Feeds

Third Brigade annexes open source intrusion detection tech

GPL security project goes under commercial management

Secure remote control for conventional and virtual desktops

OSSEC, the open source host-based intrusion detection project, has been snapped up by Third Brigade, a commercial firm in the same information security sub-market. Terms of the deal, announced on Tuesday, were undisclosed.

Daniel Cid, creator and primary developer for OSSEC, has become the principal researcher at Third Brigade, which has promised to continue contributing to the open source community with further editions of OSSEC. Third Brigade plans to make its money from support and training. It also plans to benefit from the acquisition by rolling OSSEC's technology into its own technology portfolio.

Host-based intrusion prevention software packages are designed to protect servers or PCs from malware infection or hacking attack. OSSEC's multi-platform offering also features log analysis, integrity checking and alerting features.

OSSEC began as an open source project five years ago in 2003. The most recent of five subsequent software releases came out in May. Members of the OSSEC community includes two of the largest commercial banks in the US, aerospace and defense firms and more than 150 universities and colleges.

The acquisition of OSSEC represents the continuation of the trend for open source security projects have come under the stewardship of commercial firms.

Snort is maintained by intrusion detection firm Sourcefire, which bought the ClamAV open source anti-virus package in August 2007. Sourcefire was founded by Martin Roesch, the creator of SNORT, in 2001.

Modsecurity, the open source web application firewall, has been under under the stewardship of Breach Security since September 2006.

Nessus the free (for non-commercial users) vulnerability scanning package. Tenable Network Security, the firm co-founded by Renaud Deraison, the creator of Nessus, moved over to a closed source license in October 2005. OpenVAS, a spin-off project, maintains earlier versions of Nessus as an open source vulnerability scanner. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.