|
He@tSeeker Pro
was designed on the Distributed Firewall Architecture (DFA). Its
main goal is the extension of network security where the security
of traditional firewalls ends.
Access Control
- Open and Closed Philosophy.
- By time - users, hosts and services
- By Host Name - Wild cards
- By IP Address
- By Services
- Directories and Files
- Incoming and Outgoing Protection
- ICMP Attacks
- Blocks Port Attacks
- Java, ActiveX and Cookies
Auditing
- Monitor and consolidate the Internet
and Intranet usage
- Register begin and end of access
of Hosts, IP, Services and files
- Generates Log trails
- Allow Queries to the log
files generating target reports
- Export log file to HTML, ASCII,
DBF and DIF formats
- Generates Several kinds of Graphics
and Statistics
Usage Monitor and Graphs
- All hosts and sites
- Downloaded and uploaded files
- Access Times
- Site over accessed
- Most visted sites
- Most used services
- Emails sent and received
Enterprise Management
- Centralized Management
- Easy to Install
- Silent Client Installation
- Automatic Client Upgrade
- Transparent to end-users
- Time Profiles
- Host and IP Address Verification
|
|
|
|