Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Greater compliancy for Linux systems

Trusted Computer Solutions : 07 August, 2008  (New Product)
Security Blanket from Trusted Computer Solutions now includes compliance features for meeting PCI and government regulations
Trusted Computer Solutions has announced new compliance features for both the standalone and enterprise versions of Security Blanket. Security Blanket is the industry's most comprehensive system lock-down and security management solution that enables system administrators to automatically configure and enhance the security levels of Linux systems.

The new features of Security Blanket provide compliance guidelines for organizations with industrial control systems (ICS), companies that process credit card transactions, and government agencies accessing classified data. Security Blanket's new compliancy lock-down profiles include:

* Payment Card Industry Data Security Standard (PCI DSS) profile - This profile helps organisations prevent credit card fraud and other security threats. A company processing, storing, or transmitting payment card data must be PCI DSS compliant or risk losing the ability to process credit card payments and being audited and/or fined. As merchants and payment card service providers must validate their compliance periodically, Security Blanket offers an automated tool for helping to maintain this compliancy.

* Payment Card Industry Data Security Standard (PCI DSS) profile - The North American Electric Reliability Corporation (NERC), formed by the Federal Energy Regulatory Commission (FERC), has established a set of CIP security standards that are mandated requirements for United States electricity distributors. The Department of Homeland Security has mandated that utility and energy companies comply with CIP guidelines by 2010. Security Blanket can now automatically lock down the operating system, disabling all unused ports and services; restricting ICS user privileges and access; establishing audit trails; providing baseline comparisons to identify system configuration changes; and ensuring system compliancy even when the application of patches changes the system configuration resulting in compromised security.


* Supervisory Control and Data Acquisition (SCADA) systems are among the ICSs that need a high degree of security. SCADA systems collect data from various sensors at a factory, plant or other remote location and transfer this data to a central computer where it is managed and controlled. SCADA systems are an integral part of industrial enterprises such as mining plants, water and electrical utility installations, oil and gas plants, mass transit systems, and environmental control systems. Open source solutions, and connections to internal networks and the Internet, have made them highly vulnerable to cyber-warfare/cyber-terrorism attacks. Security Blanket's new CIP profile enhances security levels within organizations that have SCADA systems.

* Government Profiles - Joint Air Force Army Navy (JAFAN) and the Director of Central Intelligence Directive (DCID) 6/3 - JAFAN is responsible for establishing the security policies and procedures for storing, processing and communicating classified Department of Defense (DoD) Special Access Program (SAP) data. DCID 6/3 is the certification and accreditation process used by federal agencies working on intelligence projects. Specifically, information technology projects that require that anyone working on them has a top secret, sensitive compartmentalised information (SCI) clearance use the DCID 6/3 process. The latest version of Security Blanket has all of the lock down requirements associated with JAFAN and DCID 6/3 built in as lock down profiles.


"Social security numbers, credit card numbers, and PIN's are examples of data that should never be compromised. Today, there is an abundance of sensitive and 'eyes only' information that needs to be contained within a secure IT environment. Now more than ever, Linux system security should be at the top of every business and government agency IT checklist," said Ed Hammersla, COO for Trusted Computer Solutions. "Security Blanket is the most comprehensive lock down tool available to help organizations throughout different vertical industries increase their security posture, and become compliant and maintain compliancy."

In addition to introducing new features to Security Blanket, TCS's Chief Operating Officer, Ed Hammersla, will speak on Wednesday, August 6 from 11:30-12:30 p.m. in room 304, Moscone South Hall. His session titled 'The System Administration Security Challenge' will address lock down and operating system security.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo