Novell® Sentinel? 6 provides a real-time, comprehensive view of how your IT environment becomes secure and audit-compliant. Sentinel replaces the labor-intensive manual collection, response, and reporting processes of security and compliance. Thus, it helps you manage risks more effectively, reduce costs and use your existing resources more effectively.
Automated Security and Compliance Management
Within Enterprise Management, having a distributed and heterogeneous IT security environment is a long process. In addition to servers, databases, applications, firewalls, routers, switches, identity and access management systems, and attack detection/prevention systems, many other systems are constantly generating data. Correct correlation and analysis of this data allows you to clearly see the security and standards compliance process of your institution.
Sentinel by Novell automates these labor-intensive manual processes and ensures their continuous monitoring. Sentinel helps you identify security events in real time and respond quickly to those events. It gathers and analyzes security and standards compliance information from all sources in your environment.
Automatic incident response management enables you to record, document and formalize the process of monitoring, measuring and responding to incidents and rule violations. Sentinel allows you to take timely action on problems, respond to them, fix the problem, and prove to auditors that your IT controls are done properly.
With Sentinel by Novell you get:
From chaos to order
What should you do if your firewall reports an urgent problem while your IDS remains unusually silent? Which is true? How can you intervene? If you have hundreds or thousands of devices and systems that receive security-related information 24 hours a day, 7/365 days, correlation is the right solution. Sentinel's advanced correlation engine - false positives - helps you reduce false results and focus your resources on problems that really cause problems. Centralized event source configuration and management allows you to manage all your connected devices directly from the Sentinel console to speed up operations and ensure you get a complete view of everything you need to monitor. Offline query and analysis functions offer advanced technical capabilities without affecting your need to constantly get a real-time view of your environment.
Sentinel is compatible with Windows*, UNIX*, Solaris* and Linux* platforms. Can be connected to any device connecting via SNMP, ODBC and other standard protocols.
Full Safety Metrics and Standards Compliance Reports
Sentinel reports provide a complete solution for viewing the company security environment, documenting regulatory compliance and effectively managing operational risk.
Sentinel reports:
Sentinel reports allow you to monitor and report on all security-related events (including user activity, exceptions, and policy violations) on assets affected by Sarbanes-Oxley, HIPAA, FISMA, PCI, and other standards and regulations.
Sentinel reports consist of a comprehensive set of ready-to-use reports and dashboards. You can easily adapt them to meet your company's specific needs, or create your own reports using industry-standard report generators.
Why Novell?
Novell is the FIRST SOFTWARE supplier that provides a single point of access to your organization's security and audit compliance process. While other providers in the market focus on platform or device-centric network intelligence, Novell emphasizes the importance of integration. The result is a cross-platform system that combines identity and access management with security information and event management. This solution helps your company reduce costs, minimize risk and maximize efficiency, while maintaining security and regulatory compliance.
In terms of Novell collectors Sentinel
Aggregators, syslog, ODBC, JDBC, IPsec SSL, SNMP, It collects information from source devices using many connection methods, including HTTP, HTTPS, and more. Thanks to Sentinel's flexible technology, including proprietary and customized devices, systems, and applications. aggregators for virtually all data sources you can develop. Sentinel's Examples of devices, systems, and applications from which it can collect events and information:
Novell Aplication Novell Access Manager Novell eDirectory?Novell Identity ManagerNetWare® Novell SecureLoginNovell ZENworks®
Antivirus CA eTrust
Enterprise Applications McAfee ePolicy Orchestrator Oracle FinancialsSAP Symantec AntiVirus Corporate EditionTrend Micro InterScan VirusWall
FirewallsCheck Point Firewall-1, Provider-1 Cisco PIXJuniper NetScreen Firewall Microsoft ISA Firewall Secure Computing Gauntlet/Sidewinder Symantec Gateway Security Firewall
Network-based Intrusion Detection Cisco Secure IDS Enterasys DragonGNU SnortIntrusion.com SecureNetISS RealSecure ServerISS RealSecure SiteProtectorJuniper NetScreen IDPMcAfee IntruShieldNFR Sentivist Sourcefire Defense Center Symantec Network Security TippingPoint Security Management System
Mainframe/Mid-size CA ACF2HP NonStop/Tandem Himalaya IBM iSeries and AS/400 IBM z/OS RACFIBM z/OS Top SecretVAX VMS
Operating systemsIBM AIXHP-UXMicrosoft Windows NT, 2000, 2003, XP Microsoft MOMRedHat Enterprise LinuxSun SolarisSun Trusted SolarisSUSE® Linux
Relational Databases IBM DB2Microsoft SQL Server 2000/2005Oracle 8i/9i/10g
Vulnerability Scanners - Weakness Scanners eEye RetinaGnu Nessus ScannerISS Internet ScannerMcAfee Foundstone EnterprisenCircle IP360 Qualys QualysGuard
VPN Checkpoint VPNCisco VPN 3000/3030Juniper Netscreen VPN-1Nortel Contivity VPN
Web and Application ServersApache HTTP ServerIBM WebSphere Microsoft IIS SunOne/iPlanet