Python Authors: Pat Romanski, AppDynamics Blog, Matt Davis, Donald Meyer, Liz McMillan

News Feed Item

NETGEAR Announces First Gigabit Firewall with DMZ for Small Businesses

ProSafe FVS318G 8-Port VPN Firewall Offers Gigabit LAN Speeds, a Software-Selectable DMZ Port and Remote Access for Business-Class Protection, Flexibility and Connection Rates

SAN JOSE, Calif., Aug. 17 /PRNewswire-FirstCall/ -- NETGEAR(R), Inc. (Nasdaq: NTGR), a worldwide provider of technologically innovative, branded networking solutions, today announced the availability of the NETGEAR ProSafe(R) 8-Port VPN Firewall (FVS318G), a compact, affordable VPN firewall that provides reliable, business-class network security, remote access and Internet access for small businesses with as many as 10 users. Providing IPsec VPN for secure remote connections and firewall functions to protect small business networks from hackers, the FVS318G offers peace of mind and security while also enabling fast networking by offering eight gigabit ports, one gigabit WAN port, and up to 25 megabit per second broadband throughput. Unique for its price point, the FVS318G also features a software-configurable hardware DMZ port to provide for server and other externally facing connections.

(Logo: http://www.newscom.com/cgi-bin/prnh/20030730/NETGEARLOGO)

(Photo: http://www.newscom.com/cgi-bin/prnh/20090817/SF62020)

"With this VPN firewall, NETGEAR continues to provide solutions that are affordable to the small business but offer the same sophisticated security functionality enjoyed by larger businesses," said Jason Leung, senior product line manager for security at NETGEAR. "We're proud to deliver secure platforms that push the boundary of what's considered 'standard' security fare for small businesses. With the FVS318G, we're offering features never seen before at a small business price point."

Featuring a software-configurable DMZ port often found only on higher-end firewalls, the FVS318G is ideal for small businesses that need externally facing network resources like a Web server but have strict internal LAN security requirements. The DMZ port can be activated or deactivated using the user-friendly GUI and adds an additional layer of security to an organization's Local Area Network (LAN); an external attacker only has access to the external-facing equipment in the DMZ, rather than the whole of the network.

"Our experience with the FVS318G on the network has been very positive," said Johnny Chin, president and chief executive officer at Onesimus Enterprises, whose company participated in the beta test program. "For the price, we were impressed with the level of features offered along with enhanced security measures against outside attackers. Best of all, it's fast enough to keep up with our high-speed broadband Internet connection, so we're both protected and running at top speed."

Designed for the small business, the FVS318G is a perfect solution for organizations that need more advanced protection than that offered by consumer-focused firewalls, but that also require tools available at a lower price point than units designed for the medium-sized business. This high-quality, highly stable unit features eight gigabit LAN ports and one gigabit WAN port to allow for speedy and secure connections at a rate of up to 25 megabits, meaning that security comes at no cost to end-user connection speed. RFC compliant IPSec VPN tunnels enable as many as five client-based remote access VPN tunnels to connect branch offices securely. Based on Stateful Packet Inspection (SPI), the 8-Port VPN Firewall delivers fast, reliable security controls to small businesses and their remote offices.

Easy to set up and manage, the FVS318G incorporates the user-friendly Web-based ProSafe Control Center configuration screen and install assistant to reduce initial setup time. Compatible with Windows(R), UNIX(R), Macintosh(R), and Linux(R) OS and backed by a lifetime warranty, the NETGEAR ProSafe 8-Port VPN Firewall (FVS318G) is immediately available via leading direct marketers, e-commerce sites and value added resellers at a U.S. street price of $139. Additional product information and photos can be found at http://www.netgear.com/Products/VPNandSSL/WiredVPNFirewallRouters/FVS318G.aspx.

About NETGEAR, Inc.

NETGEAR (NASDAQ: NTGR) designs innovative, branded technology solutions that address the specific networking, storage, and security needs of Small- to Medium-sized Businesses (SMBs) and home users. The company offers an end-to-end networking product portfolio to enable users to share Internet access, peripherals, files, multimedia content, and applications among multiple computers and other Internet-enabled devices. Products are built on a variety of proven technologies such as wireless, Ethernet and powerline, with a focus on reliability and ease-of-use. NETGEAR products are sold in over 29,000 retail locations around the globe, and via more than 41,000 value-added resellers. The company's headquarters are in San Jose, Calif., with additional offices in 25 countries. NETGEAR is an ENERGY STAR(R) partner. More information is available by visiting www.netgear.com or calling (408) 907-8000. Follow NETGEAR at http://twitter.com/NETGEAR and http://www.facebook.com/netgear.

(C)2009 NETGEAR, Inc. NETGEAR, the NETGEAR logo and ProSafe are trademarks or registered trademarks of NETGEAR, Inc. in the United States and/or other countries. Other brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to change without notice. All rights reserved.

Note: Actual data throughput will vary from maximum signal rates stipulated. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate.

Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.:

This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease of use of NETGEAR's products may not meet the price, performance and ease of use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission, including, but not limited to, those risks and uncertainties listed in the section entitled "Part II - Item 1A. Risk Factors," pages 35 through 49, in the Company's quarterly report on Form 10-Q for the fiscal second quarter ended June 28, 2009, filed with the Securities and Exchange Commission on August 6, 2009. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events.


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...