Tag: security

A conversation on email archiving and compliance

More and more industries are being asked to archive their e-mail communication due to legal or industrial compliance regulations. As organizations begin to examine e-mail archiving there are a few questions they should ask about compliance before selecting a product

Astaro Command Center 2.1 GA Released

Completing the release of the Astaro Command Center 2.1, today we have released the GA/Final version. It is available as an Up2Date for existing installations, a full set of ISO images for installing on your own hardware or ACC appliances, and we have Virtual images as for VMware ESX/i and VMware Player. Release Notes and a new 2.1 Demo server are also available

Dispelling the myths of open source

The concept of open source solutions remains daunting to those who do not understand this area of development, yet the massive community of open source developers have created some truly remarkable tools. Open source solution providers, particularly those in the security industry, face tough challenges combating some of the common misconceptions and myths surrounding this highly adaptable and effective development method. Astaro published a white paper dispelling the myths associated with open source.

Astaro Security Gateway’s IPS Successfully Blocks Attacks

Logansport Savings Bank was using the Astaro Security Gateway to block attacks and spam at their Indiana office when it was suggested that the Astaro did not have an effective IPS (intrusion prevention system). Although they were happy with the Astaro's performance they decided it was better to test the Astaro against a competitor to ensure they had the right product for their network. “As a financial institution we can't take any chances with our security so although we felt the Astaro Security Gateway was effectively protecting our network we wanted to make sure,” said Mike Thompson, Compliance Officer at Logansport Savings Bank

What is a botnet?

Since the Internet has become a staple of businesses and homes we've become familiar with the term “virus” and what it means from a technology perspective. In recent years viruses have evolved into more powerful 'botnets'. While we've discussed the effects of botnets several times in this blog we've never defined the term.

Risks of forgoing security outweigh the cost savings

When operating a small or even a medium sized business there are certain technologies your business can not do without – no matter what market your business is in. However, because of their size, many organizations forgo purchasing these essential business functions due to budgetary reasons. Depending on the type of technology, the organization may be able to get by without these tools, but there are technologies that no organization can do without.