Endpoint
10/21/2010
09:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Astaro Offers Wireless Security

Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller

October 19, 2010 (WILMINGTON, MA) – Astaro (http://www.astaro.com), a Unified Threat Management (UTM) vendor, today announced the general availability of Astaro Wireless Security, which augments any Astaro Security Gateway with wireless functionality eliminating the need for dedicated wireless appliances. Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller. Additionally, Astaro offers Astaro Wireless Access Points to be placed throughout an organization as needed to extend wireless connectivity. The new approach integrates seamlessly with the security policy in place and therefore offers the same level of UTM security to wireless clients as if they were connected via LAN.

The use of WLAN has many advantages when compared to LAN. To install WLAN, no structural changes such as drilling holes and installing cables are necessary. Wireless networks can easily be adapted and expanded as their topology is not influenced by their environment. WLAN allows employees to access important information via mobile devices like laptops, smart phones and tablets from anywhere within the organization, increasing efficiency and productivity. In addition to providing public hot spots and comfortable guest Internet access, the deployment of wireless access points also allows the effortless connection of additional clients to the LAN.

Despite these advantages, many organizations are reluctant to invest in a wireless network infrastructure, as existing solutions are expensive, complex and difficult to secure.

“Wireless is supposed to be simple you set it up and it just works. But we all know in reality this is not always the case. With our old solution we would lose connectivity and it was hard to manage our wireless,” said Chris Bolin, IT Director, Albert Gallatin Area School District. “I was able to quickly set up the Astaro Wireless Security access points and now we always have connectivity. Astaro is the way to go for a cost effective wireless security solution.”

“It is important to ensure that a wireless solution fits seamlessly into the infrastructure in place, especially into firewalls and other security systems,” said Gert Hansen, Vice President Product Management at Astaro. “But with existing solutions, this is hard work. As a result, companies either refrain from installing Wi-Fi altogether, or they use cheaper consumer access points. This can be dangerous for the business, as they provide a much lower level of security. Astaro Wireless Security protects all wireless clients with the same high level of UTM security that is in place for devices connected via LAN.”

Astaro Wireless Security offers the following features:

* Quick Deployment: Thin access points (802.11n) allow the creation of secure and reliable wireless networks within minutes. Astaro Access Points are configuration-less and can be placed anywhere in an organization – no reconfiguration of network switches needed. * Central Management: Complete configuration, logging and troubleshooting of all wireless zones are performed within the Astaro Security Gateway which acts as a wireless controller and offers a central view of all wireless clients. * Integrated Security: Seamless integration of all wireless zones into the security framework offers instant UTM protection for all wireless clients. * Strong Encryption: State-of-the-art wireless encryption and authentication standards ensure a secure wireless connection. * Secure Guest Internet Access: Setting up wireless guest Internet access is easy, without the risk of compromising the integrity of the internal network.

More information about Astaro Wireless Security can be found on: http://www.astaro.com/solutions/wireless-security

About Astaro

Astaro offers the most complete and easy to use Internet security appliances available. Astaro’s award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 2,500 resellers, Astaro products protect over 100,000 networks across 60 countries. Astaro, headquartered in Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation jpozerski@astaro.com 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.