Attacks/Breaches
7/30/2012
02:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements

ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels

ReaSoft Development has announced the release of ReaSoft Network Firewall 3, a new version of its popular solution for corporate Internet access management and network protection. What is it remarkable for? It features DLP-system elements, supports restriction of access to certain categories of websites and guarantees easy setting-up in case of several network interfaces.

ReaSoft Network Firewall is a powerful solution that was developed specially for small and medium-size businesses, with due consideration of their specific needs and problems. The program has already won significant popularity thanks to its excellent performance combined with minimal requirements and ease of use.

Besides regular firewall functions, ReaSoft Network Firewall 3 is noted for elements of Data Loss Prevention system. Of course, they do not make it a full-featured DLP system, but they have proved more than sufficient for monitoring and tracking tasks. ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, web-mail, ICQ, MSN, Internet communities and other similar channels. All HTTP and HTPS POST queries, communication via instant messengers and e-mails with attachments are decoded by the program and saved on the hard disk for checking. Given that full-fledged DLP systems are very expensive and require significant implementation effort, ReaSoft Network Firewall is an affordable yet effective substitution.

Another important feature is web filtering based on the program´s catalog of websites. It would be very useful for those managers or business owners who would like to boost their employees´ productivity. According to recent surveys, 90 percent of American office workers do online shopping and surf social networks during office hours. It means that simply blocking access to all websites categorized as "Electronic commerce", "Social Networking" and "Entertainment" (by creating a correspondent rule in ReaSoft Network Firewall) eliminates the so-called "cyber-slacking", greatly increases the employees´ labor efficiency and, consequently, corporate income. By the way, traffic consumption considerably drops.

The third most significant characteristic of ReaSoft Network Firewall is the surprising simplicity of setup and management even if there are several incoming and outgoing network interfaces. Everything is clear and straightforward thanks to the control panel, which has been specially designed to help network administrators avoid mistakes. Initial configuration, as well as creation of any rules and objects, is performed via simple wizards. The program also features a set of predefined firewall rules: if the administrator fails to create effective security policies, this set ensures normal operation of the server.

It should be also noted that ReaSoft Network Firewall 3 enables the administrator to create rules for certain applications and restrict use of certain application protocols.

Pricing and Availability

ReaSoft Network Firewall 3 is compatible with MS Windows 2000, XP, 2003 Server, Vista, 2008 Server, 7 (full support of 32-bit and 64-bit editions). The license price starts from 199.00 USD (up to 10 workstations); volume discounts are available for non-commercial educational and scientific institutions. Further information on ReaSoft Network Firewall 3, as well as its free evaluation version, is available at the product page.

Links

Product page: http://www.reasoft.com/products/networkfirewall/ Download link: http://www.reasoft.com/products/networkfirewall/ Company website: http://www.reasoft.com

Company

Founded in 1999, ReaSoft Development is a IT company specializing in producing highly efficient, well-made and user-friendly software to meet the needs of both business professionals and amateur home users. For more information, visit www.reasoft.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.