![](/file/16978/Sun Solutions CD - APR '97 - SEP '97 (704-3778-12 Rev. H)(Sun Microsystems, Inc.)(1997).iso/products/Progressive/images/kodiak.gif)
Progressive
Systems' Kodiak Firewall offers
maximum protection for your Internet
and Intranet security needs. More
than just Stateful Packet Inspection,
Kodiak works hand-in-hand with your
company's network security policy
to keep the network secure.
With multiple dimensions to network
security, an effective policy will
implement the following elements.
Access Protection
Our Stateful
Packet Inspection means "that which
is not expressly permitted is denied."
By opening, timing and locking the
needed ports for each transaction,
Progressive Systems' Kodiak Firewall offers maximum security for even
those applications which are permitted.
Not only will Progressive Systems' Kodiak Firewall thwart SATAN and
other probing attacks, it will notify the
administrator immediately of the attack,
and where the attack is coming from.
And because Progressive Systems' Kodiak Firewall's Stateful Packet
Inspection technology is the fastest
firewall technology available, you won't
have to sacrifice network performance
just to keep your enterprise secure.
Access Logging and Monitoring
Because of Progressive Systems' Kodiak Firewall's
extensive Logging features, the administrator
can log data specifically, from every IP
address all the way down to every bit going
over the wire. Logging can be sent
via VPN to remote locations, offering
flexible enterprise wide security. Our
tamper-proof audit trail provides
extensive network fingerprinting as
extensive as your company demands.
Alarm Surveillance
By using remote
access logging, your
network security policy can define events
across the enterprise to trigger silent
alarms as the perpetrator attempts to
breach Progressive Systems' Kodiak Firewall. Progressive Systems' Kodiak Firewall can then start
an event log (which can be securely
logged to a remote location), that captures
the complete details of the attack to be
used later for analysis or prosecution.
Authentication
Progressive Systems' Kodiak Firewall's authentication
technologies
make sure the user or system is who they
say they are. By authenticating the remote
partner, Progressive Systems' Kodiak Firewall allows secure
transactions to occur through the firewall
using Progressive Systems VPN
technology.
Progressive System VPN
Included with Progressive Systems' Kodiak Firewall is
the Progressive Systems VPN technology.
Featuring triple
DES128 bit encryption and a proprietary
tunneling protocol, Progressive Systems
VPN offers a low cost of ownership
solution to creating a secure Intranet or
extranet acoss the Internet.
These
powerful features of Progressive Systems' Kodiak Firewall,
when combined with it's versatile GUI,
make it the choice for both
network and enterprise security.
Home |
PPP |
VPN |
Support |
Corporate
3518 Riverside Dr. Suite 201
Columbus, Ohio 43221
Voice: 614 326 4600 Fax: 614 326 4601
Sales: 800 558 7827 Support: 800 330 7127
WHS,
webmaster@progressive-systems.com