Security policies are automatically applied based on your location, providing higher levels of security in untrusted environments.

Here are some key features of "Secure Endpoint Firewall":

Secure Endpoint Firewall uses policies to control the security settings for your computer. Policies control firewall settings, file sharing, the applications authorized to communicate over the network and the remote devices your computer is authorized to communicate with. Policies for home, office, and remote are automatically created for you and can be customized. These policies are automatically loaded depending on your location.

Why are policies important? There is no single security setup that can protect your computer from intrusion in all environments. Computing today is about mobility. Consider the following scenario: On your way to work in the morning you stop at a local coffee shop, turn your laptop on and connect to a WiFi hotspot. You might connect to your corporate network using VPN to check your email, or you may just browse the Internet. Feeling refreshed after your morning coffee, you then head to the office. When you arrive, you plug your laptop into the corporate network. After a long day, you go home and connect to the Internet via your high-speed connection to search for a new job or vacation spot.

The scenario described above illustrates the complexity of securing a machine in multiple environments. In fact, it may not be possible to do so with a single configuration. The computer would be so "locked down" that the person would not be productive. An effective solution would employ specific policies for each of the environments and apply them automatically. Secure Endpoint accomplishes this.

How does it work? One of the easiest ways for a hacker to gain access to your computer is through file sharing. Secure Endpoint allows you to specify file sharing settings in each policy. For example, lets say that file sharing is turned on for the office policy, and turned off for the home and remote policies. When you connect to a network, Secure Endpoint detects your location and automatically applies the appropriate policy, protecting your computer and your information. If you connected to the corporate network, file sharing would be enabled, otherwise it would be disabled.

Secure Endpoint Firewall incorporates a state of the art firewall to filter network traffic. If you are attached to the Internet, your machine is probably being scanned on a regular basis. Without a properly configured firewall, hackers can learn valuable information based on how your computer responds to the scans. They can use this information to break into your computer and gain access to your personal information.

How does it work? Secure Endpoint intercepts unauthorized network activity and displays a security alert giving you the opportunity to accept or reject the connection. Detailed information about the connection request is readily available, helping you decide how to handle the alert. Secure Endpoint remembers your response and applies it the next time similar activity is encountered. Unauthorized network activity will be automatically blocked if no action is taken after a period of time.

Custom filters can be created to control precisely how your computer responds to network communications. These filters can be easily created using the built in filter wizard. The wizard allows you to specify detailed information about the network activity you want to allow or block.

Secure Endpoint loads along with the operating system and protects your machine even if you aren't logged in. This keeps your system safe if it is turned on and connected to the Internet. Packets are intercepted at the lowest possible level and analyzed in the kernel minimizing performance issues often found in software firewalls.

Secure Endpoint keeps the information on your machine private and secure. Network activity is monitored for all applications and processes running on your machine. Any attempt to transfer or receive information over the Internet is validated according to currently loaded policies.

Why is this important? Malicious programs such as keystroke loggers and trojan horses can be downloaded and installed on your machine without your knowledge. This can happen by simply browsing to a website or by opening an email. Once installed, these programs can record and transmit your personal information back to the hacker. These programs can also silently wait for a signal from a hacker which instructs your machine to participate in a coordinated massive attack on a targeted website or business. Secure Endpoint intercepts this activity and alerts you to the threat.

How does it work? When an application or process attempts to connect to the Internet, Secure Endpoint checks the currently loaded policy to determine if the application or process is authorized to make the connection. If not, a security alert is displayed allowing you to take action. At this point, you can allow the connection or reject it. Similarly, any attempt by a remote device to connect to an application or process on your machine is validated against the currently loaded policy. If the connection is not authorized, a security alert is displayed allowing you to accept or reject the connection.

Secure Endpoint will detect connections to networks and allow you to assign specific policies according to your location.As you connect to a network, Secure Endpoint determines your location and automatically loads the appropriate policy.

Why is this important? One of the biggest security threats to an enterprise is the laptop. Mobile users take their laptops with them and connect to a variety of different networks outside of the office such as hotels, hotspots in coffee shops and high speed connections at home. This exposes the laptop to huge number of potential security threats. Automatically loading policies based on location ensures the highest degree of protection possible in a dynamic environment.

How does it work? Secure Endpoint monitors all wireless, LAN and dial-up connections. When the connection is made, Secure Endpoint determines your location and loads the appropriate policy. If you are connecting to a new network (e.g. a hotspot), Secure Endpoint will display a security alert prompting you to authorize or reject the connection. When authorizing the connection, Secure Endpoint allows you to specify your location. The next time you connect to this network, Secure Endpoint will load the policy for that location automatically.

Requirements:

■ CPU: 400 Mhz or greater. Single and dual processor configurations are supported.

■ Memory: At least 64 megabytes (MB) of RAM.

■ Hard Disk Space: At least 25 megabytes of disk space.

■ Network Connection: At least one Network Interface Card (NIC) or modem.

Limitations:

■ 30-day trial