NetworkShield Firewall 2.0 Build 328


Developer:

License / Price:

Size / OS:

Last Updated:

Category:

Trial / USD 199.00 buy button
18.5 MB / Windows 2K / XP / 2003 / Vista / XP X64 / 2008 / Vista64 / 7 / 7 x64 / 2008 x64
[view history]
C: \ Security \ Firewall

NetworkShield Firewall is a new generation corporate gateway firewall, which protects the network from external and internal attacks, provides Internet access to users and offers enhanced traffic monitoring features.

NetworkShield Firewall provides integrated security, simple management, and fast, secure access for your network. NetworkShield Firewall was especially created for small and medium-size businesses.

If you do not have a dedicated IT department, you can use the NetworkShield Firewall quick configuration features and get rid of the access distribution and network security configuration problems. IT experts will be able to use additional tools for flexible network configuration and management.

Here are some key features of "NetworkShield Firewall":

Stateful Firewall:
· Network Protect. Reliable network-lay er Firewall provides primary protection for Internet servers and local networks.
· Stateful Packet Inspection. The rule-based Firewall performs SPI (Stateful Packet Inspection) processing of all network packets and provides reliable safety of internal enterprise networks.
· Application Protocol Detection. The most valued feature of this solution is that Application Level protocol (HTTP, POP3, SMTP, SSL, FTP, etc.) is detected by the exact transferred data (Layer 7), and not simply by the typical port number. This approach allows to define a strict policies on the network traffic, enabling only the high-level protocols that are really needed.
· Connection Forward. This technology redirects all connections to the assigned IP-address and port. It provides safe operation for internal enterprise servers from the outside Internet.

Internet Sharing:
· Built-in NAT. NAT (Network Address Translation) technology allows to connect local area networks to the Internet. Most importantly, implemented NAT has a perfect network traffic processing performance.
· DNS Forwarder. The effective Internet usage is not possible without DNS service. Built-in DNS Forwarder can quickly provide centralized configuration for network parameters, and later adjusts it transparently to the user.
· DHCP server. Built-in DHCP server automatically assigns IP addresses, decreasing the required time for local area network deployment.

Corporate Network Protect:
· Data-Loss Prevention. Built-in DLP (Data-Loss Prevention) mechanism is designed to find and repress corporate information leak through the Internet (e-mail, web-mail, internet communities, MSN, ICQ, etc.). All HTTP POST queries, instant messagers chats and e-mails with attachments are decoded from the network traffic and stored to the hard disk and database. Messages are saved in plain text, all emails in .eml format, so any information search programs can be used.
· Web filter. Blocking access to the undesirable Web sites by URL-address or by Category can reduce Internet traffic consumption and improve employees' productivity.
· Alerts and Notification. Rule-based notification mechanism allows to specify various alerts events via e-mail. For example, visits to some Web-sites, particular recipient's messages or certain content of messages.
· Users Control. The program allows Active Directory users' import to a designated group and assigns distinct profile settings. As well as to identify users working on a terminal server and create exception lists with no restrictions applied.

Traffic Usage Control:
· Traffic count. Internet traffic is permamently counted for every computer or user in a network. The peculiarity of the designed mechanism is a very high accuracy of data collection. Traffic is counted for all connectio ns with enabled Logging at corresponding Firewall rule. This allows to avoid excessive logging and receive detailed information on the particular traffic only.
· Detailed Reports. Built-in report server allows to view detailed reports on network traffic or each connection. The reporting system includes several kinds of reports: summary, per-host, per-user, and detailed reports about all the connections marked for logging.
· Usage Control. The sufficient set of tools provided to control and restrict network users' traffic on the Internet: grant or revoke remote resources access, users permissions control, setting up quotas limits to users and computers.
· Speed Limit. The speed limit for groups of computers or users. The assigned channel width will be distributed equally among all of group members.
· Traffic Monitoring. The system administrator is able to monitor users activity in a real time. Special section provides detailed infor mation about established connections by both LAN and Internet server.

Control Panel:
· Control Panel. Software management provided by single control panel with a simple and intuitive Web interface, using a standard Web browser.
· Remote Access. Remote software control does not require any additional tools, using just an ordinar Web browser and configured Firewall rule enabling access to the Control Panel.

Requirements:

· Processor 300 MHz Pentium II-compatible or faster processor.
· Memory 256 megabytes (MB) of RAM or more recommended.
· Hard disk: 20 megabytes (MB) of available hard-disk space for the installation; 1 gigabyte (GB) of disk space for logging recommended.
· Network devices Network adapter for communication with the Private network; one additional network adapter, modem, or I SDN adapter for each additional Public of Private network.

Limitations:

· 30-day trial

What's New in This Release: [ read full changelog ]

· Extreme driver-level performance improvements


download button
Via: NetworkShield Firewall 2.0 Build 328