Tag: Network Security

You, Us, and the Amazon Cloud

As several customers and partners have expressed their interest in our current Amazon capabilities, I'd like to take the chance to summarize our integration with Amazon and their excellent cloud services. In ASG 8.300, we added two different areas of support with Amazon Web Services (AWS) products; our solution can be run within the Amazon Elastic Computing Cloud (EC2)using a pre-built machine image provided by us, along with a dedicated Amazon Virtual Private Cloud (VPC) connector to join your ASG to your VPC with a level of ease never before possible. As a result, you then saw the business case possibilities around using RED appliances and WIFI Access Points for connecting branch offices back to products hosted within Amazon; we have shipped thousands of units in response

Network Security Breaches – What to do after?

Network uptime and bottom line go hand in hand for enterprises dependent on online sales. According to an online DoS attack cost calculator 1 , an enterprise with annual revenue of $10 Million USD, of which at least 10% comes from online sales, can lose up to $100K USD per DoS attack! The year 2011 came to be known as the “Year of the Hack”, a time when we saw small and big enterprises falling victim to network security breaches, advent of industrial malwares like Duqu (Based on Stuxnet ) which can lay dormant for months and attack when needed (That was not the outline of an alien invasion movie), zero day malwares, increased DDoS attacks and more. As per some reports, it is estimated that around One Thousand DoS attacks occur 2 every single day and there are around Three Thousand active Command and Control (C&C) centers 3 which can carry out DoS attacks.

The Sophos-Astaro Roadshow 2012

We would like to thank everyone who visited the Sophos-Astaro Partner Roadshow events and hope that you were able to take enough valuable information home with you. It was especially pleasing for us to greet so many new (and familiar) faces and open the IT security “Complete Security” chapter