Novell broadens security portfolio

Powered by SC Magazine
 

Novell today announced two new acquisitions designed to extend its identity and access management capabilities.

The first acquisition is compliance and privileged user management firm Fortefi.

Novell plans to use the firm's Command Control and Compliance Auditor products to introduce the Novell Privileged User Manager in the second quarter of 2009.

The offering will provide granular access control and auditing of 'super' or 'root' users across multiple systems, as well as allowing the rapid enabling or disabling of administrator-level users across Unix and Linux systems.

Novell also announced that it has acquired a perpetual source code licence to ActivIdentity's single sign-on solution, SecureLogin.

Although the product has been available until now through an OEM agreement as Novell SecureLogin, the new deal will enable better integration of SecureLogin with Novell’s identity management solutions and faster addition of Novell customer requirements into future iterations of the product, said the firm.

“We’re excited about adding Fortefi’s privileged user management solutions to our portfolio and bringing SecureLogin technology, development, and support in-house,” said Jim Ebzery, senior vice president and general manager of identity and security at Novell.

“With these two moves, we continue our evolution to become the 'category-killer' for identity and security management.”

Copyright ©v3.co.uk


Novell broadens security portfolio
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 718

Vote