Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/1/2010
02:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Kerio Launches New Unified Threat Management Solution For SMBs

Kerio Control 7 is based on the industry-standard Snort project

SAN JOSE, California –June 1, 2010– Kerio Technologies today unveils the latest evolution of its gateway security product line, Kerio Control. Building upon Kerio WinRoute Firewall’s 13-year heritage, the new UTM server solution and software appliance offers network administrators complete network security and a wealth of tools to manage user access and optimize performance. Equipped with an embedded IDS/IPS engine, Kerio Control provides comprehensive management of rapidly evolving security threats.

Front and center in the new product are its Intrusion Detection and Prevention capabilities (IDS/IPS). Based on industry standard Snort technology, Kerio Control’s IDS/IPS classifies and stops attacks against servers, applications, clients and infrastructure components. An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.

“At Triton, we have always been extremely happy with Kerio’s straightforward user interface, easy VPN, and detailed reporting,” says David Denchik, President of Triton Technical, a premier IT consulting firm and a Kerio Certified Partner from Seattle, WA. “The new Kerio Control introduces both IDS and MAC address filtering which are both welcome additions that will enable us to meet client requirements without purchasing separate hardware or software. We are particularly excited about Kerio’s implementation of IDS and the ease of support of having this feature integrated in one solution.”

Kerio Control comes with a fresh new Web Administration console, raising the standard for manageability of security and UTM products. The Web Administration has the look and feel of a true desktop application, making the enforcement of sophisticated network policies a snap for most IT administrators, a startling difference compared to the management tools of other UTM appliances.

Kerio StaR, the cornerstone data analytics component of Kerio Control, interprets and displays network activity in a variety of comprehensive views, to assist in identifying security threats, traffic patterns, and performance bottlenecks. Just like the new Web Administration, Kerio StaR is accessible from any browser, giving managers instant insight into the web behavior of every single employee or user in their network. The database-driven Kerio StaR gives administrators useful trend reports based on historic data, allowing them to view and inspect changing usage patterns and take swift action on any emerging network abuse.

Kerio Technologies is transitioning to new anti-virus and anti-malware technology partner, Sophos. Kerio Control 7 is the first Kerio product to ship with an embedded high-performance Sophos anti-virus engine that provides the option to scan to all inbound and outbound web, email and FTP traffic for malware. While Kerio Control provides numerous plug-ins for other commercial and open-source anti-virus products, Sophos is a recommended option for every customer installation of the new UTM as it provides a seamless experience and painless setup.

ICSA labs certified as a Corporate Firewall, Kerio Control provides both network and application layer security. Kerio Control puts special focus on the client-to-server VPN, providing an unparalleled choice of VPN clients for all major platforms – Mac, Windows, and Linux. Kerio VPN Client works with practically any combination of operating system versions, giving modern organizations tremendous flexibility in the way they deploy VPN to their users.

“Kerio Control 7 is the elaborate execution of a very simple idea – a gateway security product that provides seemingly endless options, yet all are very easy to implement,” says Scott Schreiman, CEO of Kerio Technologies Inc.

Whether deploying as a hardened Linux software appliance or a certified Windows application, Kerio Control can run on 32-bit and 64-bit server or workstation systems. The Kerio Control 7 software appliance can turn any PC into a dedicated UTM appliance using the ISO image, while the specially designed virtual appliance for VMware can be easily imported into existing virtual environments to maximize ROI on existing IT equipment.

The Kerio Control server license starts at $255 and includes 5 users, with 5-user packs starting at just $120. Unlike most competitors, Kerio has no added fees for VPN clients.

Kerio Control is available for download immediately with a 30 day unrestricted evaluation period. Visit www.kerio.com/control/whats-new for more information.

About Kerio Technologies, Inc.

Innovating in Internet security since 1997, Kerio Technologies, Inc. provides Internet messaging and firewall software for small to medium-sized businesses and organizations worldwide. Kerio is headquartered in San Jose, California, and has offices in New York, Germany, the United Kingdom, the Czech Republic and Russia. Kerio is a member of CalConnect, a calendaring and scheduling consortium; a premier member of the Apple Developer Connection; and a Microsoft Gold Certified Partner. Kerio has more than 4,400 business partners in 108 countries. Technology partners include Sophos, eSoft, and Notify Technology Corporation. For more information, please visit www.kerio.com.

“Kerio,” its products and its logo are either registered trademarks or trademarks of Kerio Technologies, Inc. in the United States and/or other countries, as the case may be.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9493
PUBLISHED: 2021-06-16
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
CVE-2021-28815
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
CVE-2021-3535
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
CVE-2021-32685
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...
CVE-2021-32623
PUBLISHED: 2021-06-16
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using...