Endpoint
10/21/2010
09:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Astaro Offers Wireless Security

Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller

October 19, 2010 (WILMINGTON, MA) – Astaro (http://www.astaro.com), a Unified Threat Management (UTM) vendor, today announced the general availability of Astaro Wireless Security, which augments any Astaro Security Gateway with wireless functionality eliminating the need for dedicated wireless appliances. Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller. Additionally, Astaro offers Astaro Wireless Access Points to be placed throughout an organization as needed to extend wireless connectivity. The new approach integrates seamlessly with the security policy in place and therefore offers the same level of UTM security to wireless clients as if they were connected via LAN.

The use of WLAN has many advantages when compared to LAN. To install WLAN, no structural changes such as drilling holes and installing cables are necessary. Wireless networks can easily be adapted and expanded as their topology is not influenced by their environment. WLAN allows employees to access important information via mobile devices like laptops, smart phones and tablets from anywhere within the organization, increasing efficiency and productivity. In addition to providing public hot spots and comfortable guest Internet access, the deployment of wireless access points also allows the effortless connection of additional clients to the LAN.

Despite these advantages, many organizations are reluctant to invest in a wireless network infrastructure, as existing solutions are expensive, complex and difficult to secure.

“Wireless is supposed to be simple you set it up and it just works. But we all know in reality this is not always the case. With our old solution we would lose connectivity and it was hard to manage our wireless,” said Chris Bolin, IT Director, Albert Gallatin Area School District. “I was able to quickly set up the Astaro Wireless Security access points and now we always have connectivity. Astaro is the way to go for a cost effective wireless security solution.”

“It is important to ensure that a wireless solution fits seamlessly into the infrastructure in place, especially into firewalls and other security systems,” said Gert Hansen, Vice President Product Management at Astaro. “But with existing solutions, this is hard work. As a result, companies either refrain from installing Wi-Fi altogether, or they use cheaper consumer access points. This can be dangerous for the business, as they provide a much lower level of security. Astaro Wireless Security protects all wireless clients with the same high level of UTM security that is in place for devices connected via LAN.”

Astaro Wireless Security offers the following features:

* Quick Deployment: Thin access points (802.11n) allow the creation of secure and reliable wireless networks within minutes. Astaro Access Points are configuration-less and can be placed anywhere in an organization – no reconfiguration of network switches needed. * Central Management: Complete configuration, logging and troubleshooting of all wireless zones are performed within the Astaro Security Gateway which acts as a wireless controller and offers a central view of all wireless clients. * Integrated Security: Seamless integration of all wireless zones into the security framework offers instant UTM protection for all wireless clients. * Strong Encryption: State-of-the-art wireless encryption and authentication standards ensure a secure wireless connection. * Secure Guest Internet Access: Setting up wireless guest Internet access is easy, without the risk of compromising the integrity of the internal network.

More information about Astaro Wireless Security can be found on: http://www.astaro.com/solutions/wireless-security

About Astaro

Astaro offers the most complete and easy to use Internet security appliances available. Astaro’s award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 2,500 resellers, Astaro products protect over 100,000 networks across 60 countries. Astaro, headquartered in Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation jpozerski@astaro.com 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3562
Published: 2014-08-21
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.

CVE-2014-3577
Published: 2014-08-21
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-...

CVE-2014-5158
Published: 2014-08-21
The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors.

CVE-2014-5159
Published: 2014-08-21
SQL injection vulnerability in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary SQL commands via the ws_data parameter.

CVE-2014-5210
Published: 2014-08-21
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.