Trusted Computer Solutions Security Blanket Enterprise v3.1
Strengths: Great lockdown, reporting, auditing and system rollback capabilities; 32- and 64-bit OS support.
Weaknesses: Supports Red Hat Enterprise and Centos only.
Verdict: Provides a very nice set of tools for locking down Linux endpoints.
SummarySecurity Blanket Enterprise Edition v3.1 provides an organization with the ability to manage the secure configuration of servers throughout the enterprise and ensure that the configurations consistently meet industry standards or customized security policies.
Security Blanket is a system-hardening tool for Red Hat Enterprise Linux (RHEL) v4 and 5, and Centos v4 and 5. It enables users to periodically check a system's state of security and apply changes based on security policy requirements.
Security Blanket is an agent-based solution. Agents are small in size and communicate with the server using TLS (transport layer security) with AES 256-bit encryption. PKI is used for the agent authentication, making this a very secure agent to host communication.
The user interface is set up like a dashboard. It is easy to use and follow. The user interface makes it very easy to manage Linux devices, even if operators don't possess strong Linux skills. There are numerous pre-defined profiles available for compliance management, auditing and reporting.
The baseline, auditing and policy administration features are all very good and easy to use. The agent must be polled, however, so this tool is not a real-time reporting solution. Scans can be scheduled at any interval and can be performed at low peak times so as not to add latency to the network or device. Servers or devices can be grouped to make the management and deployment of policies much easier in very large and distributed environments.
Assessment, baseline and logging reports help IT managers and security auditors assess compliance against security policies and monitor compliance against change. Security Blanket scans the OS and then automatically configures the OS to a state of compliance based on the profile. We liked the feature that allowed us to compare any two servers or groups of servers, right down to file attributes.
We found this to be a very easy-to-use solution for the amount of functionality it delivered.