Seven Products to Help Take Care of Your Linux Security

Posted by ricky26 on July 19th, 2014

As Linux is an open-source operating system that means anyone can write a new operating system module, as long as they agree to the open-source licensing agreement, it would seem that it would invite its share of hackers.

From a real-world standpoint, since Linux machines don't standout from the crowd of MS-DOS/Windows machines, hackers have less incentive to use their time to get into Linux machines, unless they are spoken about or written about. This makes them a challenge.

Here are seven products we have found that will help you with Linux security. They use separate servers to watch your Linux machines and break a hacker's attempt at cracking your systems. The systems are available from:

  1. Trend Micro whose Worry-Free Business Security system 7.0 whose system watches your system and its links to the cloud and your server farm. It secures the journey through the cloud.

  2. Bomgar whose secure system supports Windows, Macs, Linux and mobiles. One Bomgar server replaces individual servers needed for the other services. This system watches all your processes, whether they are behind outside firewalls or not, so you always have an idea of what's going on. It integrates remote security with your home systems. This system assumes you have already made your investments in remote system management software, a service desk and help desk, as well as a CRM. This enables you to take full advantage of your desktop environment and enables you to maximize your investment. It uses pre-built modules and represents one way to keep your costs as low as possible.

  3. Go-Daddy Support is a widely known system that features a remote disk farm and PCI Compliant Hosting for your systems so that you have constant 24/7/365 coverage. Since it is a remote system to you – all you have is a process daemon running on your site, Go-Daddy represents a savings to you because you do not have to tie up a system or systems and you have a secure login through Go-Daddy.

  4. Resources: 10 Steps to Protect Your Computer represents a compilation of the steps they use and that you should be using to secure your systems. It can be remote, through the cloud, or it can use a dedicated system on your site that monitors you cloud-based systems. It watches for patterns that hackers use in their coding and if it find them cuts out the effected areas while either you or your security people handle the problem.

  5. Zenworks by Novell is a locally located system that runs a series of modules that watches each of your Linux-based modules closely for hacker patterns. It also works with cloud-based computing in that it can watch your remote processes to ensure that hackers haven't built any “special surprises” into your own code and ensures that any bad code is cut out before it hits your major systems and database.

  6. Geek Buddy – – Like the Commodo dragon Geek buddy goes out and finds bad code and eats it, eliminating it from your system. The dragon analogy is very apt here as this is an active system that goes out looking for bad code and if it finds it, the system eliminates it. It can watch both local and cloud-based processes.

  7. Escan Internet Security – – Like the other products mentioned here this is handles both local cloud-based security for you. Using its own modules, it runs on a separate server – remotely in most cases as it places a running daemon on your site – and applies various modules to code it considers to be hacked. It eliminates it before it infects your system. If you run it locally, it has the same functions, but you have the responsibility for the machine.

Like it? Share it!


About the Author

Joined: February 7th, 2014
Articles Posted: 2,308

More by this author