Distributed by Guardian Digital, Inc.
10 May 2004
Volume II, Issue V 
 Features

 In Every Issue


Guardian Digital, Inc.
165 Chestnut Street
Second Floor
Waldwick, NJ 07463

Phone:
(201) 962-7300

Fax:

(201) 866-625-4728

E-mail:

info@guardiandigital.com

Website
:
www.guardiandigital.com

©Copyright 2004, Guardian Digital, Inc. All Rights Reserved.

Behind the Shield Unsubscribe


 

 

In this issue of Behind the Shield, Guardian Digital's chronicle of Internet and open source security news, we'll cover company highlights, thoughts from our CEO and revealing points on how Guardian Digital products are rapidly changing the face of open source for business.

Read on to learn why Guardian Digital’s comprehensive security solutions were favored at the Real World Linux Expo over many well-known single-purpose solutions.

Guardian Digital Aids Medical Industry to Comply with Federal Patient Privacy Regulations

Guardian Digital's unique focus on Internet and network security has garnered much attention from members of the medical field for their ability to help physicians comply with federal patient privacy regulations.

Dr. Paul Brisson, co-owner and spinal surgeon for NY Spine Care, a leading medical center for back and spine injuries, implemented numerous solutions from Guardian Digital's award-winning portfolio of products including EnGarde Secure Professional, Secure Mail Suite, Secure VPN Server Suite, Internet Acceleration and Management Server and EnGarde WorkGroup Suite. Integrating these power-packed solutions into his existing system Dr. Brisson is now able to keep his network productive while maintaining the security mandated by the United States federal Health Insurance Portability and Accountability Act (HIPAA).

More Information


Guardian Digital Security Solutions Win Out At Real World Linux

Guardian Digital's comprehensive security solutions gained the interest of security enthusiasts and business executives alike at the Real World Linux Exposition, Canada's only national event focusing on Linux and open source. Looking for cost-effective ways to protect their corporate networks, onlookers were impressed by the comprehensive portfolio of security and productivity applications offered by Guardian Digital. Secure Mail and Internet Productivity Suites were stand-out favorites amongst visitors and were praised for incorporating the perfect balance of unmatched functionality and bulletproof security.

Learn More


Industry Note

Linux and National Security

As the open source industry grows and becomes more widely accepted, the use of Linux as a secure operating system is becoming a prominent choice among corporations, educational institutions and government sectors. With national security concerns at an all time high, the question remains: Is Linux secure enough to successfully operate the government and military's most critical IT applications?

The United States government sure thinks so. A recent survey conducted by the Mitre Group found 251 Department of Defense deployments of Linux and other open source software. Not only is the United States government sponsoring hundreds of open source projects, it has been reported that open source applications have become major components in the IT infrastructure at the Pentagon.

Proprietary software advocates are currently stirring a debate on whether using Linux in matters of national defense is appropriate. It is their opinion that the availability of the source code for open source applications and the unknown origins of the code can lead to subversive content being deliberately placed into critical codes and putting the security of our entire country at risk.

What makes this debate illogical is the fact that there is not a single mainstream operating system, proprietary or open source that in its current state should be used to run critical national security applications. Any chosen system would have to be adjusted and re-worked to be a proper fit for the government's most critical IT needs. However, assuming the government is turning to Linux for national defense applications, the availability of the source code is exactly what makes Linux the obvious choice. Linux and other open source applications provide the freedom to customize programs to suit specific requirements, a liberty unfounded in proprietary systems. If the security provided by a particular installation is not sufficient it can be modified to ensure the highest levels of protection.

Additionally, the United States government, with special regard to the Department of Defense, puts security and confidentiality to the highest standard. Any code chosen for critical government or military systems must undergo countless hours of analysis and vulnerability assessment before it will even be considered for testing. To imply that our government has not considered the risks of Linux and other operating systems alike and is using insecure infrastructures of any kind is to insult the intelligence and capability of our government and military to protect its citizens.

Linux is not an invitation for IT terrorism, but quite possibly a first step towards preventing it. Linux incorporates a "defense-in-depth" approach to security, meaning robust security measures are implemented at every level of development and deployment. Not relying on obscurity, like closed-source counterparts, Linux truly focuses on the security of the system and its capabilities and strengths continue to improve, surpassing those of proprietary vendors like Microsoft.

The open source approach, however, affords users a substantial number of resources from developers in the community to ensure that even seemingly insignificant security flaws are properly fixed. The unfailing group effort and dedication of the open source community continuously results in vulnerabilities being identified and patches being released more rapidly, mitigating potential security risks before negatively affecting the end user.

Due to the consistent occurrence of security issues circling Microsoft, Linux has made its way into the mainstream and is becoming more widely accepted every day. Providing customers with a reliable, scalable platform, Linux offers a solid budget friendly alternative to those offered by proprietary vendors without sacrificing functionality and power.

Dave Wreski, CEO Guardian Digital, Inc.


At a Glance
Internet Acceleration and Management Server

Guardian Digital Internet Defense & Detection System (IDDS) is the first and most necessary step in securing your corporate network. This comprehensive intrusion detection and prevention application analyzes network traffic for suspicious and potentially damaging activity while mitigating risks from common and uncommon vulnerabilities. Using sophisticated open source technologies, IDDS delivers proactive security by blocking imminent threats before entering the network.

Simplified web-based management and real-time system reporting provides an effortless way to consistently maintain security and view the status of the network. Updated attack signatures and attack severity ratings allow administrators to ascertain risk and take the necessary actions to thwart attempts of intruders while powerful intrusion prevention features identify offending IP addresses and redirect or reset connections before harmful data can damage a network. IDDS provides organizations with unparalleled security while leveraging existing resources resulting in a cost-effective, bulletproof security solution for any network.

Learn more about the
Internet Defense and Detection System

 

.....

Guardian Digital Mailbag

Q. I have been hearing a lot about honeynets and their relevance to Internet security. What exactly are they?

A. A honeynet is a network strategically placed behind a reverse firewall used to identify hackers during an attempted intrusion. Intended to be compromised, honeynets are designed to confine and control all inbound and outbound traffic and analyze it for malicious activity. In many cases, honeynets are set up to give the intruder the look and feel of a real system, leaving them unaware they are being monitored and allowing administrators to analyze techniques and pinpoint potential vulnerabilities within a system.

In regards to security, honeynets are particularly useful because they can provide all necessary information regarding vulnerabilities and compromises within a network, allowing administrators to proactively correct vulnerabilities and thwart potential compromises before any damaging activity can take place.

The Behind the Shield editors encourage their readers to submit questions. The most frequently asked questions will appear in future issues. We look forward to answering all your inquiries! Email us at info@guardiandigital.com


Guardian Digital In the News



Processor.com Interviews Guardian Digital CEO Dave Wreski
on the Measures of IT Success


Sharing his expertise with Processor.com readers, Guardian Digital Chief Executive Officer speaks about how companies should measure their individual IT successes.


Read Full Article

 

.

Hints & Tips from Experts

Understanding & Preventing Denial of Service Attacks -- Guardian Digital is pleased to provide Behind the Shield readers with informative expert advice on what network security really means. Each month a new topic of interest will be chosen to supply you with useful tips and information not offered elsewhere. This month, we'll have a brief discussion on understanding and preventing denial of service attacks.

A denial of service (DoS) attack is defined as an attempt by a hacker to prevent authorized users from utilizing a specific service. A successfully executed DoS can disable any computer on a network, which depending on the network structure and the function of the workstation, could cause serious damage to an organization's IT infrastructure, resulting in loss of system productivity and ultimately loss of revenue.

Here are resources we consider to be the best available for information on preventing a DoS
attack:

SANS
CISCO
CERT



Partner Profile

Symtrex Exhibits Guardian Digital Products at Real World Linux Expo, Toronto Canada

 Through national and multi-national partners, like Symtrex Guardian Digital is able to provide their productivity and security solutions to customers worldwide.

One of the major issues buzzing around the Real World Linux Expo in Toronto this week is the cost of sufficient Internet security and the ability for smaller corporations to afford it. Symtrex fascinated many of the visitors to their booth by exhibiting Guardian Digital's Internet Productivity Suite, the cost-effective, comprehensive small business solution.

"Guardian Digital Internet Productivity Suite, to those who were cost conscious, was an intriguing product. Not only did it provide the protection that they required, it is simple to install, and comes complete with a one year subscription to Guardian Digital Master Support, ensuring any difficulties were immediately addressed. Attendees were also impressed by the additional support subscriptions and products that are available to complete their network," stated Lynne Krekeler of Symtrex.

Along with Internet Productivity Suite, Symtrex also exhibited several other offerings from Guardian Digital. Addressing consistent concerns for effective spam and virus protection as well as employee surf controls, the solutions provided by Guardian Digital's award-winning enterprise portfolio of products obtained well-deserved interest at the expo.

Website

 

 

 

 

If you wish to unsubscribe from this newsletter, please click here.