Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/27/2009
03:49 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Astaro Offers SMBs Free Silent Business Audit And Forensic Analysis

Offer will demonstrate what spyware and malware is able to get by the organization's spam filter, and will provide insight into Internet usage trends

July 22, 2009 (Wilmington, MA) " Astaro Corporation (http://www.astaro.com), a leading network security vendor, today announced that Astaro is offering a free silent business audit and forensic analysis for small businesses. The silent business audit and forensic analysis will demonstrate what spyware and malware is able to get by the organization's spam filter and will provide insight into Internet usage trends.

As part of the free silent business audit and forensic analysis offering, Astaro will deploy an Astaro Security Gateway appliance behind an organization's normal web filter for 14 days.

During this time the appliance will monitor Internet traffic and record spyware and malware infections missed by the normal web filter. As an added bonus, the appliance will also block the transfer of any malware and spyware that makes it passed the normal web filter to avoid the spread of infections.

To register for a silent business audit and forensic analysis click here: http://purl.manticoretechnology.com/MTC_Common/mtcURLSrv.aspx?ID=4149&Key=1D9202AB-9FB1-4DDC-A3D6-E223D0E7F825&URLID=2242.

Astaro is offering a free silent business audit and forensic analysis to small business to help organizations gain insight into the effectiveness of their current web filtering tools. Many small businesses don't have the resources necessary to truly understand where infections come from and how employees are using the Internet. Having this type of insight into the network will allow these organizations to take steps towards creating a more secure and more efficient network.

"Often times an organization will set up their firewall and content filtering rules and assume each is working the way they want. We've worked with organizations that were shocked to find out what was making it through their filters and firewalls," said David Rogers, Vice President, Americas, Astaro Corporation, "The summer months can represent an excellent opportunity for many organizations to put their existing security controls to the test and at a time when end-user support tends to decrease. This free offering will provide valuable insight into network traffic patterns and help organizations evaluate their level of exposure to unwanted Spyware, Malware, and use of network resources."

About Astaro Corporation Astaro offers the most complete and easy to use Internet security appliances available. Combining best of breed applications, the proven quality of Linux and enterprise level performance, Astaro's award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 3,000 resellers, Astaro products protect over 100,000 networks for 47,000 customers across 60 countries. Astaro, headquartered in Wilmington, Massachusetts, USA and Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation [email protected] 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8603
PUBLISHED: 2020-05-27
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or ...
CVE-2020-8604
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.
CVE-2020-8605
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
CVE-2020-8606
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
CVE-2020-11075
PUBLISHED: 2020-05-27
In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a...