Distributed by Guardian Digital, Inc.
7 February2010
Volume III, Issue II 

 In Every Issue

Guardian Digital, Inc.
165 Chestnut Street
Second Floor
Waldwick, NJ 07463

(201) 962-7300


(201) 866-625-4728




© Copyright2010, Guardian Digital, Inc. All Rights Reserved.

In this issue of Behind the Shield, Guardian Digital's chronicle of Internet and open source security news, we'll cover company highlights, thoughts from our CEO and revealing points on how Guardian Digital products are rapidly changing the face of open source for business.

Read on to learn about the innovative spam and phishing attack prevention tools just released by Guardian Digital.

Guardian Digital Continues to Innovate
with Advanced Spam Fighting Solutions

Guardian Digital reinforced their dedication to email security with the release of Secure Mail Suite v. 3.2. Incorporating advanced technologies for enterprise spam and phishing protection, Secure Mail Suite is the first solution of its kind designed to consistently combat ever-changing corporatemail threats. These new security tools not only provide bulletproof distributed protection from all forms of spam, phishing, and blended attacks, but also protect server resources by increasing system access speeds and performing quicker content checks

Learn More

At a Glance

Guardian Digital Secure Network

Guardian Digital Secure Network (GDSN) is a streamlined support system intended to provide customers with software updates, version upgrades, and master technical support. Designed to connect EnGarde Linux users to our expert security and application engineers, GDSN is the most cost-effective way to ensure system and network security through updates and personalized support.

The Guardian Digital Secure Network is comprised of two components; GDSN Software Maintenance Manager and GDSN technical support services. The GDSN Software Maintenance Manager provides users with automated software enhancements and security updates providing the most technologically advanced security and productivity applications as well as bulletproof protection from the latest Internet threats. A critical addition to any network, GDSN Software Maintenance Manager is included with purchase and yearly renewal of software applications and is the only way to effortlessly and affordably guarantee absolute network security.

Guardian Digital Secure Network Technical support, on the other hand, is available on a contractual basis and provides comprehensive email, web, and phone support. Guardian Digital offers a virtual menu of technical support options including everything from long-term to incident-based contracts ensuring the perfect fit for every budget and Linux ability.

Learn more about Guardian Digital Secure Network

Guardian Digital in the News

LinuxInsider: Linux Vulnerabilities Creep Toward the Desktop

Dave Wreski, CEO of Guardian Digital, was recently interviewed by LinuxInsider editor Anne Zeigler regarding the state of Linux security and its effect on enterprise adoption.

Full Article

Industry Note

Linux and Open Source Myths

As an open source and Linux enthusiast it is wonderful to sit back and watch Linux quickly gaining popularity among some of the world’s most influential corporations and government agencies. In fact, the client list here at Guardian Digital has grown to include quite a few high-powered entities in recent years. However, as I read of comparable organizations still remaining skeptical on the benefits of Linux, I feel disheartened. Pinpointing reasons including steep learning curve, weak technical support, and minimal program choices, closed-source loyalists chose to stick with proprietary solutions. What they don’t see is that as Linux becomes more accepted in mainstream culture, many of those perceived disadvantages have transcended into nothing more then information technology myths. Here are a few I have come across recently:

Myth #1-No Solid Technical Support
Although this may have been true at one time, Linux developers realized that to build a market for their product they could not just simply put it on the store shelves. They had to prove the stability of their company and provide professional-grade technical support to successfully solicit and maintain a steady stream of customers. To date, most established Linux companies have support structures and expert technical support teams designed to provide equal, if not better, customer value then those of proprietary vendors.

Myth #2-Steep Learning Curve
A steep learning curve was also an obstacle to Linux adoption in the early years. Since nearly all users have at one time or another primarily used Windows systems, a switch to a Linux-based operating system represented a dramatic change. While there is one Windows operating system with a universal interface, there are hundreds of Linux operating systems each with a separate user interface. Consequently each Linux application implemented would require the time and patience to learn and become accustom to a new interface. The most popular Linux vendors, however, have taken steps to minimize this curve by providing users with simplified user interfaces some of which even attempt mirror that of Windows. The learning curve of using Linux has definitely been curtailed as user-friendliness continues to increase.

Myth #3-Limited Software Choices
As Linux gains popularity and backing of major corporations, nearly all software applications are designed to support both Windows and Linux environments. With Linux market share growing at such a rapid rate, software developers are becoming aware of the purchasing power of Linux users and are satisfying their needs for choice by providing innumerable software applications comparable to those available for the Windows operating system.

As some of the alleged Linux pitfalls are being observed as more fiction then fact, the number of Linux and open source users is growing dramatically. As we continue to develop the most technologically advanced user-friendly applications and enterprise-grade support services, winning over the skeptics will continue to become a less daunting task.

Dave Wreski, CEO, Guardian Digital, Inc.

Guardian Digital Mailbag

Q. How can I protect my small business network?

A. Small businesses have to worry about Internet security just as much if not more then large enterprises. Not paying attention to the security of your small business network is a fatal mistake and could result in the end of your business. Here are some quick security tips to keep your small business network secure and productive:

Install and Update Anti-virus Software.
Anti-virus software protects your network from malicious code found in emails and downloaded from the Internet. It has the ability to scan your system for such code and delete or cleanse the infected file. Since new viruses are released on a monthly basis keeping your software updated is the only way to guarantee consistent protection.

Download Operating System Updates.
Your OS vendor will regularly release updates some of which will be enhanced security features or patches to known vulnerabilities. Pay attention to these updates and download them as soon as they become available.

Set up an Internet firewall.
A firewall is your first line of defense against intruders and unlawful activity. They screen all and block unauthorized traffic coming into your network from the Internet.

Educate Employees on Network Security.
Not all computer issues are caused by faceless hackers. Many problems originate from inside the business. Protect sensitive areas of your network with security applications and password protections. Also, make sure that all your employees now how to securely utilize email. Since many computer viruses are unleashed by someone inadvertently opening a seemingly harmless email, let them know that under no circumstances should they ever open suspicious or unsolicited email and attachments. It may be a good idea to incorporate written security policies in your corporate guidelines.

Secure Wireless Networks.
Because small business owners and employees are always on the go, wireless networks are a popular option. They are also most vulnerable to hackers. If your organization uses wireless networks, be sure use encryption technologies.

The Behind the Shield editors encourage their readers to submit questions. The most frequently asked questions will appear in future issues. We look forward to answering all your inquiries! Email us at info@guardiandigital.com

Hints & Tips
from the Experts


Guardian Digital is pleased to provide Behind the Shield readers with informative expert advice on what network security really means. Each month a new topic of interest will be chosen to supply you with useful tips and information not offered elsewhere. This month we will have a brief discussion patching mobile devices.

Security and patch management on mobile devices is one of the most trying tasks for administrators. With the greater numbers of corporations relying on mobile computing, it is also one of the most important and yet overlooked areas of information technology. Traditionally, the security of corporate servers has received the greatest priority. However, as viruses continue to evolve and begin to attack laptops, PDAs, and even cell phones, it increasingly important that appropriate measures are taken to ensure corporate data stored on those devices is kept as secure, if not more, then those housed on servers and office desktops.

Since mobile devices are subject to all sorts of threats including both technological (viruses, worms, spam) and physical (lost or stolen), it is essential that organizations who allow the use of these instruments devise corporate policies regarding their use and further document courses of action if exposed to these kind of threats. Examples of policies and procedures include:

· Utilization of advanced encryption and security standards including Wireless Equivalency Privacy (WEP) to minimize the occurrence of WLAN-related vulnerabilities;
· Password-protection on all mobile devices;
· Encryption of sensitive documents that are stored on the device;
· Minimization of access to sensitive internal information using firewalls;
· Habitually perform data back-up on all mobile devices;
· Implementation of antivirus software on all mobile devices;

Wireless and mobile device security begins with secure server solutions. As important as it is to have security defenses on the individual mobile devices themselves, it is equally important to have a server application that will provide security and inform administrators of activity coming into their network from a wireless connection.

Partner Profile


Through national and multi-national partners like AvSquare Solutions in India, Guardian Digital is able to provide their productivity and security solutions to customers worldwide.

Forging new grounds in open source security systems through our strategic partnerships with various principles, AVSquare-NS3 delivers a comprehensive portfolio of Network / E-security and productivity applications coupled with unparalleled service and support. By leveraging the merits of the collaborative open source design model, coupled with the company’s security and Internet expertise, AVSquare-NS3’s solutions maintain the highest degree of security and reliability.

For further information on AvSquare Solutions please visit their website at www.avsquare.com


If you wish to unsubscribe from this newsletter, please click here.