Perimeter
2/14/2017
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Untangle Partners with FlashRouters to Distribute Revolutionary Firmware

Full Next-Generation Firewall Features Now Available on Popular Linksys Router.

SAN FRANCISCO, Calif. - Feb. 14, 2017 - Untangle®, Inc., a leader in comprehensive network security for small-to-medium business (SMB), today at the RSA Conference announced a partnership with FlashRouters. FlashRouters is the leading supplier of routers pre-installed with alternative firmware distributions to provide enhanced performance, improved privacy and security, and additional functionality. Untangle’s flagship network security product, NG Firewall, will now be available pre-installed on the Linksys WRT1900ACS router from FlashRouters.com.

Untangle’s support of the Linksys WRT1900ACS router represents an expansion of its support for ARM-based Wi-Fi routers. Recognizing the inherent limitations in popular consumer routers and the price floors of enterprise next-generation firewall appliances, Untangle set about making its popular, broadly installed and easy-to-use NG Firewall product available on off-the-shelf ARM-based Wi-Fi routers, radically lowering the cost of deploying a network security appliance––key for small/home offices, branch offices, franchises, retail outlets, and any organization concerned with deployment costs. Because its NG Firewall solution is software-based, Untangle is uniquely suited to address this market need. It first announced support for the Asus AC3100 RT-AC88U in August, 2016. Today’s announcement extends that support to the Linksys WRT1900ACS router. Additionally, by partnering with FlashRouters, Untangle is providing its customers the opportunity to purchase the Linksys WRT1900ACS router pre-installed with Untangle NG Firewall, bypassing the need to perform the software re-imaging process themselves.

“The Linksys WRT1900ACS router flashed with the Untangle firmware is most powerful firewall on the planet for the price. This makes it ideal for organizations that need the power of an enterprise firewall but are cost-conscious, from large multi-site deployments like retail to SOHO and power users at home,” said Dirk Morris, founder and chief product officer at Untangle.

FlashRouters provides routers that have been "flashed" with alternative firmware, such as Untangle NG Firewall. "Flashing" is the term used for the process of re-imaging a router with a firmware upgrade. Router firmware cannot simply be installed like a regular program on a PC; rather, it must be done in a manner that is specific to each different router device. This sensitive process, if done incorrectly, can "brick" a router, making it inoperable. By partnering with FlashRouters, Untangle will broadly expand the reach of its firmware, enabling potential customers to purchase a turnkey solution without the risks associated with re-imaging the router themselves. Untangle will continue to provide its firmware for download from its website for IT enthusiasts who wish to perform their own router imaging.

“FlashRouters has been providing DD-WRT, Tomato and VPN routers for more than six years and is committed to bringing open source alternative routers to market. We’re excited to partner with Untangle to expand our range to include the industry’s leading open source firewall,” said Joe Soria, co-founder and chief operating officer at FlashRouters.

About NG Firewall

NG Firewall delivers a comprehensive solution for content filtering, malware and threat protection, secure Wi-Fi, application control, bandwidth optimization, virtual private networks and more. Untangle combines Unified Threat Management (UTM)—to address all of the key network threats—with policy management tools that enable administrators to monitor, manage and shape internet traffic. NG Firewall’s fully customizable industry-leading reports provide administrators an unprecedented level of insight into what’s happening on their networks across all applications by user, group, time of day and more. Customers who wish to manage multiple NG Firewall deployments can do so with Command Center, Untangle’s cloud-based centralized management service announced yesterday.

Pricing & Availability

The Linksys WRT1900ACS router pre-imaged with Untangle NG Firewall is available today for pre-order from FlashRouters, with an estimated ship date of March 1. Untangle NG Firewall firmware is also available as a free download for those who wish to purchase a router on their own and perform their own imaging. For more details about the release, please visit untangle.com.

See Untangle Running on the Linksys WRT1900ACS Router at RSA

Untangle is showcasing its award-winning NG Firewall and new Command Center at the RSA Conference in San Francisco through February 16 in the South Hall of the Moscone Center, Booth #S437.

About Untangle

Untangle is an innovator in cybersecurity designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations. Untangle’s integrated suite of software and appliances provides enterprise-grade capabilities and consumer-oriented simplicity to organizations with limited IT resources. Untangle’s award-winning network security solutions are trusted by over 40,000 customers around the world. Untangle is headquartered in San Jose, California. For more information, visit www.untangle.com.

 

About FlashRouters
FlashRouters uses enhanced firmware and applications, including popular open source projects like DD-WRT and Tomato, to provide custom networking solutions to individuals and businesses worldwide. Each FlashRouter device is hand-configured and tested by an expert technician prior to shipment. FlashRouters is headquartered in the New York City metropolitan area. For more information, visit www.flashrouters.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.