Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

5 open source security projects to watch

Combine tools with processes for secure information

Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job.

With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet.

In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.

1. PacketFence

PacketFence is an open source Network Access Control (NAC) system for wired and wireless networks developed by Canadian company Inverse.

PacketFence integrates with the Snort intrusion detection system and the Nessus vulnerability scanner and is managed out-of-band.

Features include VoIP support, 802.1X, isolation of rogue devices and a Web-based management interface.

URL: http://www.packetfence.org
Licence: GPL

2. SmoothWall

The SmoothWall Open Source Project started in 2000 with SmoothWall Express, a firewall shipped with its own hardened GNU/Linux operating system and Web management interface.

SmoothWall can be downloaded as an iso image for Intel and AMD processors and, once installed, can be updated online.

The product integrates a standard set of firewall features and does QoS, traffic stats, Web proxying and real-time graphs.

The company behind the open source product, SmoothWall, offers commercial support for the product and sells appliances.

URL: http://www.smoothwall.org/
Licence: GPL

3. ModSecurity

ModSecurity is an open source Web application firewall (WAF) project for the Apache HTTP server developed by US company Trustwave.

ModSecrity has its own programming language to protect against Web application attacks.

Installed as an Apache module, ModSecurity features HTTP traffic monitoring, logging and real-time analysis, attack prevention and a rules engne.

Since it is run in Apache, ModSecurity should be as scalable as the existing Web server architecture.

ModSecurity now claims more than 10,000 deployments world-wide.

URL: http://www.modsecurity.org/
Licence: GPL

4. Untangle

Untangle is another multi-purpose gateway security project distributed as a Linux image. It will run on dedicated hardware or virtual machines.

The Untangle distribution supports a mix of free and paid security applications. The free apps include a Web Filter, anti-virus, spam prevention, advertising and phishing blocking, anti-spyware, firewall and tools for reporting and VPNs.

Various levels of commercial support are available for Untangle depending on which package is subscribed to.

Version 8.0 of Untangle was release late 2010.

URL: http://www.untangle.com/
Licence: GPL, others

5. TrueCrypt

Encryption is often a basic requirement for data security and the open source TrueCrypt project endeavours to make it as easy as possible.

Using a virtual encrypted disk, TrueCrypt can encrypt an entire partition or storage device, including USB flash drives or regular hard drives.

And since the encryption is in real-time it should be transparent to the user. It also supports hardware-accelerated encryption on modern processors.

TrueCrypt will run on Windows, Mac OS X and Linux.

URL: http://www.truecrypt.org
Licence: TrueCrypt License

For more articles in this series, be sure to check out:
5 open source network management projects to watch
5 open source virtualisation technologies to watch
5 open source CRM systems to watch
5 open source VoIP softphones to watch
5 open source billing systems to watch
5 open source office suites to watch
5 open source IP telephony projects to watch
5 open source help desk apps to watch
5 enterprise open source wiki apps to watch
5 open source project management apps to watch
5 free project management applications you must try

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: AMD, Apache, etwork, Intel, Linux, NU, Untangle
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: TrueCrypt, firewalls, open source, security, encryption
Latest Blog Posts
Whitepapers
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • Smarter Data Centre Outsourcing: Considerations for CFOs
    Deloitte explores the business and finance implications associated with managing data centres. This paper outlines the options available to structure an organisations data centre and complementary IT services and provides the key considerations that need to be reviewed when determining which option works best for them.
    Learn more »
  • All Flash and Databases - Storage Switzerland
    This webcast explores how All-Flash enterprise storage compares to traditional disk-centric arrays. Learn how to best leverage Flash so databases thrive and limitations of I/O disappear, while exploring the pitfalls and peculiarities of Flash, and how to optimise its performance as a storage solution to ensure reliance, predictability and cost savings for a variety of enterprise workloads.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments