Tag: government

Introducing Three New IT Security Products for 2011

Continuing our approach of developing a more comprehensive approach to protecting company networks, we will add solutions for Next Generation Firewalling, Log Management and Data Leakage Prevention to our portfolio. Network configurations and the threat landscape have become increasingly complex, making it necessary for organizations to consolidate their IT security.

Astaro at the RSA – live and in color!

The RSA Conference in San Francisco is the event where we decided to exclusively unveil our new innovations for 2011: Astaro Next Generation Firewall, Astaro Endpoint Security and Astaro Log Management. Interest at the Astaro booth (#2251) has so far been overwhelming and we hope that it continues to be so. We have set up a live stream, so you can see how much is going on for yourself

Up2Date 8.102 Released

We have released Up2Date 8.102 today for all ASG installations. This Up2Date is a stability release designed to enhance the reliability of your Astaro Security Gateway. Tomorrow, we plan to issue new ISO images along with brand new Virtual Appliances for VMware which use the vSphere 4 architecture, followed by updated ISO's for the Astaro Smart Installer.

IPS Pattern Updates

The Microsoft Active Protections Program (MAPP) is a program for security software providers.  Members of MAPP receive security vulnerability information from the Microsoft Security Response Center (MSRC) in advance of Microsoft’s monthly security update. By sharing vulnerability information prior to the public release of a security update, Microsoft enables security software providers who operate at the application and network layer to offer protection to our mutual customers in a timely manner.  This means, Astaro as a MAPP partner receives vulnerability information earlier. We can provide updated patterns for our Intrusion Prevention Systems (IPS) at the same moment as Microsoft releases their patches. Before the launch of MAPP, security software providers had to wait until the public release of a security update before building protections.  December     Microsoft Advisory: Applicable Rules: MS10-090 3:18197 3:18198 3:18199 3:18216 3:18217 3:18218 3:18221 MS10-091 3:18219 3:18220 3:18233 MS10-092 Not Applicable MS10-093 3:18210 3:18211 MS10-094 3:18222 3:18223 3:18224 3:18225 3:18226 3:18227 MS10-095 3:18208 3:18209 MS10-096 3:18204 3:18205 3:18206 3:18207 MS10-097 3:18202 3:18203 MS10-098 Not Applicable MS10-099 Not Applicable MS10-100 Not Applicable MS10-101 3:18215 MS10-102 Not Applicable MS10-103 3:18212 3:18213 3:18214 3:18230 3:18231 MS10-104 3:18238 MS10-105 3:18200 3:18201 3:18229 3:18235 3:18236 3:18237 MS10-106 Not Applicable November     Microsoft Advisory: Applicable Rules: MS10-087 3:18063 3:18067 3:18068 3:18069 MS10-088 3:18065 3:18066 MS10-089 3:18070 3:18071 3:18072 3:18073 3:18074 3:18076 October     Microsoft Advisory: Applicable Rules: MS10-071 3:17766 3:17767 3:17768 3:17769 3:17770 3:17771 3:17772 3:17774 MS10-072 3:17766 3:17767 MS10-073 Not Applicable MS10-074 Not Applicable MS10-075 3:17753 MS10-076 3:17747 MS10-077 3:18064 MS10-078 3:17752 3:17765 MS10-079 3:17754 3:17755 3:17756 MS10-080 3:17757 3:17758 3:17759 3:17760 3:17761 3:17762 3:17763 3:17764 MS10-081 Not Applicable MS10-082 Not Applicable MS10-083 3:17773 MS10-084 Not Applicable MS10-085 3:17750 MS10-086   September     Microsoft Advisory: Applicable Rules: MS10-061 3:17252 3:17253 MS10-062 3:17242 MS10-063 3:17256 MS10-064 3:17251 MS10-065 1:17103 3:17254 3:17255 MS10-066 Not Applicable MS10-067 3:17250 MS10-068 3:17249 MS10-069 Not Applicable MS10-070 3:17428 3:17429 August     Microsoft Advisory: Applicable Rules: MS10-046 1:17042 1:17043 MS10-047 Not Applicable MS10-048 Not Applicable MS10-049 Not Applicable MS10-050 3:17135 MS10-051 3:17133 MS10-052 3:17117 MS10-053 3:17115 3:17129 3:17130 3:17131 3:17132 3:17136 MS10-054 3:16577 3:17125 3:17126 3:17127 MS10-055 3:17128 MS10-056 3:17119 3:17120 3:17121 3:17122 3:17123 3:17124 MS10-057 3:17134 MS10-058 Not Applicable MS10-059 Not Applicable MS10-060 3:17114 3:17118 July     Microsoft Advisory: Applicable Rules: MS10-042 Not Applicable MS10-043 3:16222 MS10-044 3:17037 3:17038 3:17039 MS10-045 3:17034 3:17035 3:17036 June     Microsoft Advisory: Applicable Rules: MS10-032 Not Applicable MS10-033 3:16661 3:16663 MS10-034 1:16635 MS10-035 3:16637 3:16658 3:16659 MS10-036 Not Applicable MS10-037 Not Applicable MS10-038 3:16638 3:16639 3:16640 3:16641 3:16643 3:16644 3:16645 3:16646 3:16647 3:16648 3:16649 3:16650 3:16651 3:16652 3:16653 3:16654 3:16655 3:16656 3:16657 3:16662 MS10-039 3:16560 3:16660 MS10-040 Not Applicable MS10-041 3:16636 May     Microsoft Advisory: Applicable Rules: MS10-030 3:16595 MS10-031 3:16593 April     Microsoft Advisory: Applicable Rules: MS10-019 3:16530 MS10-020 3:16531 3:16532 3:16539 3:16540 1:16287 1:16453 1:16454 MS10-021 Not Applicable MS10-022 Not Applicable MS10-023 3:16542 MS10-024 3:16534 MS10-025 3:16541 MS10-026 3:16543 MS10-027 3:16537 MS10-028 3:16535 3:16536 MS10-029 3:16533 March     Microsoft Advisory: Applicable Rules: MS10-016 3:16472 MS10-017 3:16461 3:16462 3:16463 3:16464 3:16465 3:16466 3:16467 3:16468 3:16469 3:16470 3:16471 MS10-018 3:16503 3:16504 3:16506 3:16507 3:16508 3:16509 3:16510 3:16511 3:16512 February     Microsoft Advisory: Applicable Rules: MS10-003 3:16416 MS10-004 3:16409 3:16410 3:16411 3:16412 3:16413 3:16421 MS10-005 3:16422 MS10-006 3:16417 3:16418 MS10-007 3:16414 MS10-008 3:16419 3:16420 MS10-009 3:16405 3:16408 MS10-010 Not Applicable MS10-011 Not Applicable MS10-012 3:15009 3:15124 3:15453 3:15847 3:16395 3:16396 3:16397 3:16398 3:16399 3:16400 3:16401 3:16402 3:16403 3:16404 MS10-013 3:16415 MS10-014 3:16394 MS10-015 Not Applicable January     Microsoft Advisory: Applicable Rules: MS10-001 3:16366 MS10-002 3:16367 3:16369     READ MORE

3 reasons why you need to archive your company e-mails

There are three good reasons for introducing an e-mail archiving solution: Mail server offloading – especially relevant for IT administrators, but also for users suffering from mailbox quotas Instant discovery – the ability to discover e-mails and attachments within seconds Compliance – archiving e-mails is a legal requirement in many countries In my experience, searching for old e-mails can be a hard task. I am always afraid to delete any e-mail as I might need it in the future and thus have collected many over the years

Who do you trust

I have been fortunate enough to attend several Security BSides events this fall, I have seen a lot of good talks and been engaged in several great conversations. Two talks, one at BSides in Dallas/Ft. Worth and one the following week in Ottawa touched on similar issues that really resonated with me

More than 50% of all companies are vulnerable to lose important e-mails

The American Association for Information and Image Management (AIIM) published an interesting survey. It was conducted among 629 members and revealed a disastrous mindset when handling e-mails in many companies. 26 percent of all companies questioned delete EVERY e-mail and do not ensure they retain it neither for the legally defined period nor for the simple benefit of keeping knowledge and information

Up2Date 7.509 Released

A few security vulnerabilities have been posted which require us to make an update to our V7 installations. Since we do not put our users at extended risk by following a scheduled update window, we are releasing this special Up2Date immediately. This V7.509 Up2date is soley issued in order to patch two components, and no new features are introduced

Make your own choice!

Blocking access to certain resources in the internet is always a controversial topic. Usually there are good reasons to do so: Security and productivity are the most important ones. Within the Astaro Security Gateway (the Astaro flagship product) come efficient but granular policies that restrict or allow access to network resources.