Tag: antivirus

Five Security Resolutions for 2012

As 2011 comes to a close and we prepare to usher in a new year it is time to reflect on transgressions from the past 12 months and on how we can better ourselves in the coming year. In addition to making resolutions to lose weight or exercise more, we at Astaro, Sophos Network Security, urge you to consider committing to resolutions that will help secure your personal and business networks

Konnichiwa! – Japanese Website Available

Once again we have expanded the language sphere of our website! From now on Japanese visitors can get information about the complete Astaro portfolio and the company itself in their native language. So if you are Japanese or just want to get an interesting new optical approach to our products you can view the new site here: www.astaro.com/ja-jp Furthermore, the new Japanes datasheets can be found here: http://www.astaro.com/ja-jp/resources/datasheets READ MORE

Hacktivism: How to stay one step ahead of this troublesome trend

Organizations need to be aware of the changing landscape of non-violent political expression. Socially minded hackers worldwide have expressed themselves in a variety of ways, from attacks against government websites to simple twitter hacks of celebrities to sending unintended endorsements of a political view or vote

Astaro Security Gateway Public Beta 8.300

The public Beta of Astaro Security Gateway 8.300 has begun! During the next few weeks, you can test our upcoming release and try out new features early. 8.300 introduces BGP Routing, Amazon Machine Images (to run ASG in the Amazon Elastic Computing Cloud), an Amazon Virtual Private Cloud (VPC) connector, support for a new Wireless AP50 product, and the ability to create site-to-site VPN's between ASG installations using our RED tunnel technology. This and more is ready for you to see! Read on for the rest of the details and how you can participate in the beta of ASG 8.300 General Beta Information Why Participate

Making sense of log management

Bringing together all your information to make better decisions. Firewalls, routers, intrusion prevention systems, web content filters, mail gateways, application servers, authentication servers, host-based intrusion prevention, end point client software. The list of devices and applications that generate security logs already seems endless, and yet the list continues to grow as new security tools are used in response to the ever-evolving threat landscape.