Astaro would like to invite you to join us in testing our next major version of our Security Gateway product.
Up2date 7.503 Released
We are in the process of delivering Up2Date 7.503 to our installations. It will appear soon for installation via your WebAdmin.
New Zero-Day exploit – Astaro blocks that!
Dan Goodwin recently reported that a new Internet Explorer exploit has been released into the wild .
Astaro featured on MSPTV
On January 15th, Business Solutions magazine hosted a webinar featuring Jim Roddy, Business Solutions, president and Gennifer Biggs, security storage and managed services editor. The webinar, titled: ” Products To Leverage For Your Own Economic Recovery “, discussed pitfalls to avoid in the economic recovery, product financing support for IT companies ramping up for the recovery and basic business advice for 2010. The webinar featured a guest speaker, Astaro partner Dean Wescott, CMO of Kincaid Network Solutions.
Programs learn to play in their own sandbox
Among all of the New Year's normal ebb and flow, predictions for the upcoming year are ubiquitous. More than a couple of these predictions proclaim that 2010 will be “The Year of the Sandbox”.
Basic Security tips part 3 – update your software
It has become more and more difficult to identify malicious links and content on the Internet. URL shortners, ads on legitimate websites , virus downloads posing as anti-virus software and of course fake e-cards all make it harder to know where you should and should not click Having a strong network security product in place will of course prevent the installation of malicious code on our computer even if you click on one of these links
Why Retail and Consumer Goods Organizations Need Security
Retail, wholesale and consumer goods organizations face unique security challenges. Each new transaction adds information into the organization's database that can be stolen.
You wouldn’t buy a car without test driving it first – would you?
As we get closer and closer to the end of 2009 businesses are beginning to reevaluate their security products. When evaluating products most companies have a clear picture of the features they want. So they look for products that offer those features.
Having your computer compromised could cost more than your personal information
At this point most people who use the web understand what can happen if their computer is infected by a virus, spyware or other malicious content.
Partnering with the right tech companies for success in 2010
According to a recent survey done by TechTarget, 2010 IT budgets are expected to be 2% less than they were in 2009. This is the first time in approximately 10 years that TechTarget has reported a decrease in IT spending.