Many of us have firewalls and anti-virus products on our notebook computers and they work pretty well. But when you get off your corporate network you leave behind you the additional security features that help protect you. Such as intrusion detection, email and web proxies and other hardened security that many security appliances give.
I guess you could cart 20lbs of appliances with you – OR you could buy a Yoggie Gatekeeper.
This small device is a robust hardware appliance that provides an array of online security tools including, URL Categorization & Filtering, Anti-Spam, Anti-Phishing, Antispyware, Antivirus, Transparent Email Proxies (POP3; SMTP), Transparent Web Proxies (HTTP; FTP) and more.
Instead of worrying if all the security software on your notebook computer is working Yoggie Gatekeeper is a hardware appliance (it’s a computer) that centralizes the security onto one device.
Yoggie’s miniaturized security processor is as powerful as a Pentium III processor (520 Bps), says their web site. Unlike security software installed on the laptop, the Yoggie Gatekeeper uses the same approach that is used to protect the corporate network – physical separation of the first line of defense. A robust security appliance, with a hardened Linux-based OS, Yoggie Gatekeeper physically isolates the laptop from incoming Internet threats. The fact that Yoggie Gatekeeper is in the front-line instead of the laptop itself means it can protect from unknown attacks, dropping the connection as they are identified. If for any reason, the attack is successful, Yoggie Gatekeeper is hit first and will not allow further damage to the laptop.
Yoggie Gatekeeper’s hardware was designed specifically for security purposes only. It includes a robust computing platform with a powerful CPU, with the sole purpose of protecting the laptop. Two separate network cards provide a physical separation between the unsafe zone (Internet) and the safe zone (connected to your laptop). The device also includes two separate Flash memory units. One unit stores a secured copy of the Linux OS. During pre boot, Yoggie copies the OS onto the second unit, and uses it during runtime. The original copy of the OS, stored on the first unit, does not include any “Write Access” permissions. This double-step process, guarantees that in the event of a successful attack, upon rebooting the device a clean and safe version of the OS is uploaded, making the OS and security applications completely safe.
Latest posts by Ramon Ray (see all)
- How Leaders Can Build a More Collaborative and Productive Virtual Team - September 15, 2017
- How to Create an Effective and Cohesive Online and Offline Marketing Strategy - September 15, 2017
- Salesforce Upgrade Its Customer Service Platform. Faster Setup Time. - July 27, 2017