Trustix Enterprise Firewall Delivers Free Security for Enterprise Networks

<p><strong>Jersey City, N.J. &mdash; Nov. 7</strong><br />Comodo, a security company, announced the release of Trustix&trade; Enterprise Firewall version 4.8 (TEF), a free enterprise class LINUX-based firewall solution. Trustix&trade; Enterprise Firewall delivers a high-performance firewall to monitor network traffic and protect the network against unauthenticated traffic or login attempts that may inject Trojans, worms or infected files into the network. TEF, widely acclaimed for its innovative WYSIWYG interface in combination with its sophisticated security features, remains free for use without requiring any licensing, subscription or renewal fees.<br /><br />Firewalls are designed to allow or block network traffic based on a number of criteria, usually related to where the traffic is coming from and what ports or services are being used. Comodo&#39;s offering provides core firewall functionality, but also contains several additional security and usability features to safeguard a company&#39;s network, including:<br /><br />&bull;    Monitoring traffic volume and the type of traffic<br />&bull;    Advising administrator about malicious activity and how many attempts there were to break into the network<br />&bull;    A fully featured packet-filtering router with advanced capabilities<br />&bull;    A unique, intuitive GUI enabling administrators to visualize and edit firewall policy, plus manage traffic for all security zones (up to 24) as well as port forwarding, Network Address Translation (NAT) and Virtual Private Network (VPN) configurations<br />&bull;    Packet-filtering, enabling TEF to act as a router to accelerate data transmission<br />&bull;    Command-line scanner<br />&bull;    Fast, multithreaded daemon with support for on-access scanning<br />&bull;    Milter interface for sendmail<br />&bull;    Virus database auto updater, virus scanner C library and on-access scanning<br />&bull;    Built-in support for various archive formats, such as Zip, RAR, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others, almost all mail file formats, ELF executables and popular document formats including MS Office and MacOffice files, HTML, RTF and PD<br />&bull;    Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others<br /><br />Additionally, this new release adds important new technology to improve the efficiency of TEF. Some of these new features and functions include:<br /><br />&bull;    High Availability & Load balancer: TEF makes use of LVS (Linux Virtual Server) to provide fast load balancing. The Heartbeat (Linux-HA) is used to monitor the Linux-directors &mdash; the hosts running LVS and doing the load balancing. This is combined with ldirectord, which monitors real-server &mdash; the hosts that accept end-user&#39;s connections. These three core components support TEF4.8 to provide highly available and/or load balanced network services.<br /><br />&bull;    Web Content Filtering, which helps prevent indiscriminate Internet surfing that often conceals viruses, worms, Trojans, spyware, keyloggers, phishing, pharming and more. TEF offers intelligent surfing protection through its user identity-based Internet Content Filtering solution, guarding enterprises from security and productivity threats and legal liability. The Web content filtering solution offered is based on a combination of categories, keywords, URLs, domain names and file types, making it a comprehensive filtering mechanism.<br /><br />&bull;    Antivirus: TEF fully integrated gateway antivirus engine provide reliable Web and e-mail security at the gateway for enterprises. The gateway antivirus solution supports business flexibility and prevents Internet threats like worms, viruses and malicious programs from entering the networks.<br /><br />&bull;    Intrusion Detection system (IDS), capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts and much more. It uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture.<br /><br />These advanced security features are configured and managed using a friendly drag &#39;n&#39; drop GUI. This allows administrators to easily visualize and configure firewall policies, demilitarized zones and Virtual Private Networks by simply clicking and dragging connections between servers. The underlying rules generated by the program are then fully optimized before being deployed. This innovative approach reduces administrator mistakes and makes deployment even easier. <br /><br />Melih Abdulhayoglu, CEO and chief security architect at Comodo, explains, "Most other enterprise firewalls do not enable users to configure their security requirements with such &#39;point and click&#39; simplicity. By providing users with such a rich featured firewall solution free of charge, we are enabling network administrators to create a highly trusted networking environment, which, in turn, we hope will promote Comodo as a worldwide leader in security technology."<br /><br />For more information, please visit www.firewall.trustix.com. </p>

Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment: