Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Yoggie Firestick Pico

1 of 5 NEXT PREV
  • yoggiefsproi1.jpg

    Published: February 25, 2008 -- 09:31 GMT (01:31 PST)

    Caption by: Christian Harris

  • yoggiefsprostick.jpg

    Notebooks don’t generally enjoy the same protection levels as systems residing behind the company firewall, where computers are shielded from outside threats by hardware-based security complete with the latest updates and security policies. As soon as a notebook leaves the network, it's a security risk, the level of which depends on whether the mobile user downloads the latest updates and security policies. As a result, infected notebooks could infiltrate security threats into the network on their return from the field.

    Traditionally, mobile firewall protection involves some type of software solution, but a dedicated hardware firewall can save software management headaches and CPU cycles. The problem revolves around the size of the hardware solution — few of the current offerings are designed for life on the road.

    Yoggie’s Firestick Pico offers firewall protection on-the-go — but in a compact USB stick form factor. In fact, it’s a Linux appliance driven by a 312MHz Intel XScale PXA270 processor. It also sports a dual flash memory mechanism that creates an 'untouchable' operating system: the OS is stored in ROM and copied to flash memory when it's installed, meaning that no permanent damage can be done to the device.

    The Firestick Pico is a £50 Linux-based hardware firewall appliance on a USB stick, designed to protect notebooks when they're outside the company network.

    The Firestick Pico places a physical barrier between your computer and the internet, helping to ensure that threats never reach your system. It will protect your computer from denial of service (DoS/DDos) attacks, buffer overflows and a broad range of malicious attacks. In addition, each Firestick Pico comes with a complimentary version of Kaspersky’s Personal Security Suite.

    Yoggie’s similar Pico and Pico Pro products offload all security applications from the system, but the Firestick Pico is an entry-level product that offloads just the firewall functionality. To this end, hardware and software functionality is cut down to the minimum. For instance, the Firestick Pico is powered by a 312MHz processor compared to a 520MHz part on Yoggie’s other products. It also includes 32MB of SDRAM and 32MB of NAND Flash compared to 128MB on the more advanced products, and has 4MB NOR Flash rather than 8MB. It terms of core features it lacks IDS, IPS, antivirus, anti-spam and anti-spyware protection. You can also forget about content filtering, a VPN client, remote centralised management, adaptive security policy and a multi-layer security agent — options found on most of Yoggie’s other Pico products.

    Operating the Firestick Pico is simple. What's so great about the device is that little management is needed. Before any data is accepted for processing by your notebook's operating system, a low-level driver redirects it to Firestick Pico, where a full security check is performed. Security breach attempts are identified and thwarted, and only secure data is passed back to your notebook. In other words, security management is all done transparently, leaving you to get on with your work.

    Security updates are even silently downloaded from the manufacturer. For those who like to get their hands dirty, a web-based management console provides status information, security logs and reports (nice graphics included), and is also used to configure settings. A couple of LEDs on the unit itself provide visual feedback when a security event occurs and when updates are being downloaded, as well as when the device is powered and operating.

    The Firestick Pico comes with a web-based management console that provides status information, security logs and reports.

    Yoggie’s Firestick Pico is an entry-level hardware solution that's an excellent replacement for a software-based firewall. With the Firestick Pico, mobile professionals can connect to any unsecured hotspot, secure in the knowledge that they're relatively well protected. Having said that, its features aren’t as comprehensive as Yoggie’s other USB devices.

     

    Published: February 25, 2008 -- 09:31 GMT (01:31 PST)

    Caption by: Christian Harris

  • yoggiefsproi2.jpg

    Published: February 25, 2008 -- 09:31 GMT (01:31 PST)

    Caption by: Christian Harris

  • yoggiefsproi3.gif

    Published: February 25, 2008 -- 09:31 GMT (01:31 PST)

    Caption by: Christian Harris

  • yoggiefsproi4.gif

    Published: February 25, 2008 -- 09:31 GMT (01:31 PST)

    Caption by: Christian Harris

1 of 5 NEXT PREV
Christian Harris

By Christian Harris | February 25, 2008 -- 09:31 GMT (01:31 PST) | Topic: Hardware

  • yoggiefsproi1.jpg
  • yoggiefsprostick.jpg
  • yoggiefsproi2.jpg
  • yoggiefsproi3.gif
  • yoggiefsproi4.gif

Notebooks don’t generally enjoy the same protection levels as systems residing behind the company firewall, where computers are shielded from outside threats by hardware-based security complete with the latest updates and security policies. As soon as a notebook leaves the network, it's a security risk, the level of which depends on whether the mobile user downloads the latest updates and security policies. As a result, infected notebooks could infiltrate security threats into the network on their return from the field.

Read More Read Less

Published: February 25, 2008 -- 09:31 GMT (01:31 PST)

Caption by: Christian Harris

1 of 5 NEXT PREV

Related Topics:

Hardware Reviews PCs Servers Storage Networking
Christian Harris

By Christian Harris | February 25, 2008 -- 09:31 GMT (01:31 PST) | Topic: Hardware

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • First look: Apple's 'Spring Loaded' event [pictures]

    Here's a peek at the products making an appearance at Apple's first big launch event of 2021.

  • Jelly crimps

    They're dead easy to use. You cut the cable, poke the ends in all the way (no need to strip the insulation), and squeeze the button to snap them down and bite through the cable. ...

  • LinkOn 112W high-power USB-C car charger

    In total, this car charger -- which fits easily into the palm of your hand -- can output a total of 112.5W.

  • Tex Energy Infinite Air portable wind turbine

    This tiny package can output that at 5V at 1.5-2 amps, which is enough to charge things lime smartphones, action cameras, and even drone batteries.

  • OnePlus 9 Pro, Xiaomi Redmi Note 10 Pro, HP ZBook Create G7, and more: ZDNet's reviews roundup

    From the latest OnePlus phones to a slew of laptops and a neat portable speaker, here's the hardware our reviewers tested during March.

  • Dangerous extension cords

    Extension cords seem like a safe place to save a few dollars by buying something cheaper. Don't!

  • When phone brands meet photo brands

    The combinations of companies known for imaging excellence and those known for covering every base in a smartphone can be a picture perfect match or ruined exposure. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums