Novell ZENworks Endpoint Security Management
June 01, 2010
From approx. c£57.30 for one licence and standard maintenance
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Very flexible with many policy options
- Weaknesses: Can be expensive for certain environments
- Verdict: Certainly a strong product as one would expect from Novell but the price needs a bit of tweaking
Novell ZENworks Endpoint Security Management secures the endpoint and prevents data leakage in several ways. It not only ensures removable device and USB control but also provides encryption and wireless network access control, as well as control of hardware communications such as Firewire, Bluetooth and serial ports.
It provides application control, which can either prevent certain applications from running at all or only executing under certain circumstances.
This product can be easily installed in a single server configuration or multiple server deployment. The initial setup involves three basic steps: installing the services, installing the management console and deploying the agents. We found setup to be simple and straightforward with the help of setup wizards.
After the completion of setting up the services and management console a basic configuration wizard is launched when the management console application is run for the first time. This helps configure the server for plugging into the directory services such as Active Directory. After this is completed the rest of the configuration and management is done through the management console.
We found the Novell solution to be flexible in both agent deployment and policy configuration. Agents can be deployed either by physically installing on each computer or by automated deployment through an Active Directory GPO. Policy can be configured in several ways with many options. Once a policy is configured it can easily be pushed out to the selected set of agents by choosing the domain objects in the publish tab of the console and clicking the publish button. We found working with policies and the management console to be easy.
Documentation consists of two PDF guides. The first is an installation guide that clearly details setting up databases and the installation and deployment steps. The second is an administration guide that illustrates how to use and configure the product, as well as creating and publishing policies. Both guides include many step-by-step instructions, screenshots and configuration examples.
Novell provides two levels of support as part of a support contract. Standard includes upgrade protection, training and 12/5 customer support (with a four-hour response time). Priority includes upgrade protection, training and 24/7 customer support (with a four-hour response time and a one-hour response time for severity one issues). There is also a large support area available on the website at no cost that includes a knowledgebase, forum, documentation and various tools and patches.
We find this product to be good value for the money. It provides a lot of features and flexibility in an easy to manage application.
SC Webcasts UK
Sign up to our newsletters
DV Cleared Systems Architect - 6 Months - London
Computerfutures - London (North), London (Greater)
CISO – Chief Information Security Officer (Up to £100K)
Evolution Recruitment - London (North), London (Greater)
Head of Security Strategy – London
Evolution Recruitment - London (West), London (Greater)
Information Security Manager
Infosec People - Hammersmith, West London
Associate Professor in Cyber Security and Networking
Edinburgh Napier University - Edinburgh, City of Edinburgh
SC Magazine UK Articles
- Russia's Central Bank introduces new mandatory cyber-security regulations
- Private firms to chase cyber-criminals for cash bounties, say police
- Epic hack, thousands of salted logins stolen
- Singapore to shut off internet access for government agencies
- 6 in 10 universities hit by ransomware, 2/3 hit multiple times
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- SC Awards Europe 2016 winners announcements!
- Microsoft ends common password use and password lockout
- ISIS radicalises 'lone wolves' through strong social media presence
- 1.5 billion Windows computers potentially affected by unpatched 0-day exploit