SlideShare a Scribd company logo
1 of 83
Download to read offline
FOSS Enterprise Security Solutions

Free and Open Source Software
Enterprise Security Solutions

Joseph Guarino
Owner/Sr. Consultant
Evolutionary IT
http://www.evolutionaryit.com

Copyright © Evolutionary IT 2007

1
Evolution of IT man..
Who am I?
•

•

•

Joseph Guarino
Working in IT for last 15 years systems, network,
security admin, technical marketing, project
management, IT management, etc.
Full time IT consultant with my own firm
Evolutionary IT

•

CISSP, LPIC, MCSE, PMP

•

www.evolutionaryit.com
?


How many of you are familiar with or use
FOSS in some way?
What is FOSS/FLOSS?

●

Free and Open Source Software

●

FLOSS or Free/Libre/Open-Source Software.

●

●

Libre is used to clarify the ambiguity of the word
free in English.
Alternative term to describe software spectrum
from free to open.
Dental Hygiene?
What is FOSS?
●

●

●

●

Represents a spectrum of licenses from Free to
Open.
FOSS (Free and Open Source Software) is a
software licensing model that allows anyone the
liberty to use, extend and distribute the software as
they see fit.
FOSS is unique as well in that it produces
innovation quickly by the very concept of open,
cooperative, collaborative sharing and
development.
Commercial software is much more restrictive.
FOSS vs. Commercial
●

●

Licensed with very specific rights associated with
its use, modification, distribution and use that are
not commonly available to a user via commercial
“closed” software.
Software licenses of traditional commercial
software define specific permission, rights and
restrictions.

●

Licensee determines the license terms.

●

Much more restrictive that FOSS.

●

Freedom, sharing, collaboration are not inherit
parts of this traditional “closed” model which
typifies the traditional software industry.
History

How it all started....
Was it any of these people?
Or perhaps?
Maybe...
For Serious!

It's an amazing story...
FSF & RMS








FSF – Free Software 
Foundation
Founded in 1983 by Richard 
Stallman with the goal of 
creating a free Unix like OS, 
GNU Project.
Consummate computer 
scientist/hacker who created 
Emacs, GNU Complier, GNU 
Debugger.
Spearhead the efforts of Free 
Software movement. 
Free Software Definition










The freedom to run the program, for any purpose
(freedom 0).
The freedom to study how the program works, and
adapt it to your needs (freedom 1). Access to the
source code is a precondition for this.
The freedom to redistribute copies so you can help your
neighbor (freedom 2).
The freedom to improve the program, and release your
improvements to the public, so that the whole
community benefits (freedom 3).
Access to the source code is a precondition for this.
FSF & RMS






Created several copyright license such as the 
GNU/GPL which is the most popular FOSS licenses.
Patent reforms are also critical to RMS and the FSF.
Free as in Freedom. Price is not the issue.  
Uncompromising stance on free software and patents.



Doesn't like the term Open Source.



http://www.fsf.org/
Enter the Linus










Linus Torvalds in 1991 creates
first Linux kernel.
Released in 1992 under
GNU/GPL
Kernel + GNU Project (systems
libs/utils) = GNU/Linux
Now kernel project coordinator
and keeper of Linux
trademark.
Neutral on Free Software and
more focused on quality.



Differs with RMS.



http://www.kernel.org/
Early Days








Kernel licensed under GNU/GPL propelled
interest, innovation and ingenuity of FOSS
community.
The Linux Kernel plus the systems utilities
and libraries from the GNU project yielded
Linux in many forms.
Early distributions such as Debian &
Slackware appeared in 93.
Evolution of GNU/Linux.....
Linux Evolutionary Time line
Perception & Ambiguity of Free








Free software inherently supports
capitalism and free enterprise within the
context of it supporting free software.
Problem was the term “free” was not
helpful in selling software.
If its “free” what would you be buying?
Ugh!
Who would champion such a cause?
And along came the OSI










OSI – non-profit created in 1998
by Bruce Perens & Eric Raymond
to promote “open source.”
Open source was a repositioning
of free software with a term that
was to clear up the ambiguity
seen in the term free.
Attempt was to make free
software provide a more business
friendly effort.
Uphold and promotes Open
Source Definition.
http://www.opensource.org/
Many Licenses








There are many FOSS licenses
each which allow different rights
and responsibilities
Most popular are GNU General
Public License, GNU Lesser
General Public License, BSD
License, Mozilla Public License,
MIT License and the Apache
License.
OSI Licenses – OSI Software
Definition
http://opensource.org/licenses/
FSF Licenses – Free Software
Definition
http://www.gnu.org/licenses/
FOSS & Security


FOSS software's development models often parallel development
of commercial except the code is open to audit by any and all
project/community/users.



Openness is a benefit in customization and flexibility of solutions.



Result is quality, reliable and secure code.







FOSS Security solutions are among the most cost effective security
solutions.
FOSS software is often the basis for innovations and evolving open
and commercial closed source security solutions in the market.
Appliance marketplace, network devices, UTM, embedded
devices,etc...
No one uses that!?








Redhat, Oracle, Sun, Dell, IBM, HP, Novell, 
Oracle, Canonical are big players behind it.
Business, government, military, educational and 
scientific community, i.e. NSA, FBI, CIA, NSF, 
NASA, Wall Street. 
Google, Yahoo, Adobe, Juniper.
I bet its on your network, home, phone right 
now.
OS's (Linux/Unix - Commercial)


Linux/Unix Distros -



Redhat - www.redhat.com



Novell - www.novell.com



Canonical – www.canonical.com



Sun – www.sun.com



Commercial support



All of these projects have a community
driven effort.
OS's (Linux/Unix - Community)


Debian Linux - www.debian.org



Slackware - www.slackware.com



Ubuntu - www.ubuntu.com



Gentoo - www.gentoo.org



Fedora - www.fedoraproject.org



OpenSUSE - www.opensuse.org



Open Solaris - www.opensolaris.org
Operating Systems (BSD)


FreeBSD - www.freebsd.org



OpenBSD - www.openbsd.org











Both are community driven but community support is
available.
No single company drives projects.
OpenBSD has stellar security history. Project is model
of success of security in the Open Source world.
Only 2 remote holes in the default install in 10 years!
O'Bsd brought you OpenSSH, OpenBGPD, OpenNTP and
OpenCVS. =P
Friends forever!?
Now onward....


FOSS security tools are supernumerary
and are available for nearly EVERY
function you might need in the enterprise.



I double dog dare you to check out...



http://www.sourceforge.net
Anti-malware/virus


Anti-malware.
ClamAV


GPL AV toolkit for email scanning.



Project is the basis for many other projects.



Ported to nearly every OS such as Linux, BSD, UNIX, Windows.



http://clamav.net/



Core ClamAV is applied to so many ends such as:



MTA Scanner - for Sendmail, Qmail, Postfix, etc.



POP3 Scanner - Any



Web/FTP Scanner – Proxy, Apache, IPCop



File system Scanner - NFS



Desktop Anti-virus – ClamWin, KlamAV (KDE Front-end), ClamXav (OSX)



Development Libraries for nearly every language



http://www.clamav.net/download/third-party-tools
HAVP & ClamWin


HAVP - HTTP Anti-Virus proxy



Integrates with Squid& other Proxies



GNU/GPL



http://www.server-side.de/



ClamWin – GPL Windows Anti-Virus



Scanning scheduler



Automatic updating



Outlook Add-in



No on access scanning.



http://www.clamwin.com/
SPAM

Not that deliciously dubious “meat.”
Anti-Spam – SpamAssassin & Vapul's Razor


SpamAssassin -



Perl based standalone (spamc) or daemon (spamd)



Suports Blackhole and URI Blackhole lists SURBL and URIBL.com



SPF(Sender Policy Framework)



Checksum based filters Vipul's Razor, Distributed Checksum Clearing
House



Apache 2.0 License



Kerio, McAfee and many more build upon this project.



http://spamassassin.apache.org/



Vipul's Razor -



Distributed, collaborative, spam detection and filtering network.



http://razor.sourceforge.net/
Anti-Spam - Dspam


Dspam



Statistical spam filter



GNU/GPL





MTA-Independent with support for Sendmail, Postfix, Qmail, Courier, and
Exim to name a few.
Bayesian filters – which take advantage of Bayes Theorem which takes
probabilistic measure of an email is spam by its content (words) to
determine if its spam.



Adaptive filter – it is capable of learning.



http://dspam.nuclearelephant.com/index.shtml
Anti-Spam - ASSP


ASSP



Transparent SMTP Proxy filtering



Platform independent runs on Linux, Unix, Windows, etc.



GNU/GPL



Works with any mail server



Bayesian Analysis



Whitelisting, Greylisting (Delaying)



DNSBL (DNS Black holes), PB (Penalty Box – trapping of offending IP's)



SPF



http://assp.sourceforge.net/
Firewalls and then some




Firewall space for FOSS is very vibrant,
mature and feature rich space with many
options to choose from. Can be used for
Firewall, VPN, HTTP Filter, Mail Filter, etc.
Additionally it commonly serves as the
basis for internetworking devices from a
variety of vendors.
Yes!




One can build a firewall from scratch with
Linux with Netfilter/Iptables or on BSD
with PF and that is great.
But....
Do you use this?






To fix your leaky
roof?
Maybe not the best
plan for every
instance.
=P
?
Firewalls - Monowall


Monowall



FreeBSD based



BSD License



Live CD, Embedded, Hard Drive Install



Simple web management GUI



Simple single XML configuration file



Can be built on i386, embedded, WRAP



Wifi support



Ipsec/PPTP VPN



SSH Server



DNS, DHCP, Dynamic DNS support



Commercial support available from dozens of vendors



http://m0n0.ch/wall/
Firewall - Pfsense


PFSense



Based on Monowall



Built on FreeBSD 6.1 with PF firewall from OpenBSD



BSD License



Live CD, Embedded, Hard Drive Install



Simple web management GUI



Can be built on i386, embedded, WRAP



Wifi support a/b/g, WEP, WPA/WPA2



Ipsec/PPTP VPN
Firewall - Pfsense


DNS, DHCP, Dynamic DNS support



Traffic Shaping with ALTQ



Multi WAN



Load Balancing



Failover CARP



Dozen of plug-ins to expand



Commercial support available from dozens of vendors



http://www.pfsense.org
Firewall - IPCop


IPCop



Fork of Smoothwall



Built from Linux From Scratch



Embedded, Hard Drive Install



I386 and embedded.



GNU/GPL



Stateful Firewall



NAT



Proxy (Squid) HTTP/FTP



IDS (Snort)
Firewall - IPCop


NTP client/server



SSH Server



DNS, DHCP, Dynamic DNS support



Traffic Shaping



IPSec/PPTP



Extensive Logging & Graphing



Extensive plug-ins to do any and everything under the sun.



Commercial support available from dozens of vendors



http://www.ipcop.org
VPN


Virtual private network.
VPN - OpenVPN




SSL/TLS VPN solution
Flexible authentication options with certificates, smart cards, 2-factor
authentication



Firewall & NAT friendly



Dynamic address support



Multiple protocol support



Linux, Solaris, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Windows
2000/XP



Client is required as it is not a proxy solution.



http://openvpn.net/



Open VPN Windows GUI



http://openvpn.se/
VPN – SSL Explorer


SSL/TLS VPN Solution



GNU/GPL



Available in commercial enterprise edition – 3SP Ltd.



Full support web proxy



Microsoft Windows, Linux, Os X, Sun Solaris supported



Zero footprint VPN (browser) – no other client needed



Slick web management GUI



Internet Explorer 5, IE6, IE7, Mozilla Firefox, Opera and Safari browsers



Supernumerary strong authentication options such as LDAP, Radius,
Public-Key, SSL client cert, one time password via SMS/Cell/PDA, RSA
SecureID, VASCO Digipass.



Full auditing and reporting



http://www.sshtools.com/showSslExplorerCommunity.do
VPN - OpenSwan


Ipsec VPN Solution



Fork of defunct FreeS/WAN



GNU/GPL



Opportunistic Encryption



X.509 certificates



NAT traversal support



XAUTH



DNSSEC support



http://www.openswan.org/
VPN - Poptop


PPTP Server



Linux, BSD, Solaris



GNU/GPL



Microsoft compatible authentication &
encryption (MSCHAPv2, MPPE 40-128 bit RC4)



Supports integration with LDAP/SAMBA



Windows built-in clients and Linux



http://www.poptop.org/
Proxy solutions


Advanced content filtering and control
Proxy - Squid












Caching proxy for HTTP, HTTPS, FTP and then
some.
Reverse Proxy
Basis for many commercial content related
devices.
Many useful add-ons.
Supports Authentication via proxy_auth for
LDAP, NCSA, MSNT, PAM, SMB, SASL, YP(NIS)
http://www.squid-cache.org/
Proxy - DansGuardian




Web Content Filtering using content of pages,
MIME filtering, file extension, phrase matching,
POST limiting and URL filtering and URL
blacklisting.
PICS (Platform for Internet Content Selection –
metadata labeling of webpages standard
developed by W3C) filtering



Can work with nearly any proxy



Linux, BSD, OSX, Unix



GNU/GPL



http://dansguardian.org/
Content Filtering - SquidGuard & HAVP


SquidGuard



Plug-in for Squid Content Control



Blacklisting, URL Matching, IP/Network/Domain Blocking, Time based
blocking and Authentication Support



GNU/GPL



http://www.squidguard.org/



HAVP



HTTP Anti-Virus proxy



Proxy with ClamAV



Integrates with Squid& other Proxies



GNU/GPL



http://www.server-side.de
Content Filtering - Untangle






Linux UTM (Unified Threat Management) with
simple GUI management.
Supports Spam prevention, Web Filtering, Antivirus
Scanner, Phishing Blocker, IPS, Firewall, Remote
Access, VPN (OpenVPN) and basic routing features.
Advanced Reporting features as well as PDF and
HTML export.



GNU/GPL



Commercial support and Appliance solutions



http://www.untangle.com/
HID


Host based Intrusion Detection
HID - Osiris


Centralized client/server systems integrity check
program.



Central server maintains file integrity database



Monitors kernel and files



Encryption support



BSD, Linux, Unix. OSX, Windows



Email Support



Syslog



http://osiris.shmoo.com/
HID - Samhain


File/Systems Integrity and IDS



Client Server model with centralized monitoring and management



Supports reports stored in Databases Oracle, MySql, PostgreSQL



Beltane – web based PHP configuration console



Linux, BSD, Unix and Windows











Checksum (Tiger192, SHA-1, MD5), size, mode/permission, owner, group,
etc. SELinux, POSIX ACL.
Kernel Integrity Check (rootkit detection), SUID/SGID, Open Ports, Process
Check, Mount Check, Logon Event Check
Advanced Logging – centralized logging w/ encryption, syslog, built-in
email functionality, RDBMS support.
Inter operates with Prelude & Nagios
http://www.la-samhna.de/samhain/index.html
HID - OSSEC






Integrates log analysis, file integrity
checking, Windows registry monitoring,
root kit detection, real time alerting and
response.
Strong and well integrated Log analysis
engine.
Runs on Linux, BSD, OS X, Solaris &
Windows.



GNU/GPL



http://www.ossec.net/
IDS


Intrusion Detection
IDS - Snort


Real-time traffic analysis & logging via protocol analysis,
content searching/matching.



Signature, protocol and anomaly based detection



GNU/GPL



Unix/Linux/BSD/Windows



Many plug-ins and extensions are available



Gold standard in the IDS world



Basis of many commercial intrusion detection products



Commercial support is available.



http://www.snort.org/
IDS - BASE


Basic Analysis and Security Engine (BASE)



Web front-end for analysis of snort IDS data



Allows for user authentication and role-based system



Easy web administration



GNU/GPL



http://base.secureideas.net/





Other SNORT add-ons such as ACID, Barnyard,
Snortsnarf,etc.
http://www.snort.org/dl/contrib/
Sguil




Pronounced sgweel
Intuitive GUI to realtime events, session
data and raw packet captures.



BSD, Linux, Solaris, Windows, Os X



QT Public License



http://sguil.sourceforge.net
IDS - Prelude-IDS




Hybrid IDS Framework that supports most open source frameworks
such as Snort, Honeyd, Nessus, Samhain, etc.
IDMEF (Intrusion Detection Message Exchange Format) IETF XML
based common format for IDS alerts.



SSL encrypted communication with sensors



Text/XML reporting



Database support for MySQL, PostgreSQL



Logging from many commercial devices such as Cisco, CheckPoint,
Symantec, Syslog



Linux, BSD, Unix, OSX



http://prelude-ids.org/
Vulnerability assessment


Scanning & assessment tools.
Nmap


Nmap



Network Mapper



Node Discovery



Port Scanning



Operating Systems detection



Linux, Unix, BSD, Windows



GNU/GPL



http://insecure.org/
Nessus




All encompassing vulnerability & security scanner
Vulnerability enumeration, patch & misconfiguration
information



Password testing using brute force/dictionary attacks



Denial of service test.







NASL (Nessus Attack Scripting Language) for any
vulnerabilities tests.
Output as Txt, HTML, LaTeX
Open source until version 2.x now a closed commercial
project
OpenVAS




Fork of 2.x Nessus
All the amazing features of Nessus but
focus of Free software licensing.



Fully GNU/GPL



Not yet 1.x.



http://www.openvas.org/
NAC

Network Admission Control
PacketFence


Open source NAC solution.



Based on Fedora, LAMP, Perl and Snort



Heterogeneous focus and vendor agnostic



PacketFence Zen (Vmware Virtual Appliance)



Authentication via Apache (any supported)



Captive portal and remediation



Optional ban of unsupported OS's ex. Windows
95/98/ME or NAT devices



GNU/GPL



http://www.packetfence.org/
FreeNAC




FreeNAC
Open source NAC solution based on Linux, OpenVMPS,
FreeRadius, MySQL



Dynamic VLAN management



Slick Web and Windows GUI management console



802.1x authentication



Scanning and identification of attached devices



Live inventory and reporting



Does not require end devices in VMPS mode.



GNU/GPL



http://www.freenac.net/
Network Monitoring




Without availability how can you have
security?
CIA triad. =)
Nagios


Enterprise network monitoring suite originally
Netsaint project.



GNU/GPL



Linux, Unix, BSD, etc.



Notification via pager, email, user defined method.



Monitoring of network services, host resources and
any other metrics.



Impressive array of plugins/addons.



Simple usable web interface.



http://www.nagios.org/
Zenoss


Open network monitoring and management suite.



GNU/GPL



BSD, Linux, Unix and even Windows.







Network health, performance, configuration, inventory/change,
event management, logging, alerting and reporting.
Supports a multitude of environmental, network, server,
application, service checks.
CMDB – configuration management database to model IT assets as
detailed in ITIL best practice.



Ease of management/setup with auto-discovery and web GUI.



Highly evolved and integrated suite beyond mere monitoring.



Commercial version is available with additional features.



http://www.zenoss.com/
Zabbix


Open network monitoring, alerting and
visualization suite.



GNU/GPL



BSD, Linux, Unix



Supports auto-discovery, distributed
monitoring, enhanced web monitoring,
enhanced notification and alerting, agents for
nearly every OS, etc.



Great web management console.



Commercial support is available.



http://www.zabbix.com/
Network Analysis


What is going on out there?
Wireshark


Open source network protocol analyzer.



100's of supported protocols



GNU/GPL



Windows, Linux, BSD, Os X



3 pane view with color coding.





Ability to decode nearly all standard capture file
formats
Supports decryption of Ipsec, ISAKMP, Kerberos,
SNMPv3, SSL/TLS, WEP, WPA,WPA2.



Outputs to XML, Postscript, CSV or plain text.



http://www.wireshark.org/
Ntop


Network traffic probe that produces rich graphical output on
your networks happenings.



GNU/GPL



Linux, BSD, Unix





CLI or web interface, passive OS fingerprinting, graphical
charts, protocol decoders, RDD support, Internet Domain, AS
(Autonomous System) and VLAN stats.
Intuitive and feature rich web interface for insight into
networks inner workings.



Can be an NetFlow/sFlow collector.



Suite of applications such as nProbe, nBox and PF_Ring



Commercial support is available.



http://www.ntop.org/
Centralized Consoles


Security Management Console Suites
OSSIM


Open Source Security Information Management.



BSD License



BSD, Linux, Unix









Well integrated collection of FOSS tools for security
management tasks.
Arpwatch, P0f, Pads, Nessus, Snort, Spade, Tcptrack, Ntop,
Nagios, Osiris.
Event correlation, visualization, reporting and incident
management.
Very nice web based security dashboard for comprehensive
360 view of environment.



Commercially available with support options



http://www.ossim.net/
Live Cd Distro's




BackTrack
Slackware based penetration testing
live CD.



nUbuntu
Based on Ubuntu but with security
tools





http://www.nubuntu.org/





Merger of Auditor and Whax Live CD
projects



SecureDVD

>300 security tools

Multiple Security Distro's on one handy
http://www.remote-exploit.org/backtrack.htmlDVD








Helix



Focus on Incident Response and
Computer Forensics

Backtrack, Operator, PHLAX, Auditor,
L.A.S., Knoppix-STD, Helix, Fire,
nUbuntu, Insert.









Bit out of date





http://www.securedvd.org/

http://www.e-fense.com/helix/
Insert
Based on Knoppix and used for
Network analysis, DR, forensics,
penetration testing, etc.
http://www.inside-security.de/insert_en.html
Thanks to..






Bradley J. Dinerman & Jack Daniels of
NAISG.
NAISG community.
The FOSS community (developers,
documenters, advocates, users, etc.)
everywhere.
Contact
Joseph Guarino
888.404.5074
www.evolutionaryit.com
Open Networker
http://www.linkedin.com/in/evolutionaryit
http://www.facebook.com/evolutionaryit

More Related Content

What's hot

Ubuntu Server - A Quick and Comprehensive Overview
Ubuntu Server - A Quick and Comprehensive OverviewUbuntu Server - A Quick and Comprehensive Overview
Ubuntu Server - A Quick and Comprehensive Overviewevolutionaryit
 
Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Zulhilmi Shaffe
 
Free Software Introduction
Free Software IntroductionFree Software Introduction
Free Software Introductionshirish agarwal
 
Introduction to fedora 20cat
Introduction to fedora   20catIntroduction to fedora   20cat
Introduction to fedora 20catMedo EL-Masry
 
Introduction to Fedora project and Fedora.Next
Introduction to Fedora project and Fedora.NextIntroduction to Fedora project and Fedora.Next
Introduction to Fedora project and Fedora.NextPravin Satpute
 
An introduction to free software
An introduction to free softwareAn introduction to free software
An introduction to free softwarePlusOrMinusZero
 
Free and open source software
Free and open source softwareFree and open source software
Free and open source softwareFrederik Questier
 
Introduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSI
Introduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSIIntroduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSI
Introduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSIVarun Mahajan
 
The Free Software Movement
The Free Software MovementThe Free Software Movement
The Free Software MovementAkis F.
 
Introducción al Software Libre
Introducción al Software LibreIntroducción al Software Libre
Introducción al Software LibreDiego Berrueta
 
Introduction To Opensource And GNU/Linux
Introduction To Opensource And GNU/LinuxIntroduction To Opensource And GNU/Linux
Introduction To Opensource And GNU/LinuxSheila Eiffert
 
Open Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsOpen Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsJoshua Smith
 
OpenSource for Entreprise
OpenSource for EntrepriseOpenSource for Entreprise
OpenSource for EntrepriseEric Fesler
 
S.zacchiroli 20121205-fossa
S.zacchiroli 20121205-fossaS.zacchiroli 20121205-fossa
S.zacchiroli 20121205-fossahere_and_there
 

What's hot (20)

Linux
LinuxLinux
Linux
 
Ubuntu Server - A Quick and Comprehensive Overview
Ubuntu Server - A Quick and Comprehensive OverviewUbuntu Server - A Quick and Comprehensive Overview
Ubuntu Server - A Quick and Comprehensive Overview
 
Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]
 
Free Open Source Software - Introduction
Free Open Source Software - IntroductionFree Open Source Software - Introduction
Free Open Source Software - Introduction
 
Free Software Introduction
Free Software IntroductionFree Software Introduction
Free Software Introduction
 
FOSS
FOSS FOSS
FOSS
 
Introduction to fedora 20cat
Introduction to fedora   20catIntroduction to fedora   20cat
Introduction to fedora 20cat
 
Free software foundation
Free software foundationFree software foundation
Free software foundation
 
Introduction to Fedora project and Fedora.Next
Introduction to Fedora project and Fedora.NextIntroduction to Fedora project and Fedora.Next
Introduction to Fedora project and Fedora.Next
 
An introduction to free software
An introduction to free softwareAn introduction to free software
An introduction to free software
 
Free and open source software
Free and open source softwareFree and open source software
Free and open source software
 
Open Source and Free Software
Open Source and Free SoftwareOpen Source and Free Software
Open Source and Free Software
 
Introduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSI
Introduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSIIntroduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSI
Introduction to GNU/Linux, Free Software, Open Source Software, FSF, FSM, OSI
 
The Free Software Movement
The Free Software MovementThe Free Software Movement
The Free Software Movement
 
Introducción al Software Libre
Introducción al Software LibreIntroducción al Software Libre
Introducción al Software Libre
 
Introduction To Opensource And GNU/Linux
Introduction To Opensource And GNU/LinuxIntroduction To Opensource And GNU/Linux
Introduction To Opensource And GNU/Linux
 
Intro to Free Software | Swecha
Intro to Free Software | SwechaIntro to Free Software | Swecha
Intro to Free Software | Swecha
 
Open Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsOpen Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystems
 
OpenSource for Entreprise
OpenSource for EntrepriseOpenSource for Entreprise
OpenSource for Entreprise
 
S.zacchiroli 20121205-fossa
S.zacchiroli 20121205-fossaS.zacchiroli 20121205-fossa
S.zacchiroli 20121205-fossa
 

Viewers also liked

Tener una vida postural de calidad. HIgiene Postural.
Tener una vida postural de calidad. HIgiene Postural.Tener una vida postural de calidad. HIgiene Postural.
Tener una vida postural de calidad. HIgiene Postural.MPD Método Pilar Domínguez
 
Support for Kids with Incarcerated Parents (SKIP)
Support for Kids with Incarcerated Parents (SKIP)Support for Kids with Incarcerated Parents (SKIP)
Support for Kids with Incarcerated Parents (SKIP)Pennsylvania Prison Society
 
Digital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VML
Digital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VMLDigital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VML
Digital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VMLDigital Clarity Group
 
Presentación de powerpoint
Presentación de powerpointPresentación de powerpoint
Presentación de powerpointamy1920moreno
 
Amazing prediction know youself
Amazing prediction  know youself Amazing prediction  know youself
Amazing prediction know youself ricksilversteine
 
PROYECTO SEGURIDAD VIAL EXPOTIT@
PROYECTO SEGURIDAD VIAL EXPOTIT@PROYECTO SEGURIDAD VIAL EXPOTIT@
PROYECTO SEGURIDAD VIAL EXPOTIT@gloriaelena325
 
Phuket Real Estate Thailand
Phuket Real Estate ThailandPhuket Real Estate Thailand
Phuket Real Estate Thailandglobaltechsource
 
Diego Montesano -. Genes.com.ar
Diego Montesano -. Genes.com.arDiego Montesano -. Genes.com.ar
Diego Montesano -. Genes.com.arDiego Montesano
 
Power compra local
Power compra localPower compra local
Power compra localInma Garrido
 
Iglesia en Valladolid, 2ª quincena noviembre
Iglesia en Valladolid, 2ª quincena noviembreIglesia en Valladolid, 2ª quincena noviembre
Iglesia en Valladolid, 2ª quincena noviembrecristinamoreubi
 
Revista Oficial ANECPLA: Infoplagas. Nº 51 JUN 2013
Revista Oficial ANECPLA: Infoplagas. Nº 51  JUN 2013Revista Oficial ANECPLA: Infoplagas. Nº 51  JUN 2013
Revista Oficial ANECPLA: Infoplagas. Nº 51 JUN 2013ANECPLA
 
Informe pv92 m1 lacc2
Informe pv92 m1 lacc2Informe pv92 m1 lacc2
Informe pv92 m1 lacc2Alba Gándara
 
ISISO product broshures
ISISO product broshuresISISO product broshures
ISISO product broshuresŞakir Musa
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 

Viewers also liked (20)

Tener una vida postural de calidad. HIgiene Postural.
Tener una vida postural de calidad. HIgiene Postural.Tener una vida postural de calidad. HIgiene Postural.
Tener una vida postural de calidad. HIgiene Postural.
 
Felipe, león el hacha
Felipe, león   el hachaFelipe, león   el hacha
Felipe, león el hacha
 
Fax
FaxFax
Fax
 
Support for Kids with Incarcerated Parents (SKIP)
Support for Kids with Incarcerated Parents (SKIP)Support for Kids with Incarcerated Parents (SKIP)
Support for Kids with Incarcerated Parents (SKIP)
 
Digital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VML
Digital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VMLDigital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VML
Digital Pulse Summit - The Forces Shaping the Web - Mike Lundgren, VML
 
Portafolio
PortafolioPortafolio
Portafolio
 
Patrick hochstenbach mobilize u gent
Patrick hochstenbach mobilize u gentPatrick hochstenbach mobilize u gent
Patrick hochstenbach mobilize u gent
 
Presentación de powerpoint
Presentación de powerpointPresentación de powerpoint
Presentación de powerpoint
 
Amazing prediction know youself
Amazing prediction  know youself Amazing prediction  know youself
Amazing prediction know youself
 
PROYECTO SEGURIDAD VIAL EXPOTIT@
PROYECTO SEGURIDAD VIAL EXPOTIT@PROYECTO SEGURIDAD VIAL EXPOTIT@
PROYECTO SEGURIDAD VIAL EXPOTIT@
 
Phuket Real Estate Thailand
Phuket Real Estate ThailandPhuket Real Estate Thailand
Phuket Real Estate Thailand
 
Diego Montesano -. Genes.com.ar
Diego Montesano -. Genes.com.arDiego Montesano -. Genes.com.ar
Diego Montesano -. Genes.com.ar
 
Power compra local
Power compra localPower compra local
Power compra local
 
Iglesia en Valladolid, 2ª quincena noviembre
Iglesia en Valladolid, 2ª quincena noviembreIglesia en Valladolid, 2ª quincena noviembre
Iglesia en Valladolid, 2ª quincena noviembre
 
Rsf ejercicio
Rsf  ejercicio Rsf  ejercicio
Rsf ejercicio
 
Revista Oficial ANECPLA: Infoplagas. Nº 51 JUN 2013
Revista Oficial ANECPLA: Infoplagas. Nº 51  JUN 2013Revista Oficial ANECPLA: Infoplagas. Nº 51  JUN 2013
Revista Oficial ANECPLA: Infoplagas. Nº 51 JUN 2013
 
Informe pv92 m1 lacc2
Informe pv92 m1 lacc2Informe pv92 m1 lacc2
Informe pv92 m1 lacc2
 
ISISO product broshures
ISISO product broshuresISISO product broshures
ISISO product broshures
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
India Cross Culture Training Shivoo
India Cross Culture Training ShivooIndia Cross Culture Training Shivoo
India Cross Culture Training Shivoo
 

Similar to Open Source Enterprise Security Solutions

Ubuntu Server a Comprehensive Overview
Ubuntu Server a Comprehensive OverviewUbuntu Server a Comprehensive Overview
Ubuntu Server a Comprehensive Overviewevolutionaryit
 
An introduction to open source software
An introduction to open source softwareAn introduction to open source software
An introduction to open source softwareSanjuktaBanik
 
Open Source is Not An Alternative, It is The Solution
Open Source is Not An Alternative, It is The SolutionOpen Source is Not An Alternative, It is The Solution
Open Source is Not An Alternative, It is The Solutionwiradikusuma
 
Intro to FOSS
Intro to FOSSIntro to FOSS
Intro to FOSSmgamal87
 
GoOpen 2010: Sandro D'Elia
GoOpen 2010: Sandro D'EliaGoOpen 2010: Sandro D'Elia
GoOpen 2010: Sandro D'EliaFriprogsenteret
 
Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?david rom
 
Gup2011| open source
Gup2011| open sourceGup2011| open source
Gup2011| open sourceOutserve
 
Open Source
Open SourceOpen Source
Open Sourcenqfaq
 
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONOPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONRitwick Halder
 
Open Source
Open SourceOpen Source
Open SourceJohn Gs
 
Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*
Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*
Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*dbslibrary
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systemsTushar B Kute
 
Fos sintro pres-dav
Fos sintro pres-davFos sintro pres-dav
Fos sintro pres-davParin Sharma
 

Similar to Open Source Enterprise Security Solutions (20)

foss_19-9
foss_19-9foss_19-9
foss_19-9
 
opensource.ppt
opensource.pptopensource.ppt
opensource.ppt
 
Ubuntu Server a Comprehensive Overview
Ubuntu Server a Comprehensive OverviewUbuntu Server a Comprehensive Overview
Ubuntu Server a Comprehensive Overview
 
Open source
Open sourceOpen source
Open source
 
An introduction to open source software
An introduction to open source softwareAn introduction to open source software
An introduction to open source software
 
Open Source is Not An Alternative, It is The Solution
Open Source is Not An Alternative, It is The SolutionOpen Source is Not An Alternative, It is The Solution
Open Source is Not An Alternative, It is The Solution
 
Intro to FOSS
Intro to FOSSIntro to FOSS
Intro to FOSS
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
GoOpen 2010: Sandro D'Elia
GoOpen 2010: Sandro D'EliaGoOpen 2010: Sandro D'Elia
GoOpen 2010: Sandro D'Elia
 
Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?
 
Gup2011| open source
Gup2011| open sourceGup2011| open source
Gup2011| open source
 
Open Source
Open SourceOpen Source
Open Source
 
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONOPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATION
 
Open Source
Open SourceOpen Source
Open Source
 
Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*
Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*
Ten Open Source Tools Which Will Transform Your Library and Your Library Budget*
 
Introduction to FOSS
Introduction to FOSSIntroduction to FOSS
Introduction to FOSS
 
Open source
Open sourceOpen source
Open source
 
FLOSS in SMEs
FLOSS in SMEsFLOSS in SMEs
FLOSS in SMEs
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
 
Fos sintro pres-dav
Fos sintro pres-davFos sintro pres-dav
Fos sintro pres-dav
 

More from evolutionaryit

Selling Open Source w/ Business Metrics - Being Persuasive with Management
Selling Open Source w/ Business Metrics - Being Persuasive with ManagementSelling Open Source w/ Business Metrics - Being Persuasive with Management
Selling Open Source w/ Business Metrics - Being Persuasive with Managementevolutionaryit
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Onlineevolutionaryit
 
Using the Internet and Social Networking to Find Your Dream Job
Using the Internet and Social Networking to Find Your Dream JobUsing the Internet and Social Networking to Find Your Dream Job
Using the Internet and Social Networking to Find Your Dream Jobevolutionaryit
 
FOSS Enterprise Security Solutions
FOSS Enterprise Security SolutionsFOSS Enterprise Security Solutions
FOSS Enterprise Security Solutionsevolutionaryit
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Securityevolutionaryit
 
Fun and Games Linux Game Servers
Fun and Games Linux Game ServersFun and Games Linux Game Servers
Fun and Games Linux Game Serversevolutionaryit
 
Open Source Video Games - Truly Free -- Truly FUN
Open Source Video Games  - Truly Free -- Truly FUNOpen Source Video Games  - Truly Free -- Truly FUN
Open Source Video Games - Truly Free -- Truly FUNevolutionaryit
 

More from evolutionaryit (7)

Selling Open Source w/ Business Metrics - Being Persuasive with Management
Selling Open Source w/ Business Metrics - Being Persuasive with ManagementSelling Open Source w/ Business Metrics - Being Persuasive with Management
Selling Open Source w/ Business Metrics - Being Persuasive with Management
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
Using the Internet and Social Networking to Find Your Dream Job
Using the Internet and Social Networking to Find Your Dream JobUsing the Internet and Social Networking to Find Your Dream Job
Using the Internet and Social Networking to Find Your Dream Job
 
FOSS Enterprise Security Solutions
FOSS Enterprise Security SolutionsFOSS Enterprise Security Solutions
FOSS Enterprise Security Solutions
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
 
Fun and Games Linux Game Servers
Fun and Games Linux Game ServersFun and Games Linux Game Servers
Fun and Games Linux Game Servers
 
Open Source Video Games - Truly Free -- Truly FUN
Open Source Video Games  - Truly Free -- Truly FUNOpen Source Video Games  - Truly Free -- Truly FUN
Open Source Video Games - Truly Free -- Truly FUN
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Open Source Enterprise Security Solutions

  • 1. FOSS Enterprise Security Solutions Free and Open Source Software Enterprise Security Solutions Joseph Guarino Owner/Sr. Consultant Evolutionary IT http://www.evolutionaryit.com Copyright © Evolutionary IT 2007 1
  • 3. Who am I? • • • Joseph Guarino Working in IT for last 15 years systems, network, security admin, technical marketing, project management, IT management, etc. Full time IT consultant with my own firm Evolutionary IT • CISSP, LPIC, MCSE, PMP • www.evolutionaryit.com
  • 4. ?  How many of you are familiar with or use FOSS in some way?
  • 5. What is FOSS/FLOSS? ● Free and Open Source Software ● FLOSS or Free/Libre/Open-Source Software. ● ● Libre is used to clarify the ambiguity of the word free in English. Alternative term to describe software spectrum from free to open.
  • 7. What is FOSS? ● ● ● ● Represents a spectrum of licenses from Free to Open. FOSS (Free and Open Source Software) is a software licensing model that allows anyone the liberty to use, extend and distribute the software as they see fit. FOSS is unique as well in that it produces innovation quickly by the very concept of open, cooperative, collaborative sharing and development. Commercial software is much more restrictive.
  • 8. FOSS vs. Commercial ● ● Licensed with very specific rights associated with its use, modification, distribution and use that are not commonly available to a user via commercial “closed” software. Software licenses of traditional commercial software define specific permission, rights and restrictions. ● Licensee determines the license terms. ● Much more restrictive that FOSS. ● Freedom, sharing, collaboration are not inherit parts of this traditional “closed” model which typifies the traditional software industry.
  • 9. History How it all started....
  • 10. Was it any of these people?
  • 13. For Serious! It's an amazing story...
  • 15. Free Software Definition      The freedom to run the program, for any purpose (freedom 0). The freedom to study how the program works, and adapt it to your needs (freedom 1). Access to the source code is a precondition for this. The freedom to redistribute copies so you can help your neighbor (freedom 2). The freedom to improve the program, and release your improvements to the public, so that the whole community benefits (freedom 3). Access to the source code is a precondition for this.
  • 17. Enter the Linus      Linus Torvalds in 1991 creates first Linux kernel. Released in 1992 under GNU/GPL Kernel + GNU Project (systems libs/utils) = GNU/Linux Now kernel project coordinator and keeper of Linux trademark. Neutral on Free Software and more focused on quality.  Differs with RMS.  http://www.kernel.org/
  • 18. Early Days     Kernel licensed under GNU/GPL propelled interest, innovation and ingenuity of FOSS community. The Linux Kernel plus the systems utilities and libraries from the GNU project yielded Linux in many forms. Early distributions such as Debian & Slackware appeared in 93. Evolution of GNU/Linux.....
  • 20. Perception & Ambiguity of Free     Free software inherently supports capitalism and free enterprise within the context of it supporting free software. Problem was the term “free” was not helpful in selling software. If its “free” what would you be buying? Ugh! Who would champion such a cause?
  • 21. And along came the OSI      OSI – non-profit created in 1998 by Bruce Perens & Eric Raymond to promote “open source.” Open source was a repositioning of free software with a term that was to clear up the ambiguity seen in the term free. Attempt was to make free software provide a more business friendly effort. Uphold and promotes Open Source Definition. http://www.opensource.org/
  • 22. Many Licenses     There are many FOSS licenses each which allow different rights and responsibilities Most popular are GNU General Public License, GNU Lesser General Public License, BSD License, Mozilla Public License, MIT License and the Apache License. OSI Licenses – OSI Software Definition http://opensource.org/licenses/ FSF Licenses – Free Software Definition http://www.gnu.org/licenses/
  • 23. FOSS & Security  FOSS software's development models often parallel development of commercial except the code is open to audit by any and all project/community/users.  Openness is a benefit in customization and flexibility of solutions.  Result is quality, reliable and secure code.    FOSS Security solutions are among the most cost effective security solutions. FOSS software is often the basis for innovations and evolving open and commercial closed source security solutions in the market. Appliance marketplace, network devices, UTM, embedded devices,etc...
  • 24. No one uses that!?     Redhat, Oracle, Sun, Dell, IBM, HP, Novell,  Oracle, Canonical are big players behind it. Business, government, military, educational and  scientific community, i.e. NSA, FBI, CIA, NSF,  NASA, Wall Street.  Google, Yahoo, Adobe, Juniper. I bet its on your network, home, phone right  now.
  • 25. OS's (Linux/Unix - Commercial)  Linux/Unix Distros -  Redhat - www.redhat.com  Novell - www.novell.com  Canonical – www.canonical.com  Sun – www.sun.com  Commercial support  All of these projects have a community driven effort.
  • 26. OS's (Linux/Unix - Community)  Debian Linux - www.debian.org  Slackware - www.slackware.com  Ubuntu - www.ubuntu.com  Gentoo - www.gentoo.org  Fedora - www.fedoraproject.org  OpenSUSE - www.opensuse.org  Open Solaris - www.opensolaris.org
  • 27. Operating Systems (BSD)  FreeBSD - www.freebsd.org  OpenBSD - www.openbsd.org      Both are community driven but community support is available. No single company drives projects. OpenBSD has stellar security history. Project is model of success of security in the Open Source world. Only 2 remote holes in the default install in 10 years! O'Bsd brought you OpenSSH, OpenBGPD, OpenNTP and OpenCVS. =P
  • 29. Now onward....  FOSS security tools are supernumerary and are available for nearly EVERY function you might need in the enterprise.  I double dog dare you to check out...  http://www.sourceforge.net
  • 31. ClamAV  GPL AV toolkit for email scanning.  Project is the basis for many other projects.  Ported to nearly every OS such as Linux, BSD, UNIX, Windows.  http://clamav.net/  Core ClamAV is applied to so many ends such as:  MTA Scanner - for Sendmail, Qmail, Postfix, etc.  POP3 Scanner - Any  Web/FTP Scanner – Proxy, Apache, IPCop  File system Scanner - NFS  Desktop Anti-virus – ClamWin, KlamAV (KDE Front-end), ClamXav (OSX)  Development Libraries for nearly every language  http://www.clamav.net/download/third-party-tools
  • 32. HAVP & ClamWin  HAVP - HTTP Anti-Virus proxy  Integrates with Squid& other Proxies  GNU/GPL  http://www.server-side.de/  ClamWin – GPL Windows Anti-Virus  Scanning scheduler  Automatic updating  Outlook Add-in  No on access scanning.  http://www.clamwin.com/
  • 33. SPAM Not that deliciously dubious “meat.”
  • 34. Anti-Spam – SpamAssassin & Vapul's Razor  SpamAssassin -  Perl based standalone (spamc) or daemon (spamd)  Suports Blackhole and URI Blackhole lists SURBL and URIBL.com  SPF(Sender Policy Framework)  Checksum based filters Vipul's Razor, Distributed Checksum Clearing House  Apache 2.0 License  Kerio, McAfee and many more build upon this project.  http://spamassassin.apache.org/  Vipul's Razor -  Distributed, collaborative, spam detection and filtering network.  http://razor.sourceforge.net/
  • 35. Anti-Spam - Dspam  Dspam  Statistical spam filter  GNU/GPL   MTA-Independent with support for Sendmail, Postfix, Qmail, Courier, and Exim to name a few. Bayesian filters – which take advantage of Bayes Theorem which takes probabilistic measure of an email is spam by its content (words) to determine if its spam.  Adaptive filter – it is capable of learning.  http://dspam.nuclearelephant.com/index.shtml
  • 36. Anti-Spam - ASSP  ASSP  Transparent SMTP Proxy filtering  Platform independent runs on Linux, Unix, Windows, etc.  GNU/GPL  Works with any mail server  Bayesian Analysis  Whitelisting, Greylisting (Delaying)  DNSBL (DNS Black holes), PB (Penalty Box – trapping of offending IP's)  SPF  http://assp.sourceforge.net/
  • 37. Firewalls and then some   Firewall space for FOSS is very vibrant, mature and feature rich space with many options to choose from. Can be used for Firewall, VPN, HTTP Filter, Mail Filter, etc. Additionally it commonly serves as the basis for internetworking devices from a variety of vendors.
  • 38. Yes!   One can build a firewall from scratch with Linux with Netfilter/Iptables or on BSD with PF and that is great. But....
  • 39. Do you use this?    To fix your leaky roof? Maybe not the best plan for every instance. =P
  • 40. ?
  • 41. Firewalls - Monowall  Monowall  FreeBSD based  BSD License  Live CD, Embedded, Hard Drive Install  Simple web management GUI  Simple single XML configuration file  Can be built on i386, embedded, WRAP  Wifi support  Ipsec/PPTP VPN  SSH Server  DNS, DHCP, Dynamic DNS support  Commercial support available from dozens of vendors  http://m0n0.ch/wall/
  • 42. Firewall - Pfsense  PFSense  Based on Monowall  Built on FreeBSD 6.1 with PF firewall from OpenBSD  BSD License  Live CD, Embedded, Hard Drive Install  Simple web management GUI  Can be built on i386, embedded, WRAP  Wifi support a/b/g, WEP, WPA/WPA2  Ipsec/PPTP VPN
  • 43. Firewall - Pfsense  DNS, DHCP, Dynamic DNS support  Traffic Shaping with ALTQ  Multi WAN  Load Balancing  Failover CARP  Dozen of plug-ins to expand  Commercial support available from dozens of vendors  http://www.pfsense.org
  • 44. Firewall - IPCop  IPCop  Fork of Smoothwall  Built from Linux From Scratch  Embedded, Hard Drive Install  I386 and embedded.  GNU/GPL  Stateful Firewall  NAT  Proxy (Squid) HTTP/FTP  IDS (Snort)
  • 45. Firewall - IPCop  NTP client/server  SSH Server  DNS, DHCP, Dynamic DNS support  Traffic Shaping  IPSec/PPTP  Extensive Logging & Graphing  Extensive plug-ins to do any and everything under the sun.  Commercial support available from dozens of vendors  http://www.ipcop.org
  • 47. VPN - OpenVPN   SSL/TLS VPN solution Flexible authentication options with certificates, smart cards, 2-factor authentication  Firewall & NAT friendly  Dynamic address support  Multiple protocol support  Linux, Solaris, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Windows 2000/XP  Client is required as it is not a proxy solution.  http://openvpn.net/  Open VPN Windows GUI  http://openvpn.se/
  • 48. VPN – SSL Explorer  SSL/TLS VPN Solution  GNU/GPL  Available in commercial enterprise edition – 3SP Ltd.  Full support web proxy  Microsoft Windows, Linux, Os X, Sun Solaris supported  Zero footprint VPN (browser) – no other client needed  Slick web management GUI  Internet Explorer 5, IE6, IE7, Mozilla Firefox, Opera and Safari browsers  Supernumerary strong authentication options such as LDAP, Radius, Public-Key, SSL client cert, one time password via SMS/Cell/PDA, RSA SecureID, VASCO Digipass.  Full auditing and reporting  http://www.sshtools.com/showSslExplorerCommunity.do
  • 49. VPN - OpenSwan  Ipsec VPN Solution  Fork of defunct FreeS/WAN  GNU/GPL  Opportunistic Encryption  X.509 certificates  NAT traversal support  XAUTH  DNSSEC support  http://www.openswan.org/
  • 50. VPN - Poptop  PPTP Server  Linux, BSD, Solaris  GNU/GPL  Microsoft compatible authentication & encryption (MSCHAPv2, MPPE 40-128 bit RC4)  Supports integration with LDAP/SAMBA  Windows built-in clients and Linux  http://www.poptop.org/
  • 51. Proxy solutions  Advanced content filtering and control
  • 52. Proxy - Squid       Caching proxy for HTTP, HTTPS, FTP and then some. Reverse Proxy Basis for many commercial content related devices. Many useful add-ons. Supports Authentication via proxy_auth for LDAP, NCSA, MSNT, PAM, SMB, SASL, YP(NIS) http://www.squid-cache.org/
  • 53. Proxy - DansGuardian   Web Content Filtering using content of pages, MIME filtering, file extension, phrase matching, POST limiting and URL filtering and URL blacklisting. PICS (Platform for Internet Content Selection – metadata labeling of webpages standard developed by W3C) filtering  Can work with nearly any proxy  Linux, BSD, OSX, Unix  GNU/GPL  http://dansguardian.org/
  • 54. Content Filtering - SquidGuard & HAVP  SquidGuard  Plug-in for Squid Content Control  Blacklisting, URL Matching, IP/Network/Domain Blocking, Time based blocking and Authentication Support  GNU/GPL  http://www.squidguard.org/  HAVP  HTTP Anti-Virus proxy  Proxy with ClamAV  Integrates with Squid& other Proxies  GNU/GPL  http://www.server-side.de
  • 55. Content Filtering - Untangle    Linux UTM (Unified Threat Management) with simple GUI management. Supports Spam prevention, Web Filtering, Antivirus Scanner, Phishing Blocker, IPS, Firewall, Remote Access, VPN (OpenVPN) and basic routing features. Advanced Reporting features as well as PDF and HTML export.  GNU/GPL  Commercial support and Appliance solutions  http://www.untangle.com/
  • 57. HID - Osiris  Centralized client/server systems integrity check program.  Central server maintains file integrity database  Monitors kernel and files  Encryption support  BSD, Linux, Unix. OSX, Windows  Email Support  Syslog  http://osiris.shmoo.com/
  • 58. HID - Samhain  File/Systems Integrity and IDS  Client Server model with centralized monitoring and management  Supports reports stored in Databases Oracle, MySql, PostgreSQL  Beltane – web based PHP configuration console  Linux, BSD, Unix and Windows      Checksum (Tiger192, SHA-1, MD5), size, mode/permission, owner, group, etc. SELinux, POSIX ACL. Kernel Integrity Check (rootkit detection), SUID/SGID, Open Ports, Process Check, Mount Check, Logon Event Check Advanced Logging – centralized logging w/ encryption, syslog, built-in email functionality, RDBMS support. Inter operates with Prelude & Nagios http://www.la-samhna.de/samhain/index.html
  • 59. HID - OSSEC    Integrates log analysis, file integrity checking, Windows registry monitoring, root kit detection, real time alerting and response. Strong and well integrated Log analysis engine. Runs on Linux, BSD, OS X, Solaris & Windows.  GNU/GPL  http://www.ossec.net/
  • 61. IDS - Snort  Real-time traffic analysis & logging via protocol analysis, content searching/matching.  Signature, protocol and anomaly based detection  GNU/GPL  Unix/Linux/BSD/Windows  Many plug-ins and extensions are available  Gold standard in the IDS world  Basis of many commercial intrusion detection products  Commercial support is available.  http://www.snort.org/
  • 62. IDS - BASE  Basic Analysis and Security Engine (BASE)  Web front-end for analysis of snort IDS data  Allows for user authentication and role-based system  Easy web administration  GNU/GPL  http://base.secureideas.net/   Other SNORT add-ons such as ACID, Barnyard, Snortsnarf,etc. http://www.snort.org/dl/contrib/
  • 63. Sguil   Pronounced sgweel Intuitive GUI to realtime events, session data and raw packet captures.  BSD, Linux, Solaris, Windows, Os X  QT Public License  http://sguil.sourceforge.net
  • 64. IDS - Prelude-IDS   Hybrid IDS Framework that supports most open source frameworks such as Snort, Honeyd, Nessus, Samhain, etc. IDMEF (Intrusion Detection Message Exchange Format) IETF XML based common format for IDS alerts.  SSL encrypted communication with sensors  Text/XML reporting  Database support for MySQL, PostgreSQL  Logging from many commercial devices such as Cisco, CheckPoint, Symantec, Syslog  Linux, BSD, Unix, OSX  http://prelude-ids.org/
  • 66. Nmap  Nmap  Network Mapper  Node Discovery  Port Scanning  Operating Systems detection  Linux, Unix, BSD, Windows  GNU/GPL  http://insecure.org/
  • 67. Nessus   All encompassing vulnerability & security scanner Vulnerability enumeration, patch & misconfiguration information  Password testing using brute force/dictionary attacks  Denial of service test.    NASL (Nessus Attack Scripting Language) for any vulnerabilities tests. Output as Txt, HTML, LaTeX Open source until version 2.x now a closed commercial project
  • 68. OpenVAS   Fork of 2.x Nessus All the amazing features of Nessus but focus of Free software licensing.  Fully GNU/GPL  Not yet 1.x.  http://www.openvas.org/
  • 70. PacketFence  Open source NAC solution.  Based on Fedora, LAMP, Perl and Snort  Heterogeneous focus and vendor agnostic  PacketFence Zen (Vmware Virtual Appliance)  Authentication via Apache (any supported)  Captive portal and remediation  Optional ban of unsupported OS's ex. Windows 95/98/ME or NAT devices  GNU/GPL  http://www.packetfence.org/
  • 71. FreeNAC   FreeNAC Open source NAC solution based on Linux, OpenVMPS, FreeRadius, MySQL  Dynamic VLAN management  Slick Web and Windows GUI management console  802.1x authentication  Scanning and identification of attached devices  Live inventory and reporting  Does not require end devices in VMPS mode.  GNU/GPL  http://www.freenac.net/
  • 72. Network Monitoring   Without availability how can you have security? CIA triad. =)
  • 73. Nagios  Enterprise network monitoring suite originally Netsaint project.  GNU/GPL  Linux, Unix, BSD, etc.  Notification via pager, email, user defined method.  Monitoring of network services, host resources and any other metrics.  Impressive array of plugins/addons.  Simple usable web interface.  http://www.nagios.org/
  • 74. Zenoss  Open network monitoring and management suite.  GNU/GPL  BSD, Linux, Unix and even Windows.    Network health, performance, configuration, inventory/change, event management, logging, alerting and reporting. Supports a multitude of environmental, network, server, application, service checks. CMDB – configuration management database to model IT assets as detailed in ITIL best practice.  Ease of management/setup with auto-discovery and web GUI.  Highly evolved and integrated suite beyond mere monitoring.  Commercial version is available with additional features.  http://www.zenoss.com/
  • 75. Zabbix  Open network monitoring, alerting and visualization suite.  GNU/GPL  BSD, Linux, Unix  Supports auto-discovery, distributed monitoring, enhanced web monitoring, enhanced notification and alerting, agents for nearly every OS, etc.  Great web management console.  Commercial support is available.  http://www.zabbix.com/
  • 76. Network Analysis  What is going on out there?
  • 77. Wireshark  Open source network protocol analyzer.  100's of supported protocols  GNU/GPL  Windows, Linux, BSD, Os X  3 pane view with color coding.   Ability to decode nearly all standard capture file formats Supports decryption of Ipsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, WPA,WPA2.  Outputs to XML, Postscript, CSV or plain text.  http://www.wireshark.org/
  • 78. Ntop  Network traffic probe that produces rich graphical output on your networks happenings.  GNU/GPL  Linux, BSD, Unix   CLI or web interface, passive OS fingerprinting, graphical charts, protocol decoders, RDD support, Internet Domain, AS (Autonomous System) and VLAN stats. Intuitive and feature rich web interface for insight into networks inner workings.  Can be an NetFlow/sFlow collector.  Suite of applications such as nProbe, nBox and PF_Ring  Commercial support is available.  http://www.ntop.org/
  • 80. OSSIM  Open Source Security Information Management.  BSD License  BSD, Linux, Unix     Well integrated collection of FOSS tools for security management tasks. Arpwatch, P0f, Pads, Nessus, Snort, Spade, Tcptrack, Ntop, Nagios, Osiris. Event correlation, visualization, reporting and incident management. Very nice web based security dashboard for comprehensive 360 view of environment.  Commercially available with support options  http://www.ossim.net/
  • 81. Live Cd Distro's   BackTrack Slackware based penetration testing live CD.  nUbuntu Based on Ubuntu but with security tools   http://www.nubuntu.org/   Merger of Auditor and Whax Live CD projects  SecureDVD >300 security tools Multiple Security Distro's on one handy http://www.remote-exploit.org/backtrack.htmlDVD     Helix  Focus on Incident Response and Computer Forensics Backtrack, Operator, PHLAX, Auditor, L.A.S., Knoppix-STD, Helix, Fire, nUbuntu, Insert.     Bit out of date   http://www.securedvd.org/ http://www.e-fense.com/helix/ Insert Based on Knoppix and used for Network analysis, DR, forensics, penetration testing, etc. http://www.inside-security.de/insert_en.html
  • 82. Thanks to..    Bradley J. Dinerman & Jack Daniels of NAISG. NAISG community. The FOSS community (developers, documenters, advocates, users, etc.) everywhere.