Atomic Secured Linux
Atomic Secured Linux
Atomic Secured Linux
The design of ASL approaches securing the server and its applications, by combining different layers
of security technologies and application layer firewalls to filter out malicious content before it
reaches the application. Our hardened kernel subsystems further enhance the overall security model
by enforcing file, network and process level security policies on the system.
The ASL approach also includes our "Just In Time Patching" system, which allows you to address
security threats posed by applications where either it is not possible to fix the application due to lack
of source code, availability of resources, or the number of applications that make repairing all
vulnerabilities economically unfeasible. You can known that your systems are protected, even when
you can't patch them.
ASL Screenshots
Immediate Results
Atomic Secured Linux provides an immediate solution for the following challenges:
• Data Theft
• Site Defacement and comment spam
• Web Application Vulnerabilities
• Regulatory Compliance
• Rootkits and Malware
Dependability
ASL is in its third year and is a mature, reliable product brought to you by founders of Plesk, so you
know it will work with your server the way you want to use it! When you use ASL, you are not only
using the software but the collected experience of our team of security and systems experts. And we
aren't new comers to Linux, our Founders have been building Linux based systems before the 1.0
kernel came way out back in the mid 90s. We know and love Linux, and when you use ASL you get
that same attention to detail we not give only our customers, but our own systems! We use every
feature in ASL on every Linux system we use. You can depend on ASL, because we depend on it
too.
Selected Features
• Automatically hardens Linux servers based on security policies, and ships with a world class
set of policies developed by our security experts.
• Host Intrusion Prevention System, with built in rootkit detection and prevent
• Kernel Intrusion Prevent System, prevents insertion of modules into kernel, protects against
memory attacks and other methods rootkits use to take over your system.
• Web based GUI management, and built to work with web with control panels such as Plesk
Server Administrator (PSA). (CPanel version coming soon!)
• "Just in Time" Virtual Patching for web applications. Helps to protect vulnerable applications
that can not be patched immediately.
• Automated file upload scanning protection, realtime prevention of malicious file uploads such
as rootkits, viruses, worms, shells, spambots and more!. Scans all Web, FTP and SSH based
file uploads. Files can be quarantined for further investigation, or can be automatically deleted
before they are ever uploaded to the system!
• Automatically disables unsafe functions in web technologies such as PHP to help prevent
entire classes of vulnerabilities.
• Built in vulnerability and compliance scanner and remediation system to ensure that your
system is operating in a safe, secure and compliant manner.
• Application layer firewalling through mod_security, and the industry leading rules created by
our Information Assurance lab gotroot.com and optimized for Cpanel and Plesk Server
Administrator environments. A must for PCI-DSS compliance!
• Protects against cross site scripting, SQL injection, remote code inclusion, directory recursion
and many many other web based attacks.
• Realtime malware/virus/trojan protection from web, mail, file and local based attacks.
• Real time web content redaction system, which helps protect a system from accidentally
serving up malware and can be used to help prevent data leakage of information, such as
credit cards, SSNs or other sensitive customer data.
• Trusted Path Execution, which restricts untrusted users such as apache to execute commands
only owned by root, thus simply preventing a whole class of exploit techniques used by
attackers, or internet worms. This can also be used to prevent your users from uploading
dangerous software to your servers!
• Users are restricted to only view their processes.
• Realtime shunning and blocking of attack sources and user control over automatic
"deshunning" time lines.
• Denial of Service protection through mod_evasive.
Supported Platforms
CentOS 4 and 5
Opera
Firefox
SeaMonkey
Safari
Screenshots
Pricing
Subscriptions to the Atomic Secured Linux channel are available for 128$ per year, for each server
using the product. Bulk discounts, and reseller agreements are also available, for more information
contact [email protected] .
Support
Subscribed customers are entitled to email based support for as long as their subscription is valid, at
[email protected] . ASL customers are also discounted 20% on professional services for
support on issues outside of ASL, including custom application integration, clustering, forensics.
Emergency services are also available on short notice. When requesting emergency services, please
include in the subject line of your message 'Emergency Services Request'.
Red Hat Enterprise Linux 4-5, CentOS 4-5, Fedora Core 4-8 installation shortcut:
SSL Install:
Non-SSL install: