|PRODUCTS||Security NEWs Service: TLAnews|
|Checkpoint||VPN-1 Gateway™ is a tightly integrated software solution combining the market-leading FireWall-1® security suite with sophisticated VPN technologies. The cornerstone of Check Point’s Secure Virtual Network architecture, VPN-1 Gateway meets the demanding requirements of Internet, intranet, and extranet VPNs by providing secure connectivity to corporate networks, remote and mobile users, satellite offices, and key partners. VPN-1 Gateway software may be deployed on a range of platforms for maximum flexibility and scalability|
|Stonebeat||Building a High Availability (HA) firewall is a way to avoid the single point of failure
within network connectivity. E-commerce and E-banking solutions are in most need of HA firewalls, but the need is increasingly present also with ISP & MSP services as well as with VPN deployments. Practically any corporation running business-critical applications needs a HA firewall system.
|NOKIA||NOKIA IP Solutions and
NOKIA Internet Packet Routing Group
Ideally suited to provide secure Internet
|RealSecure™ is an automated,
real-time attack recognition and
response system for your network.
RealSecure acts like a network
packet capture program,
unobtrusively analyzing packets of
information as they travel across
the network, and interpreting
hostile activity on your network by
recognizing the network traffic
patterns that indicate attacks.
|NFR builds network security analysis and monitoring tools that
allow you to see how your network is being used and eventually attacked.
In other words, garanting information security and availability is more and more difficult and complex.
Nobody's network is shrinking or getting less complicated - and networking is becoming the lifeblood of many modern businesses. In other words, your job is getting harder and more
|Vandal and Virus Protection at the Network Server and Desktop. eSafe Protect Enterprise is
a network-based, centrally managed Anti-Vandal and Anti-Virus system that costs
about the same as standard Anti-Virus. Using our centralized console can save hours of
installing and updating Internet protection
| InterScan VirusWall provides high-performance three-in-one
Internet gateway protection against viruses and malicious code. The optional eManager adds spam
blocking, content filtering, and email scheduling.
Real-time virus detection and clean-up for all
|SurfinGate protects the computer
network from hostile Internet attacks carried out through Java and ActiveX mobile code technologies, preventing undetected costly attacks such as industrial espionage, data modification,
and many denial of service intrusions.
SurfinGate inspects Java and ActiveX content at the gateway, away from critical resources, to identify potential hostile attacks before they enter the network.
Executables arriving via e-mail and the Web are "flagged" upon download for future monitoring by SurfinShield.
|WebSENSE is designed to promote professional
use of the Internet by effectively allowing an
organization to monitor, report and manage internal
WebSENSE gives you the flexibility to fine-tune
your Internet access policy. You can choose to
monitor, block or screen (the combination of both).
With WebSENSE in place, you'll easily minimize
unprofessional Internet use
|MIMEsweeper for FireWall-1® is part of the MIMEsweeper family of Content Security solutions from Content Technologies. It provides Content Security tightly integrated with Check Point Software Technologies FireWall-1.
Infection and loss of data from email and Web-borne viruses lost productivity through uncontrolled Web surfing downloading of offensive material degradation / loss of network service through hostile Java and ActiveX attacks siphoning of data from computers by Cyberwoozles
MIMEsweeper for FireWall-1 is OPSEC-compliant Content Security for protecting your investment in FireWall-1.
File and System integrity
|Tripwire® Security Systems, Inc.(TSS) is a software developmentcompany
specializing in system security and policy compliance
The company is developing a
family of Defense in Depth(SM)
security solutions based on its
Tripwire® file integrity assessment technology. Tripwire can determine if files have
been added to or deleted from
protected system directories.