{"id":1478,"date":"2006-04-25T00:00:00","date_gmt":"2006-04-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/25\/novell-shells-out-72-million-to-buy-e-security\/"},"modified":"2021-12-30T11:39:27","modified_gmt":"2021-12-30T11:39:27","slug":"novell-shells-out-72-million-to-buy-e-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/25\/novell-shells-out-72-million-to-buy-e-security\/","title":{"rendered":"Novell Shells Out $72 Million to Buy e-Security"},"content":{"rendered":"<p>Commercial Linux distributor Novell last week continued to build out the security features of its SUSE Linux by acquiring e-Security, a provider of automated compliance and reporting software, for $72 million.  e-Security, which is based in Vienna, Virginia, was founded in 1999 and its Sentinel security event manager software is used by 150 companies, many of them very large organizations who have had their IT operations turned upside down by various government compliance regulations in the past year.  The Sentinel software collects, aggregates, correlates, and displays event information as it relates to users, resources, and applications.  Sentinel 5 comes with a whole slew of what are called &#8220;collectors,&#8221; which is just another way to say monitoring agents.   Collectors are created for the device, application, and network levels.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the operating system front, e-Security had already created collectors for Microsoft Windows 2000 and Windows 2003 and the Microsoft Operations Manager (MOM) systems management console; Red Hat Enterprise Linux; Sun Microsystems Solaris and Trusted Solaris (an ultra-secure variant of Solaris); IBM AIX and OS\/400; Hewlett-Packard HP-UX.<\/p>\n<p>A few months after Novell bough Immunix, it took the AppArmor security appliance software that Immunix had created and not only began the task of embedding it into SUSE Linux, but also released the AppArmor code as an open source project as a means to help create the thousands of application profiles that the AppArmor software requires.<\/p>\n<p>Sales and engineering for the Sentinel product will remain in Vienna, but the company will be rolled into Novell&#8217;s system security and identity management unit, which includes the AppArmor, ZENworks, and Novell Identity Manager products.<\/p>\n<p>http:\/\/www.itjungle.com\/tlb\/tlb042506-story03.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1478","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1478"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1478\/revisions"}],"predecessor-version":[{"id":3965,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1478\/revisions\/3965"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}