Update to Trustix Enterprise Firewall Released

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<strong>Jersey City, N.J.</strong><br />Comodo, a security company, announced an updated release of Trustix Enterprise Firewall version 4.8.1 (TEF), an enterprise class, open-source LINUX-based free firewall solution. Comodo Trustix Firewall provides robust perimeter protection to corporate networks and delivers the highest levels of security and protection out-of-the-box. <br /><br />This high-performance firewall monitors network traffic and protects the network against unauthenticated traffic or log-in attempts that could inject Trojans, worms or infected files into the network. This free, commercial version now incorporates a powerful new anti-SPAM module for improved performance and security.<br /><br />Trustix Enterprise Firewall is acclaimed for its innovative, drag-and-drop user interface that allows administrators to quickly set and modify complicated firewall settings such as de-militarized zones (DMZ&#39;s) without having to program using a command line. This powerful feature enables administrators to visualize and configure firewall policy, DMZs (up to 24 zones), port forwarding, network address translation and virtual private network settings in a few mouse clicks. <br /><br />The underlying rules generated by the program are then fully optimized before being deployed, thereby optimizing the security and performance of your firewall&#39;s architecture and avoiding errors and duplication.<br /><br />Release 4.8.1 of Trustix Enterprise Firewall contains the following new features and improvements:<br /><br /><ul><li><strong>High availability and load balancer: </strong>To avoid false fail-overs to a secondary server, the heartbeat communication informs the secondary server whether the primary server has failed is now duplicated on a serial interface The server will only take over if both the Ethernet and serial interface heartbeats cease. </li><li><strong>Intrusion detection system (IDS):</strong> Improvements to the client make it easier to remotely configure IDS settings and determine the source of Intrusions. </li><li><strong>VPN connection: </strong>Additional advanced settings and other improvements make the system more configurable and easy to manage through a remote VPN Connection. </li><li><strong>Improved client GUI:</strong> Redesigned look and feel to improve ease of use and access to major features.</li></ul>

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone


Posted in Archive|