CloudLinux expands its Extended Lifecycle Support services for Linux distributions

By | 6:13 PM Leave a Comment

CloudLinux announces the expansion of its affordable Extended Lifecycle Support (ELS) services for Linux distributions, by providing its own updates and security patches for several years after expiration of the products’ end-of-life date. For example, support for CentOS 6 from Red Hat expired November 30 last year.

CloudLinux offers ELS for CentOS 6, available since November, 2020 and extends to June 2024. Oracle Linux 6 (ends March 2021) Extended Lifecycle Support service will be available starting in February 2021 and will extend to February 2025. Extended Lifecycle Support service for Ubuntu 16.04 (ends April 2021) and Debian 9 (ends June 2022) is under development.

“At CloudLinux we realized that a large volume of Linux users are at risk — relying on unsupported operating systems (OS). That is, unless these users rapidly move to an alternative OS which is not necessarily practical,” said Igor Seletskiy, CEO and founder of CloudLinux Inc.

“That’s why we launched Extended Lifecycle Support services for various Linux distributions, giving users more breathing room to consider their options of whether to upgrade to a newer version or switch to a different Linux distribution.”

Organizations that still depend on end-of-life operating systems are likely to face a growing list of security risks and vulnerabilities after the vendor stops deploying patches and updates for the latest Common Vulnerabilities and Exposures (CVE).

And, even after upgrading to a newer Linux version, administrators still face the same situation of having support expire, creating a continually stressful environment for administrators responsible for safeguarding corporate data. The CloudLinux Extended Lifecycle Support provides years of additional time to transition to alternatives.

CloudLinux Extended Lifecycle Support includes updates for the kernel and all needed packages such as Apache, PHP, MySQL, Glibc, OpenSSL, OpenSSH, and many others.


from Help Net Security https://ift.tt/3ofkgNi

0 comments:

Post a Comment