Tag: events

Introducing Three New IT Security Products for 2011

Continuing our approach of developing a more comprehensive approach to protecting company networks, we will add solutions for Next Generation Firewalling, Log Management and Data Leakage Prevention to our portfolio. Network configurations and the threat landscape have become increasingly complex, making it necessary for organizations to consolidate their IT security.

Astaro at the RSA – live and in color!

The RSA Conference in San Francisco is the event where we decided to exclusively unveil our new innovations for 2011: Astaro Next Generation Firewall, Astaro Endpoint Security and Astaro Log Management. Interest at the Astaro booth (#2251) has so far been overwhelming and we hope that it continues to be so. We have set up a live stream, so you can see how much is going on for yourself

With new acquisitions UTM major Astaro can take on Pointsec, Aladdin and Utimaco

At a time when Germany’s UTM (Unified Threat Management) appliance major Astaro has intensified its operations across the globe including India, the acquisitions of two of Europe’s leading security companies, Romania’s ‘CoSoSys’ and Denmark-based ‘InspektOnline’ by it has paved the way for the emergence of yet another holistic security firm. Read more from India's Digital Edge article here

IPS Pattern Updates

The Microsoft Active Protections Program (MAPP) is a program for security software providers.  Members of MAPP receive security vulnerability information from the Microsoft Security Response Center (MSRC) in advance of Microsoft’s monthly security update. By sharing vulnerability information prior to the public release of a security update, Microsoft enables security software providers who operate at the application and network layer to offer protection to our mutual customers in a timely manner.  This means, Astaro as a MAPP partner receives vulnerability information earlier. We can provide updated patterns for our Intrusion Prevention Systems (IPS) at the same moment as Microsoft releases their patches. Before the launch of MAPP, security software providers had to wait until the public release of a security update before building protections.  December     Microsoft Advisory: Applicable Rules: MS10-090 3:18197 3:18198 3:18199 3:18216 3:18217 3:18218 3:18221 MS10-091 3:18219 3:18220 3:18233 MS10-092 Not Applicable MS10-093 3:18210 3:18211 MS10-094 3:18222 3:18223 3:18224 3:18225 3:18226 3:18227 MS10-095 3:18208 3:18209 MS10-096 3:18204 3:18205 3:18206 3:18207 MS10-097 3:18202 3:18203 MS10-098 Not Applicable MS10-099 Not Applicable MS10-100 Not Applicable MS10-101 3:18215 MS10-102 Not Applicable MS10-103 3:18212 3:18213 3:18214 3:18230 3:18231 MS10-104 3:18238 MS10-105 3:18200 3:18201 3:18229 3:18235 3:18236 3:18237 MS10-106 Not Applicable November     Microsoft Advisory: Applicable Rules: MS10-087 3:18063 3:18067 3:18068 3:18069 MS10-088 3:18065 3:18066 MS10-089 3:18070 3:18071 3:18072 3:18073 3:18074 3:18076 October     Microsoft Advisory: Applicable Rules: MS10-071 3:17766 3:17767 3:17768 3:17769 3:17770 3:17771 3:17772 3:17774 MS10-072 3:17766 3:17767 MS10-073 Not Applicable MS10-074 Not Applicable MS10-075 3:17753 MS10-076 3:17747 MS10-077 3:18064 MS10-078 3:17752 3:17765 MS10-079 3:17754 3:17755 3:17756 MS10-080 3:17757 3:17758 3:17759 3:17760 3:17761 3:17762 3:17763 3:17764 MS10-081 Not Applicable MS10-082 Not Applicable MS10-083 3:17773 MS10-084 Not Applicable MS10-085 3:17750 MS10-086   September     Microsoft Advisory: Applicable Rules: MS10-061 3:17252 3:17253 MS10-062 3:17242 MS10-063 3:17256 MS10-064 3:17251 MS10-065 1:17103 3:17254 3:17255 MS10-066 Not Applicable MS10-067 3:17250 MS10-068 3:17249 MS10-069 Not Applicable MS10-070 3:17428 3:17429 August     Microsoft Advisory: Applicable Rules: MS10-046 1:17042 1:17043 MS10-047 Not Applicable MS10-048 Not Applicable MS10-049 Not Applicable MS10-050 3:17135 MS10-051 3:17133 MS10-052 3:17117 MS10-053 3:17115 3:17129 3:17130 3:17131 3:17132 3:17136 MS10-054 3:16577 3:17125 3:17126 3:17127 MS10-055 3:17128 MS10-056 3:17119 3:17120 3:17121 3:17122 3:17123 3:17124 MS10-057 3:17134 MS10-058 Not Applicable MS10-059 Not Applicable MS10-060 3:17114 3:17118 July     Microsoft Advisory: Applicable Rules: MS10-042 Not Applicable MS10-043 3:16222 MS10-044 3:17037 3:17038 3:17039 MS10-045 3:17034 3:17035 3:17036 June     Microsoft Advisory: Applicable Rules: MS10-032 Not Applicable MS10-033 3:16661 3:16663 MS10-034 1:16635 MS10-035 3:16637 3:16658 3:16659 MS10-036 Not Applicable MS10-037 Not Applicable MS10-038 3:16638 3:16639 3:16640 3:16641 3:16643 3:16644 3:16645 3:16646 3:16647 3:16648 3:16649 3:16650 3:16651 3:16652 3:16653 3:16654 3:16655 3:16656 3:16657 3:16662 MS10-039 3:16560 3:16660 MS10-040 Not Applicable MS10-041 3:16636 May     Microsoft Advisory: Applicable Rules: MS10-030 3:16595 MS10-031 3:16593 April     Microsoft Advisory: Applicable Rules: MS10-019 3:16530 MS10-020 3:16531 3:16532 3:16539 3:16540 1:16287 1:16453 1:16454 MS10-021 Not Applicable MS10-022 Not Applicable MS10-023 3:16542 MS10-024 3:16534 MS10-025 3:16541 MS10-026 3:16543 MS10-027 3:16537 MS10-028 3:16535 3:16536 MS10-029 3:16533 March     Microsoft Advisory: Applicable Rules: MS10-016 3:16472 MS10-017 3:16461 3:16462 3:16463 3:16464 3:16465 3:16466 3:16467 3:16468 3:16469 3:16470 3:16471 MS10-018 3:16503 3:16504 3:16506 3:16507 3:16508 3:16509 3:16510 3:16511 3:16512 February     Microsoft Advisory: Applicable Rules: MS10-003 3:16416 MS10-004 3:16409 3:16410 3:16411 3:16412 3:16413 3:16421 MS10-005 3:16422 MS10-006 3:16417 3:16418 MS10-007 3:16414 MS10-008 3:16419 3:16420 MS10-009 3:16405 3:16408 MS10-010 Not Applicable MS10-011 Not Applicable MS10-012 3:15009 3:15124 3:15453 3:15847 3:16395 3:16396 3:16397 3:16398 3:16399 3:16400 3:16401 3:16402 3:16403 3:16404 MS10-013 3:16415 MS10-014 3:16394 MS10-015 Not Applicable January     Microsoft Advisory: Applicable Rules: MS10-001 3:16366 MS10-002 3:16367 3:16369     READ MORE

Who do you trust

I have been fortunate enough to attend several Security BSides events this fall, I have seen a lot of good talks and been engaged in several great conversations. Two talks, one at BSides in Dallas/Ft. Worth and one the following week in Ottawa touched on similar issues that really resonated with me

More than 50% of all companies are vulnerable to lose important e-mails

The American Association for Information and Image Management (AIIM) published an interesting survey. It was conducted among 629 members and revealed a disastrous mindset when handling e-mails in many companies. 26 percent of all companies questioned delete EVERY e-mail and do not ensure they retain it neither for the legally defined period nor for the simple benefit of keeping knowledge and information