General protection


Company Name:

CyPost Corporation

Address:

900-1281 West Georgia
Vancouver, BC V6E 3J7

Phone Number:

(604) 904-4422

E-mail Address:

<info@cypost.com>

URLs:

http://www.cypost.com/

Category:

General Protection

Product Name:

Navaho ZipSafe

Product Description: Navaho ZipSafe is the easiest and fastest way to ensure no one reads confidential data on hard disks, network drives, or floppies.

Navaho ZipSafe compresses (by up to 70%) and protects data in one step, enabling you to instantly organize documents files and folders for secure storage or transport.

  • Built-in Compression: Reduces file size on hard drives and floppy disks by as much as 70%.

  • Drag-and-Drop Feature: Application works behind the scenes allowing users to encrypt and compress files by simply dragging and dropping them into the Drop area.

  • Shredder: This feature makes files unrecoverable to programs that rebuild files after deletion.

  • Choice of Encryption: Navaho ZipSafe supports a variety of algorithms including 40-, 56-, 112-, 128-, and 168-bit.

Works with all file formats: Navaho ZipSafe quickly and easily encrypts and compresses digital images, spreadsheets, Word documents, files, folders, and even entire directories.

Company Name:

Delta Design UK.com

Address:

10 Wratting Road
Haverhill, Suffolk, CB9 0DD,
United Kingdom

Phone Number:

n/a

E-mail Address:

<marketing@deltadesignuk.com/> for publication: <mail@deltadesignuk.com>

URLs:

http://www.deltadesignuk.com/

Category:

General Protection

Product Name:

Net-Commando 2000

Product Description: Hacker Protection/Prevention/Detection, Trojan Horse virus Protection/Prevention/Detection/Removal, System Analysis, and Internet Tracing. This package uses various methods of detection, prevention, and monitoring to deny remote access to your computer. It does this by monitoring areas of your computer where Internet viruses aim their auto-start procedures. It warns of hackers attempting to access your computer, and provides an address for you to back track them, as well as tools to assist you in reporting the hacker to the ISP. The program also includes many system analysis tools, including NetStat (protocol statistics), which lists all open ports and allows one to terminate an established TCP port.

Company Name:

Finjan Software

Address:

2860 Zanker Road, Suite 201
San Jose, CA 95134

Phone Number:

(408) 324-0228

E-mail Address:

<info@finjan.com>

URLs:

http://www.finjan.com/

Category: General

Protection

Product Name:

SurfinShield Corporate

Product Description: SurfinShield Corporate is a centrally managed PC security solution that proactively monitors the actual behavior of downloaded active content, including executables, scripts, ActiveX, and Java. By monitoring code behavior in its protected "SafeZone," SurfinShield enforces its security policy and automatically blocks malicious activity before damage can be inflicted. Unlike traditional antivirus technology, SurfinShield represents a new way to combat Trojans, Internet worms, and hostile web pages based on code behavior, not by static signature recognition. Because SurfinShield does not rely on database updates, it defends against new variants, unknown and "yet-to-be-created" attacks on the "first strike."

Features and benefits

SurfinShield Corporate consists of a console, server, and client module.

The central console is designed for ease of use, allowing administrators to set both granular and corporatewide security policies.

The central server holds security policies and logs the security events of each desktop. Should one client face an attack, it will update all other SurfinShield Corporate clients, automatically blocking the hostile element upon contact.

The client module of SurfinShield Corporate houses the behavior monitoring "engine." The client is not dependent on the server for protection and will continue to defend against attacks when removed from the corporate network.

First-strike security

A "first strike" is the first time a new malicious code attack is launched. First-strike security uses content inspection and behavior-monitoring technology to detect and prevent malicious attacks before damage is caused. Because Finjan products do not rely on database updates, they defend against new variants, unknown and even "yet-to-be-created" attacks on the "first strike."

System requirements

SurfinShield client

SurfinShield server

SurfinConsole

Company Name:

Intego, Inc.

Address:

6301 Collins Ave., Suite #1806
Miami, FL 33141

Phone Number:

(305) 868-7920

Contact Name:

Olivier Depoorter

E-mail Address:

<odepoorter@intego.com>

URLs:

http://www.intego.com/

Category:

General Protection

Product Name:

ContentBarrier

Product Description:

Blocks all offensive material from the Internet.

San Francisco, CA, January 9, 2001 Intego, a leading provider of Macintosh Internet security utilities, today announced ContentBarrier, thorough and efficient Internet filtering software for Macintosh. ContentBarrier 1.0 helps parents protect their children by monitoring Internet usage to avoid contact with dangerous web sites, chat rooms, e-mail, newsgroups, and downloads.

ContentBarrier allows parents to select or customize specific categories of potential danger; log Internet usage; control access days and times; and receive e-mail alerts when certain activity occurs. ContentBarrier works with multiple users, so if there are several children in a household, different criteria can be set according to their age.

ContentBarrier has a high-performance content filter engine for sophisticated filtering. Its predefined categories let you choose what you don't want your children to see. Inappropriate web sites are blocked, shielding your children from things they are too young for.

ContentBarrier also supports the new version of Intego's NetUpdate, the automatic software update engine. Users can program updates for specific days and times, and NetUpdate will check the Intego server to find out if updates are available for all of Intego's Barrier products installed on your computer.

Intego's programs have received many awards in the U.S., Europe, and Asia, such as awards from Macworld, MacRame, MacNN, MacAddict. In France, UniversMacWorld recently gave NetBarrier its 2000 trophy for the best Internet program.

"When children surf the Internet, they can see whatever they want, unless a parent is there to watch over their shoulders," said Laurent Marteau, CEO, Intego. "ContentBarrier sets up a protective wall around your computer making the Internet a safer place for children."

ContentBarrier features

ContentBarrier is also used by companies to restrict inappropriate employee web site usage. Many employees do their shopping on the Internet, play network games, send and receive personal e-mail, or download MP3 files while at work, reducing productivity and using valuable network bandwidth. ContentBarrier can solve this problem by blocking access to many different types of sites, and contains specific categories of web sites designed for business use.

If your employees spend their working time surfing sexually explicit sites, this not only reduces productivity, but it may even expose you to liability for sexual harassment. Sending private e-mail over your mail server can also expose you to liability, and even prosecution, since your business is responsible for what circulates on its network.

ContentBarrier business features

System requirements are a MacOS compatible computer with a Power PC processor, OpenTransport, Mac OS 8.1 or higher, and 32 MB RAM. It is also compatible with Mac OS 9.1. Also available in French and Japanese versions.

ContentBarrier is available immediately from retailers including buy.com, CompUSA, MacZone, Outpost.com, Computertown, Club Mac, MacWarehouse, MacMall, ComputerWare, Computer Store Northwest, J&R, Microcenter, CDW, Developer Depot, and from 200 Apple Specialists (see list on the Intego web site) and on-line at http://www.intego.com/.

For more information, contact Intego, 6301 Collins Ave., Ste. 1806, Miami, FL 33141 tel: (305) 868-7920 fax: (305) 868-7938 web site: http://www.intego.com/, <info@intego.com>.

Company Name:

Intego, Inc.

Address:

6301 Collins Ave., Suite #1806
Miami, FL 33141

Phone Number:

(305) 868-7920

Contact Name:

Olivier Depoorter

E-mail Address:

<odepoorter@intego.com>

URLs:

http://www.intego.com/

Category:

General Protection

Product Name:

Internet Security Barrier

Product Description:

The Internet Security Suite for the Mac

San Francisco, CA, January 9, 2001 Intego, a leading provider of Macintosh Internet security utilities, today announced Internet Security Barrier, a total Internet security suite for the Macintosh. Internet Security Barrier includes NetBarrier and its three powerful modules: Firewall, Antivandal, and Internet Filter; VirusBarrier, the acclaimed antivirus program for Macintosh; and ContentBarrier, the thorough and efficient Internet filtering program for a full security suite to protect Macs from all Internet dangers. This suite is the perfect solution to Internet security problems.

Intego's programs have received many awards in the U.S., Europe, and Asia, such as awards from Macworld, MacHome, MacNN, MacAddict . In France, UniversMacWorld recently gave NetBarrier its 2000 trophy for the best Internet program.

Internet Security Barrier 1.0 also supports the new version of Intego's NetUpdate, the automatic software update engine. Users can program updates for specific days and times, and NetUpdate will check the Intego server to find out if updates are available for all of Intego's Barrier products installed on your computer.

"Security issues are the biggest computer problem in recent years," said Laurent Marteau, CEO, Intego. "Hackers, viruses and inappropriate content are a plague. Our goal was to develop a full suite of security software for the Macintosh, so Mac users can be protected from every security risk. We're proud to be able to offer such a comprehensive package."

Internet Security Barrier Features include:

System requirements are a MacOS compatible computer with a Power PC processor, OpenTransport, Mac OS 8.1 or higher, and 32 MB RAM. It is also compatible with Mac OS 9.1. A Mac OS X version will be available Q1 2001. Also available in French and Japanese versions.

Internet Security Barrier is available immediately from retailers including buy.com, CompUSA, MacZone, Outpost.com, Computertown, Club Mac, MacWarehouse, MacMall, ComputerWare, Computer Store Northwest, J&R, Microcenter, CDW, Developer Depot, and from 200 Apple Specialists (see list on the Intego web site) and on-line at htm://www.intego.com.

For more information, contact Intego, 6301 Collins Ave., Ste. 1806, Miami, FL 33141 tel: (305) 868-7920 fax: (305) 868-7938 web site: htm://www.intego.com, <info@intego.com>.

About Intego

Intego, the i-security software company, publishes security software for the Macintosh, and its products are currently sold in 65 countries. With three essential products, Intego focuses on all aspects of the computer security market: antivirus protection, intrusion prevention, and content control.

In less than two years, NetBarrier has become the world leader in personal firewalls for the Macintosh. VirusBarrier, Intego's acclaimed antivirus solution, has been a resounding success since its launch in July 2000. ContentBarrier, Intego's new parental control program, has been available to reinforce its product line since January 2001.

Intego was founded in May 1999 by a collection of highly motivated engineers and high-profile marketing, finance, and sales managers to leverage their extensive knowledge of network security and the Mac environment to corporate, individual, and educational users worldwide. The privately held company has its headquarters in Miami, Florida and in Paris, France.

Company Name:

MFX Research

Address:

19 - 23 Bridge Street
Pymble NSW 2073 Australia

Phone Number:

+61 2 9440 0200

E-mail Address:

<info@mfxr.com>

URLs:

http://www.mfxr.com/

Category:

General Protection

Product Name:

MFX Verify

Product Description: MFX Verify is a toolset designed to monitor and protect the condition of your applications and operating systems files from any form of corruption, decay, or degradation.

MFX Verify continuously checks critical system and application files, and as soon as any corruption is detected, irrespective of the cause, the files are immediately restored to their original state.

Examples of some of the day-to-day problems MFX Verify solves :

In all of the preceding examples, MFX Verify immediately detects what has happened, and undoes any damage done to the file.

MFX Verify is unique, and being complementary to other utility software, finally "plugs the holes" in the control of systems and applications.

Unlike other so-called restoration systems, MFX Verify operates by making a byte-by-byte comparison, not simply a checksum, file size, or date stamp comparison. It offers users the ability to define which files they wish to protect.

The major cause of errors in PCs is the corruption of application and system executable and library files. By keeping these files in their original condition, "up time" is dramatically improved.

Rather than permitting a problem to occur, and then trying to fix it, MFX Verify prevents the problem from happening in the first place.

MFX Verify also permits the frequency of scan to be run continuously or set at intervals.

MFX Verify operates in a fully automated or user selected format, on compiled file types eg .exe, .com, .dll, and .sys.

MFX Verify is very fast the throughput is up to 20Mb per second.

With full log and reporting facilities, MFX Verify maintains the integrity of the files from the time of installation.

MFX Verify SDK provides the same protection on Windows NT and 2000 systems.

Company Name:

MFX Research

Address:

19-23 Bridge Street :
Pymble NSW 2073 Australia

Phone Number:

+61 2 9440 0200

E-mail Address:

<info@mfxr.com>

URLs:

http://www.mfxr.com/

Category:

General Protection

Product Name:

MFX ValidSite

Product Description: "How do I ensure that my web site is fully protected? My site is hosted on an Internet Service Provider! This was the challenge posed to us by a recent client.

The solution is ... ValidSite. ValidSite from MFX Research ensures that only the information you want to display is published on your web site.

ValidSite's unique "file trap procedure" provides for:

Should a hacker enter the site, ValidSite will automatically remove all traces of the attack. ValidSite dramatically reduces web site maintenance and update costs.

Other benefits

As more companies are relying upon their web sites to act as both a shop front for their products and services, and as a window to their company, the need to protect the contents of their web site is critical. The protection of this investment is paramount to companies and organizations.

Company Name:

MFX Research

Address:

19-23 Bridge Street
Pymble NSW 2073 Australia

Phone Number:

+61 2 9440 0200

E-mail Address:

<info@mfxr.com>

URLs:

http://www.mfxr.com/

Category:

General Protection

Product Name:

MFX WebSiteLock

Product Description:

Protect your web site from attack and alteration.

WebSiteLock is the world's first software toolset to "lock" and protect the contents of an organization's web site.

As more companies are relying upon their web sites to act as both a shop front for their products and services, and as a window to their company, the need to protect the contents of their web site has become of critical importance. The protection of this investment is paramount to companies and organizations.

Significant amounts of interest, time, and money are spent on firewalls and other software and hardware solutions to prevent intrusion. In spite of this, we all know that even the most secretive and security-conscious organizations have been "hacked" from our own prime minister's site to the CIA site in Washington.

Commercial sites such as Nike and MGM have been entered and details altered, deleted, or added. The British PM's site and the GST site have been altered.

Many smaller companies and organizations have been targeted and the costs suffered by the disruption have been experienced by all sectors of business, the utilities, and the government. Hackers often attack a site out of curiosity, mischief, and for "fun," to prove how clever they are not necessarily to prove how negligent you are.

Regardless of the motive, the impact is the same: You pay for the consequences! Because your firewall alone is never enough....

Further, the damage being caused by someone from within, or someone with inside knowledge who has recently left the company, can be of greater impact. This person can be far more "focused" and specific in the damage he or she causes.

WebSiteLock is aimed at organizations that have their own server(s) to manage their site.

Truly, your web sites' last line of defense...

To meet the needs of companies who use Internet Service Providers (ISPs) to host their web sites, MFX Research has developed ValidSite. Full details of the features and functions of ValidSite can be obtained from the MFXR web site.

A version, aimed at meeting the specific requirements of ISPs and Application Service Providers (ASPs) themselves, is also available.

Company Name:

Neoteris, Inc.

Address:

161 East Evelyn Avenue
Mountain View, CA 94041

Phone Number:

(605) 605-4800

E-mail Address:

<info@neoteris.com>

URLS:

http://www.neoteris.com/

Category:

General Internet Protection

Neoteris, Inc. is the industry leader in the Instant Virtual Extranet (IVE) category of Internet security appliances. Neoteris' IVE provides secure access to private network resources over the Internet using a standard web browser. The IVE requires neither client software/hardware nor LAN configuration changes, thus dramatically reducing secure access implementation and maintenance costs over conventional methods such as dial-up networks, VPNs, or custom extranet deployments. Additionally, Neoteris increases security by limiting users to authorized application resources versus conventional methods that provide broad network layer access.

Customers typically deploy Neoteris' IVE as an employee remote access solution or as a secure partner extranet solution. Private dial network connections are for today's applications and prohibitively expensive for large deployments. Virtual private networks (VPNs) using the Internet require client software or special hardware that are plagued with network incompatibilities and support costs. Also, VPNs provide broad network layer access, which may introduce security risks. Neoteris' IVE limits users to authorized application resources, thus increasing security.

Custom extranet deployments are expensive to implement and maintain and limit the network resources available to users. Furthermore, unlike custom extranet deployments that may be exposed to security vulnerabilities through set-up or maintenance errors, Neoteris' IVE is a secure, hardened, dedicated appliance.

Neoteris' IVE appliances provide clientless, secure access to enterprise resources such as web-based applications, client-server applications, proprietary messaging servers (Lotus Notes, MS Exchange), file servers (MS CIFS and NFS), Telnet and SSH hosts, and standards-based e-mail servers (IMAP, POP, SMTP)

Company Name:

Palisade Systems Inc.

Address:

2625 North Loop Drive, Suite 2120
Ames, IA 50010

Phone Number:

(515) 296-6500 or (888) 824-0720

E-mail Address:

<info@palisadesys.com>

URLs:

http://www.palisadesys.com/

Category:

General Protection

Product Name:

PacketPup

Product Description: PacketPup is free-to-download software (available from http://www.packetpup.com/) that quickly and easily shows you whether you should be concerned about bandwidth allocation on your network. PacketPup tracks the use of file-sharing and streaming applications like Napster, Gnutella, iMesh, ReaIAudio/ReaIVideo, Scour Exchange, Shoutcast, and Windows Media, displaying its data in graphical form. It then provides a Return on Investment (ROI) interface that helps you determine both usage and how much that usage costs your organization. If PacketPup shows you that you have a bandwidth problem, PacketHound a hardware-based blocking appliance is a great solution.

PacketPup protects PC networks by alerting administrators to possible bandwidth and security issues associated with the use of file-sharing and streaming applications. Used unchecked, these applications (including Napster, Gnutella, RealAudio/RealVideo) can make PCs vulnerable to problems, clogging network bandwidth and exposing the network to security holes by opening back doors and creating virus vulnerabilities.

Company Name:

Palisade Systems Inc.

Address:

2625 North Loop Drive, Suite 2120
Ames, IA 50010

Phone Number:

(515) 296-6500 or (888) 824-0720

E-mail Address:

<info@palisadesys.com>

URLs:

http://www.palisadesys.com/

Category:

General Protection

Product Name:

PacketHound

Product Description: PacketHound is a network appliance that allows system administrators to manage or block access to bandwidth- and productivity-eating Internet technologies like Napster, Gnutella, iMesh, RealAudio!ReaIVideo, Scour Exchange, and Windows Media. PacketHound protects your organization by allowing you to impose a flexible, organization-specific rule set. You can, for example, block an entire network, or block all access except in one computer lab, or block on a machine-by-machine basis. You can also use time-based rules to shut down access during critical hours but allow it at other times.

PacketHound protects PCs from the bandwidth and security issues associated with the use of file-sharing and streaming applications. Networked PCs are vulnerable to the actions of others on the network; if others are running Napster or Gnutella, all computers have less bandwidth and are potentially vulnerable to security issues: network use of peer-to-peer clients can open security holes and expose an organization to viruses and Trojan horses.

Company Name:

Pedestal Software

Address:

11 Medway Branch Road
Norfolk, MA 02056

Phone Number:

(888) 664-7174

E-mail Address:

<info@pedestalsoftware.com>

URLs:

http://www.pedestalsoftware.com/

Category:

General Protection

Product Name:

SecurityExpressions

Product Description: Enterprise security management, administration, reporting, and lockdown. SecurityExpressions automates the process of deploying, assessing, and maintaining consistent security policies on networks of Windows NT and 2000 systems. It helps organizations with security management and large-scale systems lockdown.

SecurityExpressions helps protect Internet PCs by locking them down according to industry-standard guidelines. Security "expressions," similar to mathematical ones, are at the core of this host and application policy management system. SecurityExpressions first assesses the vulnerability state by seeing how well the PC complies with the lockdown policy. Changes are recommended for noncompliant settings and SecurityExpressions automatically fixes them either interactively or in unattended mode. History logging provides an audit trial of changes, and modifications may be rolled back to their previous state if problems arise.

Company Name:

Redline Networks

Address:

675 Campbell Technology Parkway
Suite 150 Campbell, CA 95008

Phone Number:

(408) 369-3800

E-mail Address:

<info@RedlineNetworks.com>

URLs:

http://www.redlinenetworks.com/

Category: General

Protection

Total security and acceleration

With Redline Networks' Web I/O Accelerator sites and enterprises achieve advanced HTTP security. Performing all functions in a completely secure environment, Web I/O Accelerators offer speed, capacity, cost savings, and HTTP security for public facing web sites and enterprise applications.

Secure connection management

Once a user is connected to a web server, the user can do any number of things to harm the network connected to the web server. But with a Web I/O Accelerator, two distinct sets of connections are maintained one set to users and a separate set to internal servers. The barrier created by this secure connection management ensures that users never directly access content holding or content generating devices.

Complete server offload

Servers simply maintain a few connections to the Web I/O Accelerator and no connections to users. This offloads all end-user SSL key exchange work from the servers. By performing key exchanges a few times per day versus 200 times per minute, more resources are available for the server to quickly generate content. Additionally, by offloading the server, Web I/O Accelerators enable end-to-end SSL without requiring an SSL card in the server.

HTTP(S) request balancing

To enable true end-to-end SSL security, an SSL accelerator must be able to load balance directly rather than rely on an external load balancer for this functionality. Web I/O Accelerators provide fine-grained Request Balancing, rather than coarse-grained connection balancing.

Multiprotocol transaction integrity

An SSL device not only needs to balance requests, it must also support multiprotocol sticky cookies. This ensures that a user returns to the same content server not only on successive requests, but also when switching between HTTP and HTTPS requests. Web I/O Accelerators support multiprotocol sticky cookies.

Full payload parsing

Unlike other products that simply parse HTTP headers, Web I/O Accelerators can perform full HTTP payload parsing and content rewriting at wirespeed. Web I/O Accelerator can utilize any defined set of rules to make security decisions based on the entire payload rather than simple header information.

No cache

Caching secure data gives hackers an opportunity to steal secure files and decrypt them off-line, increasing the risk of a security breach. Additionally, caching is irrelevant for SSL transactions where each user gets a unique, encrypted file. Instead, Web I/O Accelerators increase application performance and decrease latency without caching and without risk of content corruption.

Data optimization and compression

Increasingly, sites are deploying data optimization and compression devices. To maintain end-to-end SSL and benefit from bandwidth savings, an SSL device must perform data optimization and compression internally. Throughput must be at full wire-speed and the implementation must support chunked transfer encoding and request pipelining to accelerate modem and broadband users. Web I/O Accelerators provide all of these data optimization and compression benefits for static, dynamic, and secure content.

Web DMZ

Web I/O Accelerators have the unique ability to protect servers from hackers by maintaining two completely separate sets of TCP connections:

Thus, the outside world never comes into direct contact with any content holding or content creating device. This effectively creates a Web DMZ inside the network where only valid, well-formed requests and responses can pass.

AutoSSL

Revolutionary security functionality enabled by the Web I/O Accelerator is automatic transformation of HTTP requests and clear text into HTTPS requests and secure content. With the Web I/O Accelerator AutoSSL functionality, enterprise applications, all site content, or even a particular VIP can be instantly secured with no rewriting of content, no modification to applications, and no change in user behavior. Users continue to make HTTP requests over port 80, and the Web I/O Accelerator automatically changes the request to HTTPS over port 443. The returning page is secured, with both redirects and the in-line objects rewritten to HTTPS.

Summary

Redline Networks' Web I/O Accelerator enables advanced HTTP security and true acceleration of SSL transactions. The Web I/O Accelerator performs all essential activities in a secure environment (connection management, sticky request balancing, parsing, compression, etc.), which enables high-performance end-to-end SSL. The Web I/O Accelerator offloads connections and key generation from servers so they focus on generating pages quickly. Web I/O Accelerators securely balance request load to servers and support multiprotocol sticky cookies so session integrity is always maintained. Once the server generates a response, the Web I/O Accelerator optimizes and compresses the response data before encrypting it for delivery to the user. In this way the Web I/O Accelerator sends fewer encrypted bits to the end user, reducing bandwidth while further speeding download and decryption times for modem and broadband users alike. Web I/O Accelerators can do this for clear text as well, enabling faster downloads of both HTTP and HTTPS data. With Redline Networks technology, a site can enjoy all of the benefits of advanced HTTP security with the speed and performance of clear text.

Company Name:

Secure Computing Corporation

Address:

One Almaden Blvd., Suite 400
San Jose, CA 95113

Phone Number:

(800) 379-4944

URLs:

http://www.securecomputing.com/

Category:

General Protection

Product Name:

SafeWord Plus

Product Description: Supports smart cards, Secure Computing's Server for Virtual Smart Card, and general smart cards.

Company Name:

Secure Computing Corporation

Address:

One Almaden Blvd., Suite 400
San Jose, CA 95113

Phone Number:

(800) 379-4944

URLs:

http://www.securecomputing.com/

Category:

General Protection

Product Name:

Sidewinder 5

Product Description:

Provides internal and perimeter security.

Company Name:

Texar Software Corp.

Address:

1101 Prince Of Wales Dr.
Ottawa K2H 9N6 Canada

Phone Number:

(613) 274-2200

E-mail Address:

<info@texar.com>

URLs:

http://www.texar.com/

Category:

General Protection

Product Name:

Secure Realms

Product Description: An access control solution that controls access to both legacy-based applications and the Web.

Company Name:

WatchGuard Technologies

Address:

316 Occidental Ave. S., Ste. 2000
Seattle, WA 98104

Phone Number:

(206) 521-8340

E-mail Address:

<information@watchguard.com>

URLs:

http://www.watchguard.com/

Category:

General Protection

Product Name:

WatchGuard LiveSecurity System w/FBII Plus and w/FBIFast VPN

Product Description:

Provides VPN and security for the Internet.

Company Name:

Webroot Software, Inc.

Address:

PO Box 3531
Boulder, CO 80307

Phone Number:

(800) 772-9383

E-mail Address:

<info@webroot.com>

URLs:

http://www.webroot.com/

Category:

General Protection

Product Name:

Window Washer

Product Description: Window Washer is a utility, not unlike ScanDisk, Disk Defragmenter, etc., that every computer should have, whether it is used in the home or office. Window Washer automates the cleaning of all unnecessary system and Internet files.

In the case of system files, Window Washer cleans the following:

Recycle Bin This area continues to hold deleted information long after it is useful. Deleting its contents is important for home users as many do not know the Recycle Bin does not empty itself. In the case of businesses, this serves the important function of completely removing sensitive material.

Registry Streams This area tracks programs that are used most often. Clearing the registry streams is important for home users since it contains useless data that takes up space. In the case of businesses, eliminating this information prevents others from finding information regarding the computer's recent activity .

Windows Run and Find History These memory blocks were created for convenience, but only take up space in the average consumer's computer. On business computers, they can also act as an open window into the user's activity.

CHK Scan Disk Files These files can be used to reconstruct old, deleted files. Eliminating these files removes useless fragments and, in the case of businesses, prevents other users from reconstructing old files.

Recently Viewed Pictures Deleting these items can protect children from inappropriate material parents do not wish them to view. For businesses, this can prevent the theft of on-line schematics and PowerPoint presentations.

Recently Opened Documents Removing the information stored in this area keeps others from discovering which documents recently have been opened.

MS Office 97 and 2000 Tracks These files are similar to Recently Opened Documents. By deleting the MS Office tracks, a user keeps secret the documents that have been recently modified, whether it is changes to a home checking account or changes to the company's new formula for household cleaners.

Windows Temporary Files Folder By eliminating these files, users prevent anyone from determining which programs have been recently installed and what items have been downloaded.

This list is considerably expandable through the use of Window Washer's free plug-in and the custom cleaning feature. The plug-ins enable the user to clean programs such as Adobe Acrobat Reader, MSNInstant Messenger, and Real Player.

For browsers such as Internet Explorer, Netscape, Opera, Neoplanet, etc. Window Washer cleans:

Cache This area stores accessed Internet pages. By deleting this, users do not have to worry about anyone seeing which sites recently have been viewed.

Cookies By deleting the cookies from a user's browser, it prevents third-party services from tracking the sites to which the user has gone.

History By deleting this, the user prevents others with access to the computer from being able to find out which sites have been visited. This can help keep research and financial information secret.

Mail Trash This function of Window Washer completely eliminates e-mails once they have been removed from the deleted folder in mail managers. Many users believe that when the deleted items folder is emptied, the e-mails are gone forever. Window Washer completely secures old correspondence by deleting them from the system entirely.

Drop Down Address Bar As this area tracks all URLs that have been input into the browser, deleting this information helps secure a user's browsing history.

Auto Complete Data Forms By removing this information, home users can protect their credit card information and business users can keep log-in and password information secure.

Downloaded Program Files Deleting this information gives both home and business users the comfort of knowing that no one can discover which Internet programs have been downloaded onto the computer.

The functionality of Window Washer offers the user two major benefits: privacy and performance. Whether it is the home user who doesn't want friends, spouses, or children to view his or her latest letter to the IRS, or whether it is a business person writing a letter to the human resources department, Window Washer protects their privacy to DOD standards.

In the process of protecting the user's privacy, Window Washer also recovers valuable hard drive space, restoring overall performance to the machine's original speed. Unless these areas are routinely cleaned, they accumulate rapidly, using more and more hard drive space. Most computer users are not aware of how to clean these areas and those that do know tend to avoid doing so because of the tedious and boring nature of the task.

The Windows operating system was designed for convenience and ease of use, not security. Hackers can enter computer systems through a variety of surreptitious means. This enables them to access private information, thereby compromising an individual's safety and right to privacy. Window Washer, when used routinely, plugs many of the security holes left open by the operating system's original design.

Window Washer is currently available on the Webroot web site, http://www.webroot.com/ and through a variety of Internet resellers. In the retail channel, Window Washer is carried by AOL, CompUSA, Fry's Electronics, Hastings, etc.

Company Name:

Webroot Software, Inc.

Address:

PO Box 3531
Boulder, CO 80307

Phone Number:

(800) 772-9383

E-mail Address:

<info@webroot.com>

URLs:

http://www.webroot.com/

Category:

General Protection

Product Name:

WinGuardian

Product Description: As children begin to use computers at younger and younger ages, they often become sophisticated enough to disable filtering and blocking software. WinGuardian is a Windows monitoring utility that is an alternative to filtering and blocking for parents, schools, and other organizations. This helpful tool runs completely hidden and is able to monitor everything a user does on a system. WinGuardian can keep track of which programs a user runs, log any text that is typed into a program, log all web sites that are visited, and even capture screenshots at specified intervals. The logs can be reviewed to determine if a user is running inappropriate programs such as games or visiting web sites that the system owner considers offensive. Alternatively, WinGuardian can display an acceptable use policy (AUP) on the computer screen. A user must read the AUP and then click on the AGREE button before he or she is allowed to access the system. Knowing that the system is being monitored is a strong deterrent from using inappropriate programs or viewing inappropriate web pages. WinGuardian also gives you the option to "lock down" the Windows 95/98/Me environment so that users can only run authorized programs.

Company Name:

World Wide Digital Security, Inc. (WVVDSI)

Address:

4720 Montgomery Lane, Suite 800
Bethesda, MD 20814

Phone Number:

(301) 656-0521, extension 0085

E-mail Address:

<isolav@wwdsi.com>

URLs:

http://www.wwdsi.com/

Category:

General Protection

Product Name:

SAINT (System Administrator's Integrated Network Tool)

Product Description: The most current version is bundled with SAINTwriter and/or SAINTexpresss . Older versions can be downloaded separately. SAINT is a vulnerability assessment tool used to scan networks for vulnerabilities that hackers might exploit to gain access. SAINT also supports extensive documentation on how to use the product, about the vulnerability, and how to fix the vulnerability. SAINT provides links to more information on the vulnerabilities found, and when possible, links to sites where patches can be downloaded to fix vulnerabilities. SAINT provides a variety of scanning intensity options ranging from light to heavy plus. Additional options include the SANS Top 10 and user-customized scans.

Company Name:

World Wide Digital Security, Inc. (WVVDSI)

Address:

4720 Montgomery Lane, Suite 800
Bethesda, MD 20814

Phone Number:

(301) 656-0521, extension 0085

E-mail Address:

<isolav@wwdsi.com>

URLs:

http://www.wwdsi.com/

Category:

General Protection

Product Name:

SAINTwriter

Product Description: SAINTwriter is a report writing module that attaches seamlessly to SAINT . SAINTwriter allows the user to generate easily various types of reports, ranging from executive summaries to technical detail reports. Users can quickly and easily create customized reports and save the report formats for future use.

Company Name:

World Wide Digital Security, Inc. (WVVDSI)

Address:

4720 Montgomery Lane, Suite 800
Bethesda, MD 20814

Phone Number:

(301) 656-0521, extension 0085

E-mail Address:

<isolav@wwdsi.com>

URLs:

http://www.wwdsi.com/

Category:

General Protection

Product Name:

SAINTexpresss

Product Description: SAINTexpresss is an automatic service that updates SAINT every time it is used. When a SAINT scan is initiated, SAINTexpress checks the WWDSI web site to see if a newer version of SAINT is available. If available, SAINTexpresss downloads the newer version of SAINT and runs the scan using this newer version. This guarantees that the scan is testing for the most recently discovered vulnerabilities and using the most advanced version of SAINT . This service is important because SAINT is updated at least once every two weeks or whenever a new critical vulnerability is discovered.

Company Name:

World Wide Digital Security, Inc. (WVVDSI)

Address:

4720 Montgomery Lane, Suite 800
Bethesda, MD 20814

Phone Number:

(301) 656-0521, extension 0085

E-mail Address:

<isolav@wwdsi.com>

URLs:

http://www.wwdsi.com/

Category:

General Protection

Product Name:

WebSAINTTM

Product Description: WebSAINT is WWDSI's web-based vulnerability assessment scanner. The network scan is run from the WWDSI web site and the report of the findings is sent to the user via secure HTTP. WebSAINT is designed for people who are responsible for the security of their networks but do not have the time or expertise to download and configure the software, perform the scan, and create the reports.




Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net