McAfee Desktop Firewall 8.5 includes multi-layered protection through inbound and outbound traffic monitoring, policy enforcement and reporting, select intrusion prevention capabilities and application monitoring.
With McAfee Desktop Firewall 8.5, administrators can now control access for traveling or remote users through Connection Aware Policies, which apply a pre-defined firewall rule set based on whether the user’s connection meets certain criteria - helping to increase network security by reducing exposure to potentially unsecured network connections.
Mobile users and road warriors access the corporate infrastructure in different ways, such as broadband, dial-up and virtual private network connections (VPN), and each method of connection requires unique control policies. McAfee Desktop Firewall 8.5 gives organizations the flexibility to selectively define different polices based on whether the user has passed a number of connection criteria, such as verifying the gateway IP and Mac address prior to connection to the home network. Once verified, McAfee Desktop Firewall 8.5 can issue a separate policy rule set that provides specific network access privileges to the client.
“We are a company that is active in more than 20 countries, with many remote users and decentralized offices,” said Tomi Behm, Processing and Network division, TietoEnator Corporation. “McAfee Desktop Firewall 8.5 includes connection aware policies, which help administrators easily process specific policies based on whether a user’s connection criteria is met. Now we can issue different firewall policies to clients whether they’re within our corporate network or accessing it from some remote location through different connection types. This helps us enforce regulatory compliance, decrease help desk tickets, manage patches and improve our overall security.”
“In a recent Forrester study among SMBs and enterprises, companies rated viruses and worms as the most serious security threat, but were not always investing in the right tools to defend against these threats,” said David Friedlander, senior analyst, Forrester. “Personal firewalls are no longer a nice-to-have - they are a necessity. Companies should install personal firewalls on all machines that leave the corporate network. In addition, they should protect their desktop computers, which become vulnerable to malicious code the second a remote machine plugs back into the corporate network.”
Download
Subscribe to:
Post Comments (Atom)
Facebook Badge
Followers
Blog Archive
-
▼
2008
(234)
-
▼
September
(41)
- VideoMach
- Sim Card Data Recovery
- ArcSoft TotalMedia™ Theatre
- Paint Shop Pro Photo X2
- Falco Icon Studio 3.2
- Hard Drive Inspector for Notebooks
- TweakNow RegCleaner Professional
- Anti-Trojan Elite 4.1.6
- MediaChance Dynamic Photo HDR
- Handy Backup
- Partition Magic 8 Pro
- Wifi Hacks AIO 2008
- Portable VLC media player
- ConvertXtoDVD
- Artificial Intelligence: A Guide to Intelligent Sy...
- Hacking Exposed Wireless
- Mastering Microsoft Visual Basic 2008
- Windows Vista Secrets
- Wireless Home Networking For Dummies
- Active Partition Recovery 5.1.595
- F-Secure Anti-Virus 2009 v9.00.138
- Wondershare DemoCreator 2.4
- XoftSpySE Anti-Spyware
- McAfee Desktop Firewall 8.5
- Kaspersky Rescue Disk 2009 8.0.0.454
- Blu-ray to DVD
- Camtasia Studio 5.1
- Bitdefender Internet Security 2008 v11.0.16
- Calculator
- Tube Hunter Ultra V2.3
- Internet Lock
- Acoustica CD/DVD Label Maker 3.23
- Internet Download Manager
- TuneUp Utilities 2008
- Sony Sound Forge
- Google Earth Pro
- Partition Manager
- ESET NOD32 Antivirus
- Lock my Folder
- Fake Webcam
- Virtual Hard Drive Pro 2.0
-
▼
September
(41)
0 comments:
Post a Comment