Comodo Releases Full Version of Trustix Enterprise Firewall for Free and Delivers Total Security for Enterprise Networks

Released on: March 12, 2008, 8:58 am

Press Release Author: Comodo Group

Industry: Computers

Press Release Summary: The commercial release of Trustix Enterprise Firewall follows
the successful BETA version and is proven to deliver advanced protection that is
\"out of the box\" easy to deploy. Trustix Enterprise Firewall now includes new
Anti-SPAM features for improved performance

Press Release Body: JERSEY CITY, NJ March 12, 2008 - Comodo, a leading security
company, announced today the commercial release of TrustixT Enterprise Firewall
version 4.8, (TEF) a free enterprise class LINUX-based firewall solution. TrustixT
Enterprise Firewall delivers a high performance firewall that monitors network
traffic and protects the network against unauthenticated traffic or login attempts
which could inject Trojans, worms, or infected files into the network. This
commercial version builds on the previous BETA release of this solution and
incorporates a powerful new anti-SPAM module for improved performance and security.

TrustixT Enterprise Firewall is widely acclaimed for its innovative WYSIWYG feature
in combination with its sophisticated security features and remains free for use
with no license, subscription, or renewal fees. The technology in this firewall was
designed allow a high level of control over inbound and outbound network traffic in
order to ensure the security of the network. Administrators are able to monitor all
network activity including any malicious activity, utilize an intuitive GUI to
visualize and edit firewall policies, and manage traffic for all security zones (up
to 24).

Additionally, this new release adds important new technology that improves the
efficiency of TEF.

* DSPAM
DSPAM is a scalable and open-source content-based spam filter designed for
multi-user enterprise systems. DSPAM filters spam by learning what spam is and
isn\'t. It does this by learning each user\'s individual mail behavior. This
allows DSPAM to provide highly-accurate and personalized filtering for each
user. DSPAM work efficiently even on large systems and provides an
administratively maintenance free solution capable of learning each user\'s
email behaviors with very few false positives. DSPAM supports many different
MTAs and can also be deployed as a stand-alone SMTP application.
* Content Filtering
Web Content Filtering prevents indiscriminate Internet surfing that often
conceals viruses, worms, Trojans, spyware, keyloggers, phishing, pharming and
more. TEF offers intelligent surfing protection through its user
identity-based Internet Content Filtering solution. TEF guards enterprises
from security, productivity threats, and legal liability. The web content
filtering solution is based on a combination of categories, keywords, URLs,
domain names, and file types, making it a comprehensive filtering mechanism.
* High Availability & Load Balancer
TEF makes use of LVS(Linux Virtual Server) to provide fast load balancing. The
Heartbeat(Linux-HA) is used to monitor the Linux-directors - the hosts running
LVS and doing the load balancing. This is combined with ldirectord which
monitors real-server - the hosts that accept end-user\'s connections. These
three core components support TEF4.8 to provide Highly Available and/or Load
Balanced network services.
* Antivirus
TEF\'s fully integrated gateway anti-virus engine provides reliable web and
e-mail security at the gateway for enterprises. The gateway anti-virus
solution supports business flexibility and prevents Internet threats like
worms, viruses and malicious programs from entering the networks.
* Intrusion Detection system (IDS)
IDS is capable of performing real-time traffic analysis and packet logging on
IP networks. It can perform protocol analysis, content searching/matching and
can be used to detect a variety of attacks and probes, such as buffer
overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting
attempts, and much more. It uses a flexible rules language to describe traffic
that it should collect or pass, as well as a detection engine that utilizes a
modular plugin architecture.

Additional firewall security related features and functions:

* Packet-filtering enabling TEF to act as a router to accelerate data transmission
* Command-line scanner
* Virus database auto updater, virus scanner C library and on-access scanning
* Built-in support for various archive formats such as - Zip, RAR, Tar, Gzip,
Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others, almost all mail file formats,
ELF executables and popular document formats including MS Office and MacOffice
files, HTML, RTF and PD
* Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW,
Upack and obfuscated with SUE, Y0da Cryptor and others
* Fully-featured packet-filtering router with advanced capabilities,

Comodo created Trustix Enterprise Firewall to enable administrators to easily
configure and manage firewall policies, manage demilitarized zones, and control
Virtual Private Networks by simply clicking and dragging connections between servers
with a \'drag \'n\' drop\' GUI. Melih Abdulhayoglu, CEO and Chief Security Architect of
Comodo explains, \"Comodo\'s Enterprise Trustix Firewall has earned a well deserved
reputation as a high-performance, free enterprise firewall that is highly intuitive
and easy to use. This best-in-class enterprise firewall is innovative because it
integrates multiple technologies to make it operationally and economically feasible
to deploy comprehensive security services to more network locations.\"

For more information, please visit: www.firewall.trustix.com
About Comodo

The Comodo companies provide the infrastructure that is essential in enabling
e-merchants, other Internet-connected companies, software companies, and individual
consumers to interact and conduct business via the Internet safely and securely. The
Comodo companies offer PKI SSL, Code Signing, Content Verification and E-Mail
Certificates; award winning PC security software; vulnerability scanning services
for PCI Compliance; secure e-mail and fax services.

Continual innovation, a core competence in PKI, and a commitment to reversing the
growth of Internet-crime distinguish the Comodo companies as vital players in the
Internet\'s ongoing development. Comodo secures and authenticates online transactions
and communications for over 200,000 business customers and 3,000,000 users of our
desktop security products.
For additional information on Comodo - Creating Trust OnlineT visit
http://www.comodo.com

For more information, reporters and analysts may contact:
Judy Shapiro
Comodo
+1 (201) 963-9471
Email: judy.shapiro@comodo.com

Web Site: http://www.comodo.com

Contact Details: +1 888 266 6361
media-relations@comodo.com

  • Printer Friendly Format
  • Back to previous page...
  • Back to home page...
  • Submit your press releases...
  •