?
Solved

UTM software for Windows 2003 RRAS

Posted on 2007-03-22
3
Medium Priority
?
253 Views
Last Modified: 2010-04-18
I plan to set up a dedicated Windows 2003 Server to be used as RRAS and a VPN server. Is there any software available that would trap viruses, spam, phishing, etc at on this server before it gets routed to the private NIC? There are a growing number of UTM appliances out there, but I don't see the equivalent software for this type of setup.
0
Comment
Question by:rcg112355
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 18778141
Checkpoint software is best known for this.
But it you are doing this to save some money, then I you could be better of using an appliance.
Hard to tell based on the info I have, there are so many factors involved.

J.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question