ABSTRACT

Download one of the many demos available and try it with your own log files. This will let you evaluate the software with all the appreciation, and skepticism, it deserves.

protect the corporate network from unauthorized users coming in-and unauthorized Internet sessions going out-via the Internet. But, while firewalls guard against intrusion and unauthorized use, they can guarantee neither the security of the link between a particular workstation and a particular server on opposite sides of a firewall nor the security of the actual message being conveyed.