Endpoint
10/21/2010
09:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Astaro Offers Wireless Security

Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller

October 19, 2010 (WILMINGTON, MA) – Astaro (http://www.astaro.com), a Unified Threat Management (UTM) vendor, today announced the general availability of Astaro Wireless Security, which augments any Astaro Security Gateway with wireless functionality eliminating the need for dedicated wireless appliances. Astaro Wireless Security includes a subscription that turns the Astaro Security Gateway into a wireless controller. Additionally, Astaro offers Astaro Wireless Access Points to be placed throughout an organization as needed to extend wireless connectivity. The new approach integrates seamlessly with the security policy in place and therefore offers the same level of UTM security to wireless clients as if they were connected via LAN.

The use of WLAN has many advantages when compared to LAN. To install WLAN, no structural changes such as drilling holes and installing cables are necessary. Wireless networks can easily be adapted and expanded as their topology is not influenced by their environment. WLAN allows employees to access important information via mobile devices like laptops, smart phones and tablets from anywhere within the organization, increasing efficiency and productivity. In addition to providing public hot spots and comfortable guest Internet access, the deployment of wireless access points also allows the effortless connection of additional clients to the LAN.

Despite these advantages, many organizations are reluctant to invest in a wireless network infrastructure, as existing solutions are expensive, complex and difficult to secure.

“Wireless is supposed to be simple you set it up and it just works. But we all know in reality this is not always the case. With our old solution we would lose connectivity and it was hard to manage our wireless,” said Chris Bolin, IT Director, Albert Gallatin Area School District. “I was able to quickly set up the Astaro Wireless Security access points and now we always have connectivity. Astaro is the way to go for a cost effective wireless security solution.”

“It is important to ensure that a wireless solution fits seamlessly into the infrastructure in place, especially into firewalls and other security systems,” said Gert Hansen, Vice President Product Management at Astaro. “But with existing solutions, this is hard work. As a result, companies either refrain from installing Wi-Fi altogether, or they use cheaper consumer access points. This can be dangerous for the business, as they provide a much lower level of security. Astaro Wireless Security protects all wireless clients with the same high level of UTM security that is in place for devices connected via LAN.”

Astaro Wireless Security offers the following features:

* Quick Deployment: Thin access points (802.11n) allow the creation of secure and reliable wireless networks within minutes. Astaro Access Points are configuration-less and can be placed anywhere in an organization – no reconfiguration of network switches needed. * Central Management: Complete configuration, logging and troubleshooting of all wireless zones are performed within the Astaro Security Gateway which acts as a wireless controller and offers a central view of all wireless clients. * Integrated Security: Seamless integration of all wireless zones into the security framework offers instant UTM protection for all wireless clients. * Strong Encryption: State-of-the-art wireless encryption and authentication standards ensure a secure wireless connection. * Secure Guest Internet Access: Setting up wireless guest Internet access is easy, without the risk of compromising the integrity of the internal network.

More information about Astaro Wireless Security can be found on: http://www.astaro.com/solutions/wireless-security

About Astaro

Astaro offers the most complete and easy to use Internet security appliances available. Astaro’s award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 2,500 resellers, Astaro products protect over 100,000 networks across 60 countries. Astaro, headquartered in Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation jpozerski@astaro.com 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2014-0778
Published: 2014-04-19
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.

CVE-2014-1974
Published: 2014-04-19
Directory traversal vulnerability in LYSESOFT AndExplorer before 20140403 and AndExplorerPro before 20140405 allows attackers to overwrite or create arbitrary files via unspecified vectors.

CVE-2014-1983
Published: 2014-04-19
Unspecified vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x before 3.1.1 allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors.

Best of the Web