MidCore Software Announces MidPoint 5.0
This latest release of the product has an improved firewall, broadband line teaming, virtual private network (VPN) capabilities, and SoftHost Distributed Web Hosting. It can also now be run with one or multiple types of communications connections (e.g., DSL, analog, cable, T1, and E1).MidCore Software Monday announced MidPoint 5.0, the latest version of its MidPoint Internet Gateway software. MidPoint 5.0 is expected to be available in the first quarter of 2001. An evaluation version will be available in late January.
MidPoint 5.0 is expected to be available in the first quarter of 2001. An evaluation version of the product will be available in late January 2001 from the company's Web site.
"We believe that MidPoint's advanced feature set makes it the most comprehensive, high-performance Internet connectivity solution available to small and medium enterprises today," said Michael J. Parrella, chairman and chief executive officer of NCTI.
MidPoint's firewall guards all network resources against unwanted access from the Internet. This gives enterprises complete control over which internal applications can get out to the Internet and which applications can access the network from the Internet. The firewall also provides: protection against "Trojan Horse" viruses, protected access from the Internet to internal servers, safe use of Windows file and print sharing on the PC where MidPoint is running, "attack" notification, and logging of unauthorized attempted access.
MidPoint's broadband line teaming allows broadband lines to seamlessly back up traditional T1 lines at a fraction of the cost. MidPoint intelligently manages traffic from a T1 and other routers so no changes are required to the enterprise's current T1 or router configurations. With this approach, back-up lines do not sit idle waiting for disaster to strike; they are instead used as regular bandwidth for which a company is already paying.
MidPoint's VPN provides secure connections over public networks so users working from remote locations can connect securely to a corporate server. Once connected, employees have the same authorization levels and access to corporate network resources as they do in the office. MidPoint's VPN uses the highest level of encryption and secure tunneling technologies to create a virtual point-to-point connection between the user and the corporate network. VPN security is two-tiered. User authentication employs industry standard protocols to prevent unauthorized access to the corporate network, and data security ensures that the data sent between the sites is properly received at the destination.
Using distributed Web hosting, MidPoint's SoftHost creates and automatically maintains a mirror image of an enterprise's most heavily used Web sites on a local hard drive. SoftHost brings the Web site's content much closer to the user, resulting in the instantaneous delivery of Web requests. SoftHost also automatically detects changes to the main Web site and updates the mirror image.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...