Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

CIS certification for Linux security product.

Trusted Computer Solutions : 08 January, 2008  (New Product)
Security Blanket from Trusted Computer Solutions gains Centre for Internet Security certification opening doors for Government contracts.
Trusted Computer Solutions has announced that Security Blanket, the company's system lock-down and security management tool, has been certified by the Centre for Internet Security (CIS) for the Red Hat Enterprise Linux Level 1 and 2 Benchmark v1.0.5. This certification is based on Security Blanket's ability to enable systems administrators to automatically compare the configuration status of their Red Hat Enterprise Linux 4 and 5 systems to the Level 1 and 2 CIS Benchmarks for Red Hat Enterprise Linux v1.0.5.

CIS Benchmarks are widely accepted by US government agencies for FISMA compliance, and by auditors for compliance with the ISO standard as well as GLB, SOX, HIPAA, FIRPA and other the regulatory requirements for information security. The Benchmarks enumerate security configuration settings and actions that 'harden' your systems. They are unique, not because the settings and actions are unknown to any security specialist, but because consensus among hundreds of security professionals worldwide has defined these particular configurations.

"Operating system security is a priority for system administrators, but most agree that it is not an easy process. Security Blanket offers an automated tool that helps administrators configure their Red Hat Enterprise Linux version 4 or 5 operating systems to security configuration standards that have been widely recognized and accepted in the industry," said Clint Kreitner, president and CEO of CIS. "This CIS certification assures Trusted Computer Solutions customers that Security Blanket provides accurate and thorough reports on how their systems comply with these standards."

Security Blanket is a menu-driven solution with an, easy-to-use user interface that enables administrators to run predefined profiles that automate industry-standard best practices for hardening Linux. The profiles are based on security guidelines recommended by the National Institute of Standards and Technology (NIST) and CIS. Alternatively, users can customize profiles that support their own security policies. Once a profile is selected, the product quickly assesses the system and provides indicators to show the status of the system's conformance to the security guidelines. The conformance indicators show Pass, Fail or Not Applicable. By clicking on any failed criteria, the user receives a detailed description of the failure, suggestions on modification and a choice to remediate or ignore.

"The CIS benchmarks are built on industry consensus and provide Security Blanket users with confidence that they now have an easy-to-use system lock down tool for Red Hat Enterprise Linux version 4 or 5 that adheres to the highest standards," said Ed Hammersla, Chief Operating Officer for TCS. "System administrators who are not Linux experts can feel confident that they can meet their organization's security requirements by using Security Blanket, now backed by the CIS certification."

CIS Benchmarks are a set of technical standards that draw upon best practices published by The SANS Institute, the National Security Agency (NSA), the National Institute of Standards and Technology (NIST), and the U.S. Defense Information Systems Agency (DISA), as well as consensus guidance from CIS members and users. The CIS Certification program is distinguished from other IT certifications because CIS certified vendor tools support the consensus best practices movement. CIS strategic partnerships with AICPA, IIA and ISACA are advancing the science of security auditing to include measurement of configuration management outcomes.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo