Analytics
7/6/2011
01:23 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Sophos Completes Astaro Acquisition

The acquisition will deliver a combination of endpoint protection with UTM

BOSTON – July 6, 2011 – Global IT security and data protection company Sophos today announced that it has completed its acquisition of network security vendor Astaro. This acquisition will allow Sophos to deliver coordinated, best-in- class threat and data protection offerings from every endpoint to any network boundary.

Organizations today face new challenges in protecting users and IT infrastructure from complex and targeted security threats; especially those that gain entry from across the Web or through new applications. As workforces become distributed across multiple offices, including the home, even basic security controls have become hard to update and enforce. Through this acquisition, Sophos will address the need for security solutions that provide threat and policy protection no matter where the user or company data resides.

“Never before has the security and IT environment been so challenging to secure for our customers,” said Steve Munford, Chief Executive Officer, Sophos. “Together Sophos and Astaro have the ingredients to uniquely solve today and tomorrow’s increasingly complex security challenges while allowing IT to enable users to work more flexibly and embrace new devices and applications.”

The acquisition, which was announced on May 6, 2011, will deliver an industry-first combination of endpoint protection with UTM. Once integration is complete, the Sophos portfolio of security products will:

• Combine Astaro’s network security with Sophos’ threat expertise. The initial integration with the Astaro Security Gateway and Sophos Anti-Virus will bring real-time protection against malware using Sophos Live Protection infrastructure, a comprehensive architecture for real-time updates to users in offices anywhere around the globe, and Sophos Web protection, real-time blocking of malicious websites via SophosLabs extensive Web reputation systems; which classify over 50,000 infected Web pages every day.

• Longer term, the integration will allow central management of anti-malware, Web and data control policies across endpoint, mobile and network enforcement points – including consumer-owned mobile devices and branch, home or remote offices. This will offer IT better visibility and control, whether the enforcement points are enterprise, consumer owned or located at a central, branch or home or remote office.

• Upon completing Astaro partner certification, Sophos partners will have access to the full network security portfolio including unique capabilities for protecting branch offices, log management and a leading network security gateway available in any delivery model. Likewise, Astaro partners will have the opportunity to become Sophos partners and deliver a complete set of endpoint, mobile and gateway solutions to their customers.

“Both companies are pragmatic and appreciate the need to be simple and secure for target buyers,” wrote The 451 Group in a May 6th 2011 Deal Analysis , regarding the acquisition. “The disruptions in this market require bold moves. Sophos has made one.”

“We founded Astaro with the mission of bringing network security products to organizations of all sizes and accomplished this goal by creating easy-to-use, Unified Threat Management solutions that addressed several facets of network security. However, as the threat landscape continued to evolve it became clear that gateway security alone would no longer be sufficient to effectively secure a network,” said Jan Hichert, Astaro co-founder and CEO, and now Sophos’ Senior Vice President and General Manager, Network Security.

About Sophos More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing security and data protection solutions that are simple to manage, deploy and use and that deliver the industry's lowest total cost of ownership. Sophos offers award-winning encryption, endpoint security, web, email, and network access control solutions backed by SophosLabs - a global network of threat intelligence centers. With more than two decades of experience, Sophos is regarded as a leader in security and data protection by top analyst firms and has received many industry awards. Sophos is headquartered in Boston, US and Oxford, UK.

About Astaro With over 56,000 installations worldwide, Astaro protects business, school, healthcare and government networks against IT security threats. Astaro combines the latest technologies in all-in-one solutions that are easy to deploy and manage. Distributed by a global network of certified partners, Astaro provides complete protection for headquarters, branch offices and data centers. Founded in 2000, Astaro, now a Sophos company, continues to be a leading vendor in the fast-growing market for Unified-Threat-Management.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web