I listen to NPR basically every time I'm in the car. Normally this gives me an ok sense as to what the rest of the world is thinking about. One show I am able to listen to regularly is “On Point”.
ASG Beta Release #4 – Version 7.480
Hello! For those who are participating in our 7.500 Beta, we have just released the fourth iteration of the release, which is numbered 7.480. We will now being merging the code and start making it final, and you can expect a Release Candidate probably next week, barring any unexpected developments. From there, 7.500 will be made Generally Available shortly thereafter
Up2Date 7.405 Released
Greetings, In order to apply some essential security patches, we are releasing Up2Date 7.405 now. This Up2Date is purely a security update, with no other changes
Free silent business audit and forensic analysis
Last week we announced an exciting new offer for all businesses in the US – a free silent business audit with forensic analysis.
Astaro Receives VMware Ready Certifications
Astaro earned multiple VMware Ready™ certifications for its security products. Astaro Security Gateway, Astaro Mail Gateway and Astaro Web Gateway have all been certified as VMware Ready, and Astaro is the only Unified Threat Management provider to have submitted to and passed VMware Ready validation.
Choose the battlefield
PC World's Jaikumar Vijayan recently reported on the attacks against US government public information infrastructure. In the article, Karen Evans, a Bush administration Information Systems executive outlined what she thought should be fast-tracked. It includes using TICs (Trusted Internet Connections) for all public infrastructures.
Google Chrome OS and Some Words On Hype
THE HYPE With the announcement of the upcoming Google Chrome OS, Google is adding some hype to the mix. Google is boldly stating that they are “going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates.
Tips for securing your Wi-Fi Connection
Recently, NPR's “All Tech Considered” posted a very good and concise article on securing WiFi technology. I would just like to add a few key points for those that concern themselves with network security. First, when using a VPN on an un-trusted hotspot, make sure that it is a “full tunnel” VPN
Ideas are for sharing
We are rolling out a new service for our partners and customers – an improved feature request site. On this new site our partners and customers can make suggestions for improvements or request totally new functionality. Not only can visitors make their own suggestions – they can vote on the suggestions of others, giving us a better understanding of the popularity or urgency of specific network security needs
Microsoft’s DirectAccess: Reinventing VPN
As we know, Virtual Private Networking (VPN) is a technology that allows remote systems to connect to a local system in a secure manner.