Continuing our approach of developing a more comprehensive approach to protecting company networks, we will add solutions for Next Generation Firewalling, Log Management and Data Leakage Prevention to our portfolio. Network configurations and the threat landscape have become increasingly complex, making it necessary for organizations to consolidate their IT security.
Astaro at the RSA – live and in color!
The RSA Conference in San Francisco is the event where we decided to exclusively unveil our new innovations for 2011: Astaro Next Generation Firewall, Astaro Endpoint Security and Astaro Log Management. Interest at the Astaro booth (#2251) has so far been overwhelming and we hope that it continues to be so. We have set up a live stream, so you can see how much is going on for yourself
With new acquisitions UTM major Astaro can take on Pointsec, Aladdin and Utimaco
At a time when Germany’s UTM (Unified Threat Management) appliance major Astaro has intensified its operations across the globe including India, the acquisitions of two of Europe’s leading security companies, Romania’s ‘CoSoSys’ and Denmark-based ‘InspektOnline’ by it has paved the way for the emergence of yet another holistic security firm. Read more from India's Digital Edge article here
IPS Pattern Updates
The Microsoft Active Protections Program (MAPP) is a program for security software providers. Members of MAPP receive security vulnerability information from the Microsoft Security Response Center (MSRC) in advance of Microsoft’s monthly security update. By sharing vulnerability information prior to the public release of a security update, Microsoft enables security software providers who operate at the application and network layer to offer protection to our mutual customers in a timely manner. This means, Astaro as a MAPP partner receives vulnerability information earlier. We can provide updated patterns for our Intrusion Prevention Systems (IPS) at the same moment as Microsoft releases their patches. Before the launch of MAPP, security software providers had to wait until the public release of a security update before building protections. December Microsoft Advisory: Applicable Rules: MS10-090 3:18197 3:18198 3:18199 3:18216 3:18217 3:18218 3:18221 MS10-091 3:18219 3:18220 3:18233 MS10-092 Not Applicable MS10-093 3:18210 3:18211 MS10-094 3:18222 3:18223 3:18224 3:18225 3:18226 3:18227 MS10-095 3:18208 3:18209 MS10-096 3:18204 3:18205 3:18206 3:18207 MS10-097 3:18202 3:18203 MS10-098 Not Applicable MS10-099 Not Applicable MS10-100 Not Applicable MS10-101 3:18215 MS10-102 Not Applicable MS10-103 3:18212 3:18213 3:18214 3:18230 3:18231 MS10-104 3:18238 MS10-105 3:18200 3:18201 3:18229 3:18235 3:18236 3:18237 MS10-106 Not Applicable November Microsoft Advisory: Applicable Rules: MS10-087 3:18063 3:18067 3:18068 3:18069 MS10-088 3:18065 3:18066 MS10-089 3:18070 3:18071 3:18072 3:18073 3:18074 3:18076 October Microsoft Advisory: Applicable Rules: MS10-071 3:17766 3:17767 3:17768 3:17769 3:17770 3:17771 3:17772 3:17774 MS10-072 3:17766 3:17767 MS10-073 Not Applicable MS10-074 Not Applicable MS10-075 3:17753 MS10-076 3:17747 MS10-077 3:18064 MS10-078 3:17752 3:17765 MS10-079 3:17754 3:17755 3:17756 MS10-080 3:17757 3:17758 3:17759 3:17760 3:17761 3:17762 3:17763 3:17764 MS10-081 Not Applicable MS10-082 Not Applicable MS10-083 3:17773 MS10-084 Not Applicable MS10-085 3:17750 MS10-086 September Microsoft Advisory: Applicable Rules: MS10-061 3:17252 3:17253 MS10-062 3:17242 MS10-063 3:17256 MS10-064 3:17251 MS10-065 1:17103 3:17254 3:17255 MS10-066 Not Applicable MS10-067 3:17250 MS10-068 3:17249 MS10-069 Not Applicable MS10-070 3:17428 3:17429 August Microsoft Advisory: Applicable Rules: MS10-046 1:17042 1:17043 MS10-047 Not Applicable MS10-048 Not Applicable MS10-049 Not Applicable MS10-050 3:17135 MS10-051 3:17133 MS10-052 3:17117 MS10-053 3:17115 3:17129 3:17130 3:17131 3:17132 3:17136 MS10-054 3:16577 3:17125 3:17126 3:17127 MS10-055 3:17128 MS10-056 3:17119 3:17120 3:17121 3:17122 3:17123 3:17124 MS10-057 3:17134 MS10-058 Not Applicable MS10-059 Not Applicable MS10-060 3:17114 3:17118 July Microsoft Advisory: Applicable Rules: MS10-042 Not Applicable MS10-043 3:16222 MS10-044 3:17037 3:17038 3:17039 MS10-045 3:17034 3:17035 3:17036 June Microsoft Advisory: Applicable Rules: MS10-032 Not Applicable MS10-033 3:16661 3:16663 MS10-034 1:16635 MS10-035 3:16637 3:16658 3:16659 MS10-036 Not Applicable MS10-037 Not Applicable MS10-038 3:16638 3:16639 3:16640 3:16641 3:16643 3:16644 3:16645 3:16646 3:16647 3:16648 3:16649 3:16650 3:16651 3:16652 3:16653 3:16654 3:16655 3:16656 3:16657 3:16662 MS10-039 3:16560 3:16660 MS10-040 Not Applicable MS10-041 3:16636 May Microsoft Advisory: Applicable Rules: MS10-030 3:16595 MS10-031 3:16593 April Microsoft Advisory: Applicable Rules: MS10-019 3:16530 MS10-020 3:16531 3:16532 3:16539 3:16540 1:16287 1:16453 1:16454 MS10-021 Not Applicable MS10-022 Not Applicable MS10-023 3:16542 MS10-024 3:16534 MS10-025 3:16541 MS10-026 3:16543 MS10-027 3:16537 MS10-028 3:16535 3:16536 MS10-029 3:16533 March Microsoft Advisory: Applicable Rules: MS10-016 3:16472 MS10-017 3:16461 3:16462 3:16463 3:16464 3:16465 3:16466 3:16467 3:16468 3:16469 3:16470 3:16471 MS10-018 3:16503 3:16504 3:16506 3:16507 3:16508 3:16509 3:16510 3:16511 3:16512 February Microsoft Advisory: Applicable Rules: MS10-003 3:16416 MS10-004 3:16409 3:16410 3:16411 3:16412 3:16413 3:16421 MS10-005 3:16422 MS10-006 3:16417 3:16418 MS10-007 3:16414 MS10-008 3:16419 3:16420 MS10-009 3:16405 3:16408 MS10-010 Not Applicable MS10-011 Not Applicable MS10-012 3:15009 3:15124 3:15453 3:15847 3:16395 3:16396 3:16397 3:16398 3:16399 3:16400 3:16401 3:16402 3:16403 3:16404 MS10-013 3:16415 MS10-014 3:16394 MS10-015 Not Applicable January Microsoft Advisory: Applicable Rules: MS10-001 3:16366 MS10-002 3:16367 3:16369 READ MORE
What differentiates an archive from a backup?
Even though both terms seem clear – at least in IT – they still get mixed up from time to time.
Up2Date 8.101 Released
Following the release of the 8.100 GA last week, we have released 8.101 with some final tweaks and fixes. This release is designed to enhance the reliability and stability of your Astaro Security Gateway installation. Read on for the details regarding this Up2Date package
CeBIT invitation mail: sent!
The first CeBIT invitation mail was sent out today and the ticket requests are coming in steadily. Due to the high demand, there may be a slight delay with the send out of the respective codes – so please be patient.
Who do you trust
I have been fortunate enough to attend several Security BSides events this fall, I have seen a lot of good talks and been engaged in several great conversations. Two talks, one at BSides in Dallas/Ft. Worth and one the following week in Ottawa touched on similar issues that really resonated with me
Updated product datasheets now available!
The Astaro product datasheets have been updated. Make sure you have the latest versions! You may access the repository here: www.astaro.com/resources/product-information-pdfs .
More than 50% of all companies are vulnerable to lose important e-mails
The American Association for Information and Image Management (AIIM) published an interesting survey. It was conducted among 629 members and revealed a disastrous mindset when handling e-mails in many companies. 26 percent of all companies questioned delete EVERY e-mail and do not ensure they retain it neither for the legally defined period nor for the simple benefit of keeping knowledge and information