Novell broadens security portfolio

Powered by SC Magazine
 

Novell today announced two new acquisitions designed to extend its identity and access management capabilities.

The first acquisition is compliance and privileged user management firm Fortefi.

Novell plans to use the firm's Command Control and Compliance Auditor products to introduce the Novell Privileged User Manager in the second quarter of 2009.

The offering will provide granular access control and auditing of 'super' or 'root' users across multiple systems, as well as allowing the rapid enabling or disabling of administrator-level users across Unix and Linux systems.

Novell also announced that it has acquired a perpetual source code licence to ActivIdentity's single sign-on solution, SecureLogin.

Although the product has been available until now through an OEM agreement as Novell SecureLogin, the new deal will enable better integration of SecureLogin with Novell’s identity management solutions and faster addition of Novell customer requirements into future iterations of the product, said the firm.

“We’re excited about adding Fortefi’s privileged user management solutions to our portfolio and bringing SecureLogin technology, development, and support in-house,” said Jim Ebzery, senior vice president and general manager of identity and security at Novell.

“With these two moves, we continue our evolution to become the 'category-killer' for identity and security management.”

Copyright ©v3.co.uk


Novell broadens security portfolio
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 321

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 126

Vote