Novell Sentinel Pricing
When it comes to security, manual monitoring just doesn't cut it. For true policy enforcement, you need something that doesn't ever get tired, bored, distracted or lazy. The active dashboard in Sentinel™ automates the security monitoring of IT systems and controls in real time, enabling you to identify and respond to anomalies and policy violations quickly and efficiently. You can go home at night knowing Sentinel is on the job.
Active monitoring is great, but active reporting is even better. It's not enough for the system to know what is happening if it can't show you in time for you to act. Providing service beyond simple security monitoring, Sentinel collects, correlates, monitors and displays data from thousands of events per second in real time. This is essential for Government applications and compliance regulations such as PCI-DSS, SOX, and FISMA. You have up-to-the-minute reports on your organization's security and compliance health right at your fingertips, instead of relying on stale reports generated for the last security or compliance audit. More +Making sense out of all the dataHaving reams of data you can't understand is like having no data. You don't just need the What—you need the So What. Sentinel helps you make sense of the volumes of data that your systems generate. It performs highly sophisticated pre-analysis for you, so you can quickly recognize new trends, attacks, or violations. You can manipulate and interact with real-time graphical information and drill down into historical details ranging from seconds to hours in the past.
Policy enforcement that ensures compliancies not just a reporter; it's also an enforcer. Based on your policies, Sentinel can actually respond to incidents as they occur, taking policy enforcement to new levels. Automated incident response management enables you to document and formalize the process of tracking, escalating and responding to incidents and policy violations, and provides the ability to create a trouble ticket directly in another system, such as Remedy. Sentinel helps you demonstrate your compliance with internal policies and industry and government regulations such as SOX, HIPAA, GLBA, PCI-DSS, FISMA and others.
Deployment made simple, easy to useSentinel delivers a centralized Event Source Management framework. With the lack of industry logging standards, using adaptable and flexible technology is central to being able to see events from all your data sources. Sentinel's architecture leverages interpretive collectors for data parsing and normalization, filtering, and enrichment in order to integrate all the data into one simple view. The framework takes the data from the source system, performs the transformations and presents the events for later analysis, visualization and reporting purposes. This makes deploying Sentinel easier and quicker, enabling you to begin realizing value sooner.
Sentinel for PCITighten your payment card data security to meet stringent new PCI security standards. Novell Sentinel provides the market's strongest solution for meeting the log monitoring and auditing requirements set forth by the Payment Card Industry (PCI) data security standards. Sentinel's ability to collect, aggregate, normalize and correlate log data from all relevant systems, devices, resources and applications, and its ability to integrate that information with Novell's identity and access management systems, makes it the clear choice when selecting a PCI-DSS monitoring solution.
Policy Enforcement That Makes You CompliantIt's not just a reporter; it's also an enforcer. Based on your policies, Sentinel™ can actually respond to incidents as they occur. Automated incident response management enables you to document and formalize the process of tracking, escalating and responding to incidents and policy violations, and provides the ability to create a trouble ticket directly in another system, such as Remedy. This functionality lets you demonstrate your compliance with internal policies and industry and government regulations such as SOX, HIPAA, GLBA, FISMA, and others.
Sentinel features and modules that provide policy enforcement and threat remediation:
Click image for large view The powerful iTRAC workflow in Sentinel enables you to respond proactively to incidents by automating and enforcing incident identification and resolution processes. IT managers get a complete "system of record" for tracking and reporting remediation of security or compliance incidents. Workflows can be tailored to fit your organization's specific remediation processes and requirements.
Event Source Management
The Sentinel Collector Manager delivers a richer event stream by injecting business-relevant data before events are correlated and analyzed.
A richer event stream means Sentinel is correlating data with the business context required to identify and remediate internal or external threats and policy violations. Sentinel Collector Manager has an easy-to-use, drag-and-drop interface to help you to create rules-based Collectors to gather, filter and normalize data from any source and securely communicate relevant information to the Sentinel Control Center. It enables users to quickly and efficiently develop and configure Collectors to monitor any source. Moreover, users can:
- Quickly create, manage, and deploy collectors to all enterprise systems
- Connect any IT asset to the Sentinel Control Center
- Write and customize rules on the fly
- Embed best practices and business rules to address unique security management and compliance monitoring requirements.
Each control can include a description of the requirement it was designed to fulfill, as well as the implementation and testing steps required to ensure that the control is working as expected. The Solution Designer then packages a set of controls into a single Solution Pack, creating an integrated solution to solve a specific business problem.
Combinations of Sentinel content are managed as integrated controls, simplifying the process of installing, implementing, and testing the Sentinel system.
The Sentinel Advisor provides centralized security intelligence for proactive resolution of new vulnerabilities. Sentinel Advisor contains a comprehensive and timely collection of known threats and vulnerabilities. Coupled with iTRAC, Sentinel Advisor provides unmatched real-time threat mitigation and policy violation prevention.
Sentinel Advisor cross-references real-time Sentinel alert data with known vulnerabilities and automated remediation process, bridging the gap between incident detection and response. With Sentinel Advisor, organizations can determine if events exploit specific vulnerabilities and how these attacks impact their assets.
When personnel are alerted that you have just had a breach of security, you want to be able to react immediately and stop that user from continuing his malicious behavior. You need to know in real time that critical information is being accessed by an unauthorized user, but what is even more important is knowing who is accessing that information. With out of the box identity visibility and remediation of suspect activities throughout the enterprise you can know who. Novell Sentinel is seamlessly integrated with Novell Identity Manager to give you a true identity context to enterprise security.