iTnews
  • Home
  • Features
  • Technology
  • Security

Review: Novell ZENworks Endpoint Security Management

By Nathan Ouellette on Jul 12, 2011 2:14PM
Review: Novell ZENworks Endpoint Security Management

Integrates with ZENworks environments but it lacks anti-virus and DLP.

ZENworks Endpoint Security Management is a client/server endpoint solution that works off of Novell's ZENworks Control Center platform (ZCC). The ZCC platform centrally manages many of Novell's other products and the Endpoint Security solution is simply unlocked through licensing. The offering provides VPN and wireless security enforcement, client firewall, device control, file/folder encryption and other features. It can be deployed physically or virtually to Windows or Linux platforms using a number of compatible database backend systems and directory services. Endpoints can be deployed to Windows client operating systems.

Both the backend server and client components were easy to deploy. We found ourselves up and running in a short amount of time. The solution can be deployed to a number of platforms and easily integrates into a number of different heterogeneous environments. The solution is very policy-centric and provides a number of useful features to control endpoints. Managing the environment and deploying client agents and policies is intuitive, and we were impressed with its enterprise-class look and feel. It is highly customizable and can bolt into existing ZENworks environments with ease.

Although anti-virus and data leakage protection capabilities are not included, virtually every other endpoint security feature is present. Additionally, the ability to use a number of backend databases for events, data reporting and other features is impressive as well.

One feature we noted was the way the solution manages encrypted files and folders. The policy language for encryption enforcement labels these hosts as "safe harbor," which can help organizations understand which hosts can help them comply with breach reporting laws.

Lastly, the Flash-based graphical reporting engine helps to summarize the current state of the endpoints in an easy-to-understand and polished format.

A flexible, enterprise-class endpoint solution that fits well into many different types of environments.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
endpointnovellsecurityzenworks

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Nathan Ouellette
Jul 12 2011
2:14PM
0 Comments

Related Articles

  • GitLab races out vulnerability-fix release
  • Hacker claims to have stolen 1 billion records of Chinese citizens
  • Australian businesses lose $227 million to BEC-like scams
  • Poor patching creates easy zero-day vulnerability reuse
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

PayTo rollout kicks off

PayTo rollout kicks off

Australia scraps digital passenger cards for international arrivals

Australia scraps digital passenger cards for international arrivals

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

Origin Energy fined $17m over automated hardship system

Origin Energy fined $17m over automated hardship system

Digital Nation

Case Study: EY invests in AI to improve approach to flexible working
Case Study: EY invests in AI to improve approach to flexible working
Case Study: Good360 deploys NetSuite, Magento and Salesforce
Case Study: Good360 deploys NetSuite, Magento and Salesforce
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Case study: AFL kicks goals with its new digital platform
Case study: AFL kicks goals with its new digital platform
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.