Sussex health IT service selects Novell for resource management

The Sussex Health Informatics Service (Sussex HIS) is supporting 25,000 NHS users with a Novell resource management suite.

The Sussex Health Informatics Service (Sussex HIS) is supporting 25,000 NHS users with a Novell resource management suite.

Sussex HIS, which provides IT services to all 11 NHS trusts in the Sussex region, is implementing Novell's Zenworks resource management suite to deliver asset management, remote desktop control and application deployment.

The roll-out, which will support 25,000 users, will enable Sussex NHS organisations to have a unified view of their IT resources, making their network more secure and easier to manage.

Currently, Novell Zenworks is being deployed throughout East Sussex to 6,000 users as a pilot project, with a view to expand the system to cover all 25,000 users in Sussex.

The project has been enabled by the Novell Enterprise Wide Agreement with NHS Connecting For Health, signed in October 2005, which means that any NHS trust can be granted the licenses and training it needs to use the full Zenworks Suite at no extra cost.

“At Sussex HIS we manage and support a very mixed IT infrastructure spanning 11 trusts throughout the region in disparate locations. We needed a robust resource management solution that was capable of working over low bandwidth connections,” said Steve Orman, head of IT at Sussex HIS.

“Novell Zenworks Suite gave us a reliable remote desktop solution as well as a clear upgrade path to use other modules of ZENworks further down the line,” said Orman.

Sussex HIS will be able to run asset reports centrally and enable remote desktop control, so the NHS trusts it supports can benefit from lower helpdesk costs, automatically deploy operating systems, configurations and software on thousands of desktops and laptops - all from a single location.

Computer Weekly wins PPA editorial campaign of the year for its NHS IT coverage >>

NHS upgrade creates false patient records >>

Novell products >>

Comment on this article:




Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT project management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...