NETWORK WORLD NEWSLETTER: DAVE KEARNS ON NOVELL NETWARE TIPS
07/26/05
Today's focus: Reader gives big thumbs up to Astaro security
product
Dear security.world@gmail.com,
In this issue:
* Reader says Novell should drop BM and integrate NSM into
eDirectory
* Links related to Novell NetWare Tips
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Fluke Networks
Download the Special Report: VoIP: Challenges, Drivers, Hurdles,
and Recommendation
VoIP, poses many questions, among them; vendors vs. carriers,
end-user adoption, management complexity, etc. Once these
questions are answered then the benefits of convergence can be
realized. Through research the following special report VoIP:
Challenges, Drivers, Hurdles, and Recommendation analyzes the
questions and the best practices behind implementing a converged
network.
http://www.fattail.com/redir/redirect.asp?CID=108858
_______________________________________________________________
COMPLIMENTARY NETWORK WORLD PRINT SUBSCRIPTIONS
Managing networks and systems can be a lot easier if you stay
aware of the latest developments in tools and technologies
designed to help. Network World will ensure that you don't miss
a beat. We would like to offer you the leading source of
dependable, accurate, timely information you can rely on to make
the best decisions for your corporate network. SUBSCRIBE TODAY
AT:
http://www.fattail.com/redir/redirect.asp?CID=108937
_______________________________________________________________
Today's focus: Reader gives big thumbs up to Astaro security
product
By Dave Kearns
A few weeks ago, I told you about the upcoming upgrade for
Novell Security Manager (NSM) powered by Astaro
<http://www.networkworld.com/nlnovell3764>. The upgrade would
tie it more closely to eDirectory than the current shipping
version, which uses a generic LDAP interface. That reminded
longtime reader Joe Whited to drop me a note with his
impressions of NSM.
After using it for a short time, he said: "Novell should stop
all development on BorderManager (if it hasn't already) and work
on getting this excellent product more effectively integrated
into eDirectory." Whited doesn't just say, "it's nice" or "I'd
consider it." No. This is an unqualified "full speed ahead" with
NSM development and drop BorderManager (BM) now before wasting
any more time on it.
Over the years that Whited has been writing to me and commenting
on the newsletter, he's always been calm, rational and fairly
conservative in his views. But not this time. He says: "One of
my engineers installed NSM on a spare PIII server we had running
and...Wow! Installation is super fast and easy, and the
management is far more intuitive and consistent than the
hodge-podge of NWADMN32, IMANAGER, INETCFG and BRDCFG that BM
forces you to use."
The only caveat he adds is: "Besides pulling security from
eDirectory (using LDAP or eDir, whatever) it needs to actually
store its config and rules in eDirectory, I think." Sounds like
a good idea to me.
If you haven't bought NSM powered by Astaro you should look into
it. But you might also simply buy the Astaro product itself -
Astaro Security Linux
<http://www.astaro.com/firewall_network_security/security_facts>.
It'll run on the SuSE kernel version of Open Enterprise Server,
or you can run it up on virtually any Linux host. And, as Whited
said, an old Pentium III machine should work fine as a hardware
platform. The services it provides include:
* Firewall.
* VPN gateway.
* Anti-virus.
* Intrusion protection.
* Spam filtering.
* Content filtering.
* Spyware Protection.
Prices start at $330 for a 10-user license, and you can download
<https://my.astaro.com/download/> a free evaluation version to
check it out. Maybe you should.
The top 5: Today's most-read stories
1. Verizon joins managed security game
<http://www.networkworld.com/nlnovell3765>
2. Future-proof your network
<http://www.networkworld.com/nlnovell3766>
3. VoIP security threats: Fact or fiction?
<http://www.networkworld.com/nlnovell3767>
4. The ROI of VoIP <http://www.networkworld.com/nlnovell3768>
5. Appliances replace DNS, DHCP software
<http://www.networkworld.com/nlnovell3769>
Today's most forwarded story:
Verizon joins managed security game
<http://www.networkworld.com/nlnovell3771>
_______________________________________________________________
To contact: Dave Kearns
Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.
Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these
respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.
Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Fluke Networks
Download the Special Report: VoIP: Challenges, Drivers, Hurdles,
and Recommendation
VoIP, poses many questions, among them; vendors vs. carriers,
end-user adoption, management complexity, etc. Once these
questions are answered then the benefits of convergence can be
realized. Through research the following special report VoIP:
Challenges, Drivers, Hurdles, and Recommendation analyzes the
questions and the best practices behind implementing a converged
network.
http://www.fattail.com/redir/redirect.asp?CID=108857
_______________________________________________________________
ARCHIVE LINKS
Archive of the Novell NetWare Tips newsletter:
http://www.networkworld.com/newsletters/netware/index.html
Novell news page:
http://www.networkworld.com/news/financial/novell.html
_______________________________________________________________
FEATURED READER RESOURCE
THE NEW DATA CENTER: SPOTLIGHT ON STORAGE
This Network World report takes a look at storage trends such as
virtualization, encryption and archiving. Here you will also
find seven tips for managing storage in the new data center, how
storage encryption can help ease the threat of identity theft,
why one exec believes its all about the information and more.
Click here:
<http://www.networkworld.com/supp/2005/ndc4/>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment