Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/15/2011
03:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Astaro Security Gateway Version 8.2 Establishes A New Generation Of UTM

New features increase visibility, performance, and control of networks

August 10, 2011 (Wilmington, MA) – Astaro, (http://www.astaro.com) a Sophos company and leading Unified Threat Management provider, today announced the availability of version 8.2 of the Astaro Security Gateway. Chief amongst the over 60 new features or enhancements in version 8.2 are Application Control (Next Generation Firewall), Interactive Web Reporting and a new authentication agent. All together the new features and enhancements will dramatically improve network performance while providing increased visibility and control over the network.

The new features and enhancements in version 8.2 provide organizations with the resources they need to meet the ever-changing challenges of securing a business network. The increased control and visibility will allow organizations to make better decisions based on the company’s unique needs and network usage trends.

“As technology changes, so too must the tools organizations use to control their networks,” said Jan Hichert, senior vice president, network security, Sophos. “With version 8.2 we once again ensure our customers can face current and future network and security challenges by offering the next generation of firewall technology; Application Control.”

Some of the new features include:

• Astaro’s Application Control improves network visibility, blocks unwanted applications and empowers IT administrators to prioritize bandwidth usage. This information can then be used to make educated decisions that will have the most impact on the business; molding their security policy to precisely fit how their company uses the Internet. The new engine is up to 100% faster than the IM/P2P control engine in previous versions. The enhanced • Interactive Web Reporting tool provides administrators with a superior user experience tailored to how they expect to see data and towards the information they are looking for. Administrators will be able to save customer filters and subscribe to periodical mail reports. • The Authentication Agent allows administrators to authenticate users by name instead of IP address. This provides increased control over access in profiles and makes reports easier to read.

The Astaro Security Gateway version 8.2 includes over 60 other enhancements or new features. These include, support for 3G/UMTS USB modems, Form Hardening for Web Application Security, Web Filtering Safe Search Enforcement, enhanced virtualization support, increased IPS performance by up to 250%, SNMP v3, weighted balancing for WAN Uplink and server load balancing, group-in-group support for network groups, SSID to Access Point assignment, rebootless reconfiguration of Access Points, VPN performance increases by up to 100% and more. Additional information about features and enhancements can be found here: www.astaro.com/blog/up2date/ASG8200 .

In addition to the new features available in version 8.2 of the Astaro Security Gateway, the newest edition of the flagship Unified Threat Management solution also includes a technical preview of Astaro’s upcoming Log Management product. It is integrated into Astaro Security Gateway and all users will be able to try it out for free.

About Astaro With over 56,000 installations worldwide, Astaro protects business, school, healthcare and government networks against IT security threats. Astaro combines the latest technologies in all-in-one solutions that are easy to deploy and manage. Distributed by a global network of certified partners, Astaro provides complete protection for headquarters, branch offices and data centers. Founded in 2000, Astaro, now a Sophos company, continues to be a leading vendor in the fast-growing market for Unified-Threat-Management. More information can be found at www.astaro.com

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...