Attacks/Breaches
7/30/2012
02:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements

ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels

ReaSoft Development has announced the release of ReaSoft Network Firewall 3, a new version of its popular solution for corporate Internet access management and network protection. What is it remarkable for? It features DLP-system elements, supports restriction of access to certain categories of websites and guarantees easy setting-up in case of several network interfaces.

ReaSoft Network Firewall is a powerful solution that was developed specially for small and medium-size businesses, with due consideration of their specific needs and problems. The program has already won significant popularity thanks to its excellent performance combined with minimal requirements and ease of use.

Besides regular firewall functions, ReaSoft Network Firewall 3 is noted for elements of Data Loss Prevention system. Of course, they do not make it a full-featured DLP system, but they have proved more than sufficient for monitoring and tracking tasks. ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, web-mail, ICQ, MSN, Internet communities and other similar channels. All HTTP and HTPS POST queries, communication via instant messengers and e-mails with attachments are decoded by the program and saved on the hard disk for checking. Given that full-fledged DLP systems are very expensive and require significant implementation effort, ReaSoft Network Firewall is an affordable yet effective substitution.

Another important feature is web filtering based on the program´s catalog of websites. It would be very useful for those managers or business owners who would like to boost their employees´ productivity. According to recent surveys, 90 percent of American office workers do online shopping and surf social networks during office hours. It means that simply blocking access to all websites categorized as "Electronic commerce", "Social Networking" and "Entertainment" (by creating a correspondent rule in ReaSoft Network Firewall) eliminates the so-called "cyber-slacking", greatly increases the employees´ labor efficiency and, consequently, corporate income. By the way, traffic consumption considerably drops.

The third most significant characteristic of ReaSoft Network Firewall is the surprising simplicity of setup and management even if there are several incoming and outgoing network interfaces. Everything is clear and straightforward thanks to the control panel, which has been specially designed to help network administrators avoid mistakes. Initial configuration, as well as creation of any rules and objects, is performed via simple wizards. The program also features a set of predefined firewall rules: if the administrator fails to create effective security policies, this set ensures normal operation of the server.

It should be also noted that ReaSoft Network Firewall 3 enables the administrator to create rules for certain applications and restrict use of certain application protocols.

Pricing and Availability

ReaSoft Network Firewall 3 is compatible with MS Windows 2000, XP, 2003 Server, Vista, 2008 Server, 7 (full support of 32-bit and 64-bit editions). The license price starts from 199.00 USD (up to 10 workstations); volume discounts are available for non-commercial educational and scientific institutions. Further information on ReaSoft Network Firewall 3, as well as its free evaluation version, is available at the product page.

Links

Product page: http://www.reasoft.com/products/networkfirewall/ Download link: http://www.reasoft.com/products/networkfirewall/ Company website: http://www.reasoft.com

Company

Founded in 1999, ReaSoft Development is a IT company specializing in producing highly efficient, well-made and user-friendly software to meet the needs of both business professionals and amateur home users. For more information, visit www.reasoft.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio