Home

News

News Home

Press Releases
Awards
Articles & Reviews
Events
 

 
 
 
 


 

 

 

 

   

Sygate® Technologies Company News

SYGATE® PERSONAL FIREWALL(TM) FOR ENTERPRISE

January 22, 2001 - New Sygate Personal Firewall for Enterprise is the most advanced, integrated personal firewall and intrusion detection software solution available today. As a bi-directional intrusion defense system, Sygate Personal Firewall ensures your PCs are protected from malicious hackers and other intruders while preventing unauthorized access from those computers to the network. Sygate Personal Firewall is a must-have security measure for any PC that connects to a private network or the public Internet. Once a machine has been compromised, every other network it connects to is at risk. No matter where your computers are used, whether remote or behind a corporate firewall, whether dial-up or an always-on broadband Internet connection, Sygate Personal Firewall, gives you complete confidence that your most precious corporate asset, information is safe and secure. If that isn't enough, Sygate Personal Firewall includes advanced active-scan vulnerability assessment to pinpoint weaknesses and fine-tune security policies.

Monitor

Sygate Personal Firewall operates as a security agent to enforce rule-based security policy on host devices, whether remote or behind a corporate firewall. As a host-based system, Sygate Personal Firewall enables the setting of security policies according to a device's user or location profile. In turn, these security rules can be based on any combination of:

  • Application - allowing application access privileges to only certain required IP addresses, ports or protocols
  • Trusted IP Addresses - allowing customization of access privileges to specific IP addresses
  • Ports - allowing customization of access privileges to specific ports
  • Protocols - allowing customization of access privileges to specific protocols
  • Schedule - allowing automatic implementation of different security policies at different times

Analyze

Host-based profiling identifies applications that violate defined security policies. As a result, Sygate Personal Firewall not only has the ability to detect and identify known Trojans and Denial of Service attacks, but also to recognize new or unknown attacks. Intrusion attempts are also detected by Sygate Personal Firewall's ability to port scanning activity. If and when an intrusion attempt occurs, Sygate Personal Firewall detects it in real-time.

Respond

When Sygate Personal Firewall detects an intrusion attempt, it immediately blocks the attempt, notifies the user and, with approval, adjusts the network connection to prohibit further attacks. Likewise, if an unauthorized application attempts to access the network, Sygate Personal Firewall advises the user of the situation and waits for your approval before proceeding further.

Report

Sygate Personal Firewall will immediately notify users of an intrusion attempt via a pop-up window. Additionally, Sygate Personal Firewall carries a powerful toolset allowing fine-tuning of security policies and forensic analysis in response to attacks.

Sygate Personal Firewall features four different types of security logs, each stored in a separate file with filtering capabilities for easy location of required information.

  • Security Logs - make it easy to see all security violations from one location
  • System Logs - record any changes made to security policies that may cause a security breach
  • Traffic Logs - contain a record of all bi-directional network traffic to and from a host device allowing visibility into attack patterns
  • Raw-Traffic Logs - store packet-level information for detailed visibility and analysis

All logged information can be consolidated for easy viewing and storage. You can also specify log size parameters as required by your specific storage capabilities. Sygate Personal Firewall even has the capability to differentiate threat severity in the organization of logged information.

When an attack has occurred, Sygate Personal Firewall provides an advanced set of forensic capabilities to trace the source and enable appropriate action. Back-trace functionality allows users to trace the route of an intrusion and locate its original source. Additionally, Who-is provides information allowing contact to the network administrator overseeing a computer used in an attack.

Vulnerability Assessment

Sygate Online Services (SOS) completes the circle of comprehensive enterprise-class intrusion defense with active vulnerability scanning capabilities. Pure intrusion detection is, by nature, reactive, monitoring for attacks in hopes of interrupting them before the system is damaged. SOS vulnerability assessment allows administrators to proactively secure systems by finding and closing security holes before would-be attackers can use them.

With SOS, you have the necessary tools to conduct exhaustive checks of your system and locate exposures to security vulnerabilities. These active scans report the number, nature and severity of system security risks. Armed with this information, you are equipped to determine the security status of a system at any particular time and audit the effectiveness of your entire system security policy.

About Sygate Technologies, Inc. ( formerly Sybergen Networks)

Sygate Technologies, Inc., formerly Sybergen Networks, Inc, was founded to address an explosive market for secure Internet access products that is estimated to exceed $1B by 2002. Today Sygate Technologies, Inc. serves more than two million users through its flagship product, Sygate Home Network, which was introduced in 1997 as SyGateÒ for Home Office, and quickly became the leading Internet-sharing software. Sygate Home Network allows multiple computers to securely share a single Internet connection, modem and phone line. In addition, the company offers innovative, flexible Internet security and access management solutions designed to address the specific needs of corporate environments, satellite offices and service bureaus, small/medium businesses, telecommuters and the mobile workforce. Sygate Technologies' products have been widely adopted by users and companies worldwide including Xerox, Cisco and Dell. Sygate Technologies' products are available from resellers, its Web site, www.sygate.com, or by calling (510) 742-2600 or (866) 4SYGATE.

# # #

For more information:

J. Gant Communications
Jennifer McClure (on behalf of Sygate Technologies)
Tel: 510 796-1475
E-mail: jenmcclure@jgantcommunications.com

 


| Home | Company | Products | News | Downloads | Buy | Support | Partners | Contact Us |
1997-2001
Sygate Technologies, Inc.
All content, brands, and products referenced herein are the trademarks or registered trademarks of their respective holders. Sygate® is a registered trademark of Sygate Technologies, Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic, mechanical, or otherwise, without prior written permission of Sygate Technologies, Inc. Please be advised that Sygate Technologies, Inc. actively and aggressively enforces its intellectual property rights to the fullest extent of the law.