FirstClass and Network Security
Security risks, from outside the local area network, are generally associated with a remote access solution such as remote TCP/IP routers, ARA and terminal servers. These can easily expose a network to outside and potentially damaging access.
FirstClass is an excellent network firewall. FirstClass allows connections directly to the server machine via remote TCP/IP protocols. There is no method for such a connection to bypass the server machine, access the network or access anything other than the FirstClass Server, as controlled by the users’ permissions.
In the event that a user has gained knowledge of the Administrator’s password (perhaps through observing the login process or other physical means) there is still no facility to have access to the server machine’s file structure or the network.
One of the reasons for this is that FirstClass to FirstClass’s connections employ entirely proprietary protocols that are designed to run on top of inherently secure operating systems.
With FirstClass, users are completely locked into an environment that cannot be accessed or bypassed from within that environment. If a user, in an attempt to break in, were to attempt to bypass FirstClass by somehow disabling FirstClass (which is not something FirstClass is susceptible to), the user would be instantly disconnected when the server ceased working. FirstClass, because it handles all of the communication protocols internally, is the only element handling the connection and no connection will exist when it ceases to function.
The FirstClass Network Store's files all reside on locked volumes, so the files themselves cannot be accessed from the network, except when logged in as a FirstClass user. This, as discussed above, strictly controls the level of file access. This contrasts with several well-known e-mail products that require that their mail users have read AND write access to their network store files that must reside on an accessible volume on the file server. This allows completely free ability to edit, corrupt or even delete select files. The standard method suggested to protect against this eventuality is to frequently back up the files in question so that restoration is more easily accomplished. While providing some protection against data loss, this in no way prevents intruders from gaining access to the information contained within the mail system.
|