Tag: construction

Astaro Security Gateway Up2Date 8.202 Released

Today we have released ASG 8.202 to increase performance in many areas, especially for the Web Filtering engine.  This release addresses the majority of the issues reported by users of 8.200/8.201, and greatly enhances the stability of your Astaro Security Gateway V8.2 installation.

3 reasons that make mail archiving a priority

Welcome to our new blog series on e-mail archiving! E-mail systems are not designed to manage huge volumes of data, and yet they are forced to do so by an ever growing e-mail flood. In real terms, this leads to mail server capacity problems. As a result, servers may become slow and unstable and ordinary maintenance routines can take a disproportionate amount of time – or users are forced to limit their e-mail volume and thus store their e-mails in PST-files

Sophos Broadens Security Portfolio with Completion of Astaro Acquisition

Global IT security and data protection company Sophos today announced that it has completed its acquisition of network security vendor Astaro . This acquisition will allow Sophos to deliver coordinated, best-in- class threat and data protection offerings from every endpoint to any network boundary. Organizations today face new challenges in protecting users and IT infrastructure from complex and targeted security threats; especially those that gain entry from across the Web or through new applications.

Sophos to Acquire Astaro to Meet Demand for Complete, Layered Security Protection

Sophos, a global security leader, today announced it has entered into an agreement to acquire Astaro, a privately held provider of network security solutions, headquartered in Wilmington, Massachusetts, USA and Karlsruhe, Germany. Businesses today face unprecedented challenges in protecting users and IT infrastructure from escalating complex security threats, especially those brought on by more mobile, roaming users, new application protocols, and distributed networks. There is a widening security gap for companies given the new rules by which users, businesses and IT operate and this acquisition answers unmet customer needs for better security coordination and effectiveness between users, applications and IT infrastructure.