ThreatSTOP 2.0 is huge leap forward in terms of scalability and providing advanced solutions to our customers.
San Diego, CA (PRWEB) December 31, 2012
ThreatSTOP, Inc. a leader in providing network security against malware and botnets, today announced its release of ThreatSTOP 2.0.
ThreatSTOP CEO, Tom Byrnes, said: “ThreatSTOP Version 2.0 is the product of 4 years of research, development testing, and customer feedback. We have completely updated the interface and reporting engine, and introduced enhanced policy and device management features. The result provides the tools administrators need to manage multiple firewalls, of multiple types, and protect networks and devices no matter where they are from Criminal Malware and Advanced Threats, all from one easy to use web interface. I am very proud of our team’s work in bringing to market a full feature set that delivers what customers have been asking for.”
In its continued effort to bring its customers and their networks the best protection possible, ThreatSTOP 2.0 possesses the following enhanced feature set:
New Policy and List Management Capabilities
ThreatSTOP has always been a great way to centrally manage firewalls of different types from multiple vendors. As ThreatSTOP is applied in ever larger and more complex networks, a new structure is required to facilitate the management of hundreds of devices and many more custom block and allow rules. Now it is even easier to manage the rule lists for multiple firewalls from a single user-friendly console.
New User Interface
In ThreatSTOP 2.0 the user interface has been completely overhauled as part of the introduction of the new features. The new layout is visible on every page.,The home page has been changed to deliver the most critical information at a glance.
Other New Features
ThreatSTOP 2.0 provides improved support for outsourced security management, as well as larger organizations with teams of network and security staff. The following features have been introduced:
- The ability for any user to delegate account control to another ThreatSTOP user
- The ability to generate automatic reports by email
o Reports can be customized to concentrate on just the critical details
o Reports can be easily imported into help desk management/trouble ticketing systems
- The ability to receive alerts when specific events occur
New Device Support
In addition, ThreatSTOP is proud to announce the extended list of supported hardware devices beyond firewalls by adding support for Juniper Junos routers. All Juniper routers (MX Series, M Series and J Series) are supported when running Junos versions 10.4 and higher. ThreatSTOP now supports most Juniper devices, all Cisco firewalls as well as the ISR platform, as well as Checkpoint, Vyatta, pfSense and generic linux (iptables) and BSD (Pf) firewalls.
Francis Turner, VP Product Management concluded “ThreatSTOP 2.0 is huge leap forward in terms of scalability and providing advanced solutions to our customers. Now customers can keep hundreds of firewalls and routers from multiple vendors automatically updated to block the latest malware. A single consistent custom policy can be specified for all of these devices and changes made to that policy in once place are automatically propagated across the entire enterprise.”
ThreatSTOP is the developer of ThreatSTOP Botnet Defense Cloud, an IP reputation-based cloud service that enables firewalls to block botnet and malware traffic to and from networks. The service prevents data theft, increases network “goodput”, reduces network load and attack surface. It is deployed on customers’ existing equipment and can be activated within an hour without the expense, complexity and time delay of hardware upgrades, network reconfigurations, retraining or manual updates. Founded in 2009, ThreatSTOP is based in San Diego, CA. For more information, visit http://www.threatstop.com.