Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/15/2011
03:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Astaro Security Gateway Version 8.2 Establishes A New Generation Of UTM

New features increase visibility, performance, and control of networks

August 10, 2011 (Wilmington, MA) – Astaro, (http://www.astaro.com) a Sophos company and leading Unified Threat Management provider, today announced the availability of version 8.2 of the Astaro Security Gateway. Chief amongst the over 60 new features or enhancements in version 8.2 are Application Control (Next Generation Firewall), Interactive Web Reporting and a new authentication agent. All together the new features and enhancements will dramatically improve network performance while providing increased visibility and control over the network.

The new features and enhancements in version 8.2 provide organizations with the resources they need to meet the ever-changing challenges of securing a business network. The increased control and visibility will allow organizations to make better decisions based on the company’s unique needs and network usage trends.

“As technology changes, so too must the tools organizations use to control their networks,” said Jan Hichert, senior vice president, network security, Sophos. “With version 8.2 we once again ensure our customers can face current and future network and security challenges by offering the next generation of firewall technology; Application Control.”

Some of the new features include:

• Astaro’s Application Control improves network visibility, blocks unwanted applications and empowers IT administrators to prioritize bandwidth usage. This information can then be used to make educated decisions that will have the most impact on the business; molding their security policy to precisely fit how their company uses the Internet. The new engine is up to 100% faster than the IM/P2P control engine in previous versions. The enhanced • Interactive Web Reporting tool provides administrators with a superior user experience tailored to how they expect to see data and towards the information they are looking for. Administrators will be able to save customer filters and subscribe to periodical mail reports. • The Authentication Agent allows administrators to authenticate users by name instead of IP address. This provides increased control over access in profiles and makes reports easier to read.

The Astaro Security Gateway version 8.2 includes over 60 other enhancements or new features. These include, support for 3G/UMTS USB modems, Form Hardening for Web Application Security, Web Filtering Safe Search Enforcement, enhanced virtualization support, increased IPS performance by up to 250%, SNMP v3, weighted balancing for WAN Uplink and server load balancing, group-in-group support for network groups, SSID to Access Point assignment, rebootless reconfiguration of Access Points, VPN performance increases by up to 100% and more. Additional information about features and enhancements can be found here: www.astaro.com/blog/up2date/ASG8200 .

In addition to the new features available in version 8.2 of the Astaro Security Gateway, the newest edition of the flagship Unified Threat Management solution also includes a technical preview of Astaro’s upcoming Log Management product. It is integrated into Astaro Security Gateway and all users will be able to try it out for free.

About Astaro With over 56,000 installations worldwide, Astaro protects business, school, healthcare and government networks against IT security threats. Astaro combines the latest technologies in all-in-one solutions that are easy to deploy and manage. Distributed by a global network of certified partners, Astaro provides complete protection for headquarters, branch offices and data centers. Founded in 2000, Astaro, now a Sophos company, continues to be a leading vendor in the fast-growing market for Unified-Threat-Management. More information can be found at www.astaro.com

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19604
PUBLISHED: 2019-12-11
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
CVE-2019-14861
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permiss...
CVE-2019-14870
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authent...
CVE-2019-14889
PUBLISHED: 2019-12-10
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence...
CVE-2019-1484
PUBLISHED: 2019-12-10
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.