25.3. Security management tools
In Table 25-3, entries for Open Source software are shaded.
Tools | Image hardening | User administration | Access control | Policies | Firewall and intrusion detection | Image isolation | Encryption | Audit | Virus protection | Security patches |
---|---|---|---|---|---|---|---|---|---|---|
Bastille | ✓ | |||||||||
BestBits | ✓ | |||||||||
BMC INCONTROL | ✓ | ✓ | ✓ | ✓ | ||||||
CA eTrust Access Control | ✓ | |||||||||
CA eTrust IDS | ✓ | |||||||||
IBM Tivoli Access Manager for e-business | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
IBM Tivoli Risk Manager | ✓ | ✓ | ||||||||
netfilter/iptables | ✓ | |||||||||
LIDS | ✓ | |||||||||
LPAR | ✓ | |||||||||
McAfee E-Business Server | ✓ | |||||||||
MIMEDefang | ✓ | |||||||||
OpenSSL | ✓ | |||||||||
PAM | ✓ | |||||||||
RAV antivirus | ✓ | |||||||||
RSBAC | ✓ | ✓ | ||||||||
Security-Enhanced Linux | ✓ | ✓ | ||||||||
Snort | ✓ | |||||||||
StoneGate | ✓ | |||||||||
TARA | ✓ | |||||||||
Tripwire |
Get Linux® on the Mainframe now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.