Novell broadens security portfolio

Powered by SC Magazine
 

Novell today announced two new acquisitions designed to extend its identity and access management capabilities.

The first acquisition is compliance and privileged user management firm Fortefi.

Novell plans to use the firm's Command Control and Compliance Auditor products to introduce the Novell Privileged User Manager in the second quarter of 2009.

The offering will provide granular access control and auditing of 'super' or 'root' users across multiple systems, as well as allowing the rapid enabling or disabling of administrator-level users across Unix and Linux systems.

Novell also announced that it has acquired a perpetual source code licence to ActivIdentity's single sign-on solution, SecureLogin.

Although the product has been available until now through an OEM agreement as Novell SecureLogin, the new deal will enable better integration of SecureLogin with Novell’s identity management solutions and faster addition of Novell customer requirements into future iterations of the product, said the firm.

“We’re excited about adding Fortefi’s privileged user management solutions to our portfolio and bringing SecureLogin technology, development, and support in-house,” said Jim Ebzery, senior vice president and general manager of identity and security at Novell.

“With these two moves, we continue our evolution to become the 'category-killer' for identity and security management.”

Copyright ©v3.co.uk


Novell broadens security portfolio
 
 
 
Top Stories
Photos: Global Switch opens Sydney East data centre
First stage opened, to some fanfare.
 
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 488

Vote