5 open source security projects to watch
- 20 January, 2011 11:23
Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job.
With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet.
In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.
PacketFence is an open source Network Access Control (NAC) system for wired and wireless networks developed by Canadian company Inverse.
PacketFence integrates with the Snort intrusion detection system and the Nessus vulnerability scanner and is managed out-of-band.
Features include VoIP support, 802.1X, isolation of rogue devices and a Web-based management interface.
The SmoothWall Open Source Project started in 2000 with SmoothWall Express, a firewall shipped with its own hardened GNU/Linux operating system and Web management interface.
SmoothWall can be downloaded as an iso image for Intel and AMD processors and, once installed, can be updated online.
The product integrates a standard set of firewall features and does QoS, traffic stats, Web proxying and real-time graphs.
The company behind the open source product, SmoothWall, offers commercial support for the product and sells appliances.
ModSecurity is an open source Web application firewall (WAF) project for the Apache HTTP server developed by US company Trustwave.
ModSecrity has its own programming language to protect against Web application attacks.
Installed as an Apache module, ModSecurity features HTTP traffic monitoring, logging and real-time analysis, attack prevention and a rules engne.
Since it is run in Apache, ModSecurity should be as scalable as the existing Web server architecture.
ModSecurity now claims more than 10,000 deployments world-wide.
Untangle is another multi-purpose gateway security project distributed as a Linux image. It will run on dedicated hardware or virtual machines.
The Untangle distribution supports a mix of free and paid security applications. The free apps include a Web Filter, anti-virus, spam prevention, advertising and phishing blocking, anti-spyware, firewall and tools for reporting and VPNs.
Various levels of commercial support are available for Untangle depending on which package is subscribed to.
Version 8.0 of Untangle was release late 2010.
Licence: GPL, others
Encryption is often a basic requirement for data security and the open source TrueCrypt project endeavours to make it as easy as possible.
Using a virtual encrypted disk, TrueCrypt can encrypt an entire partition or storage device, including USB flash drives or regular hard drives.
And since the encryption is in real-time it should be transparent to the user. It also supports hardware-accelerated encryption on modern processors.
TrueCrypt will run on Windows, Mac OS X and Linux.
Licence: TrueCrypt License
For more articles in this series, be sure to check out:
5 open source network management projects to watch
5 open source virtualisation technologies to watch
5 open source CRM systems to watch
5 open source VoIP softphones to watch
5 open source billing systems to watch
5 open source office suites to watch
5 open source IP telephony projects to watch
5 open source help desk apps to watch
5 enterprise open source wiki apps to watch
5 open source project management apps to watch
5 free project management applications you must try
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- 5 open source network management projects to watch
- 5 open source virtualisation technologies to watch
- 5 open source CRM systems to watch
- 5 open source VoIP softphones to watch
- 5 open source billing systems to watch
- 5 open source office suites to watch
- Five open source IP telephony projects to watch
- 5 open source help desk apps to watch
- Five enterprise open source wiki apps to watch
- 5 open source project management apps to watch
- 5 free project management applications you must try
High school students still see ICT as ‘sitting at a computer all day’: survey
Does encryption really shield you from government's prying eyes?
Solving the skills conundrum – part 1
"How many of the Fortune 500 companies have access to PRISM? https://en.wikipedia.org/wiki/Industrial_espionage ..."Australia suspected to have PRISM data: Ludlam
Australia Post’s mail business to lose $200 million this year
Data Centre Physical Infrastructure: Optimising Business Value
To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in data centre physical infrastructure (DCPI). This whitepaper discusses how companies can succeed in a changing global market. Read now.
Leading Through Connections – Insights from the Global Chief Executive Officer Study
IBM’s 2012 Global CEO study follows face-to-face discussions with more than 1,700 CEOs and senior public sector leaders from around the globe. The findings examine how CEOs are responding to the complexity of increasingly interconnected organisations, markets, societies and governments. For example, almost one-quarter of CEOs say their organisations operate below par in terms of driving value from data. CEOs have expressed frustration about their inability to capitalise on available information. This is because: “The time available to capture, interpret and act on information is getting shorter and shorter.” CEO, Chemicals and Petroleum, United States Given the need for deeper business insight, the best performing organisations are more adept at converting complex data into insights, and insights into action. Download Entire Report Now.
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.