are configured.
Product Marketing Manager Brian Singer shows how easy it is to set up data collection with Sentinel Log Manager.
Jason Arrington, Product Manager for Sentinel, provides an overview of what Sentinel does and how it integrates with other Identity and Security products.
Forrester discusses collaboration market trends and our principles and strategy.
Demonstration of the desktop effects in SUSE Linux Enterprise Desktop.
Bullet-proof security with user flexibility in mind.
This demo of Vibe beta code gives you a sneak peek into features of the highly anticipated upcoming release, like a new relevancy dashboard, robust search, custom forms, video tutorials, content and user tracking capabilities, and social networking features like miniblogs, tagging, sharing and more.
Check out this demo of the most exciting new features in GroupWise 8, including Home View innovations, integration with Micro Focus® Vibe, enhanced task management capabilities, a robust new contact management interface, and new tools to make your calendar more effective than ever before.
If you're concerned about reducing downtime, preserving data integrity, and ensuring disaster recovery, tune in to this 16-minute technical overview of the fault tolerance and high-availability capabilities available through Open Enterprise Server 2 and OES Clustering Services 1.8.
In this 11-minute demo, we continue our exploration of fault tolerance and high availability with a look at the actual process for installing OES Clustering Services 1.8 and setting up Open Enterprise Server 2 Linux clusters.
In this engineer-to-engineer session, you'll explore Micro Focus iFolder 3.7 capabilities, including creating, sharing, and merging folders and resolving file conflicts. You'll also see the Web admin console and learn how to provision and manage users, create policies and balance server loads.
Learn about the security and vulnerability capabilities in Compliance Management solutions.
Part two of this troubleshooting session continues the discussion around logs, and presents a real-world troubleshooting case study.
This session provides best practices for troubleshooting Access Manager, including detail on diagnostic tools, general troubleshooting strategies and specific debugging techniques.
Attend this session to learn how to make the most of the latest WebAccess client enhancements in GroupWise and the best way to implement them in your organization.
Application Virtualization lets you convert applications that run on Microsoft Windows into self-contained virtual applications without having to modify your registry files. By applying Application Virtualization you automatically increase user productivity in your organization and create a secure desktop environment.
ZENworks Configuration Management lets you remotely manage devices from a Web-based console without having your IT administrator visit every workstation or branch office allowing your business to reduce travel costs and focus more on business objectives.
ZENworks Configuration Management provides enterprise customers the fastest return on investment by saving time and resources every step of the migration process by maintaining and managing user-based applications and system settings.
ZENworks Configuration Management lets you create bundles to automate the distribution of applications, patches and operating system upgrades ensuring devices are always up-to-date. By applying the ZENworks bundle feature you allow your organization to reduce administrative effort and lower your total cost of managing desktops.
ZENworks Configuration Management policy features offers you a unique policy-based approach to automate software updates, endpoint security and migration. Through Policy-Driven automation you will be able to optimize the value of your IT assets and control IT costs.
Jason Arrington, Product Manager, provides an overview of the product.
In this program leading experts from featured analyst firm, Gartner, Inc., and opinion leaders from us and Infosys, explore the emerging trends in SIEM and provide crucial advice on how to use SIEM to enhance your security and compliance programs.
Keith Shaw talks with Wendy Steinle about the new batch of wikis, blogs, and other collaborative software that helps companies become more productive and deliver value.
See how easy it is to implement tiered storage without affecting your end users. Gain major time and dollar savings for your storage infrastructure.
This Storage Manager demonstration illustrates how to get existing storage under control and managed by policy. It also shows how to seamlessly migrate user and group storage from a NetWare server to an Open Enterprise Server (Linux) server.
This Storage Manager demonstration illustrates how to automate the full lifecycle of user and group storage. It shows the process of provisioning and de-provisioning storage based on a user's role within the organization.
This SecureLogin demonstration illustrates how simple it is for users to begin enjoying single sign-on functionality across terminal, Web, Windows and Java-based applications. It also highlights how rapidly SecureLogin can be deployed, and showcases a deployment scenario that enables fast user switching.
With Open Enterprise Server you can virtualize NetWare or Open Enterprise Server instances to gain efficiencies in your storage and print infrastructure. See how fast you can get a XEN VM up and running.
A graphical user interface makes it easy to upgrade your NetWare servers to Open Enterprise Server running SUSE Linux Enterprise Server. The sysadmin's best friend!
Check out the coolest new feature from our engineering! You can actually stop spinning up new Active Directory servers every time you add a business app. Leverage your existing infrastructure since DsfW makes Micro Focus eDirectory look like Active Directory!
Data protection and recovery for environments.
Come and listen how you can reduce your IT costs and increase user productivity by aligning your IT organization with your business objectives.
The Access Governance Suite delivers user access certification and comprehensive roles management, allowing you to translate business processes into IT policies and entitlements that meet regulatory requirements.
The Roles Based Provisioning Module introduced RBAC features to Identity Manager. In this session, we will demonstrate how to combine this with the user access certification, role analytics and modeling of the Access Governance Suite.
The best-engineered and most interoperable Linux desktop is back–and in today's economy. Come learn about the latest applications, multimedia capabilities, and green IT enhancements of SUSE Linux Enterprise Desktop, and find out how this Linux desktop can help you lower costs in your environment.
Join experts from NTS to explore common deployment scenarios for SecureLogin. The presenters will highlight potential deployment problems and solutions for addressing them. The second session of this two-part series will cover SecureLogin deployments in “kiosk” mode.
Often called, "the Hummer of the IT industry," storage of unstructured data is a topic on everyone's minds. Speak to the team that developed Dynamic Storage Technology and hear about automated, policy-driven storage, and how you can put it to work in your environment.
Learn what developments are coming in the future for Open Enterprise Server.
If you're considering deploying Vista, or if you have to account for new Vista machines on your network, come hear from the experts that have made Open Enterprise Server Vista-ready. Common Internet Filing System (CIFS), Domain Services for Windows, and SAMBA will be discussed.
The clear trend in organizations is that more and more people are bringing their Macs to work. Can you connect them to your network reliably and securely? What about scalability and performance? Talk to the team that's developed the enhanced support for Apple Filing Protocol and hear the pros and cons of NetATalk.
With Open Enterprise Server 2 and the flexibility of Linux, a new question comes to mind: which file system will serve me best? Hear from the team that has worked with Storage Services for decades, but what they have to say may surprise you. NTFS and Posix file systems will also be discussed.
Attend this session to learn how you can leverage the power of ZENworks Endpoint Security Management and ZENworks Network Access Control across your enterprise, so your users can stay productive.
In this session, learn field-tested and proven techniques to quickly identify and resolve the most commonly encountered issues in Identity Manager, including password synchronization and more.
In this session, participants will learn how to use the new Storage Manager 2.5 features for provisioning, managing network data, and creating and managing auxiliary storage policies. They'll also see the enhanced collaborative storage features, including file grooming, migrations and data archiving.
In this session, you'll learn the best way to approach the design, configuration and deployment of ZENworks 10 Configuration Management along with implementation of best practices.
In this video clip, Kent Erickson, Senior Vice President and General Manager of Workgroup Solutions, provides a brief overview of our strategy in the collaboration space.
In this Webcast, Kent Erickson, Senior Vice President and General Manager of Workgroup Solutions, and Ken Muir, Chief Technology and Strategy Officer for Workgroup Solutions, outline our view of collaboration market trends, our strategy for addressing them, and our unique ability to deliver collaboration solutions that drive innovation and growth for our customers.
SEP sesam offers simple backup and restore in a complex world.
Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. This presentation shows how to utilize Messaging Architects products with GroupWise 8.
Disaster recovery for GroupWise, including a demonstration of Reload getting a GroupWise system back up and running at the click of a button.
A highlight of the GroupWise 8 training available from our end-user training partner BrainStorm.
Eight integrations for GroupWise 8 using Riva Integration Server
An overview of the office productivity market requirements, and how OpenOffice.org Novell Edition can address those requirements.
The Scripting Driver can help you integrate unconnected systems, replace your current home-grown provisioning system, or utilize ready-to-deploy mixed-source solutions. In this session, you'll learn how to develop a simple syslog driver and see demonstrations of mixed-source solutions.
You've probably heard quite a bit about the next release of Micro Focus Vibe, but you may be looking for technical training to help get you started. Attend this session to equip yourself with the latest tools to ensure a fast, easy and problem-free deployment. You'll learn how to install the beta version of Vibe. We will review pre-installation requirements, host and storage preparation, installation, integration with Micro Focus eDirectory and GroupWise, and configuration and customization best practices.
From low-cost, commodity hardware and consolidation opportunities to the wealth of open source software add ons, the benefits of Linux are significant. And because collaboration is an ideal platform for realizing these efficiencies, many customers are moving their back-end GroupWise systems to Linux. Join us to see how easy it can be, and get some expert advice on the best way to do so.
GroupWise 8 is the most user-focused release ever. With an emphasis on personal productivity, GroupWise 8 is full of features that help end users “get things done” wherever they are and whatever client platform they want to use. Attend this session to learn how to make the most of the latest Linux/Mac client enhancements and the best way to implement them in your organization.
Demonstration of Novell Privileged User Manager, highlighting the rule-creation tools, the reusable script and command libraries, the color-coded audit records and more.
Join experts from NTS to explore common deployment scenarios for SecureLogin. The presenters will highlight potential deployment problems and solutions for addressing them. The first session of this two-part series will cover Citrix deployments.
The Compliance Management Platform combines identity, access and security management technologies. This combination automates the process of granting users access to resources, while providing a real-time, holistic view of all network events enterprise wide.
Ron Hovsepian, CEO, welcomes customers to the IT in Action Tour and invites them to learn how we help IT professionals tackle today's most pressing IT challenges.
See a demo of Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.
Topics covered are where to start and what file systems are available, running agents as non-root, administration (ConsoleOne), and Monitor (GWHA).