» Lynis | Lynis Enterprise | Tour
Lynis and Lynis Enterprise Suite
Open source software provides trust by having people look into the code. Adjustments are easily made, providing you with a flexible solution for your business. But can you trust systems and software with your data? Lynis provides you this confidence and helps with auditing your systems. So you can verify yourself and trust!
Lynis TourSo you want to know what Lynis and Lynis Enterprise have to offer you?
One solution for:
Perform in-depth technical audits to check if systems are really compliant.
Tired of reading long benchmarks? Just run a security scan with Lynis and know your weaknesses. These findings are great input for your system hardening steps.
With focus on Linux and Unix based systems, the Lynis suite includes a powerful security auditing tool. Check how well your patch management strategy is executed. Also determine if your systems are really configured like you had intended during installation time.
Security incident detection and monitoring
With the right configuration and plugins, Lynis perform a really deep investigation. Almost like a forensics team! Traces of malware and malformed files can be detected.
But we don't stop there. New functionality is continuously being added. Stay tuned!
Users of the Lynis Enterprise version will have additional tools and guidance. This includes additional explanations, scripts and examples on solving findings. For some of the plans this also includes additional code snippets. This way you can make optimal use of your existing configuration management solutions (e.g. Cfengine, Puppet).
Compliance and regulations
Dealing with compliance and regulations? Lynis helps you with taking the right measures. Check the related controls and define your improvement plan. Support is available to audit controls from standards like:
Lynis is the right tool to help you with your compliance (e.g. for Linux systems).
(Audit our promises!)
Lynis does more than simple baseline or compliance checking. Configuring a specific setting is simply not enough. That's why Lynis already checks the system for proper functioning. Don't just trust on compliance checks alone!
Examples of audit tests:
We all know those software "solutions" with high requirements. Starting with a specific database engine, reporting software, a lot of storage and enough CPU cores... To make things worse, licenses for every single component. Not for Lynis!
Lynis has very low requirements. You only need an operating system and a normal (Bourne) shell. That's it!
Lynis is written in shell script. Therefore it runs on most systems, without any adjustments. No alterations, no installation and no third party tools needed. But.. if you still prefer to use software packages and install Lynis, that's completely fine with us!
Operating systems supported
More is actually better!
Most security solutions only provide support for the common Linux versions. We simply love all Unix derived systems. Therefore we can support (almost) all of them. We are confident that Lynis run on systems which have the common GNU tools available. Feel free to test our promises!
The list on which Lynis is confirmed to work:
Since Lynis is also auditing software, a small overview of the software it supports:
Regulations are increasing, security incidents show up in the news almost daily. It's no wonder companies start to invest in security programs.
You like to be secured, we like to help! Our goal is to spread our technology to as much companies and individuals as possible. We keep Lynis open source, so individuals and small companies can freely use the software.
Passion for Information Security
For companies who would like the full Lynis Enterprise suite, with additional options and support, we have very affordable pricing. We aren't in for the money. We are here to help your business and improve the information security field!
Did we already mention we are passionate about our services?
Discover Pricing »
(Good can be very affordable)
Still have questions or like to know more? Check the contact page and ask!
Copyright 2014 CISOfy, All Rights Reserved - Sitemap | Terms of Services | About Us