Attacks/Breaches
7/30/2012
02:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements

ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels

ReaSoft Development has announced the release of ReaSoft Network Firewall 3, a new version of its popular solution for corporate Internet access management and network protection. What is it remarkable for? It features DLP-system elements, supports restriction of access to certain categories of websites and guarantees easy setting-up in case of several network interfaces.

ReaSoft Network Firewall is a powerful solution that was developed specially for small and medium-size businesses, with due consideration of their specific needs and problems. The program has already won significant popularity thanks to its excellent performance combined with minimal requirements and ease of use.

Besides regular firewall functions, ReaSoft Network Firewall 3 is noted for elements of Data Loss Prevention system. Of course, they do not make it a full-featured DLP system, but they have proved more than sufficient for monitoring and tracking tasks. ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, web-mail, ICQ, MSN, Internet communities and other similar channels. All HTTP and HTPS POST queries, communication via instant messengers and e-mails with attachments are decoded by the program and saved on the hard disk for checking. Given that full-fledged DLP systems are very expensive and require significant implementation effort, ReaSoft Network Firewall is an affordable yet effective substitution.

Another important feature is web filtering based on the program´s catalog of websites. It would be very useful for those managers or business owners who would like to boost their employees´ productivity. According to recent surveys, 90 percent of American office workers do online shopping and surf social networks during office hours. It means that simply blocking access to all websites categorized as "Electronic commerce", "Social Networking" and "Entertainment" (by creating a correspondent rule in ReaSoft Network Firewall) eliminates the so-called "cyber-slacking", greatly increases the employees´ labor efficiency and, consequently, corporate income. By the way, traffic consumption considerably drops.

The third most significant characteristic of ReaSoft Network Firewall is the surprising simplicity of setup and management even if there are several incoming and outgoing network interfaces. Everything is clear and straightforward thanks to the control panel, which has been specially designed to help network administrators avoid mistakes. Initial configuration, as well as creation of any rules and objects, is performed via simple wizards. The program also features a set of predefined firewall rules: if the administrator fails to create effective security policies, this set ensures normal operation of the server.

It should be also noted that ReaSoft Network Firewall 3 enables the administrator to create rules for certain applications and restrict use of certain application protocols.

Pricing and Availability

ReaSoft Network Firewall 3 is compatible with MS Windows 2000, XP, 2003 Server, Vista, 2008 Server, 7 (full support of 32-bit and 64-bit editions). The license price starts from 199.00 USD (up to 10 workstations); volume discounts are available for non-commercial educational and scientific institutions. Further information on ReaSoft Network Firewall 3, as well as its free evaluation version, is available at the product page.

Links

Product page: http://www.reasoft.com/products/networkfirewall/ Download link: http://www.reasoft.com/products/networkfirewall/ Company website: http://www.reasoft.com

Company

Founded in 1999, ReaSoft Development is a IT company specializing in producing highly efficient, well-made and user-friendly software to meet the needs of both business professionals and amateur home users. For more information, visit www.reasoft.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7241
Published: 2014-12-19
The TSUTAYA application 5.3 and earlier for Android allows remote attackers to execute arbitrary Java methods via a crafted HTML document.

CVE-2014-7249
Published: 2014-12-19
Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 992...

CVE-2014-7267
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the output-page generator in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7268.

CVE-2014-7268
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the data-export feature in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7267.

CVE-2014-8272
Published: 2014-12-19
The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.