In an effort to answer the question “Who is doing what on my network?”, the company Cyberoam has released Cyberoam iView, a new, open-source logging and reporting solution. Cyberoam iView, says its creator, delivers centralized identity-based logging and reporting of multiple devices across geographical locations, thus enabling organizations to meet their security management and regulatory compliance requirements. The application further solves many drawbacks, such as the expense of existing logging-reporting solutions or the need to correlate individual logs from multiple devices like firewalls, antivirus and antispam solutions, intrusion-prevention solutions, proxy servers, routers, operating systems and more. One already can derive logs and reports via Linux iptables/Netfilter firewall, the popular open-source HTTP proxy Squid and other commercial UTM firewall solutions.
The disaster recovery application InMage Scout—InMage's flagship product—recently was upgraded to version 5.1. InMage Scout is a single platform that supports transparent backup, quick disaster recovery from catastrophic failures and automated application failover/failback for improved restoration of application services. Enhancements in this new v5.1 include enhanced support for larger environments and multi-tenancy features for MSP customers, as well as improved scalability, platform coverage and ease of use. Support for Sun Solaris also has been added to the existing support for Linux and Windows.
If you're in the market for a mail server with a slick Web-based e-mail application, AXIGEN hopes you'll try its new Mail Server Version 7.2. AXIGEN says that service providers will appreciate the new AJAX-based Webmail, a “cool Web experience” for its users that “will help them create new services and generate new streams of income” due to its strong focus on monetization. The application provides multiple, customizable advertising capabilities and seamless integration with third-party applications, such as portals and community-related tools, thus helping SPs keep their customers on-line for a longer period. The application introduces features such as keyboard navigation and shortcuts, drag and drop, live e-mail list view, frequent folders and also allows users to employ shortcuts and time-saving tricks they already have been using with classic desktop e-mail clients, such as Outlook or Thunderbird. Supported platforms include Linux, various BSDs, Solaris and Windows.
The latest single-board computer to come from the house of WinSystems is the EBC-Z8510-G, this one powered by the Intel Atom processor (1.1GHz or 1.6GHz) and integrating the new COMIT (Computer On Module Interconnect Technology) and SUMIT-ISMT I/O expansion standards. The little guy measures in at 203mm x 147mm (8.5" x 5.75"). The I/O interface features two Gigabit Ethernet ports, CRT and LVDS flat-panel video, a MiniPCIe card interface for a wireless networking module, four USB 2.0 ports, four serial COM ports, HD audio, PATA controller for both a CompactFlash and hard disk, 48 lines of digital I/O, LPT and a PS/2 port for keyboard and mouse. The EBC-Z8510-G supports Linux and Windows OSes and development kits.
Napatech has added extremely accurate packet timestamping—important for measuring quality-of-service factors in packet networks, such as latency—to its line of intelligent network adapters for real-time network analysis. The new time synchronization solution enables Napatech network adapters to be synchronized with a variety of time sources, such as GPS, IEEE 1588v2, CDMA and Pulse Per Second sources. This feature allows packets to be timestamped with an accuracy of 50 nanoseconds. It also lets Napatech adapters be daisy-chained, allowing a single time synchronization source for multiple adapters. Napatech calls its adapters “ideal for OEM network appliance vendors in the network performance monitoring, test and measurement, security and optimization markets.” An extensive software suite is provided for integration supporting Linux, FreeBSD and Windows.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide