The Astaro Blog is updated regularly by our team of engaged enthusiasts, who are specialists in their particular area. Learn more about our bloggers below.
ASG Version 8 Public Beta Begins
Astaro would like to invite you to join us in testing our next major version of our Security Gateway product.
Astaro introduces three new products
This morning, Astaro announced three new products that will be available in 2010. Each product will allow organizations to connect their network while remaining confident in its security and ensuring access to information. Also in development is version 8 of the Astaro Security Gateway
Basic Security tips part 3 – update your software
It has become more and more difficult to identify malicious links and content on the Internet. URL shortners, ads on legitimate websites , virus downloads posing as anti-virus software and of course fake e-cards all make it harder to know where you should and should not click Having a strong network security product in place will of course prevent the installation of malicious code on our computer even if you click on one of these links
Having your computer compromised could cost more than your personal information
At this point most people who use the web understand what can happen if their computer is infected by a virus, spyware or other malicious content.
Key to success is strong partnerships
I'm often asked what separates Astaro from other network security and UTM vendors.
Astaro Command Center 2.1 Released
Astaro has today made available the soft-release of the next Astaro Command Center (ACC) version – our tool for centrally managing Astaro devices. Whether you have two or two-hundred+ installations, ACC gives you a central point for monitoring, configuring, and reporting. Today's release will allow anyone at Beta Version 2.070 or Stable Version 2.000 to Up2Date to ACC 2.1 via manual FTP download
Why do financial institutions need security?
No bank or other financial institution would consider using a regular pick up truck and forgo security guards for the transport of their money. Yet many financial institutions are doing the technological equivalent by not implementing enterprise level network security solutions. The regulatory framework that affects all financial institutions makes it essential that privacy is protected and that the security of network transactions can be demonstrated and verified.
Botnet Mitigation
If you are infected with a botnet, don't worry, it is not the end of the world.
Why using technology in business meant for personal use is a bad idea
Technology is necessary in order to run almost any business imaginable. Even the smallest organization, such as an auto repair shop or a flower stand, has website to attract new customers and the larger the organization the more technology the company needs.