Access "Novell's Sentinel 6.0 product review"
This article is part of the March 2008 issue of Reviews of six top Web application firewalls
SIEM Sentinel 6.0 REVIEWED BY BRENT HUSTON Novell Price: Starts at $65,000 Novell, which acquired Sentinel, its entry into the SIEM market, from e-Security last year, offers a robust product that is getting better with each revision. Setup B Sentinel has many parts, and could take quite a bit of work to set up in a large environment. The setup isn't necessarily pain-ful, but there are steep system requirements, which may not be an issue for enterprises. In a large environment, Novell recommends each component be installed on a separate machine for maximum performance. Setting up collectors, which gather data from devices and convert it to the Sentinel event log format, takes some work, but it pays off in the end in the breadth of device support. For test purposes, we installed them on the same machine. Sentinel supports a variety of platforms, such as Linux, Solaris, Windows and databases, including Oracle and Microsoft SQL Server. Management/Monitoring B+ Control Center is the front end to the brains of the operation, and where most of the time will be ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Case Study: Company deploys full disk encryption policy on laptops
One billion-dollar company isn't taking chances with data stored on its laptops. It deployed full disk encryption on every machine, an increasingly popular security strategy.
-
SonicWALL NSA E5500 product review
Product review of SonicWALL NSA E5500 security tool basic and advanced firewall features, setup, pricing, VPN and wireless security.
-
Novell's Sentinel 6.0 product review
In this product review of Novell's Sentinel 6.0, an addition to the SIEM market, learn about cost, setup, OS support, configuration and management.
-
Klocwork Insight Tool Dynamically Tests Security of Applications
Klocwork Insight tool sandbox technology allows developers to test code and security of applications while remaining insulated from the rest of the code.
- Viewpoint: War analogies tread a fine line
-
Case Study: Company deploys full disk encryption policy on laptops
-
-
Security Services: TraceSecurity Risk Manager
At Your Service
-
Product review: Palo Alto Networks PA-4050
NETWORK FIREWALL
-
Imperva SecureSphere Database Gateway product review
Imperva's SecureSphere Database Gateway is evaluated for its installation and configuration, management and monitoring, vulnerability assessment and reporting capabilities.
-
Security Learning its Role in E-Discovery
Security teams are learning their crucial role in processing e-discovery requests.
-
Comparative Product Review: Six Web Application Firewalls
No longer can security managers focus only on perimeter and host security. The application has become the prime target for hackers. We review six leading Web application firewalls from Barracuda, Bee Ware, Breach Security, Citrix, F5 and Imperva that help deliver your critical apps securely.
-
Security Services: TraceSecurity Risk Manager
-
Columns
-
Face-Off: Is Security Market Consolidation a Plague or Progress
Bruce Schneier and Marcus Ranum debate the impact of market consolidation on information security.
-
Interview with Macbook Hacker Dino Dai Zovi
PING: Dino Dai Zovi
-
E-Discovery Compliance Requires Security Pros to Think As Lawyers Do
Perspectives: Think Like a Lawyer
-
Researcher Puts Quantitative Measurement on Information Security Threats
Editor's Desk: Score One for Threats
-
Face-Off: Is Security Market Consolidation a Plague or Progress
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO