Channel: Sentinel

Notice: Undefined index: HTTP_COOKIE in /inet/netiq/docroot/media/index.php on line 32

Detect and Disrupt: Identifying Advanced Threats Before They Do Damage

In this webinar, we discuss simple but powerful security monitoring tools and methods to provide interlocking layers of protection and preserve business agility.

0.0000

  • Type: Webcast
  • Duration: 40:29
  • New
  • Date: 11 Mar 2015

Dark Reading Webcast: APTs from A to Z

As an information technology (IT) security professional your responsibility is to protect your organizational data from both outsiders and insiders. And you need to recognize when a compromise or breach is actually taking place. In this webcast, explore common practices for collecting, monitoring, and analyzing system log data. Discover different methods of identifying and monitoring privileged users. Find out how to detect unusual activity on business computing services, and learn why maintaining patch levels is so important.

0.0000

  • Type: Video
  • Duration: 43:28
  • New
  • Date: 11 Mar 2015

Managing Risk and Enforcing Compliance in an "Always-On" World

Cloud, BYOD and other technologies are here to stay. Now that your business users have access to sensitive data and services “anytime, from anywhere”, what can you do to stay one step ahead of the security and compliance risks that come with a rapidly evolving threat and IT operations landscape? View this webcast to hear Renee Bradshaw, Senior Marketing Manager for Security Products at NetIQ, describe how implementing a continuous process for improving security and maintaining compliance is the right approach to mitigating risks to your sensitive data - wherever it resides.

0.0000

  • Type: Video
  • Duration: 41:25
  • New
  • Date: 11 Mar 2015

RDC & NetIQ Identity Manager, Access Manager & Sentinel Log Manager

RAI Data Center (RDC) is an IT and business services provider for the automotive and transport services organizations based in the Netherlands, Belgium and Luxemburg. RDC helps companies such as car dealers, lease companies, importers, garages, car washes and car rental companies work smarter and faster by providing web-based services that support cooperation between companies across the whole supply chain. This involves thousands of applications and services to which their customers need access; some of which RDC provides, while others come from other providers. Different providers mean different authentication processes with numerous usernames and passwords.

0.0000

  • Type: Video
  • Duration: 4:35
  • New
  • Date: 11 Mar 2015

Simple Tips for Better Security and Sustainable Compliance

This auditing and compliance session provides tips to improve your security and compliance efforts.

0.0000

  • Type: Webcast
  • Duration: 37:49
  • New
  • Date: 11 Mar 2015

Getting a Fix on Your Security Posture: What Your Logs Aren't Telling You

A look at how logs can assist you in determining compliance and finding new attacks as well as some of the typical pitfalls of logging that can lead to failures.

0.0000

  • Type: Webcast
  • Duration: 58:09
  • New
  • Date: 11 Mar 2015

Friday Keynote: NetIQ

The NetIQ team demos how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate your security across the enterprise and public cloud access, and increase executive visibility by providing your management with a comprehensive view.

0.0000

  • Type: Video
  • Duration: 17:28
  • Date: 14 Oct 2011

GaVI Success Video

To enhance security and streamline processes, GaVI used Identity Manager and Sentinel to automate user account management for 22,500 + users.

0.0000

  • Type: Video
  • Duration: 03:49
  • Date: 04 Aug 2011

City of Siena Italy Success Video

To enhance the security of its IT environment, the Municipality of Siena implemented Sentinel, Novell Identity Manager and Access Manager. The solutions enabled the automation of IT systems monitoring and user management processes, ensuring greater levels of protection for personal data held by the Municipality.

0.0000

  • Type: Video
  • Duration: 03:50
  • Date: 04 Aug 2011

Enhance Security and Compliance Across Your SAP Infrastructure

Adam Loughran, Compliance and Security Management Principal, describes the certified and integrated technologies that NetIQ and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.

0.0000

  • Type: Webcast
  • Duration: 09:32
  • Date: 01 Apr 2011

Sony Italia Customer Success Video

Following the introduction of stringent new legislation in Italy related to ensuring data privacy, Sony Italia needed the ability to maintain auditable records of all logins to systems containing personal data. Working with H4T, a Novell Partner, the company chose Novell Sentinel Log Manager as the most cost-effective and functional solution to meet the new legislative requirements.

4.0000

  • Type: Video
  • Duration: 03:48
  • Date: 15 Feb 2011

Sentinel Log Manager 1.1 Walkthrough

Join Jason Arrington, as he walks through the features of Sentinel Log Manager, including new features found in version 1.1.

5.0000

  • Type: Demo
  • Duration: 21:10
  • Date: 03 Dec 2010

University of Dayton Uses Sentinel Log Manager

Brian Singer talks with Randy Hardin, Lead Systems Engineer at the University of Dayton, about how they use Sentinel Log Manager to achieve compliance and enhance their security.

3.0000

  • Type: Audio
  • Duration: 11:53
  • Date: 27 Jul 2010

Moving Beyond Archival: Tips and Tricks for Taking the Next Step with Log Management

Featuring: Jerry Shenk and Jason Arrington. According to the recently released SANS log management survey, many organizations are now able to collect logs from many new sources, including systems and applications. However, organizations still find it difficult to derive real value from their log files. In this Webcast, experts from SANS will provide some best practice scenarios that will enable organizations to easily derive more value from log data. Don't get stuck with gigabytes of nearly worthless log files, unleash the information that your log data contains to improve security and simplify your compliance efforts.

0.0000

  • Type: Audio
  • Duration: 57:14
  • Date: 07 Jul 2010

Friday Demo: Sentinel Futures

Brian Singer, Jason Arrington and Pascal Oetiker highlight some of the innovative capabilities in Sentinel and where it’s headed in the future.

4.7143

  • Type: Video
  • Duration: 12:29
  • Date: 24 May 2010

Manage Complexity with Security as a Service

Security Information & Event Management (SIEM) and regulatory compliance have become mission critical priorities as well as arduous tasks. Wipro, and Dave Shackleford show you how partnering with an IT security service provider can help manage security complexity, and put you on a path to compliance while reducing operating costs.

0.0000

  • Type: Webcast
  • Duration: 58:05
  • Date: 28 Apr 2010

BrainShare Keynote - Security

Demonstration on how Sentinel and Sentinel Log Manager can keep your business safe from breaches.

4.5000

  • Type: Video
  • Duration: 16:31
  • Date: 27 Mar 2010

SANS Review of Novell Sentinel Log Manager

Novell Sentinel Log Manager, released in August 2009, marks a new direction for Novell's Sentinel SIEM platform. In this review, SANS Analyst Jerry Shenk discusses how Sentinel Log Manager works as a standalone log management product against traditional pain points associated with log management, including collection, storage and reporting.

4.3125

  • Type: Webcast
  • Duration: 49:32
  • Date: 01 Feb 2010

Podcast: SAP Tackles Compliance

Join Leo Castro for this brief Q&A session. Learn how SAP and Novell are teaming up to provide enterprises with integrated compliance solutions (audio only).

0.0000

  • Type: Audio
  • Duration: 07:29
  • Date: 12 Jan 2010

The Best Defense is a Good Offense: Using Correlation to Actively Fend off Attacks

In most of today's enterprise IT departments, security teams are currently employing vulnerability management as well as intrusion detection and prevention techniques. We'll take a look at common aspects of both vulnerability management and intrusion detection systems, exploring the most common ways that these products and processes are configured.

0.0000

  • Type: Webcast
  • Duration: 53:17
  • Date: 29 Oct 2009

Sentinel Log Manager: Simple Setup

Product Marketing Manager Brian Singer shows how easy it is to set up data collection with Sentinel Log Manager.

2.7500

  • Type: Demo
  • Duration: 02:27
  • Date: 08 Oct 2009

Introduction to Sentinel Podcast

Jason Arrington, Product Manager for Sentinel, provides an overview of what Sentinel does and how it integrates with other Identity and Security products.

4.0000

  • Type: Audio
  • Duration: 13:09
  • Date: 09 Jul 2009

Forrester Research and NetIQ on Collaboration

Forrester and NetIQ discuss collaboration market trends and NetIQ principles and strategy.

5.0000

  • Type: Webcast
  • Duration: 37:59
  • Date: 08 Jul 2009

Security and Vulnerability Video

Learn about the security and vulnerability capabilities in Novell Compliance Management solutions.

3.5000

  • Type: Video
  • Duration: 05:30
  • Date: 09 Jun 2009

Injecting Identity into Network Monitoring

Watch this session to see a demonstration of the correlation and identity injection capabilities in Sentinel. With these capabilities, you'll always know who is accessing what, when they're doing it and if they're authorized.

4.3333

  • Type: Demo
  • Duration: 11:17
  • Date: 09 Jun 2009

Beyond SIEM: The Next Generation of Security Management

In this program leading experts from featured analyst firm, Gartner, Inc., and opinion leaders from Infosys, explore the emerging trends in SIEM and provide crucial advice on how to use SIEM to enhance your security and compliance programs.

0.0000

  • Type: Video
  • Duration: 39:49
  • Date: 08 Jun 2009

Novell Sentinel Demo

Jason Arrington, Novell Product Manager, provides an overview of the product.

0.0000

  • Type: Demo
  • Duration: 13:12
  • Date: 08 Jun 2009

Novell Sentinel 6.1: Putting the "Cool" Back into SIEM Products

See a demo of Novell Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.

0.0000

  • Type: Demo
  • Duration: 13:13
  • Date: 04 May 2009