Language Selection

English French German Italian Portuguese Spanish

D@TA Protection and the Linux Environment

Filed under
Security

Organizations that gather and store critical information have to protect it. While there are tried and true techniques for data protection, there are also new and innovative ones. These new practices and tools greatly enhance an organization's ability to protect mission-critical data. Linux and Open Source users are specially challenged when trying to take advantage of much of this new technology.

LWM: How is Linux involved in data protection?

TP: There are two ways that Linux pops up in regards to data protection. One is on the product side. It's one of the most popular platforms in use in data storage and data protection systems. Storage systems used to be fairly simple. When all you wanted to do was provide an interface to the storage devices and maybe RAID, you could write your own embedded executive pretty easily.

Now that storage systems are highly complex, feature-rich products, a better underlying operating system is necessary. Linux provides the environment that enables many of the advanced functions that data protection relies on. Unlike some other embedded operating systems, Linux gives developers the control they want and marketers the licensing conducive to a high-volume business. There's a downside though. Proprietary operating systems and executives rarely have the security issues that more common operating systems do. Even when there's a threat, few people are trying to exploit it. That's not always the case - take a look at the security issues that have hit Cisco IOS lately - but the threat is still higher with a common OS.

Despite that, Linux is an excellent platform for data protection products. Besides the many programmers who understand it well, the ability to program at a kernel and source code level lets you to do things that would be difficult otherwise.

The other place that Linux intersects with data protection is in the data center. Linux has established itself as a viable server operating system. Linux-based systems now serve up mission-critical data that has to be protected. That means that Linux users have to worry about data protection issues the same way Microsoft Windows Server and Unix users do.

LWM: What are some of the issues that enterprise Linux users have with data protection?

LWM: What can Linux users do to better protect mission-critical enterprise data?

LWM: What should the Linux community expect from vendors regarding data protection?

LWM: What should they expect from the Open Source community?

Full Article.

More in Tux Machines

Kodi 14.0 Helix Unwinds

Merry Christmas and happy holidays, everyone! We are proud to announce the release of Kodi 14.0, which comes with a new name, a new logo, and a wide variety of new features, but underneath the new coat of paint remains the same software we all love. A detailed changelog for Kodi 14 can be found under milestones on our code repository, should you be interested. With that said, let’s take a look at some of the features that come with Kodi 14.0. Read more

KaOS ISO 2014.12

KaOS is very proud to announce the availability of the December release of a new stable ISO. This ISO marks two major milestones for this distribution. Since it’s inception almost two years ago, a need to be ready for UEFI installs has always been a priority. That was tied though to getting a modern Qt based installer that could handle such UEFI installs. With this ISO, both are implemented. Read more

Old FOSS Friend & Foe Represents Sony in Hack

Boies, along with three attorneys representing the States, brought Microsoft to it’s knees — or so it seemed at the time. On November 5, 1999, Judge Thomas Penfield Jackson found that Windows dominance on the PC made the company a monopoly and that the company had taken illegal actions against Apple, Java, Netscape, Lotus Notes, RealNetworks, Linux, and others in order to maintain that monopoly. He ordered Microsoft broken in two, with one company producing Windows and another handling all other Microsoft software. As we all know, Judge Jackson’s solution was never implemented. Although an appeals court upheld the verdict against Redmond, the breakup of the company was overturned and sent back to the lower court for a review by a new judge. Two years later, in September, 2001, under the Bush Administration, the DOJ announced that it was no longer seeking the breakup of Microsoft, and in November reached a settlement which California, Connecticut, Iowa, Florida, Kansas, Minnesota, Utah, Virginia and Massachusetts opposed. The settlement basically required Microsoft to share its APIs and appoint a three person panel that would have complete access to Microsoft’s systems, records, and source code for five years. The settlement didn’t require Microsoft to change any code or stop the company from tying additional software with Windows. Additionally, the DOJ did not require Microsoft to change any of its code. Read more

Study: ‘European Parliament should use open source’

The European Parliament should use free software and open standards for all of its ICT systems and data, concludes a study by the EP’s Greens/European Free Alliance: “That is the most appropriate way for the Parliament to meet its own standard of ‘utmost transparency’.” Read more