Sygate® Technologies
Company News
SYGATE®
PERSONAL FIREWALL(TM) FOR ENTERPRISE
January
22, 2001 - New
Sygate Personal Firewall for Enterprise is the most advanced,
integrated personal firewall and intrusion detection software
solution available today. As a bi-directional intrusion defense
system, Sygate Personal Firewall ensures your PCs are protected
from malicious hackers and other intruders while preventing
unauthorized access from those computers to the network. Sygate
Personal Firewall is a must-have security measure for any
PC that connects to a private network or the public Internet.
Once a machine has been compromised, every other network it
connects to is at risk. No matter where your computers are
used, whether remote or behind a corporate firewall, whether
dial-up or an always-on broadband Internet connection, Sygate
Personal Firewall, gives you complete confidence that your
most precious corporate asset, information is safe and secure.
If that isn't enough, Sygate Personal Firewall includes advanced
active-scan vulnerability assessment to pinpoint weaknesses
and fine-tune security policies.
Monitor
Sygate Personal Firewall operates as a security agent to enforce
rule-based security policy on host devices, whether remote
or behind a corporate firewall. As a host-based system, Sygate
Personal Firewall enables the setting of security policies
according to a device's user or location profile. In turn,
these security rules can be based on any combination of:
- Application - allowing application access privileges
to only certain required IP addresses, ports or protocols
- Trusted
IP Addresses - allowing customization of access privileges
to specific IP addresses
- Ports
- allowing customization of access privileges to specific
ports
- Protocols
- allowing customization of access privileges to specific
protocols
- Schedule
- allowing automatic implementation of different security
policies at different times
Analyze
Host-based profiling identifies applications that violate
defined security policies. As a result, Sygate Personal Firewall
not only has the ability to detect and identify known Trojans
and Denial of Service attacks, but also to recognize new or
unknown attacks. Intrusion attempts are also detected by Sygate
Personal Firewall's ability to port scanning activity. If
and when an intrusion attempt occurs, Sygate Personal Firewall
detects it in real-time.
Respond
When Sygate Personal Firewall detects an intrusion attempt,
it immediately blocks the attempt, notifies the user and,
with approval, adjusts the network connection to prohibit
further attacks. Likewise, if an unauthorized application
attempts to access the network, Sygate Personal Firewall advises
the user of the situation and waits for your approval before
proceeding further.
Report
Sygate Personal Firewall will immediately notify users of
an intrusion attempt via a pop-up window. Additionally, Sygate
Personal Firewall carries a powerful toolset allowing fine-tuning
of security policies and forensic analysis in response to
attacks.
Sygate Personal Firewall features four different types of
security logs, each stored in a separate file with filtering
capabilities for easy location of required information.
- Security Logs - make it easy to see all security
violations from one location
- System
Logs - record any changes made to security policies
that may cause a security breach
- Traffic
Logs - contain a record of all bi-directional network
traffic to and from a host device allowing visibility into
attack patterns
- Raw-Traffic
Logs - store packet-level information for detailed visibility
and analysis
All
logged information can be consolidated for easy viewing and
storage. You can also specify log size parameters as required
by your specific storage capabilities. Sygate Personal Firewall
even has the capability to differentiate threat severity in
the organization of logged information.
When an attack has occurred, Sygate Personal Firewall provides
an advanced set of forensic capabilities to trace the source
and enable appropriate action. Back-trace functionality allows
users to trace the route of an intrusion and locate its original
source. Additionally, Who-is provides information allowing
contact to the network administrator overseeing a computer
used in an attack.
Vulnerability
Assessment
Sygate Online Services (SOS) completes the circle of comprehensive
enterprise-class intrusion defense with active vulnerability
scanning capabilities. Pure intrusion detection is, by nature,
reactive, monitoring for attacks in hopes of interrupting
them before the system is damaged. SOS vulnerability assessment
allows administrators to proactively secure systems by finding
and closing security holes before would-be attackers can use
them.
With
SOS, you have the necessary tools to conduct exhaustive checks
of your system and locate exposures to security vulnerabilities.
These active scans report the number, nature and severity
of system security risks. Armed with this information, you
are equipped to determine the security status of a system
at any particular time and audit the effectiveness of your
entire system security policy.
About
Sygate Technologies, Inc. ( formerly Sybergen Networks)
Sygate
Technologies, Inc., formerly Sybergen Networks, Inc, was founded
to address an explosive market for secure Internet access
products that is estimated to exceed $1B by 2002. Today Sygate
Technologies, Inc. serves more than two million users through
its flagship product, Sygate Home Network, which was introduced
in 1997 as SyGateÒ for Home Office, and quickly became the
leading Internet-sharing software. Sygate Home Network allows
multiple computers to securely share a single Internet connection,
modem and phone line. In addition, the company offers innovative,
flexible Internet security and access management solutions
designed to address the specific needs of corporate environments,
satellite offices and service bureaus, small/medium businesses,
telecommuters and the mobile workforce. Sygate Technologies'
products have been widely adopted by users and companies worldwide
including Xerox, Cisco and Dell. Sygate Technologies' products
are available from resellers, its Web site, www.sygate.com,
or by calling (510) 742-2600 or (866) 4SYGATE.
#
# #
For
more information:
J.
Gant Communications
Jennifer
McClure (on
behalf of Sygate Technologies)
Tel:
510 796-1475
E-mail:
jenmcclure@jgantcommunications.com
|