Integrating Windows, Linux, Unix, Macs on Computer Networks

Mixed Network Integration

Subscribe to Mixed Network Integration: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Mixed Network Integration: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

100% Growth (2009 vs. 2008) On the back of a strong 2008, we’re on track to deliver over 100% sales growth in 2009 which clearly is the exception to the norm.  Our performance allows us not only to drive a strong balance sheet but also to continue to grow headcount including our customer-facing technical resources.  I attribute our success to a variety of factors including our strong products as well as our open source business model.  Likewise Open delivers a high value, free offering for customers that require a scalable authentication solution.  Most of our Likewise Enterprise customers start with Likewise Open and over time expand the scope of their authentication project requirements to include policy, audit, and reporting.  A common theme that I hear from our customers is that they like doing business with us and they like our technical teams. Record Q1 Q1 wa... (more)

Likewise Releases Open Source Software for File Sharing Among Linux, Mac, Unix and Windows

BELLEVUE, Wash., September 10, 2009 - Likewise announced today that it is releasing a high-performance, Windows-compatible file server, Likewise-CIFS. It is designed for independent software vendors and large organizations that require access to Linux, Unix, and Mac servers from Windows computers. Likewise-CIFS is available at www.likewiseopen.org and in Likewise Open 5.3 under GPLv2 licensing terms.  Likewise will also license Likewise-CIFS under commercial licensing terms that allow original equipment manufacturers to embed Likewise-CIFS in a variety of network attached storage devices, including network appliances and clustered storage solutions. Likewise-CIFS supports both the SMB1 and SMB2 versions of the Server Message Block protocol. It is designed to be a high-performance, highly-scalable protocol stack. Its modular and extensible driver architecture lets OEMs... (more)

WinMagic Supports Intel Anti-Theft Technology

WinMagic, a provider of disk encryption, today announced an agreement with Intel Corporation (NASDAQ: INTC), to support Intel Anti-Theft Technology (Intel AT). Combining WinMagic’s SecureDoc full-disk encryption with Intel AT will provide organizations worldwide with fully-integrated data protection and laptop theft deterrence. WinMagic plans to deliver a comprehensive enterprise notebook security solution that combines SecureDoc full-disk encryption with Intel AT enabled notebooks. By collaborating with Intel on Anti-Theft, WinMagic will combine data protection with tamper-resistant asset protection and theft deterrence. WinMagic’s integrated security offering will leverage the robust hardware-based capabilities of Intel AT to enable stronger data protection. WinMagic’s SecureDoc will integrate with the local and remote theft detection mechanisms provided by Intel... (more)

Symplified to Demo SinglePoint Cloud Security at Cloud Expo

Symplified Demo at Cloud Expo Cloud Computing Expo - Symplified, the Cloud security company, announced a new user provisioning addition to its SinglePoint Cloud security platform that enables organizations to centralize the management of user accounts for multiple cloud applications from within their firewall or using the Salesforce.com platform. SinglePoint Cloud Identity Manager integrates with enterprise user directories to automate the creation, provisioning, modification, and de-provisioning of accounts that enable employees to access Cloud-based Software as a Service (SaaS) applications and data. Symplified to exhibit at Cloud Expo 2010, which will take place April 19-21, at the Jacob Javits Convention Center in New York City. Cloud Expo, with over 5,000 delegates and more than 200 sponsors, will be the most significant technology event of the year. With Sin... (more)

Care UK prescribes Becrypt security solutions

Leading independent provider of health and social care implements data security solution with central management London, UK - 12 January 2010 - Becrypt, a provider of information assurance solutions, today announces its partnership with Care UK, a leading independent provider of health and social care, to provide a range of security solutions, enabling Care UK to enhance comply with government and NHS legislation as well as safeguarding company data and its employees. Care UK selected Becrypt from a trial of three security providers, to implement its DISK Protect and Enterprise Manager solutions across its laptop estate. Becrypt DISK Protect provides disk encryption and will be rolled out to the company's entire laptop estate (more than 500 laptops), using Becrypt's Enterprise Manager's central management capabilities. To work along side the NHS it is essential to co... (more)

Tip of the Red Hat - Entrust Updates PKI Platform, Adds Linux Support

Building on the continued success of the public key infrastructure (PKI) platform, Entrust  is advancing the technology to bring it to new markets. With the introduction of Entrust Authority Security Manager 8.0, Entrust customers can implement one of the most trusted PKI security solutions available on the cost-effective Linux Red Hat platform. This release introduces Entrust to the open-source platform market and expands the potential overall installation base for the PKI solution. "Linux is recognized as one of the most popular operating systems installed on servers globally, and provides Entrust with an active new market segment for PKI deployments," said Entrust President and CEO Bill Conner. "This is a key milestone for Entrust and the entire PKI platform. We're eager to see how the Linux community embraces and implements our PKI technology." In a recent publi... (more)

A Simple Way to Programmatically Create SharePoint Security Groups

When it comes to SharePoint deployments, I try to automate everything I can.  I don’t like manual steps especially when it comes to setting up security.  A common task when deploying any sites is setting up security in some manner.  Today I am going to cover how to easily store definitions your SharePoint security groups in an XML file.  We’ll use LINQ to XML to make reading the file a breeze, and then we’ll use the SharePoint object model to create the groups and add users (or AD groups).   I’ve blogged on how to create a group before, but we’re going to take this a step further by giving you code that you can easily add to a feature receiver or console application.  First let’s take a look at the XML file we’re going to use. more)

Latest Likewise Open Available with Latest Ubuntu Release

Likewise announced today that the latest version of Ubuntu - shipping this Sunday, October 10 2010 - will include Likewise Open 6 in its repository, enabling easy integration of Ubuntu machines into networks using Microsoft Active Directory. Likewise Open has been included in the Ubuntu repository since the 8.04 LTS (Long Term Support) release in April 2008. Likewise Open joins desktops and servers running Linux or Unix, and Macs, to an organization's existing Active Directory. With more than 70,000 organizations worldwide, Likewise Open is the most widely used Active Directory authentication engine for Mac, Linux and Unix systems. Likewise Enterprise builds on the authentication engine of Likewise Open, making it easy for IT managers to authenticate users, control access to applications and data, centrally manage settings with group policies, and create reports f... (more)

Active Directory Replication Topology - and More

Blog Summary for week of October 3... 1. Active Directory Replication Topology This article is part of the series covering Active Directory. It is about the replication topology. The route replication traffic travels through a network called the Replication Topology. Replication is an important function within Active Directory that for the most part runs automatically. This post describes three aspects of Replication Topology: Replication of Partitions, Site Links, and Inter Site Topology Generator. 2. Monitor Everything with Monitis – And do it easily with PowerShell – Part 4 This is part 4 of a series on the Monitis PowerShell Module, which is built on top of the Monitis REST API. This article is about monitoring web applications. Here’s a command for monitoring web applications: Get-Help Add-MonitisExternalMonitor –parameter PostData. PostData sends additional da... (more)

Reading an Attribute from an LDAP Directory

Looking up user information from an LDAP directory is a common usage of the Vordel Gateway. Sometimes it's used for Message Enrichment in front of an applications server. This saves the applications server developer the hassle of looking up the attributes from the directory, since the attributes are handed to them on a plate, in the message, by the Gateway. So here is a quick tutorial on how to do this: In the circuit you can see below, I am doing four things: 1) Authenticating the client against an LDAP directory (in this case Microsoft Active Directory) using WS-Security UsernameTokens. 2) Looking up attributes for the user (in this case, their telephone number) 3) "Injecting" a SAML 2.0 assertion into the message, including the SAML Attribute Statement 4) Passing the message back, with the SAML assertion now in it (so that we can see it). Here I could have used a "Con... (more)

Working with Microsoft Security Tools

How many of us take for granted Microsoft’s family of tools that contribute to the security of your organization? The most commonly used and appreciated tools are: Forefront Family Microsoft Security Essentials Windows Intune / Windows Update / Microsoft System Center Family Windows Firewall (with Advanced Security) Let’s take a look at all of these tools and their features. Then, we can look at other less popular tools offered by Microsoft — such as Microsoft Security Compliance Manager and Microsoft Security Assessment Tool. Forefront Family Microsoft has spent a great amount of time trying to supply a manageable easy-to-use security solution for its products. The result of these efforts is the Forefront Family. It consists of several tools you can use to secure your Microsoft infrastructure. Also, it is designed to interact with other Microsoft tools, such as Ac... (more)