User-Defined Groups are ideal for use as “white lists” or black lists”. While they can be manually created, do you really have the time
Hacktivism: How to stay one step ahead of this troublesome trend
Organizations need to be aware of the changing landscape of non-violent political expression. Socially minded hackers worldwide have expressed themselves in a variety of ways, from attacks against government websites to simple twitter hacks of celebrities to sending unintended endorsements of a political view or vote
Astaro Security Gateway Public Beta 8.300
The public Beta of Astaro Security Gateway 8.300 has begun! During the next few weeks, you can test our upcoming release and try out new features early. 8.300 introduces BGP Routing, Amazon Machine Images (to run ASG in the Amazon Elastic Computing Cloud), an Amazon Virtual Private Cloud (VPC) connector, support for a new Wireless AP50 product, and the ability to create site-to-site VPN's between ASG installations using our RED tunnel technology. This and more is ready for you to see! Read on for the rest of the details and how you can participate in the beta of ASG 8.300 General Beta Information Why Participate
Role-based access control for device configurations, key for ensuring network security
The configurations of network devices are crucial from the standpoint of network security. The configurations contain sensitive information such as access credentials, SNMP settings, ACLs and others
Networkworld Article on Network Security and ManageEngine NetFlow Analyzer
Folks, http://www.networkworld.com/community/node/79146 Recently I have read this article in NW that talks about the importance of network security and why medium and large enterprises started considering products that can offer APT. The answer to Network Security from ManageEngine is Advance Security Analysis Module
Performance tuning of NetFlow Analyzer Professional / Professional Plus Edition Made easy!.
In the older version of NetFlow Analyzer if the product faces performance related issue, tuning the product took long time and the downtime of the product was about 15 to 20 minutes by following the steps mentioned here . In the Newer version of NetFlow Analyzer version 9.5 build 9500, this tuning steps is made easy. Now you can tune the product in the User Interface.
Fortinet Wireless LANs
Fortinet WiFi solutions offer a scalable approach to 802.11n wireless deployments, all while helping you meet PCI DSS compliance, and serve legacy clients with a full range of authentication.
Security Minute October, 2011
In this month’s Security Minute, Fortinet senior security strategist, Derek Manky, discusses new spam techniques that are luring users to click on malicious links and a new Android malware variant that has many of the destructive capabilities found on today’s infected PCs.
Making sense of log management
Bringing together all your information to make better decisions. Firewalls, routers, intrusion prevention systems, web content filters, mail gateways, application servers, authentication servers, host-based intrusion prevention, end point client software. The list of devices and applications that generate security logs already seems endless, and yet the list continues to grow as new security tools are used in response to the ever-evolving threat landscape.
Astaro enters Cloud Security Alliance
Astaro recently joined the Cloud Security Alliance(CSA) along with Sophos and is now looking into further cooperation and speaking opportunities with the group. The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.