June 2003
Intermediate to advanced
464 pages
10h 33m
English
In Table 25-3, entries for Open Source software are shaded.
| Tools | Image hardening | User administration | Access control | Policies | Firewall and intrusion detection | Image isolation | Encryption | Audit | Virus protection | Security patches |
|---|---|---|---|---|---|---|---|---|---|---|
| Bastille | ✓ | |||||||||
| BestBits | ✓ | |||||||||
| BMC INCONTROL | ✓ | ✓ | ✓ | ✓ | ||||||
| CA eTrust Access Control | ✓ | |||||||||
| CA eTrust IDS | ✓ | |||||||||
| IBM Tivoli Access Manager for e-business | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
| IBM Tivoli Risk Manager | ✓ | ✓ | ||||||||
| netfilter/iptables | ✓ | |||||||||
| LIDS | ✓ | |||||||||
| LPAR | ✓ | |||||||||
| McAfee E-Business Server | ✓ | |||||||||
| MIMEDefang | ✓ | |||||||||
| OpenSSL | ✓ | |||||||||
| PAM | ✓ | |||||||||
| RAV antivirus | ✓ | |||||||||
| RSBAC | ✓ | ✓ | ||||||||
| Security-Enhanced Linux | ✓ | ✓ | ||||||||
| Snort | ✓ | |||||||||
| StoneGate | ✓ | |||||||||
| TARA | ✓ | |||||||||
| Tripwire |