Perimeter
2/14/2017
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Untangle Partners with FlashRouters to Distribute Revolutionary Firmware

Full Next-Generation Firewall Features Now Available on Popular Linksys Router.

SAN FRANCISCO, Calif. - Feb. 14, 2017 - Untangle®, Inc., a leader in comprehensive network security for small-to-medium business (SMB), today at the RSA Conference announced a partnership with FlashRouters. FlashRouters is the leading supplier of routers pre-installed with alternative firmware distributions to provide enhanced performance, improved privacy and security, and additional functionality. Untangle’s flagship network security product, NG Firewall, will now be available pre-installed on the Linksys WRT1900ACS router from FlashRouters.com.

Untangle’s support of the Linksys WRT1900ACS router represents an expansion of its support for ARM-based Wi-Fi routers. Recognizing the inherent limitations in popular consumer routers and the price floors of enterprise next-generation firewall appliances, Untangle set about making its popular, broadly installed and easy-to-use NG Firewall product available on off-the-shelf ARM-based Wi-Fi routers, radically lowering the cost of deploying a network security appliance––key for small/home offices, branch offices, franchises, retail outlets, and any organization concerned with deployment costs. Because its NG Firewall solution is software-based, Untangle is uniquely suited to address this market need. It first announced support for the Asus AC3100 RT-AC88U in August, 2016. Today’s announcement extends that support to the Linksys WRT1900ACS router. Additionally, by partnering with FlashRouters, Untangle is providing its customers the opportunity to purchase the Linksys WRT1900ACS router pre-installed with Untangle NG Firewall, bypassing the need to perform the software re-imaging process themselves.

“The Linksys WRT1900ACS router flashed with the Untangle firmware is most powerful firewall on the planet for the price. This makes it ideal for organizations that need the power of an enterprise firewall but are cost-conscious, from large multi-site deployments like retail to SOHO and power users at home,” said Dirk Morris, founder and chief product officer at Untangle.

FlashRouters provides routers that have been "flashed" with alternative firmware, such as Untangle NG Firewall. "Flashing" is the term used for the process of re-imaging a router with a firmware upgrade. Router firmware cannot simply be installed like a regular program on a PC; rather, it must be done in a manner that is specific to each different router device. This sensitive process, if done incorrectly, can "brick" a router, making it inoperable. By partnering with FlashRouters, Untangle will broadly expand the reach of its firmware, enabling potential customers to purchase a turnkey solution without the risks associated with re-imaging the router themselves. Untangle will continue to provide its firmware for download from its website for IT enthusiasts who wish to perform their own router imaging.

“FlashRouters has been providing DD-WRT, Tomato and VPN routers for more than six years and is committed to bringing open source alternative routers to market. We’re excited to partner with Untangle to expand our range to include the industry’s leading open source firewall,” said Joe Soria, co-founder and chief operating officer at FlashRouters.

About NG Firewall

NG Firewall delivers a comprehensive solution for content filtering, malware and threat protection, secure Wi-Fi, application control, bandwidth optimization, virtual private networks and more. Untangle combines Unified Threat Management (UTM)—to address all of the key network threats—with policy management tools that enable administrators to monitor, manage and shape internet traffic. NG Firewall’s fully customizable industry-leading reports provide administrators an unprecedented level of insight into what’s happening on their networks across all applications by user, group, time of day and more. Customers who wish to manage multiple NG Firewall deployments can do so with Command Center, Untangle’s cloud-based centralized management service announced yesterday.

Pricing & Availability

The Linksys WRT1900ACS router pre-imaged with Untangle NG Firewall is available today for pre-order from FlashRouters, with an estimated ship date of March 1. Untangle NG Firewall firmware is also available as a free download for those who wish to purchase a router on their own and perform their own imaging. For more details about the release, please visit untangle.com.

See Untangle Running on the Linksys WRT1900ACS Router at RSA

Untangle is showcasing its award-winning NG Firewall and new Command Center at the RSA Conference in San Francisco through February 16 in the South Hall of the Moscone Center, Booth #S437.

About Untangle

Untangle is an innovator in cybersecurity designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations. Untangle’s integrated suite of software and appliances provides enterprise-grade capabilities and consumer-oriented simplicity to organizations with limited IT resources. Untangle’s award-winning network security solutions are trusted by over 40,000 customers around the world. Untangle is headquartered in San Jose, California. For more information, visit www.untangle.com.

 

About FlashRouters
FlashRouters uses enhanced firmware and applications, including popular open source projects like DD-WRT and Tomato, to provide custom networking solutions to individuals and businesses worldwide. Each FlashRouter device is hand-configured and tested by an expert technician prior to shipment. FlashRouters is headquartered in the New York City metropolitan area. For more information, visit www.flashrouters.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.