Sun has recently completed development efforts of the audit_remote plugin. As 
you may know, this plugin deals with the secure transmission of audit trails to 
a remote storage (original proposal for secure transmission and storage is 
described at 
http://hub.opensolaris.org/bin/view/Project+audit/audit_remote_proposal).
 
At Kinamik we have developed the centralized secure audit trail repository that 
receives these audit trails (as far as we know, we are the only ones that have 
done that). This secure audit trail repository, called Kinamik Secure Audit 
Vault, cryptographically processes each audit trail record (i.e. high 
granularity) and makes it tamper evident as soon as it is received, in 
real-time. The product not only does centralization and securing of audit data, 
it also provides amongst other features tamper detection, data search and 
reporting. Further details of Kinamik?s Secure Audit Vault may be found at 
http://www.kinamik.com/index.php/How-it-works.html, and for more details on the 
Openomics blog from Sun ISV Engineering at 
http://blogs.sun.com/openomics/entry/kinamik_secures_solaris_audit_trails.
 
We are looking for organizations and interested users that can assess this 
solution, providing us some feedback on desired improvements, capabilities, 
features and functions.
 
If you are interested in supporting this initiative and trying the combined 
solution, please contact Nadeem Bukhari (nadeem.bukhari at kinamik.com) or 
download directly a virtual appliance with the product at 
http://www.kinamik.com/freetrial. By the way, the current version of the 
Kinamik Secure Audit Vault product is also capable of supporting syslog, log4j, 
JDBC applications, text files and Weblogic Audit trails.
 
Thank you
 

Nadeem Bukhari CISSP, CISM

VP of Product Strategy & Strategic Alliances

Kinamik Data Integrity S.L.

 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/security-discuss/attachments/20100310/fa44d360/attachment.html>

Reply via email to