Language Selection

English French German Italian Portuguese Spanish

D@TA Protection and the Linux Environment

Filed under
Security

Organizations that gather and store critical information have to protect it. While there are tried and true techniques for data protection, there are also new and innovative ones. These new practices and tools greatly enhance an organization's ability to protect mission-critical data. Linux and Open Source users are specially challenged when trying to take advantage of much of this new technology.

LWM: How is Linux involved in data protection?

TP: There are two ways that Linux pops up in regards to data protection. One is on the product side. It's one of the most popular platforms in use in data storage and data protection systems. Storage systems used to be fairly simple. When all you wanted to do was provide an interface to the storage devices and maybe RAID, you could write your own embedded executive pretty easily.

Now that storage systems are highly complex, feature-rich products, a better underlying operating system is necessary. Linux provides the environment that enables many of the advanced functions that data protection relies on. Unlike some other embedded operating systems, Linux gives developers the control they want and marketers the licensing conducive to a high-volume business. There's a downside though. Proprietary operating systems and executives rarely have the security issues that more common operating systems do. Even when there's a threat, few people are trying to exploit it. That's not always the case - take a look at the security issues that have hit Cisco IOS lately - but the threat is still higher with a common OS.

Despite that, Linux is an excellent platform for data protection products. Besides the many programmers who understand it well, the ability to program at a kernel and source code level lets you to do things that would be difficult otherwise.

The other place that Linux intersects with data protection is in the data center. Linux has established itself as a viable server operating system. Linux-based systems now serve up mission-critical data that has to be protected. That means that Linux users have to worry about data protection issues the same way Microsoft Windows Server and Unix users do.

LWM: What are some of the issues that enterprise Linux users have with data protection?

LWM: What can Linux users do to better protect mission-critical enterprise data?

LWM: What should the Linux community expect from vendors regarding data protection?

LWM: What should they expect from the Open Source community?

Full Article.

More in Tux Machines

Hayao Miyazaki CG Tribute Made with Open Source Tools

Dono produced photorealistic worlds for the memorable stars of Spirited Away, Kiki’s Delivery Service, My Neighbor Totoro, Princess Mononoke, and many more of Hayao Miyazaki’s masterpieces using a suite of open source tools, including Blender for 3D, Gimp for image editing, and Natron for compositing. The only non-open source software was the rendering engine, Octane. Read more

Why Open Source Software Growth Is Rising

GitHub CEO Chris Wanstrath discusses open source software and GitHub’s plan to expand internationally. He speaks with Bloomberg’s Emily Chang on “Bloomberg West.” Read more

Ubuntu 15.10 (Wily Werewolf) Is Now Rebased on Linux Kernel 4.2 RC5

Canonical's Joseph Salisbury reported the summary of the Ubuntu Kernel Team meeting that took place on August 4, 2015, on the official IRC channels of the project. Read more

Q4OS 2.0 Linux Distribution Will be Based on Debian 9 Stretch and Trinity Desktop 14.1

The developers of the Debian-based Q4OS Linux distribution built around the Trinity Desktop Environment (TDE) project, which aims to keep the spirit of the legacy KDE 3.5 desktop environment alive, informed Softpedia earlier about the immediate availability for download and testing of the first snapshot of Q4OS 2.0. Read more