Advanced cloud security tools
Posted on 18 December 2009.
Sun Microsystems unveiled open source cloud security capabilities and announced support for the latest security guidance from the Cloud Security Alliance.


The open source cloud security tools:

OpenSolaris VPC Gateway: Provides customers with greater choice and flexibility when connecting their systems to the Amazon Virtual Private Cloud. The OpenSolaris VPC Gateway software enables customers to quickly and easily create a redundant, secure communications channel to a Virtual Private Cloud without the need for proprietary networking equipment.

Immutable Service Containers (ISC): Delivers architectural patterns with associated deployment strategies that collectively define a highly secure foundation for service delivery. Incorporating many of the security features of the OpenSolaris Operating System, including Solaris ZFS, Solaris Containers, and Solaris IP Filter and Auditing, the ISC architecture leverages service compartmentalization and improved integration techniques to create virtual machines with significantly improved security protection and monitoring capabilities.

Security Enhanced Virtual Machine Images (VMIs): Using many of the techniques developed for the Immutable Service Container project, Sun created several security-enhanced VMIs for the Amazon Elastic Compute Cloud (EC2). These virtual machines leverage industry accepted recommended practices including non-executable stacks, encrypted swap and auditing enabled by default. Beyond simple OpenSolaris images, Sun has also published integrated software stacks such as Solaris AMP and Drupal built on these security-enhanced images.

Cloud Safety Box: Simplifies managing encrypted content in the Cloud. Using a simple Amazon S3-like interface, the Cloud Safety Box automates the compression, encryption and splitting of content being stored in the cloud on any supported operating system including Solaris, OpenSolaris, Linux and Mac OS X.





Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //