Comodo Releases Full Version of Trustix Enterprise Firewall for Free

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<p><strong>Jersey City, N.J. &mdash; March 12</strong><br />Security company Comodo announced the commercial release of Trustix Enterprise Firewall version 4.8, (TEF) a free enterprise class LINUX-based firewall solution. Trustix Enterprise Firewall delivers a high-performance firewall that monitors network traffic and protects the network against unauthenticated traffic or log-in attempts that could inject Trojans, worms or infected files into the network. This commercial version builds on the previous BETA release of this solution and incorporates a powerful new anti-SPAM module for improved performance and security.<br /><br />Trustix Enterprise Firewall is widely acclaimed for its innovative WYSIWYG feature in combination with its sophisticated security features and remains free for use with no license, subscription or renewal fees. The technology in this firewall was designed allow a high level of control over inbound and outbound network traffic in order to ensure the security of the network. Administrators are able to monitor all network activity including any malicious activity, utilize an intuitive GUI to visualize and edit firewall policies and manage traffic for all security zones (up to 24).<br /><br />Additionally, this new release adds important new technology that improves the efficiency of TEF. <br /><br /><strong>DSPAM</strong><br />DSPAM is a scalable and open-source, content-based spam filter designed for multiuser enterprise systems. DSPAM filters spam by learning what spam is and isn&#39;t. It does this by learning each user&#39;s individual mail behavior. This allows DSPAM to provide highly accurate and personalized filtering for each user. DSPAM work efficiently even on large systems and provides an administratively maintenance free solution capable of learning each user&#39;s email behaviors with very few false positives. DSPAM supports many different MTAs and can also be deployed as a stand-alone SMTP application. <br /><br /><strong>Content Filtering</strong><br />Web content filtering prevents indiscriminate Internet surfing that often conceals viruses, worms, Trojans, spyware, keyloggers, phishing, pharming and more. TEF offers intelligent surfing protection through its user identity-based internet content filtering solution. TEF guards enterprises from security, productivity threats and legal liability. The Web content-filtering solution is based on a combination of categories, keywords, URLs, domain names and file types, making it a comprehensive filtering mechanism. <br /><br /><strong>High Availability and Load Balancer</strong><br />TEF makes use of LVS (Linux Virtual Server) to provide fast load balancing. The Heartbeat (Linux-HA) is used to monitor the Linux directors, the hosts running LVS and doing the load balancing. This is combined with ldirectord, which monitors real server, the hosts that accept end-user&#39;s connections. These three core components support TEF4.8 to provide highly available and/or load balanced network services. <br /><br /><strong>Antivirus</strong><br />TEF&#39;s fully integrated gateway antivirus engine provides reliable web and e-mail security at the gateway for enterprises. The gateway antivirus solution supports business flexibility and prevents Internet threats such as worms, viruses and malicious programs from entering the networks. <br /><br /><strong>Intrusion Detection System (IDS)</strong><br />IDS is capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts and much more. It uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plug-in architecture. <br /><br />Additional firewall security related features and functions:</p><ul><li>Packet-filtering enabling TEF to act as a router to accelerate data transmission.</li><li>Command-line scanner.</li><li>Virus database auto updater, virus scanner C library and on-access scanning.</li><li>Built-in support for various archive formats such as Zip, RAR, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others, almost all mail file formats, ELF executables and popular document formats, including MS Office and MacOffice files, HTML, RTF and PDF.</li><li>Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others.</li><li>Fully featured packet-filtering router with advanced capabilities.</li></ul><p><br />Comodo created Trustix Enterprise Firewall to enable administrators to easily configure and manage firewall policies, manage demilitarized zones and control virtual private networks by simply clicking and dragging connections between servers with a drag-and-drop GUI. Melih Abdulhayoglu, CEO and chief security architect of Comodo explained "Comodo&#39;s Enterprise Trustix Firewall has earned a well-deserved reputation as a high-performance, free enterprise firewall that is highly intuitive and easy to use. This best-in-class enterprise firewall is innovative because it integrates multiple technologies to make it operationally and economically feasible to deploy comprehensive security services to more network locations." <br /></p>

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone


Posted in Archive|