In an effort to answer the question “Who is doing what on my network?”, the company Cyberoam has released Cyberoam iView, a new, open-source logging and reporting solution. Cyberoam iView, says its creator, delivers centralized identity-based logging and reporting of multiple devices across geographical locations, thus enabling organizations to meet their security management and regulatory compliance requirements. The application further solves many drawbacks, such as the expense of existing logging-reporting solutions or the need to correlate individual logs from multiple devices like firewalls, antivirus and antispam solutions, intrusion-prevention solutions, proxy servers, routers, operating systems and more. One already can derive logs and reports via Linux iptables/Netfilter firewall, the popular open-source HTTP proxy Squid and other commercial UTM firewall solutions.
The disaster recovery application InMage Scout—InMage's flagship product—recently was upgraded to version 5.1. InMage Scout is a single platform that supports transparent backup, quick disaster recovery from catastrophic failures and automated application failover/failback for improved restoration of application services. Enhancements in this new v5.1 include enhanced support for larger environments and multi-tenancy features for MSP customers, as well as improved scalability, platform coverage and ease of use. Support for Sun Solaris also has been added to the existing support for Linux and Windows.
If you're in the market for a mail server with a slick Web-based e-mail application, AXIGEN hopes you'll try its new Mail Server Version 7.2. AXIGEN says that service providers will appreciate the new AJAX-based Webmail, a “cool Web experience” for its users that “will help them create new services and generate new streams of income” due to its strong focus on monetization. The application provides multiple, customizable advertising capabilities and seamless integration with third-party applications, such as portals and community-related tools, thus helping SPs keep their customers on-line for a longer period. The application introduces features such as keyboard navigation and shortcuts, drag and drop, live e-mail list view, frequent folders and also allows users to employ shortcuts and time-saving tricks they already have been using with classic desktop e-mail clients, such as Outlook or Thunderbird. Supported platforms include Linux, various BSDs, Solaris and Windows.
The latest single-board computer to come from the house of WinSystems is the EBC-Z8510-G, this one powered by the Intel Atom processor (1.1GHz or 1.6GHz) and integrating the new COMIT (Computer On Module Interconnect Technology) and SUMIT-ISMT I/O expansion standards. The little guy measures in at 203mm x 147mm (8.5" x 5.75"). The I/O interface features two Gigabit Ethernet ports, CRT and LVDS flat-panel video, a MiniPCIe card interface for a wireless networking module, four USB 2.0 ports, four serial COM ports, HD audio, PATA controller for both a CompactFlash and hard disk, 48 lines of digital I/O, LPT and a PS/2 port for keyboard and mouse. The EBC-Z8510-G supports Linux and Windows OSes and development kits.
Napatech has added extremely accurate packet timestamping—important for measuring quality-of-service factors in packet networks, such as latency—to its line of intelligent network adapters for real-time network analysis. The new time synchronization solution enables Napatech network adapters to be synchronized with a variety of time sources, such as GPS, IEEE 1588v2, CDMA and Pulse Per Second sources. This feature allows packets to be timestamped with an accuracy of 50 nanoseconds. It also lets Napatech adapters be daisy-chained, allowing a single time synchronization source for multiple adapters. Napatech calls its adapters “ideal for OEM network appliance vendors in the network performance monitoring, test and measurement, security and optimization markets.” An extensive software suite is provided for integration supporting Linux, FreeBSD and Windows.
James Gray is Products Editor for Linux Journal
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
|Concerning Containers' Connections: on Docker Networking||Aug 26, 2015|
|My Network Go-Bag||Aug 24, 2015|
|Doing Astronomy with Python||Aug 19, 2015|
|Build a “Virtual SuperComputer” with Process Virtualization||Aug 18, 2015|
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- A Project to Guarantee Better Security for Open-Source Projects
- Where's That Pesky Hidden Word?
- Firefox Security Exploit Targets Linux Users and Web Developers
- My Network Go-Bag
- Three More Lessons
- Build a “Virtual SuperComputer” with Process Virtualization
- Doing Astronomy with Python
- diff -u: What's New in Kernel Development