Endpoint
10/21/2010
09:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Astaro Offers Wireless Security

Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller

October 19, 2010 (WILMINGTON, MA) – Astaro (http://www.astaro.com), a Unified Threat Management (UTM) vendor, today announced the general availability of Astaro Wireless Security, which augments any Astaro Security Gateway with wireless functionality eliminating the need for dedicated wireless appliances. Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller. Additionally, Astaro offers Astaro Wireless Access Points to be placed throughout an organization as needed to extend wireless connectivity. The new approach integrates seamlessly with the security policy in place and therefore offers the same level of UTM security to wireless clients as if they were connected via LAN.

The use of WLAN has many advantages when compared to LAN. To install WLAN, no structural changes such as drilling holes and installing cables are necessary. Wireless networks can easily be adapted and expanded as their topology is not influenced by their environment. WLAN allows employees to access important information via mobile devices like laptops, smart phones and tablets from anywhere within the organization, increasing efficiency and productivity. In addition to providing public hot spots and comfortable guest Internet access, the deployment of wireless access points also allows the effortless connection of additional clients to the LAN.

Despite these advantages, many organizations are reluctant to invest in a wireless network infrastructure, as existing solutions are expensive, complex and difficult to secure.

“Wireless is supposed to be simple you set it up and it just works. But we all know in reality this is not always the case. With our old solution we would lose connectivity and it was hard to manage our wireless,” said Chris Bolin, IT Director, Albert Gallatin Area School District. “I was able to quickly set up the Astaro Wireless Security access points and now we always have connectivity. Astaro is the way to go for a cost effective wireless security solution.”

“It is important to ensure that a wireless solution fits seamlessly into the infrastructure in place, especially into firewalls and other security systems,” said Gert Hansen, Vice President Product Management at Astaro. “But with existing solutions, this is hard work. As a result, companies either refrain from installing Wi-Fi altogether, or they use cheaper consumer access points. This can be dangerous for the business, as they provide a much lower level of security. Astaro Wireless Security protects all wireless clients with the same high level of UTM security that is in place for devices connected via LAN.”

Astaro Wireless Security offers the following features:

* Quick Deployment: Thin access points (802.11n) allow the creation of secure and reliable wireless networks within minutes. Astaro Access Points are configuration-less and can be placed anywhere in an organization – no reconfiguration of network switches needed. * Central Management: Complete configuration, logging and troubleshooting of all wireless zones are performed within the Astaro Security Gateway which acts as a wireless controller and offers a central view of all wireless clients. * Integrated Security: Seamless integration of all wireless zones into the security framework offers instant UTM protection for all wireless clients. * Strong Encryption: State-of-the-art wireless encryption and authentication standards ensure a secure wireless connection. * Secure Guest Internet Access: Setting up wireless guest Internet access is easy, without the risk of compromising the integrity of the internal network.

More information about Astaro Wireless Security can be found on: http://www.astaro.com/solutions/wireless-security

About Astaro

Astaro offers the most complete and easy to use Internet security appliances available. Astaro’s award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 2,500 resellers, Astaro products protect over 100,000 networks across 60 countries. Astaro, headquartered in Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation jpozerski@astaro.com 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web