09:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

Astaro Offers Wireless Security

Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller

October 19, 2010 (WILMINGTON, MA) – Astaro (http://www.astaro.com), a Unified Threat Management (UTM) vendor, today announced the general availability of Astaro Wireless Security, which augments any Astaro Security Gateway with wireless functionality eliminating the need for dedicated wireless appliances. Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller. Additionally, Astaro offers Astaro Wireless Access Points to be placed throughout an organization as needed to extend wireless connectivity. The new approach integrates seamlessly with the security policy in place and therefore offers the same level of UTM security to wireless clients as if they were connected via LAN.

The use of WLAN has many advantages when compared to LAN. To install WLAN, no structural changes such as drilling holes and installing cables are necessary. Wireless networks can easily be adapted and expanded as their topology is not influenced by their environment. WLAN allows employees to access important information via mobile devices like laptops, smart phones and tablets from anywhere within the organization, increasing efficiency and productivity. In addition to providing public hot spots and comfortable guest Internet access, the deployment of wireless access points also allows the effortless connection of additional clients to the LAN.

Despite these advantages, many organizations are reluctant to invest in a wireless network infrastructure, as existing solutions are expensive, complex and difficult to secure.

“Wireless is supposed to be simple you set it up and it just works. But we all know in reality this is not always the case. With our old solution we would lose connectivity and it was hard to manage our wireless,” said Chris Bolin, IT Director, Albert Gallatin Area School District. “I was able to quickly set up the Astaro Wireless Security access points and now we always have connectivity. Astaro is the way to go for a cost effective wireless security solution.”

“It is important to ensure that a wireless solution fits seamlessly into the infrastructure in place, especially into firewalls and other security systems,” said Gert Hansen, Vice President Product Management at Astaro. “But with existing solutions, this is hard work. As a result, companies either refrain from installing Wi-Fi altogether, or they use cheaper consumer access points. This can be dangerous for the business, as they provide a much lower level of security. Astaro Wireless Security protects all wireless clients with the same high level of UTM security that is in place for devices connected via LAN.”

Astaro Wireless Security offers the following features:

* Quick Deployment: Thin access points (802.11n) allow the creation of secure and reliable wireless networks within minutes. Astaro Access Points are configuration-less and can be placed anywhere in an organization – no reconfiguration of network switches needed. * Central Management: Complete configuration, logging and troubleshooting of all wireless zones are performed within the Astaro Security Gateway which acts as a wireless controller and offers a central view of all wireless clients. * Integrated Security: Seamless integration of all wireless zones into the security framework offers instant UTM protection for all wireless clients. * Strong Encryption: State-of-the-art wireless encryption and authentication standards ensure a secure wireless connection. * Secure Guest Internet Access: Setting up wireless guest Internet access is easy, without the risk of compromising the integrity of the internal network.

More information about Astaro Wireless Security can be found on: http://www.astaro.com/solutions/wireless-security

About Astaro

Astaro offers the most complete and easy to use Internet security appliances available. Astaro’s award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 2,500 resellers, Astaro products protect over 100,000 networks across 60 countries. Astaro, headquartered in Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation jpozerski@astaro.com 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.