Access "Identity and Access Management product reviews: Readers Choice Awards"
This article is part of the April 2007 issue of Security Products Readers' Choice Awards 2007
GOLD | Novell Identity Manager Novell Price: Server, $75,000; Per user, $25 Novell says it has invested plenty to simplify the usability of its Novell Identity Manager product. Readers responded with a bevy of high ratings to earn Novell the gold medal. Novell Identity Manager earned high marks for scalability, return on investment, integration and compatibility, extensibility and breadth of platforms, applications and domains supported, and vendor service and support. "We spoke with end users and managers and we'd hear people ask, 'How much consulting will I need to get it up and running?'" says Ivan Hurtt, product and marketing manager for security and identity products at Novell. "We had a lot of people who liked the product but were afraid to use it. If people don't know how to use the technology, all that power gets wasted." Novell Identity Manager offers graphically based tools that let users drag-and-drop and create "what-if" scenarios. "You can test it for a shorter period of time with a higher level of certainty, and then roll it out more ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Vulnerability Management: QualysGuard Enterprise (2007)
2007 Readers' Choice Awards Vulnerability assessment, management
-
Intrusion Detection/Prevention
2007 Readers' Choice Awards Network intrusion detection/prevention appliances and software
-
Prospective Buyers Want Answers
SANS WhatWorks The SANS Institute's WhatWorks program identifies three critical areas of concern for security managers.
-
Database security, software appliances review: Readers Choice Awards
In this Readers Choice Award product review of database security products and software appliances, learn about pricing and ratings on Symantec, AppDetective and Imperva SecureSphere products and appliances.
-
Identity and Access Management product reviews: Readers Choice Awards
In this Reader's Choice Award product review of identity and access management and provisioning products, learn about security features and get pricing info on Novell, RSA and Oracle IAM and provisioning products.
-
Endpoint Security: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Pre- and post-connection network access control
-
Emerging Technologies: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Innovative and effective solutions to tough security problems
-
Risk and Policy Management
2007 Readers' Choice Awards Risk, policy, configuration and vulnerability management
-
UTM
2007 Readers' Choice Awards Unified threat management products
-
Vulnerability Management: QualysGuard Enterprise (2007)
-
-
Wireless
2007 Readers' Choice Awards Wireless security products
-
2007 Readers' Choice AwardsMethodology
Selecting the 2007 Readers' Choice Awards
-
Antimalware: McAfee VirusScan Enterprise and AntiSpyware Enterprise
2007 Readers' Choice Awards Desktop and gateway enterprise antimalware products.
-
Application Security: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Source code and web application scanners and appliances
-
Authentication: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Digital identity verification
-
Secure Remote Access
2007 Readers' Choice Awards Secure remote access products
-
Network Firewalls
2007 Readers' Choice Awards Network firewall appliances and software
-
Security information, event management systems: Readers Choice Awards
Get the Information Security Readers Choice Award results for security information management system (SIMs) products from vendors like Archsight, Check Point and NetIQ.
-
Messaging
2007 Readers' Choice Awards Email, IM and VoIP secuirty
-
Wireless
-
Columns
-
Editor's Desk: 2007 Readers' Choice Awards
The Real World
-
PING: Shelly Barnes
Read an interview with Shelly Barnes, vice president of technology and process at Arizona Tile.
- Viewpoint: Best of breed vs. suites
-
Editor's Desk: 2007 Readers' Choice Awards
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO