Vendor Report: Novell - Identity and Security

Report Details

Novell has a long history in the fields of identity and security. The company was one of the pioneers in network operating systems and the corresponding directory and security services. Over the year, it has continued to develop and expand its portfolio. Today, identity and security remain at the heart of Novell’s business model, along with products for data centers based on Novell Suse Linux as well as products for communication, security and device management collectively labeled “end user computing”.

Over the past years, Novell has been following a clearly fined path towards improving and marketing its product lineup. It is now in an excellent position to be perceived as a leading supplier of integrated solutions for managing heterogeneous IT infrastructures all the way from the data center to the desktop. In our estimation, however, its greatest strengths lie in the realm of identity and security. In addition, Novell has proven to be a solidly financed enterprise with lots of liquidity – a fact that is frequently overlooked by outsiders.

Novell’s technical prowess paired with a deep understanding of IT GRC make this vendor a prime al-ternative for anyone looking for strong, performing IT infrastructure solutions. Individually, their products are often found to be the most technologically mature in their respective market segments. Therefore, Novell can be considered even in IAM, GRC and IT Sec environments in which Novell eDirectory is currently not being employed. Novel has successfully reduced its former excessive reliance on its in-house eDirectory infrastructure, and their products now work very well within mixed IT environments.
 
You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Dec 06, 2010

Vendor Report: Novell - Identity and Security

Novell has a long history in the fields of identity and security. The company was one of the pioneers in network operating systems and the corresponding directory and security services. Over the year, it has continued to develop and expand its portfolio. Today, identity and security remain…

€95.00 Get Access

Latest Related Reports

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: Privilege Management - 71100

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre…

Leadership Compass

Leadership Compass: Privilege Management - 71100

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management…

Executive View

Executive View: NetIQ Access Manager - 71054

NetIQ Access Manager is an example of an integrated Access Management and Identity Federation solution. In fact, NetIQ has been the first vendor to combine federation functionality with web access management features, thus providing a completely integrated solution based on a solid…

Leadership Compass

Leadership Compass: IAM/IAG Suites - 71105

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management.…

Leadership Compass

Leadership Compass: Access Governance - 70948

Leaders in innovation, product features, and market reach for Identity and Access Governance and Access Intelligence. Your compass for finding the right path in the market.

Executive View

Executive View: NetIQ Identity Manager - 70901

NetIQ is part of the Attachmate Group, which consists of a number of business units, including Novell and Attachmate. NetIQ is the entity, which now markets the former Novell Identity and Access Management products. The core product of NetIQ today is NetIQ Identity Manager, formerly known…

Executive View

Executive View: NetIQ SecureLogin - 71066

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both…

Leadership Compass

Leadership Compass: Identity Provisioning - 70949

Identity Provisioning is still one of the core segments of the overall IAM market. Identity Provisioning is about provisioning identities and access entitlements to target systems. This includes creating and managing accounts in such connected target systems and associating the accounts…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR as opportunity to build trusted relationships with consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00