Kaspersky Nabs Linux Threats With Mail Security

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  

Kaspersky Lab released Kaspersky Linux Mail Security, aimed at addressing a rising tide of multi-platform threats. The offering speaks to the growing number of Linux and Mac OS X threats that will likely prompt partners to bolster their arsenals with more comprehensive security tools.

It’s well established that attacks are becoming more indiscriminate. Threats once relegated to Microsoft Corp. Windows machines are more likely to hit those Macs and Linux systems too. In short, nothing is safe.

To that end, Kaspersky Lab Inc. is aiming to ramp up its email protection for other with the release of Kaspersky Linux Mail Security.

Related articles

The solution relies on a variety of existing technologies from the Woburn, Mass.-based vendor such as heuristics and the company’s cloud-based Urgent Detection System, regularly used in its security solutions.

Among other things, the new mail security tool touts easy integration into a variety of Linux-based mail server configurations in an effort to block malware and malicious attachments, fight spam and stop exploits from infiltrating the corporate network. That means partners will likely have a few less headaches when integrating the solution into their customers’ multi-platform environments.

All in all, the new solution features a series of perks that include beefed up endpoint protection, attachment filter and format recognizer that blocks malicious attachments, enforced spam update service that gives users access to experts, reputation based spam filtering and a new AV engine.

Additionally, the solution offers support for IPv6, as well as comprehensive traffic and management rules and protection for ActiveDirectory and OpenLDAP.

Specifically, the e-mail security offering from Kaspersky Lab, a subsidiary of the Moscow-based Kaspersky Lab ZAO, aims to address the “hit and run” nature of attacks, the company says. For example, when a spam campaign is unleashed on an enterprise, around half of the intended victims are subjected to the messages within the first 10 minutes of the attack. That gives security solutions a short window to respond.

But for the channel, the Linux Mail Security system is another reminder that the days when attacks were relegated to Windows environments are long since gone, and will likely stay that way.

Enterprises housing diverse, multi-platform environments have existed since computers were introduced in the workplace. However, these days, it almost goes without saying that organizations’ are dealing with a lot more complexity as they incorporate virtualization, cloud and mobile infrastructure, as well as increasingly more reliance on Mac and Linux systems to fulfill various IT requirements.

That fact is not lost on cybercriminals, who are now making their attacks more holistic to address a wider variety of platforms, and hitting the proverbial two, five or 10 birds with one stone.

That means that malware is becoming more universal. Last month, researchers at F-Secure detected malware on compromised Colombian transport Web sites that targeted Windows, Mac and Linux users. During the attack, users trigger a Java Archive vulnerability by visiting a compromised Web site, which then determines if the users are running a Windows, Mac or Linux system before executing the attack.

In 2010, the Boonana malware similarly exploited a malicious Java applet to execute cross-platform attacks that downloaded malicious code on Windows, Unix and Mac OS X machines.

And last week, another Java vulnerability gave rise to a rampant exploit that allegedly swept across more than 100,000 systems before parent company Oracle Corp. issued an emergency patch repairing the flaw. While the exploit only appeared to attack Windows systems, it also contained the capability of infecting Mac OS X and Linux environments.

That said, partners will need to start rethinking security holistically, if they haven’t done so already. That means educating and informing their customers about security best practices that should be universally applied to all systems, not just to vulnerable Windows environments. And it means that it will likely behoove partners to start bolstering their arsenal with security tools that address a multitude of threats on a variety of platforms—if for nothing else, than to save some time and a lot of hassles tackling a plethora of new threats silo by silo.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  
More on Best Practices
windows81-logo

Channel Must Intensify Windows Server 2003 Migration Campaigns

Reseller urges channel to get customers clued up before it is too late

nest-egg-money-incubator-accelerator

Report: Late Supplier Payment Becoming The Norm

More than half of global businesses admit to delaying supplier payments according to new study

iphone-5s-stack

Apple is Greenest Brand in Mobile Tech, Report Claims

A survey by environmental organization Greenpeace claims others are failing to match Apple's green credentials

hacker-computer

Home Depot Joins Not-So-Exclusive Data Breach Club

Home Depot has become the latest retailer to lose data to hackers. What can be done to prevent these breaches, and how can the channel assist?

Visitor comments
Add comments
blog comments powered by Disqus
In-depth
Broken heart

An amicable split?

Where will HP and Symantec's conclusion that the sum of their parts is greater than the whole leave partners?

elvis67878787

Suspicious minds in the post-Snowden world

Investment in new technologies being avoided with security experts wary of cloud and new technologies post-Snowden

Old-fashioned cash register

Vendors need to get with the times, Channel conference hears

MSPs need up-to-date support from vendors, including working together

seo-checklist

‘Internet of Things’ shifting IT spending priorities

Analyst firm Gartner says enterprises spent more than $40 billion on what could be called Internet of Things (IoT) programs. As more IP-enabled devices get connected, enterprises may shift spending patterns and disrupt the way IT is acquired and supported