Beyond displaying an extensive slate of existing Linux products, vendors at
last week’s InfoSecurity show pointed to possible future offerings ranging
from a Linux client for a CD-ROM encryption system to a Linux-enabled all-in-one device for securing both physical access and video surveillance.
In a sign of the growing convergence between information security and
physical security, the InfoSecurity conference was combined this year with the East
coast edition of the ISC show, another perennial event at New York City’s
Javits Center.
Conference sessions tended to skirt matters specific to OS and
interoperability, focusing instead on convergence issues such as organizational
restructurings and information sharing, as well as on what general types of tools to
deploy against the latest nuances in bots, pharming, and other cyberattacks.
But on the show floor and in other conference byways, vendors and government
contractors happily discussed OS platforms, including their reasons for
favoring particular Linux distributions.
PD Inc., for example, is using a COTS implementation of embedded Linux in
its all-in-one device for physical access, video surveillance and analysis, and
storage now being developed under contract to the US Navy.
“We’re getting everything that Red Hat would provide, while keeping the
costs lower,” according to Jason Pyeron, senior consultant at PD.
The integrated device uses CAC cards with single sign-on (SSO) for
authentication, along with a modular overall structure for quick expandability, Pyeron
said, during an interview with LinuxPlanet at the show.
The contractor is currently testing the integrated appliance internally. But
Pyeron anticipates a pilot test by the Navy in 2007.
Symark on the other hand, offers its PowerBroker and PowerPassword software
on both Red Hat and Debian Linux, along with other varieties of Unix, said
Carla Davies, sales engineer, in a meeting with LinuxPlanet on the show floor.
PowerBroker is designed to let organizations delegate Linux or Unix
administrative privileges to trusted users without divulging the root password.
PowerPassword is a program for managing passwords across multiple
authentication systems complying with the PAM specification.
For its part, Cyberoam has chosen embedded Red Hat Linux as the platform for
Unified Threat Management, a gateway-enabled security appliance just now
becoming available in the US.
The appliance combines a firewall with identity management, anti-virus,
anti-spam, content filtering, intrusion detection and prevention, bandwidth
management, VPN, and systems management capabilities, said Hermal Patel, CEO, in
another interview.
Patel sees SonicWave and FortiNet as the company’s primary competitors. “Unlike [the others], though, we are identity-based,” he told LinuxPlanet.
India-based Cyberoam has been selling the appliance through Ernst & Young
and Avaya on the Indian subcontinent.
Now, however, Cyberoam has opened a sales office in New Jersey, and it’s
looking to sign up distributors in North America. CCNY is the first to be inked.
Why did Cyberoam decide on Linux as its embedded environment? “Flexibility,”
Patel responded. In addition to creating an interface aimed at “ease of use,” Cyberoam has added device drivers to the embedded platform.
An anti-spyware appliance from mi5networks, also shown at InfoSecurity, is
based on embedded Linux, too. But “hardened” security is the main reason why.
Doug Camplejohn, CEO and founder of mi5, said that his company opted to use
Fedora Linux because of the need for a hardened kernel.
The appliance uses three different scanning technologies to check incoming
traffic for spyware on-the-fly. “We can block spyware before it ‘phones home,'” Camplejohn contended.
Meanwhile, other vendors are giving thought to enabling their Windows-based products for use on Linux servers and/or desktops.
Although the news hasn’t yet been announced, Secured eMail has now
definitely decided to produce a Java client for its Simple Encryption Platform, a
system that encrypts mail authored on Microsoft Exchange and Windows editions of
Lotus Notes, according to Daniel Nilsson, business development manager.
Via the Java client, users will be able to view the encrypted mail on Linux
and other non-Windows-based mail systems, Nilsson told LinuxPlanet.
Also for access from non-Windows systems, DolphinSecureWare, Inc. provides a
Web browser interface to Purifile, a new software product for removing “sensitive information” that users might have hidden–either accidentally or deliberately–inside Microsoft Office files.
Dolphin, another federal government contractor, first developed Purifile for
the Dept. of Defense, said John E. Ivory, program manager, and John P.
Cappelli, commercial sales manager.
The company is now in the process of introducing the Microsoft Office file
inspection application to the commercial space.
At the same time, Global Technologies Group, Inc. (GTGI) is planning an
Apple Macintosh client for SecureDisc, its Windows XP-based system for encrypting
CD- and DVD-ROMs.
“After the Mac client, our next client will probably be for [desktop]
Linux,” said GTGI’s George W. Allen.
One common use of SecureDisc is to encrypt payroll files. Once the files are
encrypted on the disks, the files are sent by overnight mail to payroll
processing firms, according to Allen.
But other vendors aren’t so sure yet about adding either Linux enablement or
access to their currently ‘Windows only’ line-ups.
“It’s all about demand,” said Bobby New, federal sales engineer at
SenForce, the makers of a system known as Endpoint Security Suite.
“In other words, in order to [start offering products for Linux], we’d need
to have a request from a customer,” according to New.
But at Promisec, makers of Spectator Professional software for endpoint
security management, the thinking around staying on ‘Windows only’ is somewhat
different.
“We’re concentrating on ‘end points’ right now, and about 98 percent of the
end points out there run on Windows,” said Hillik Koffer, co-founder and VP
of business development
“If we do anything with Linux, it’ll be on Linux servers. And we don’t want
to do that right now, because it would only confuse the issue. What we’re
talking with [customers] about now is end point security.”
But crossplatform support works the other way around, too. For instance,
long-time Linux and Unix player Symark recently came out with PowerKeeper, a “hardened” appliance for managing administrative passwords for Red Hat and Novel
SuSE servers and workstation desktops, as well as for Windows servers and
desktops, Unix, IBM AS/400, Cisco routers, and multivendor databases and
firewalls.
“There’s quite a need out there for Windows administrators to be able to
manage passwords, too,” Davies told LinuxPlanet.
This article was first published on LinuxPlanet.com.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.