Category: Firewalls

Making sense of log management

Bringing together all your information to make better decisions. Firewalls, routers, intrusion prevention systems, web content filters, mail gateways, application servers, authentication servers, host-based intrusion prevention, end point client software. The list of devices and applications that generate security logs already seems endless, and yet the list continues to grow as new security tools are used in response to the ever-evolving threat landscape.

Astaro enters Cloud Security Alliance

Astaro recently joined the Cloud Security Alliance(CSA) along with Sophos and is now looking into further cooperation and speaking opportunities with the group. The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.