Firewall are a component part and an enforcement of, an overall security policy. It is a step toward the goal of total security. The best way to totally secure your system is to not have any users and leave it turned off. Obviously this not a workable solution. Security spans a spectrum from no security to onerous policies that users will reject. Our firewall incorporates the security philosophy of "That which is not expressly permitted is prohibited." This conservative position puts you in control and makes you responsible for what is allowed to pass through the firewall. Our firewall is capable and more secure than a router alone. The firewall is configured ass a dual-homed gateway and implemented as a Basition Host. It provides a single point of control between your private network and outside networks. By providing popular application gateways with audit logs and customizable reports the firewall protects your network while providing the services your users want and giving you the control you need. Software programs have bugs. Big programs have more bugs than small ones. If you want to minimize your risk you should run as small a program as possible. Our firewall code is extremely small yet offers the same firewall code is extremely small yet offers the same functionality as our competitors. How many lines are there in the firewall you are looking at? Our system not a "black box" but a "crystal box" we let you see what is going on inside by providing source code. If you cannot see what is going on inside how do you know it is enforcing on inside how do you know it is enforcing your security policy correctly? Does your firewall vendor allow you to look at their source? Our source has been reviewed by many organizations who have felt it was solid enough for their use. If you are going to use it in your organization you should review it too. How many users of our competitors firewall have reviewed the source code? Who is in control of your security policy? Who is control of your firewall? Our firewall is purchased not leased so you are in control. You are in control of the hardware, the software, and the administration of the firewall. This gives you both control and responsibility. Only you can insure that the firewall is enforcing your security policy and not the vendors.
Features
- Crystal Box - source code is included.
- BDSI UNIX based.
- Compact robust code
- Custom auditing & logging.
- Popular application gateways
- Customized audit reporting.
Main Products
IC card reader thermostat timer