Welcome!

Cloud Security Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

Trusted Computer Solutions Offers Free Trial of Industry’s Only Automated System Lock-Down and Security Management Solution

Trusted Computer Solutions, Inc. (TCS), a leading developer of cross domain, operating system and network security software, today announced that it is offering a free trial version of its award-winning Security Blanket™ product for Linux. Security Blanket is a system lock-down and security management tool that enables systems administrators to automatically configure and enhance the security level for Operating Systems (OS) including Red Hat Enterprise Linux versions 4 and 5, Solaris version 10, CentOS versions 4 and 5, Fedora version 10 and Oracle Enterprise Linux versions 4 and 5.

Security Blanket is a menu driven solution with an easy-to-use interface that allows administrators to run predefined profiles that automate industry-standard best practices for hardening Linux and Solaris. Alternatively, users can customize profiles that support their own security policies. Once a profile is selected, the product quickly assesses the system and provides indicators – Pass, Fail or Not Applicable – that show the status of its compliance to an organization’s security guidelines. Following the assessment, the user can instantly configure the OS to be in full compliance by clicking Apply.

The free trial of Security Blanket Standalone offers full vulnerability scanning and system configuration for a Linux OS for a limited time period where users will experience all of the Security Blanket functionality and capabilities. The trial version provides one Assessment Report, two Baseline reports, and the generation of one Baseline Comparison report to evaluate the robust reporting features.

Security Blanket offers two versions for both Linux and Solaris servers – standalone and enterprise. The standalone version of Security Blanket is typically purchased by organizations with a small number of Linux and Solaris servers to manage. Designed for medium-to-large sized organizations, the enterprise edition gives users centralized management of all servers from a single console. While this limited time offer is available for Linux servers only, those interested in a free trial of Security Blanket for Solaris can contact TCS at 1-866-230-1317.

To access the free trial of Security Blanket, visit: http://www.trustedcs.com/SecurityBlanket/SecurityBlanket-Try-Out.html

For a complete brochure-based tutorial of the product, visit: http://www.trustedcs.com/documents/Security_Blanket_Brochure.pdf

Security Blanket received LinuxWorld 2008’s Product Excellence Award for “Best Security Solution.” In addition, system administrators in the commercial and government sectors have shared their experiences with the product:

  • “After downloading the free trial version of Security Blanket and successfully locking down one of my Linux servers, I was compelled to purchase Security Blanket Enterprise for all of my Linux and Solaris servers. Being able to group my servers by their function and lock the groups down using different guidelines has saved me days of implementation time. I can now get new servers into production much faster now. What a time-saver!” – Product Control Manager, Fortune 1000 Wholesale Distributor
  • “Thanks to Security Blanket, I was able to lock down all 18 of my classified servers in one day. Prior to using Security Blanket, locking down one server would have taken an entire week. It was so easy to create a custom profile by modifying the default DISA STIG profile for our specific site needs. Now I have a custom security profile that I can use for all of my servers. Having the ability to automatically run weekly Baseline Reports is also a big time-saver! Now that I am using Security Blanket, I have more time to focus on mission-critical tasks and projects.” – Principal Field Support Engineer, National Test Range

About Trusted Computer Solutions

Founded in 1994, Trusted Computer Solutions is an industry leader in security solutions that protect an organization’s intelligence, information, and infrastructure. The Company's flagship products enable government and industry to securely share information, striking the right balance between information protection and information sharing, a vital component to national security. Known as the SecureOffice® Suite, these products adhere to the most stringent security standards set by U. S. Government Agencies and are installed and accredited in operational systems around the world. TCS also develops products that protect an organization’s infrastructure. Security Blanket is an award-winning tool that automatically locks down operating systems on enterprise wide server deployments, according to industry standard security best practices. CounterStorm is a network security tool that collects and monitors network traffic to protect against external and internal threats and provides visibility into the network. TCS is headquartered in Herndon, Va., with offices in Champaign, Ill. and San Antonio, Tx. For more information, visit www.TrustedCS.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...