Novell bundles apps for security package

Networking giant Novell has unveiled a package of security-related products for enterprises in a bid to capitalise on the...

Networking giant Novell has unveiled a package of security-related products for enterprises in a bid to capitalise on the burgeoning interest in network security.

The package, called Novell Secure Access, contains six components. Among them are iChain, an application that provides secure access to data and applications from the Web, and BorderManager, which secures access to Internet resources from inside the enterprise. The package is available immediately for $159 (£111) per user, compared with $212 (£148) when the products are sold separately.

Gartner analyst John Pescatore said that although Novell has been good at making secure network systems, the company is now "finally starting to get serious about security as a market".

"Security is one of those markets [Novell] should have owned," Pescatore added, noting that he has recently been deluged by briefing requests from network management vendors spinning themselves as security specialists.

But Pescatore, along with Jonathan Penn, an analyst at Giga Information Group, is sceptical that users, other than some existing Novell shops, will go for the entire bundle.

Penn said different products within the Novell security suite are generally sold to different groups in the enterprise. "For example, SecureLogin and BorderManager are internally focused products, while iChain is more of an extranet player," he said. It would make more sense, Penn said, for Novell to group its products by where they fit into companies instead of dumping them all into a single security bucket.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...