IBM strengthens Linux security

IBM Middle East has extended its Tivoli security management software for both Unix and Linux as it continues to drive support for open source operating systems.

  • E-Mail
By  Matthew Southwell Published  June 30, 2002

IBM Middle East has extended its Tivoli security management software for both Unix and Linux. As part of the expanded portfolio, IBM Tivoli Access Manager for Operating Systems enables access control across the open source OS’s and provides IT administrators with the ability to secure data and apps based on corporate security policies.

The software features delegate administration, policy definition, auditing and access control for AIX, Solaris, HP-UX, Red Hat Linux and SuSE Linux operating systems through a unified web-based interface.

"IBM is profoundly committed to the open source movement and believes that Linux is already a key platform for e-business. Businesses in the Middle East are also recognising this, and as a result we are seeing a growing popularity of Linux deployment across major business-critical applications,” says Yvon Le Gall, Tivoli regional manager, IBM Software Group, Middle East and North Africa (MENA).

In addition to Access Manager, Tivoli has unveiled its latest version of IBM Tivoli Risk Manager. The solution features new web, host and network Intrusion Detection System (IDS) sensors for Linux on IBM's xSeries and zSeries servers. The sensors monitor web server access logs, system log files and network intrusion traffic and feed the data into Tivoli Risk Manager's intelligent correlation engine to present IT administrators with a real-time view of enterprise security on a single console.

"IBM's software already gives our customers more control over their security policies across a broad range of platforms, and our clients will now benefit from being able to extend those same security policies across their Linux environment. With these new solutions, IBM equips security administrators and application developers with the right tools to better integrate consistent security policy across more platforms," explains Le Gall.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code