Attacks/Breaches
7/30/2012
02:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements

ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels

ReaSoft Development has announced the release of ReaSoft Network Firewall 3, a new version of its popular solution for corporate Internet access management and network protection. What is it remarkable for? It features DLP-system elements, supports restriction of access to certain categories of websites and guarantees easy setting-up in case of several network interfaces.

ReaSoft Network Firewall is a powerful solution that was developed specially for small and medium-size businesses, with due consideration of their specific needs and problems. The program has already won significant popularity thanks to its excellent performance combined with minimal requirements and ease of use.

Besides regular firewall functions, ReaSoft Network Firewall 3 is noted for elements of Data Loss Prevention system. Of course, they do not make it a full-featured DLP system, but they have proved more than sufficient for monitoring and tracking tasks. ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, web-mail, ICQ, MSN, Internet communities and other similar channels. All HTTP and HTPS POST queries, communication via instant messengers and e-mails with attachments are decoded by the program and saved on the hard disk for checking. Given that full-fledged DLP systems are very expensive and require significant implementation effort, ReaSoft Network Firewall is an affordable yet effective substitution.

Another important feature is web filtering based on the program´s catalog of websites. It would be very useful for those managers or business owners who would like to boost their employees´ productivity. According to recent surveys, 90 percent of American office workers do online shopping and surf social networks during office hours. It means that simply blocking access to all websites categorized as "Electronic commerce", "Social Networking" and "Entertainment" (by creating a correspondent rule in ReaSoft Network Firewall) eliminates the so-called "cyber-slacking", greatly increases the employees´ labor efficiency and, consequently, corporate income. By the way, traffic consumption considerably drops.

The third most significant characteristic of ReaSoft Network Firewall is the surprising simplicity of setup and management even if there are several incoming and outgoing network interfaces. Everything is clear and straightforward thanks to the control panel, which has been specially designed to help network administrators avoid mistakes. Initial configuration, as well as creation of any rules and objects, is performed via simple wizards. The program also features a set of predefined firewall rules: if the administrator fails to create effective security policies, this set ensures normal operation of the server.

It should be also noted that ReaSoft Network Firewall 3 enables the administrator to create rules for certain applications and restrict use of certain application protocols.

Pricing and Availability

ReaSoft Network Firewall 3 is compatible with MS Windows 2000, XP, 2003 Server, Vista, 2008 Server, 7 (full support of 32-bit and 64-bit editions). The license price starts from 199.00 USD (up to 10 workstations); volume discounts are available for non-commercial educational and scientific institutions. Further information on ReaSoft Network Firewall 3, as well as its free evaluation version, is available at the product page.

Links

Product page: http://www.reasoft.com/products/networkfirewall/ Download link: http://www.reasoft.com/products/networkfirewall/ Company website: http://www.reasoft.com

Company

Founded in 1999, ReaSoft Development is a IT company specializing in producing highly efficient, well-made and user-friendly software to meet the needs of both business professionals and amateur home users. For more information, visit www.reasoft.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.