Maintaining Server Integrity

Michael Vizard

One of the challenges that IT organizations routinely face is that for any number of reasons someone may accidentally or purposefully alter the way a particular server is configured. Inevitably, those changes wind up creating a definite compliance issue and a potential security problem, so what many IT organizations really need is a simple tool that alerts them every time a configuration on a server changes.

That's the thinking that went into the development of version 8.0 of Deep Security from Trend Micro, which was released today at the VMworld 2011 conference.

According to Harish Agastya, director of product marketing for data center and virtualization security, Deep Security 8.0 is designed to provide that average IT professional with a set of tools for maintaining server integrity, while also allowing highly trained security professionals to use the tool to discover the root cause of a particular security problem.

Deep Security 8.0 can be used with both physical and virtual servers, with the latest release now including support for version 5.0 of vSphere and the ability to monitor a virtual desktop infrastructure (VDI) deployment. To accomplish that, Deep Security makes use of a mix of agent and agentless approaches, the use of which depends on the level of analysis required to monitor that particular function.

Priced starting at $1,000 per server, Deep Security 8.0 provides IT organizations with a security gateway that in addition to monitoring server integrity also includes anti-malware, firewall, intrusion detection and protection services, Web application protection and log inspection.

In addition, the new release is more tightly integrated with version 2.0 of SecureCloud, a cloud security offering from Trend Micro that has been upgraded to include new encryption capabilities.

They say that when it comes to security an ounce of prevention is worth well more than a pound of cure. Given the fact that when it comes to security, servers are the primary focus of most attacks, and the first step towards deploying an ounce of prevention should be finding some way to easily monitor changes to the server environment.
 



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.