Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:49 PM
Dark Reading
Dark Reading
Products and Releases

Astaro Offers SMBs Free Silent Business Audit And Forensic Analysis

Offer will demonstrate what spyware and malware is able to get by the organization's spam filter, and will provide insight into Internet usage trends

July 22, 2009 (Wilmington, MA) " Astaro Corporation (http://www.astaro.com), a leading network security vendor, today announced that Astaro is offering a free silent business audit and forensic analysis for small businesses. The silent business audit and forensic analysis will demonstrate what spyware and malware is able to get by the organization's spam filter and will provide insight into Internet usage trends.

As part of the free silent business audit and forensic analysis offering, Astaro will deploy an Astaro Security Gateway appliance behind an organization's normal web filter for 14 days.

During this time the appliance will monitor Internet traffic and record spyware and malware infections missed by the normal web filter. As an added bonus, the appliance will also block the transfer of any malware and spyware that makes it passed the normal web filter to avoid the spread of infections.

To register for a silent business audit and forensic analysis click here: http://purl.manticoretechnology.com/MTC_Common/mtcURLSrv.aspx?ID=4149&Key=1D9202AB-9FB1-4DDC-A3D6-E223D0E7F825&URLID=2242.

Astaro is offering a free silent business audit and forensic analysis to small business to help organizations gain insight into the effectiveness of their current web filtering tools. Many small businesses don't have the resources necessary to truly understand where infections come from and how employees are using the Internet. Having this type of insight into the network will allow these organizations to take steps towards creating a more secure and more efficient network.

"Often times an organization will set up their firewall and content filtering rules and assume each is working the way they want. We've worked with organizations that were shocked to find out what was making it through their filters and firewalls," said David Rogers, Vice President, Americas, Astaro Corporation, "The summer months can represent an excellent opportunity for many organizations to put their existing security controls to the test and at a time when end-user support tends to decrease. This free offering will provide valuable insight into network traffic patterns and help organizations evaluate their level of exposure to unwanted Spyware, Malware, and use of network resources."

About Astaro Corporation Astaro offers the most complete and easy to use Internet security appliances available. Combining best of breed applications, the proven quality of Linux and enterprise level performance, Astaro's award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 3,000 resellers, Astaro products protect over 100,000 networks for 47,000 customers across 60 countries. Astaro, headquartered in Wilmington, Massachusetts, USA and Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.

Press Contact: Jessica Lavery-Pozerski Astaro Corporation [email protected] 978-974-2648 Join "Astaro" on Facebook

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.