Tag: Network Security

Hacktivism: How to stay one step ahead of this troublesome trend

Organizations need to be aware of the changing landscape of non-violent political expression. Socially minded hackers worldwide have expressed themselves in a variety of ways, from attacks against government websites to simple twitter hacks of celebrities to sending unintended endorsements of a political view or vote

Astaro Security Gateway Public Beta 8.300

The public Beta of Astaro Security Gateway 8.300 has begun! During the next few weeks, you can test our upcoming release and try out new features early. 8.300 introduces BGP Routing, Amazon Machine Images (to run ASG in the Amazon Elastic Computing Cloud), an Amazon Virtual Private Cloud (VPC) connector, support for a new Wireless AP50 product, and the ability to create site-to-site VPN's between ASG installations using our RED tunnel technology. This and more is ready for you to see! Read on for the rest of the details and how you can participate in the beta of ASG 8.300 General Beta Information Why Participate

Networkworld Article on Network Security and ManageEngine NetFlow Analyzer

Folks, http://www.networkworld.com/community/node/79146 Recently I have read this article in NW that talks about the importance of network security and why medium and large enterprises started considering products that can offer APT. The answer to Network Security from ManageEngine is Advance Security Analysis Module

Performance tuning of NetFlow Analyzer Professional / Professional Plus Edition Made easy!.

In the older version of NetFlow Analyzer if the product faces performance related issue, tuning the product took long time and the downtime of the product was about 15 to 20 minutes by following the steps mentioned here . In the Newer version of NetFlow Analyzer version 9.5 build 9500, this tuning steps is made easy. Now you can tune the product in the User Interface.

Making sense of log management

Bringing together all your information to make better decisions. Firewalls, routers, intrusion prevention systems, web content filters, mail gateways, application servers, authentication servers, host-based intrusion prevention, end point client software. The list of devices and applications that generate security logs already seems endless, and yet the list continues to grow as new security tools are used in response to the ever-evolving threat landscape.

Astaro enters Cloud Security Alliance

Astaro recently joined the Cloud Security Alliance(CSA) along with Sophos and is now looking into further cooperation and speaking opportunities with the group. The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.