advising on IT-business alignment
IT-business alignment about us blog our services articles & reports resources your profile exposure
blog
blog
Wednesday, August 09, 2006

Novell starts down the road of Sentinel integration

Novell today announced the first update to the Sentinel the security and event monitoring and reporting solution it obtained with the $72M acquisition of e-Security in April. The company did what it had to by adding support for SUSE Linux Enterprise Server and bolstered support for non-US markets, where SUSE is strongest, with with addition of German, French, Spanish, Italian and Portuguese languages. Hardly sufficient, you would say, to justify the "major milestone" headline on the press release. And you would be right. What turns this announcement into something more significant is the fact that Sentinel is now able to collect events from Novell's suite of identity management offerings.

Whilst hardly earth shattering, this is important since it enables identity data to be correlated with other runtime events including, importantly, application logs. Too much of the discussion relating to the role of identity management in compliance focusses on ensuring that identity data and associated entitlements are managed and provisioned in accordance with policy within identity management solutions and far less on then determining whether those policies are subsequently enforced by the systems which use that data. This announcement goes some way to address that.

This announcement is important for Novell in two regards. Firstly, Sentinel includes more sophisticated event correlation and reporting capabilities than Novell Audit, the company's pre- e-Security compliance audit and reporting offering, which was largely a simple data dump for event data with customers reliant on their resident Crystal Reports wizards in order to make sense of that data. Of course this is somewhat of a double-edged sword for Novell, since existing customers will be wondering what this means for their existing investment in Novell Audit. No doubt Novell will respond with some attractive upgrade packages. Secondly, it bulks up Novell's offerings as it faces up to IBM in identity management - IBM's December acquisiton of Micromuse brought with it one of the leaders in security and event management in GuardedNet.

Novell has done a good job in the first 4 months since the acquisition and the integration adds to already comprehensive identity management portfolio. There is still some way to go though if it is to maximise the return on its $72M and integrate it with the rest of the Novell portfolio. I still have my doubts, however, whether that portfolio has the breadth and credibility for the company to position itself against the likes of IBM to address organisations' broader security and event monitoring requirements.


Burn this feed
Burn this feed!

Creative Commons License
This work is licensed under a Creative Commons License.

Blog home

Previous posts

Bastard apps
IDS-Scheer: everyone's best friend
If it looks like an application, walks like an app...
Debunking the myth of ROI from IT
Podcast: On Web 2.0 from first principles, enterpr...
Mercury - rising or falling?
Xen and the art of Microsoft virtualisation
IT-business alignment: it's the process, stupid
New podcast episode: on user-centric identity and ...
IT-business alignment - is it just fluff?

Blog archive

March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
September 2008
October 2008
November 2008
December 2008
January 2009
February 2009
March 2009
April 2009
May 2009
June 2009
July 2009

Blogroll

Andrew McAfee
Andy Updegrove
Bob Sutor
Dare Obasanjo
Dave Orchard
Digital Identity
Don Box
Fred Chong's WebBlog
Inside Architecture
Irving Wladawsky-Berger
James Governor
Jon Udell
Kim Cameron
Nicholas Carr
Planet Identity
Radovan Janecek
Sandy Kemsley
Service Architecture - SOA
Todd Biske: Outside the Box

Powered by Blogger

Weblog Commenting and Trackback by HaloScan.com

Enter your email address to subscribe to updates:

Delivered by FeedBurner