We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Calcom Makes Hardening Automation a Smooth Process for IT Professionals

Ditsa Keren Technology Researcher

Established in 2001, CalCom provides solutions for configuration hardening automation, helping IT teams to enforce and manage security baselines for large server environments in a cost-effective fashion. In this blog post we've interviewed CalCom's business development manager Roy Ludmir to hear what CalCom is all about.

CalCom started developing released a first version of its’ hardening automation platform in 2008, based on our experience as security integrators, and following our customers' requirements. Back then and up to this day, it's been a big challenge to perform server hardening, mainly due to the ongoing conflict between security and IT operation teams.

The requirement to harden and secure a server usually comes from the security team, but the actual work is done by the IT operations team, and their interests often contradict. While the security's objective is to make the system as secure as possible, IT's main interest is that everything runs smoothly.

We've recognized this as a repeated challenge in every enterprise we've worked with, so we decided to develop a fully automated tool that helps these teams to harden their security while maintaining all system operations up and running. Our philosophy says: secure as much as possible but don’t break anything.

What makes CalCom unique?

Our distinctiveness lies in our ability to address the most significant challenge of assisting IT professionals in comprehending the potential impact of future policy changes on the production environment.

Let's say you need to harden 10,000 servers. In that case, before you enforce policies to your servers (harden), you would need to go into a lab environment that simulates the production, and start testing everything. That's a labor intensive task that requires thousands of hours. We developed an analytics engine that can predict the impact of the change, before it actually gets done. The idea is to provide an understating of what might break during the hardening, and highlighting the areas that could be damaged as a result of the hardening process.

What are the key elements necessary for creating a secure working environment?

From the security aspect, hardening is a fundamental requirement, and a very basic best practice in the market.

Regulatory requirements such as PCI-DSS, HIPAA, etc. and standards such as NIST cyber security framework require organizations to perform configuration hardening of their systems in order to manage a secure environment. This is standard requirement that every security professional is familiar with.

 In your opinion, how is GDPR going to affect the way we do business?

GDPR is all about making sure that data of organizations is managed securely. Enterprises will need to go into the next level of securing their systems.  Hardening and encryption technologies will obviously be on the rise, but its early to say how exactly it's going to impact the entire market. I assume it will become clearer in about 1 year from now.

Can you tell us a bit about Calcom's future plans?

So far our main business was around Microsoft windows hardening automation. These days, we are preparing to launch a solution for the Linux open source world, which will take us further into the DevOps environment.

We are currently seeing the rise of new development and operation platforms which are heavily dependent on Linux, I believe this shift will be adopted by many enterprises.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Ditsa Keren is a cybersecurity expert with a keen interest in technology and digital privacy.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.