Secure Endpoint Firewall 1.0.1.2 Download

fyxm network: our download portal - Softliste.de
Secure Endpoint Firewall
        Bookmark and Share
  • Name:Secure Endpoint Firewall
  • License:Trial
  • Developer:Carbonated Software
  • Downloads:45
  • Rating:3 / 5
  • OS:Windows
  • Size:4.2 MB
  • D.M.C.A. 
  • Download > 

Secure Endpoint Firewall 1.0.1.2

Secure Endpoint Firewall 1.0.1.2 Description:

Security policies are automatically applied based on your location, providing higher levels of security in untrusted environments.

Secure Endpoint Firewall 1.0.1.2 Features:

· Policy based protection

Secure Endpoint Firewall uses policies to control the security settings for your computer. Policies control firewall settings, file sharing, the applications authorized to communicate over the network and the remote devices your computer is authorized to communicate with. Policies for home, office, and remote are automatically created for you and can be customized. These policies are automatically loaded depending on your location.

Why are policies important? There is no single security setup that can protect your computer from intrusion in all environments. Computing today is about mobility. Consider the following scenario: On your way to work in the morning you stop at a local coffee shop, turn your laptop on and connect to a WiFi hotspot. You might connect to your corporate network using VPN to check your email, or you may just browse the Internet. Feeling refreshed after your morning coffee, you then head to the office. When you arrive, you plug your laptop into the corporate network. After a long day, you go home and connect to the Internet via your high-speed connection to search for a new job or vacation spot.

The scenario described above illustrates the complexity of securing a machine in multiple environments. In fact, it may not be possible to do so with a single configuration. The computer would be so "locked down" that the person would not be productive. An effective solution would employ specific policies for each of the environments and apply them automatically. Secure Endpoint accomplishes this.

How does it work? One of the easiest ways for a hacker to gain access to your computer is through file sharing. Secure Endpoint allows you to specify file sharing settings in each policy. For example, lets say that file sharing is turned on for the office policy, and turned off for the home and remote policies. When you connect to a network, Secure Endpoint detects your location and automatically applies the appropriate policy, protecting your computer and your information. If you connected to the corporate network, file sharing would be enabled, otherwise it would be disabled.

· Intelligent packet filtering

Secure Endpoint Firewall incorporates a state of the art firewall to filter network traffic. If you are attached to the Internet, your machine is probably being scanned on a regular basis. Without a properly configured firewall, hackers can learn valuable information based on how your computer responds to the scans. They can use this information to break into your computer and gain access to your personal information.

How does it work? Secure Endpoint intercepts unauthorized network activity and displays a security alert giving you the opportunity to accept or reject the connection. Detailed information about the connection request is readily available, helping you decide how to handle the alert. Secure Endpoint remembers your response and applies it the next time similar activity is encountered. Unauthorized network activity will be automatically blocked if no action is taken after a period of time.

Custom filters can be created to control precisely how your computer responds to network communications. These filters can be easily created using the built in filter wizard. The wizard allows you to specify detailed information about the network activity you want to allow or block.

Secure Endpoint loads along with the operating system and protects your machine even if you aren't logged in. This keeps your system safe if it is turned on and connected to the Internet. Packets are intercepted at the lowest possible level and analyzed in the kernel minimizing performance issues often found in software firewalls.

· Application and process monitoring

Secure Endpoint keeps the information on your machine private and secure. Network activity is monitored for all applications and processes running on your machine. Any attempt to transfer or receive information over the Internet is validated according to currently loaded policies.

Why is this important? Malicious programs such as keystroke loggers and trojan horses can be downloaded and installed on your machine without your knowledge. This can happen by simply browsing to a website or by opening an email. Once installed, these programs can record and transmit your personal information back to the hacker. These programs can also silently wait for a signal from a hacker which instructs your machine to participate in a coordinated massive attack on a targeted website or business. Secure Endpoint intercepts this activity and alerts you to the threat.

How does it work? When an application or process attempts to connect to the Internet, Secure Endpoint checks the currently loaded policy to determine if the application or process is authorized to make the connection. If not, a security alert is displayed allowing you to take action. At this point, you can allow the connection or reject it. Similarly, any attempt by a remote device to connect to an application or process on your machine is validated against the currently loaded policy. If the connection is not authorized, a security alert is displayed allowing you to accept or reject the connection.

· Network sensing and location awareness

Secure Endpoint will detect connections to networks and allow you to assign specific policies according to your location.As you connect to a network, Secure Endpoint determines your location and automatically loads the appropriate policy.

Why is this important? One of the biggest security threats to an enterprise is the laptop. Mobile users take their laptops with them and connect to a variety of different networks outside of the office such as hotels, hotspots in coffee shops and high speed connections at home. This exposes the laptop to huge number of potential security threats. Automatically loading policies based on location ensures the highest degree of protection possible in a dynamic environment.

How does it work? Secure Endpoint monitors all wireless, LAN and dial-up connections. When the connection is made, Secure Endpoint determines your location and loads the appropriate policy. If you are connecting to a new network (e.g. a hotspot), Secure Endpoint will display a security alert prompting you to authorize or reject the connection. When authorizing the connection, Secure Endpoint allows you to specify your location. The next time you connect to this network, Secure Endpoint will load the policy for that location automatically.

Secure Endpoint Firewall 1.0.1.2 Requirements:

· CPU: 400 Mhz or greater. Single and dual processor configurations are supported.
· Memory: At least 64 megabytes (MB) of RAM.
· Hard Disk Space: At least 25 megabytes of disk space.
· Network Connection: At least one Network Interface Card (NIC) or modem.

Secure Endpoint Firewall 1.0.1.2 Limitations:

· 30-day trial

Related searches:

symantec endpoint protection - 1 firewall - approach

Secure Endpoint Firewall security information

You cannot download any crack or serial number for Secure Endpoint Firewall on this page. Every software that you are able to download on our site is legal. There is no crack, serial number, hack or activation key for Secure Endpoint Firewall present here. Our collection also doesn't contain any keygens, because keygen programs are being used in illegal ways which we do not support. All software that you can find here is freely downloadable and legal.

Secure Endpoint Firewall installation package is prepared to be downloaded from our fast download servers. It is checked for possible viruses and is proven to be 100% clean and safe. Various leading antiviruses have been used to test Secure Endpoint Firewall, if it contains any viruses. No infections have been found and downloading Secure Endpoint Firewall is completelly problem free because of that reason. Our experts on malware detection tested Secure Endpoint Firewall with various spyware and malware detection programs, including fyxm.net custom malware and spyware detection, and absolutelly no malware or spyware was found in Secure Endpoint Firewall.

All software that you can find on our servers, including Secure Endpoint Firewall, is either freeware, shareware or open-source, some of the software packages are demo, trial or patch versions and if possible (public domain licence), we also host official full versions of software.

Because we want to be one of the fastest download sites on the web, we host all the software including Secure Endpoint Firewall on our servers. You cannot find here any torrents or download links that would lead you to dangerous sites.

Fyxm.net does support free software, however we do not support warez or illegal downloads. Warez is harming producers of the software.

Enjoy!

Rate Secure Endpoint Firewall 1.0.1.2!

Rating: 2.8/5 (10 votes cast)

Similar Programs License Size Rating  
USB FireWall Freeware 3.3 MB 3 / 5
FIREWALL/X Demo 705 KB 2 / 5
NeT Firewall Trial 3.8 MB 2 / 5
1 Firewall Shareware 988 KB 3 / 5
XP Firewall Control Freeware 3.4 MB 2 / 5

Featured Products

LimeWire 5.2.1 Beta / 5.1.3

LimeWire

Share computer files with anyone on the internet!

Kaspersky Anti-Virus Personal 2010

Kaspersky Anti-Virus Personal

BKaspersky AV provides all types of anti-virus protection

Winamp 5 Full

Winamp

A flexible and sophisticated application for playing and managing your music

DAEMON Tools Lite 4.30.4

Daemon Tools

Advanced application for multiprotection emulation

CMS Templates Download

Blogger Themes

Check our website devoted to CMS themes download
FYXM.net - We have everything! If not - please do contact us here.