throbber
MAY 27, 2002 • eweek.co m
`
`SAP America splits division, moves CEO Kemna
`
`1 1
`
`Review: Netscape 7.0 adds usability enhancements 14
`
`Microsoft security chief faces formidable task
`
`Tape storage technology reaches big milestone
`
`29
`
`41
`
`Review: SuSE upgrade edges desktop Linux rivals 54
`
`EMCrevsup
`Symmetrix
`
`COMPANY PLANS SYMMETRIX
`UPGRADE IN 2003 WITH FIBRE
`CHANNEL REPLACING SCSI
`
`By Evan Koblentz
`AFTER ALE GTHY SABBATICAL,
`EMC Corp. is developing
`updatesforitsSymmetrixenter(cid:173)
`prise storage systems that will
`employ Fibre Channel internal
`designs for the fu·st time. The
`company is also revamping one
`of its Clariion storage systems
`fo r the nudrange market with
`added capacity.
`The Symmetrix moves, seen
`largely as necessities, sho uld
`bring the EMC product in lme
`with such high-end storage
`systems as those from rival
`Hitachi Ltd.
`"It's about time," sajd Tom
`Black, a storage administrator
`at Petro-Canada, in Missis(cid:173)
`sauga, Ontario. Black manages
`24 terabytes of EMC's Sym(cid:173)
`metri.x systems and Clariion-
`
`based AS (netwo rk-attached
`storage) in two datacenter . ''I'd
`actually started lookillg more
`clo ely at Hitachi and some
`other things on the market in
`anticipation that EMC rudn 't
`have something up their sleeve."
`The forthcoming update to
`Symmetrix, Version 6.0, is
`due early neA.'t year and will be
`the product's first major update
`in 12 years. T he most notable
`change to the system will be its
`use of a Fibre Channel internal
`architecture instead of its em(cid:173)
`rent SCSI design, sources srud.
`The design change, how(cid:173)
`ever, wiU not affect user iJlter(cid:173)
`actions witl1 the microcode(cid:173)
`rath er the way ymmetrix s
`cache, rusk drives, host inter(cid:173)
`faces and processors commu(cid:173)
`nicate internally, sources srud.
`But moving to Fibre Chan(cid:173)
`nel will also help the Hopkjn(cid:173)
`ton , Mass., company greatly
`reduce production co t , as a
`ICONTlNUED ON PAGE 18]
`
`Microsystems Inc. to integrate
`products and create an iden(cid:173)
`tity infrastructure across a
`n etwork. RSA's ClearTrust
`and Keon software will be inte-
`ICONTlNUED ON PAGE 18]
`
`eWEEK LABS
`
`WEB SERVICES:
`SAFE OR SORRY?
`
`STANDARDS MAY BE MONTHS AWAY, BUT
`SOME ENTERPRISES ARE FORGING AHEAD
`TO LOCK DOWN TRANSACTIONS PAGE 47
`
`Merged management
`team faces challenges
`in multiple sectors;
`how will it fare?
`
`Zander: Sun
`still riding
`right track
`
`By Peter Galli IN MENLO PARK. CALIF.
`SUN MICRO Y TE IS I 1C.'S OUT(cid:173)
`going chief operating officer
`and president, Ed Zander, sajd
`he decided to leave Sun partly
`bee a use his chances ofbecom(cid:173)
`ing CEO were slim.
`In a ca ndi d interview at
`Sun's offices here last week,
`Zander, a 15-year un veteran,
`said that after three or four
`yearsofdoingajob, "you hope
`to get more challenged. And
`when you're COO and pre i(cid:173)
`dent, there's only one other job
`you can get, and I knew [CEO]
`Scott [Me ealy] wascommit-
`]CONTlNUED ON PAGE 141
`
`Scrambling to secure Web services
`
`By Dennis Fisher
`WHILE MUCH OFTHEATTENTIO
`surrounding Web serv ices
`security has focused on stan(cid:173)
`dards efforts, software devel (cid:173)
`opers and users are rea lizing
`that standards a lone won't
`solve the problem .
`As a result, developers such
`as RSA Security In c., Oblix
`Inc. and even networking
`manufacturer Cisco Systems
`
`Inc. are starting to take a more
`holistic approach to ecurity
`w ith new products that
`addre s key Web ervices
`sec urity matters. Potential
`use rs, h wever,
`till have
`questions about the technol (cid:173)
`ogy's vulnerability.
`R A, which is counti ng on
`demand for Web service to
`driv e much
`fits future
`growth, wi ll partner with un
`
`111''''1"11"1'" '111(1 'T'I'I 'I'''I"I'I"II 1'1'1
`
`1lEOO
`l800
`
`8~01 - ~~8 8~ I W 'ISNijl 1S ~3
`A~ij~ f:l ll 001
`Q~ij Slijl~3S S3l~ijM8Il
`~ I Nn 3J.ijJ.S Nij ~IH~IW
`886 ~617"\:6
`H 600 689EOlEO~ M 3 H~/8~/~9L~O C~ OOO#
`OSO - J ->i.¥ .101 . 1CI-:clti J .. . ¥>f¥¥:ot¥¥ Cbct:.lNXatl·
`
`Page 1
`
`

`
`JUN 0 5 ZOOZ
`
`'Cr ,1Gf I' SiATE UNIVERSITY
`LIBRARiES
`
`Page 2
`
`

`
`eWEEK LABS: REVIEW
`
`Sanctum's simple approach to security
`
`APPSHIELD 4.0 USES AGENTS
`TO GUARD MULTIPLE SYSTEMS
`
`By Jim Rapoza
`Si\ 1 CTUM INC.' APPSH IELD 4.0
`uses a s imp le b u t effective
`method to prevent attack on
`Web applicatio ns: It finds out
`what th e application is sup (cid:173)
`posed to do and what type o f
`u er activity is no rmal-then
`it stops anything else.
`In eWEEK Labs' test , App(cid:173)
`Shi eld 4.0 proved to be very
`effective at stopping a variety of
`attacks and probeson anyWeb
`application, topping every(cid:173)
`thing from worms to attempted
`code insertions, and AppShield
`works with almost every Web
`server and Web app licatio n
`development language.
`AppShi e ld 4. 0 , re lea ed
`
`las t mo nth, is priced starting
`at $15,000. It r un s o n olaris,
`W indows T and Wind ws
`2000.
`App hield will bee pecially
`att ractive to compani es that
`rely on Web applica tio ns fo r
`fun ctio ns, e pe(cid:173)
`co re busine
`cially given its ability to sit in
`front ofand pro tect man y W eb
`erve rs and it abili ty to sto p
`known a t tac ks a nd n ew
`e>..'plo its.
`Whil e Ap p hi eld is ve ry
`efficient at protecting dynamic
`Web a pplica ti o ns, it pretty
`much top there, relyin g o n
`good netwo rk securi ty and a
`hard ened o pera tin g sy tem
`to pro tect it aga in s t o th e r
`fo rm of attacks. In some ways,
`th is makes it less effective than
`co m peting produ cts uch as
`
`- I ' * : ~~- ..!.....--,·'-=--
`
`....t:.lB
`
`liiNIIr- ~ .... r u.. .....
`
`[
`--- ~
`-.--
`[
`,...... ... _... ......
`· ·---~-....a ................. ......_
`[
`...... ~ ... ,..._...,---
`
`..:..
`
`Wrth AppShield, admins can choose from three pre-defined security settings.
`
`Enterce pt Securi tyTechnolo(cid:173)
`gies inc.' Entercept2.0, which
`i pr iced at ro ugh ly $ 1,500
`per server and not only ecure
`th e W e b a ppli ca ti o ns a nd
`erver bu t al so the o perating
`sys tem. However, AppShield ,
`
`whi ch ca n u e both agentsand
`a p roxy approach, can mo re
`ea ily protectmultiplesy tems.
`In Ve rsio n 4. 0, Sa n ctum
`has included new features that
`make it much easier to get up
`and running with App hield .
`
`Once we installed the system,
`we were able to choose among
`three preset tern plate fo r secu(cid:173)
`ri ty protection: a Basic level,
`which protects against the most
`common attacks; an Interme(cid:173)
`di ate level, which adds more
`protection against application
`tampering; and a Strict level,
`wh ich tries to block almost
`everything. We could also opt
`to pick our own security set(cid:173)
`ti ngs t hro u g h th e c ustom
`option (see screen).
`AppSh ield can run in pas(cid:173)
`sive o r active mode. In the pas(cid:173)
`sive mode, the program logs
`ali acti vity but doesn't block
`anything. In active mode, the
`progran1 blocks nonstandard
`ac tivity from th e protected
`Web applications.
`!CONTINUED ON PAGE 561
`
`Hat. With sectio ns for managing soft(cid:173)
`ware, hardware, networking, security,
`sys tem and miscell aneous option s,
`Y AST2 provided the widest range of
`utilities in a single space of any of the
`three distributio ns we reviewed.
`We particularl y li ked th e way that
`YAST2 provid ed bri ef, o n -screen
`explanatory no tes related to the tool
`we were using at the time. Thi s helped
`a lot, since th ere a re ge nerall y mo re
`configuration options fro m whi ch to
`choose than on a Windows sy tem. The
`Red Hat and Mandrake control pan(cid:173)
`els offered no such note .
`Mandrake's control panel i very use(cid:173)
`ful as well, and although it lacks a few of
`the features ofYAST2, it boa ts a co u(cid:173)
`ple unique to itself. Two such features
`are Mandrake's util ity for configuring
`Sa mba file sharing and browsing and
`Mand rake's font insta ller app lica tion
`(see screen, left) . Unattractive, out-of(cid:173)
`the-box fonts typically plague Li n ux dis(cid:173)
`tributions, so a good font insta ller is a
`must. In tests, the Mandrake font util(cid:173)
`itywasm uch easierto use than the KDE(cid:173)
`based utilities upon which Red Hat and
`SuSE depend.
`
`The Red Hat control panel includes
`16 separate confi guratio n applets fo r
`eve ry thin g fro m ha rdwa re to n et(cid:173)
`working to security- many of which
`have unique interface tha t can take
`ome getting u ed t . We coul d place
`ourRedHat ysteminto allof th esame
`configuration s a our u E and Ma n(cid:173)
`drake machines, but it wasn' t as easy
`o r co nvenient to figure out.
`Ma ny desktop- related co nfiguration
`tasks mu t be performed in a KDE Con(cid:173)
`tro l Pane l located away fro m t h e
`SuSE, Ma ndrake or Red Ha t co ntrol
`panels-the same circumstan ces exist
`fo r ystem with N ME. We'd like
`to see futur releases tie in more tightly
`t
`th eir de kto p enviro nments.
`SuSE's softwa re u tility enabled us to
`change the so urce ofinstallation, install
`a nd re m o ve softw a re, a nd access
`upd a te fr m th e W b
`r fro m a n
`installatio n D .
`W h e n we fir ed up t h e softw a re
`upd a te too l, itt ld us if an y of o ur
`in s ta ll ed pac kages h ad un ful filled
`dependencies and wh ther anyofthem
`co nfli cted with any other. Mandrake
`offers th e sa me fu nctio nali ty in its own
`
`software installer, and all th ree distri(cid:173)
`butions enabled us to fe tch upd ates
`through the Web.
`The d isplay prope rties sec ti on in
`SuSE's co ntrol pa nel was particularly
`n ice- us ua lly, co n figur ing X for a
`
`Li nux box is som ewhat unpredictable.
`SuSE'sX setup tool, called SaX, probed
`hardwa re fo r tl1e appropriate settings
`and allowed us to make changes. The
`model of tl1e monitor that we used for
`testing was not
`!CONTINUED ON PAGE 561
`
`Red Hat's Red Hat Unux 7.3 makes a solid desktop operating system, but this distribution's
`particu lar strengths lie on the seNer side. Still, Red Hat Linux is somewhat of a U.S. indus(cid:173)
`try standard for Unux, and many companies that opt for Linux ·"'~"~!!!!/!!II
`across their organization will likely select Red Hat.
`INDICATORS
`POOR
`USABilllY
`GOOD
`CAPABILilY
`GOOD
`PERFORMANCE
`FAIR ·
`INTEROPERABILilY
`~ __ FAIR ,-:
`MANAGEABILilY
`FAIR
`SCALABILilY
`SECURilY
`G~O~- .J
`
`COST ANALYSIS
`Red Hat Linux 7.3 comes in $59.95 Personal and $199.95 Pro(cid:173)
`fessional editions. For those who wish to forgo printed docu(cid:173)
`mentation and professional support, Red Hat is also availa ble
`for free download over the Internet.
`0 Ships with latest version of KDE; ships with new printing con(cid:173)
`figuration tools. 0 Control panel is less conveniently orga nized
`than those for Mandrake and SuSE.
`
`EVALUATION SHORT LIST
`• MandrakeSoft's Mandrake Unux 8.2
`• SuSE Linux's SuSE Linux 8.0
`
`• Microsoft Corp.'s Windows XP Professional
`• Apple Computer Inc.'s Mac OS X
`
`www.redhat.com
`
`Page 3
`
`

`
`APPSHI ELD FROM PAGE 55
`
`The pas ive mode is ideal fo r teach(cid:173)
`ing AppShield how to protect a Web
`applica tion. To do so, we ass igned a
`workstatio n to be a trusted IP so urce
`for AppShield. We th en surfed th e
`applications and carriedo ut aJl norm al
`activity while AppS hield watched and
`learned. Once we we re fi ni shed, we
`could autom atically crea te a security
`rule for that site.
`Beca u se AppS hi e ld wa tc h es th e
`cl ick stream, it ca n protect almost any
`ap plication. In test , we protected appli(cid:173)
`cations wri tten in Active Server Pages,
`JavaServer Pages and PHP. It was a sim(cid:173)
`ple matter to manually ed it the created
`rules or to autom atically create a new
`rule from th e administration interface.
`AppShield ca n pro tect regul ar Web
`traffic and traffic within SSL (Secure
`Sockets Layer) co nnectio ns, al tho ugh
`to protect SSL tra ffic , the ce rtifi cates
`must be added to AppSh.ield. Some per(cid:173)
`fo rman ce hi t is poss ib le si nce App (cid:173)
`Shield must decrypt an d re-encrypt the
`traffic. However, the product ca n also
`work wi th third-party SSL accelerators.
`Companies deploying AppShield
`can choose fro m n-vo implementatio ns.
`T he mo re traditional, host-based mode
`involves installin g AppS hield o n the
`same system as the Web server an d
`using o ne of the bu il t-in Web serve r
`plug-ins. AppSh.ield has pre-built pl ug-
`
`ins fo r m o st pop ul a r We b se rver s
`includ.ing Apache, Microsoft Co rp .'s
`In ternet Informati on Se rvices a nd Sun
`Microsystem s In c.'s Sun Ope n N e t
`Enviro nment.
`T he other dep loyme nt op ti on is to
`install AppShield in a ga teway m ode,
`where it sits in fro nt of the W eb servers
`a nd redirects requests to the appro(cid:173)
`pria te servers.
`Acco rd ing to Sanctllln officials, per(cid:173)
`form an ce in Version 4.0 o f AppShield
`is much improved over previo us ver(cid:173)
`sions. Still, som e negative effect is prob(cid:173)
`able becau e the product resides in fro nt
`of traffic. AppS hield can be set up in
`large cl usters to in1 prove pe rform an ce.
`In add.itio n, the product automatically
`passes through all standard HTML and
`o tl1er nona pplication traffic.
`Like m ost securi ty app li catio n ,
`besides trying to sto p unwan ted activ(cid:173)
`ity, AppShield does extensive logging
`and an alysis of tl1is activity. One wel(cid:173)
`com e new feature in tl1is versio n is the
`introductio n o fprivacy cont:rols, wh.ich
`make it possible to preset info rmatio n
`that wiU not be sto red in the applica(cid:173)
`tion's logs. T his is welco me fo r co m(cid:173)
`pa ni e
`that do n 't wa nt in fo rm a ti o n
`such as their cu to me rs' cred it ca rd
`n umbers sto red in security Jogs. e
`
`East Coast Techn ica l Director ji m
`Rapoza can be reached at j im_rapoza@
`ziffdav is.com.
`
`COST ANALYSIS
`At $15,000, AppShield is considerably more expensive than many
`competitors, which generally are priced at about $2,000. In addi(cid:173)
`tion, while a single AppShield installation can protect many servers,
`pricing is still on a per-server basis, although volume discounts
`do apply.
`0 Simple ru le creation th rough passive moni to ring of Web
`application activity; can selectively block sensitive privacy infor(cid:173)
`mation from security logs. 0 Needs to be insta lled in conjunction with good system secu(cid:173)
`ntv to protect against direct attacks on the AppShield system.
`EVAlUA"flON SHORT LIST
`• Argus Sy::>tems Group Inc.'s PitBull
`• eEye Di~ft.al SPcunty Inc.'s SecureiiS
`
`• Entercept Security Technologies'
`Entercept 2.0
`

`
`www.sanctuminc.com
`
`LINUX FROM PAGE 55
`
`inclu ded in the list f mo nitors we had
`to selec t from , but we co u ld put a
`Wi ndows driver disk into th machin e,
`from which Su E ga th ered the appro(cid:173)
`priate sett.ings.
`
`Setting up security
`ALL T HR EE DISTRI IW TIO SO FF ER PE R(cid:173)
`so na] fir ewa ll . ftware, b ut whe n it
`cam e to configurati on , SuSE wo n o u t
`aga in . SuSE' s firewa ll and sec urit y
`d.ialogs en abled u either to elect a pre(cid:173)
`set securi ty level o r t dri ll down into
`in d.ividuaJ option . Mandrake Lin ux's
`co ntrol panel did not contain a utili ty
`fo r con figuring th e sy tem ' firewa ll ,
`a nd Red Hat's fir ewall e tup applet
`req uired m o re bas ic fa mi lia rity with
`fi rewalls to set up.
`Speak.ing of sy tem co nfiguration ,
`o ne qual ity of Linux th at we appreci(cid:173)
`ated in contra t with Vlindows wa s
`the ease with which we could as umc
`administrative right to make change
`witho ut logging o ut and back in a root.
`Upo n laun ching a ystem setu p utili ty
`in o ne of the Li nux d istrib uti ons we
`tested , we we re prompted for o ur root
`passwo rd to make ystem cha nges.
`Tn W ind ow , acq uir ing admi n is(cid:173)
`trative rights t change a etting o r to
`insta ll software often requ ire loggi ng
`
`ut as a regula r use r a nd logging back
`in as an adm inistrator. o poorly imple(cid:173)
`m e nted is thi s fac ili ty in W ind ows
`th at by defaul t, Windows XP users are
`assigned adm inistrative rights- a secu(cid:173)
`ri ty fa ux pa , since li m ited user rights
`restrict the damage that a virus oracon(cid:173)
`figura ti n erro r ca n ca use in a system.
`All three d is tribut ions were fa irly
`sim p le to in ta ll , but we fo un d SuSE
`the sim ples t. SuSE sta rted us o ut with
`a set
`f d efa ult se ttin gs, the acce p(cid:173)
`ta nce of whi ch et th e install process
`unde r way with a sin gle click. We could
`also change each of the settings.
`For use rs who wish to install SuSE
`a longside a copy of W indows, SuSE
`offe rs to re-size W indows pa rtitions to
`make way for Lin ux. In one of the test
`systems, u E re- ized a 38MB Win(cid:173)
`dows fi le allocatio n table pa rtition to
`l9MB a nd in tai led u E in the result(cid:173)
`ing free pace. We co uld the n choose
`indows or uSEatboot. T his feature
`\
`doe not, however, wo rk with T File
`ystem pa rtitions.
`f the p rod u c ts we tested
`o ne
`in cl uded co nfigura tion tool for wire(cid:173)
`less LA 1 s in its co ntrol panel ap pl.ica(cid:173)
`tio ns-thi is a gap we ho pe to see fiJJed
`in future releases. e
`
`Technical A nalyst jason Brooks can be
`reached at jason_brooks@zijfdavis.com.
`
`l
`
`•
`
`.
`
`- .
`
`.~:··
`t·
`SuSE Linux 8.0

`-··
`With a focus on usability that doesn't come at the cost of flexibility, SuSE Linux's SuSE Linux
`8.0 rose to the top in our tests to earn the Analyst's Choice designation.
`Th1s SuSE Linux upgrade proved that 1t is well -~~~"'~~~~
`suited to supplant Windows on many main(cid:173)
`INDICATORS
`stream desktop machines, with industry-leadmg
`GOOD
`USABILilY
`distnbution control and streamlined Installa(cid:173)
`GOOD
`CAPABILilY
`tion.
`GOOD
`PERFORMANCE
`FAIR
`INTEROPERABILilY
`GOOD
`MANAGEABILilY
`FAIR
`SCALABILilY
`GOOD
`SECURilY
`
`COST ANALYSIS
`SuSE 8.0 comes in $39.95 Personal and $79.95 Professional
`editions. With a friendly interface for most system setup tasks,
`users should take to SuSE with minimal retrai ning, and SuSE's
`open-source status means there's no software licensing to track.
`0 Best control panel of the distributions we tested; very good installation routine; ships
`with KDE 3.0. 0 Lacks Mandrake Linux's fi le sharing and font utilities; no tools for setting
`up WLANs.
`
`EVALUATION SHORT LIST
`• Red Hat's Red Hat Linux 7.3
`• MandrakeSoft's Mandrake Linux 8.2
`
`• Microsoft Corp.'s Wi ndows XP Professional
`• Apple Computer Inc.'s Mac OS X
`
`M'.'•'·''~'&11Mf83•l ,, M
`
`Page 4

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket