Feeds

Red Hat makes a security bundle with Symantec

A muscular appliance

Choosing a cloud hosting partner with confidence

Red Hat last week continued its appliance assault via a partnership with Symantec.

The companies have crafted a pair of software bundles meant to give Linux customers easier access to high-end security features. Customers can pick from pre-tested packages that included Red Hat Enterprise Linux or the Red Hat Application Stack with Symantec Critical System Protection. As you might expect, the packages are aimed at small- to mid-sized business that could use some help securing their data centers with relative ease.

Symantec's Critical System Protection handles a wide variety of tasks, including protection against zero day exploits and buffer overflow and memory-based attacks. It also automates some security policy procedures.

Since Critical System Protection covers both server and application protection, the companies will sell their new bundles as Secure Server Host and Secure Server Host for Applications. The server bundle, which will run on two-socket systems, covers intrusion protection and detection, while the application bundle, also aimed at two-socket x86 gear, focuses on security policy and compliance.

The bundles will be sold through the "Red Hat on Intel" channel. Red Hat and Symantec will independently handle updates and support for their products, which seems like a bit of a pain.

Last month, Red Hat revealed a similar database bundle with Sybase. The Linux maker has vowed to create more and more pre-packaged appliances. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.