This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
Company type | Private |
---|---|
Industry | Information technology Software Network security |
Founded | 2001 |
Fate | Acquired by GFI Software |
Headquarters | San Jose, California |
Key people | Mirek Kren (CEO) |
Products | Kerio Connect, Kerio Control, Kerio Operator, Samepage |
Number of employees | 200 |
Website | kerio |
Kerio Technologies, Inc. is a former technology company specializing in collaboration software and unified threat management for small and medium organizations. Founded in 1997, Kerio is headquartered in San Jose, California. [1] In January 2017, GFI Software acquired Kerio. [2] GFI Software is owned by Aurea SMB Solutions, which in turn is owned by ESW Capital Group. [3]
Kerio Technologies incorporated in 2001, but its first product WinRoute Pro entered the Internet security market in 1997, [4] as it was owned and maintained by Tiny Software until February 1, 2002. [5] Tiny Software then transferred sales and development of its software to Kerio, where the developers continued to work on it under the Kerio brand. [6]
Kerio's main products (in the early 2000s) were Kerio Personal Firewall [7] and Kerio WinRoute Firewall [8] and the company focused on collaboration software with Kerio MailServer. [9] Kerio discontinued its Personal Firewall in late 2005, which was then acquired by Sunbelt Software. [10]
Starting in 2010, Kerio MailServer was renamed to Kerio Connect [11] and Kerio WinRoute to Kerio Control. [12] Kerio introduced Kerio Operator, an IP PBX system, in 2011 [13] and Samepage, a file sharing and collaboration software, in 2013. [14]
In January 2017, Kerio was bought by GFI Software. Kerio Connect, Kerio Control, Kerio Operator and Kerio Cloud became GFI assets but Samepage was not part of the acquisition. [2]
Kerio provides IT products and services mainly in security solutions [15] which are physical devices and virtual appliance that could run on virtualization platforms such as VMware vSphere.
Kerio Control is a network security solution that manages security services and perform as Unified Threat Management such as intrusion detection and prevention (IPS), gateway antivirus, VPN, web content, application filtering and endpoint security software. [16] [17]
Kerio Connect provides email service for small and mid-sized businesses. Some of its features include security features such as SSL encryption, S/MIME and antispam. Supporting for Microsoft Outlook, and mail services IMAP and POP. [18]
3Com Corporation was an American digital electronics manufacturer best known for its computer network products. The company was co-founded in 1979 by Robert Metcalfe, Howard Charney and others. Bill Krause joined as President in 1981. Metcalfe explained the name 3Com was a contraction of "Computer Communication Compatibility", with its focus on Ethernet technology that he had co-invented, which enabled the networking of computers.
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and possibly performance in the process.
In computer security, a DMZ or demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN): an external network node can access only what is exposed in the DMZ, while the rest of the organization's network is protected behind a firewall. The DMZ functions as a small, isolated network positioned between the Internet and the private network.
Extensible Messaging and Presence Protocol is an open communication protocol designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML, it enables the near-real-time exchange of structured data between two or more network entities. Designed to be extensible, the protocol offers a multitude of applications beyond traditional IM in the broader realm of message-oriented middleware, including signalling for VoIP, video, file transfer, gaming and other uses.
A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.
In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. This technique is most commonly used to make services on a host residing on a protected or masqueraded (internal) network available to hosts on the opposite side of the gateway, by remapping the destination IP address and port number of the communication to an internal host.
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.
An application firewall is a form of firewall that controls input/output or system calls of an application or service. It operates by monitoring and blocking communications based on a configured policy, generally with predefined rule sets to choose from. The two primary categories of application firewalls are network-based and host-based.
In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It can, for example, allow private network communications to be sent across a public network, or for one network protocol to be carried over an incompatible network, through a process called encapsulation.
Imaging for Windows from Global 360 is document imaging software. Earlier versions of Imaging for Windows were available for Windows 95 OSR2, Windows 98, Windows Me, Windows NT 4.0, Windows 2000. Global360 Imaging for Windows is the upgrade to this Imaging software, which was discontinued as of Windows XP. Its image viewing, editing and scanning functions are superseded by Windows Picture and Fax Viewer and Microsoft Paint, both of which are based on GDI+ in Windows XP. However, the multi-page picture editing functions are gone with the Imaging software.
In networking, a black hole refers to a place in the network where incoming or outgoing traffic is silently discarded, without informing the source that the data did not reach its intended recipient.
Direct Push is Microsoft's technology for receiving e-mail instantly on Windows Mobile 5.0, 6.0 and 6.1 enabled devices, from Microsoft Exchange Servers, Kerio Connect and Zarafa. This service was launched primarily for business users and was supported around 2006 by about 100 operators.
Meeting Maker is a cross-platform personal calendar and group scheduling software application from PeopleCube. First released in 1991 for Macintosh by ON Technology, support for other platforms followed in 1993 with Meeting Maker XP. Alongside Windows and Mac, native clients were released for OS/2 and Solaris, and later also for other platforms. Some support was also introduced for mobile platforms like Apple Newton, PalmPilot and Windows CE. Although powerful, its user interface - aiming at uniformity across multiple platforms — was criticized as weak and not supporting all features of target platforms.
Windows 2.1 is a major release of Microsoft Windows. It was released to manufacturing on May 27, 1988, as a successor to Windows 2.0.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Scott Schreiman is an American technology executive who founded Samepage Labs Inc., a productivity and collaboration suite company in Campbell, California. Samepage Labs was acquired by Paylocity on Nov 16, 2020.
VIPRE Security Group, a brand of Ziff Davis, is a privately held cybersecurity company headquartered in New York.