Attacks/Breaches
7/30/2012
02:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements

ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels

ReaSoft Development has announced the release of ReaSoft Network Firewall 3, a new version of its popular solution for corporate Internet access management and network protection. What is it remarkable for? It features DLP-system elements, supports restriction of access to certain categories of websites and guarantees easy setting-up in case of several network interfaces.

ReaSoft Network Firewall is a powerful solution that was developed specially for small and medium-size businesses, with due consideration of their specific needs and problems. The program has already won significant popularity thanks to its excellent performance combined with minimal requirements and ease of use.

Besides regular firewall functions, ReaSoft Network Firewall 3 is noted for elements of Data Loss Prevention system. Of course, they do not make it a full-featured DLP system, but they have proved more than sufficient for monitoring and tracking tasks. ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, web-mail, ICQ, MSN, Internet communities and other similar channels. All HTTP and HTPS POST queries, communication via instant messengers and e-mails with attachments are decoded by the program and saved on the hard disk for checking. Given that full-fledged DLP systems are very expensive and require significant implementation effort, ReaSoft Network Firewall is an affordable yet effective substitution.

Another important feature is web filtering based on the program´s catalog of websites. It would be very useful for those managers or business owners who would like to boost their employees´ productivity. According to recent surveys, 90 percent of American office workers do online shopping and surf social networks during office hours. It means that simply blocking access to all websites categorized as "Electronic commerce", "Social Networking" and "Entertainment" (by creating a correspondent rule in ReaSoft Network Firewall) eliminates the so-called "cyber-slacking", greatly increases the employees´ labor efficiency and, consequently, corporate income. By the way, traffic consumption considerably drops.

The third most significant characteristic of ReaSoft Network Firewall is the surprising simplicity of setup and management even if there are several incoming and outgoing network interfaces. Everything is clear and straightforward thanks to the control panel, which has been specially designed to help network administrators avoid mistakes. Initial configuration, as well as creation of any rules and objects, is performed via simple wizards. The program also features a set of predefined firewall rules: if the administrator fails to create effective security policies, this set ensures normal operation of the server.

It should be also noted that ReaSoft Network Firewall 3 enables the administrator to create rules for certain applications and restrict use of certain application protocols.

Pricing and Availability

ReaSoft Network Firewall 3 is compatible with MS Windows 2000, XP, 2003 Server, Vista, 2008 Server, 7 (full support of 32-bit and 64-bit editions). The license price starts from 199.00 USD (up to 10 workstations); volume discounts are available for non-commercial educational and scientific institutions. Further information on ReaSoft Network Firewall 3, as well as its free evaluation version, is available at the product page.

Links

Product page: http://www.reasoft.com/products/networkfirewall/ Download link: http://www.reasoft.com/products/networkfirewall/ Company website: http://www.reasoft.com

Company

Founded in 1999, ReaSoft Development is a IT company specializing in producing highly efficient, well-made and user-friendly software to meet the needs of both business professionals and amateur home users. For more information, visit www.reasoft.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.