log on

NETWORKING

At the network level, Log-On has implemented state-of-the-art protocols ranging from security association to directory services. Examples of projects include work with Check Point Software on their FW-1 Firewall suite to develop content-based policy management, with specific support for protocols such as X.400 and SQL* Net. For a related project, Log-On developed a proxy server for monitoring and validating firewall operation.

Examples of Log-On’s experience with TCP/IP internals include the implementation of a secure network protocol that included packet analysis and on-the-fly compression and decompression.

Projects have included:

  • Peer to peer networks
  • Video panels
  • Network for Gaming software including a network for a multi-player bridge game
  • Development of a super-computer based on networking
  • Secure VPN networks
  • Secure Proxy Servers
  • TCP/IP Internals
  • LDAP Integration
  • Firewall Add-ons and Firewall Traversal
  • Http sniffers