Feeds

Red Hat makes a security bundle with Symantec

A muscular appliance

Secure remote control for conventional and virtual desktops

Red Hat last week continued its appliance assault via a partnership with Symantec.

The companies have crafted a pair of software bundles meant to give Linux customers easier access to high-end security features. Customers can pick from pre-tested packages that included Red Hat Enterprise Linux or the Red Hat Application Stack with Symantec Critical System Protection. As you might expect, the packages are aimed at small- to mid-sized business that could use some help securing their data centers with relative ease.

Symantec's Critical System Protection handles a wide variety of tasks, including protection against zero day exploits and buffer overflow and memory-based attacks. It also automates some security policy procedures.

Since Critical System Protection covers both server and application protection, the companies will sell their new bundles as Secure Server Host and Secure Server Host for Applications. The server bundle, which will run on two-socket systems, covers intrusion protection and detection, while the application bundle, also aimed at two-socket x86 gear, focuses on security policy and compliance.

The bundles will be sold through the "Red Hat on Intel" channel. Red Hat and Symantec will independently handle updates and support for their products, which seems like a bit of a pain.

Last month, Red Hat revealed a similar database bundle with Sybase. The Linux maker has vowed to create more and more pre-packaged appliances. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.