Feeds

Novell to mashup management tools

No tea making facilities as yet, though

Combat fraud and increase customer satisfaction

It seems that most of the IT industry is trying to figure out how to make money by vertically integrating some aspects of the data centre and selling a complete solution that addresses the whole stack. Novell - known predominantly for its NetWare and SUSE Linux operating systems - is no exception.

Having shelled out big bucks - well, at least compared to its size and cash pile - for a number of systems management tool makers, Novell is unveiling the product line and strategy it will bring to market in 2010 to deliver what it calls "intelligent workload management".

This will start with its SUSE Appliance online software packaging tool, which went beta in February and into production in July. Then it will stir in a whole bunch of code from its ZENworks system management tools, the PlateSpin virtual server management tools and the ManagedObjects business service management tools. Finally, add in Identity Manager for access control and security, before mashing the whole thing up in a pot and selling it as an integrated toolset for managing infrastructure and the applications that ride on top of it.

You've probably heard this many times before, most recently - as in last week - from an outfit called rPath and its Project Javelin. With that project, rPath, which was founded by some of the top ex-techies from Red Hat, is seeking to go beyond a repository-driven software appliance tool that rode atop a homegrown version of Linux.

It wants to be a kind of version control system for operating system, middleware and application software deployed in both development and production environments. In this case, Project Javelin is supporting Red Hat Enterprise Linux, Ubuntu, CentOS, and Novell's SLES and will from next year support Microsoft's Windows.

Like Novell's intelligent workload management effort - which does not have a code-name even though its components do - rPath's Project Javelin is a roadmap that will lead to a product set, rather than a single product that is currently ready for delivery.

According to Justin Steinman, vice president of solution and product marketing at Novell, one of the key differences between the two approaches is that Novell has the tools and the expertise in coping with security and access control at the operating system and application level. It has acquired and built the code that will allow it to do role-based access and control on software stacks that span physical servers, virtual machines, and cloud-style infrastructure.

"We think that CIOs are looking for tools to manage three pools of infrastructure - physical, virtual, and cloud," explains Steinman. "Decades ago, security meant locking a mainframe in the basement. But that is not going to work today. We've offered identity solutions, appliance tools, management solutions, but not in a tightly integrated fashion. Now we will." As for rPath, Steinman says that Novell is not all that worried. "The lack of security and identity management in rPath will really hamstring them," Steinman says.

Novell's intelligent workload management toolset - and man, does it ever need a better name - has eight core components. Some are kickers to currently shipping products, while others are based on code borrowed from different tools and mixed in new ways, and still others that have brand new code. The tools are grouped into four major functional groups, which are used to build, secure, manage, and measure the software stacks deployed internally on physical or virtual servers, or out on virtualized cloud infrastructure.

The workload build tools include the online SUSE Appliance Toolkit, which Steinman says will be ready for prime-time in the first quarter of 2010. The thing that needed to be added to the appliance service, which for now only builds appliances for Novell's SUSE Linux distro, is the ability to embed access and security settings, including per-user and role-based access, into the application stack. This way, as workloads move from physical to virtual to cloud infrastructure, the access and security settings can travel with the stacks.

Novell is being a bit cagey about exactly how it is going to make the security and access settings portable, but says that it is taking bits of its Sentinel log manager and event manager tools and embedding them in an agent that can travel with physical and virtual infrastructure. The creation and embedding of these security and access settings will not be done with the SUSE Appliance Toolkit, but rather with another tool code-named "Workshop," which is not expected to be delivered until the fourth quarter of 2010.

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.