Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/15/2011
03:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Astaro Security Gateway Version 8.2 Establishes A New Generation Of UTM

New features increase visibility, performance, and control of networks

August 10, 2011 (Wilmington, MA) – Astaro, (http://www.astaro.com) a Sophos company and leading Unified Threat Management provider, today announced the availability of version 8.2 of the Astaro Security Gateway. Chief amongst the over 60 new features or enhancements in version 8.2 are Application Control (Next Generation Firewall), Interactive Web Reporting and a new authentication agent. All together the new features and enhancements will dramatically improve network performance while providing increased visibility and control over the network.

The new features and enhancements in version 8.2 provide organizations with the resources they need to meet the ever-changing challenges of securing a business network. The increased control and visibility will allow organizations to make better decisions based on the company’s unique needs and network usage trends.

“As technology changes, so too must the tools organizations use to control their networks,” said Jan Hichert, senior vice president, network security, Sophos. “With version 8.2 we once again ensure our customers can face current and future network and security challenges by offering the next generation of firewall technology; Application Control.”

Some of the new features include:

• Astaro’s Application Control improves network visibility, blocks unwanted applications and empowers IT administrators to prioritize bandwidth usage. This information can then be used to make educated decisions that will have the most impact on the business; molding their security policy to precisely fit how their company uses the Internet. The new engine is up to 100% faster than the IM/P2P control engine in previous versions. The enhanced • Interactive Web Reporting tool provides administrators with a superior user experience tailored to how they expect to see data and towards the information they are looking for. Administrators will be able to save customer filters and subscribe to periodical mail reports. • The Authentication Agent allows administrators to authenticate users by name instead of IP address. This provides increased control over access in profiles and makes reports easier to read.

The Astaro Security Gateway version 8.2 includes over 60 other enhancements or new features. These include, support for 3G/UMTS USB modems, Form Hardening for Web Application Security, Web Filtering Safe Search Enforcement, enhanced virtualization support, increased IPS performance by up to 250%, SNMP v3, weighted balancing for WAN Uplink and server load balancing, group-in-group support for network groups, SSID to Access Point assignment, rebootless reconfiguration of Access Points, VPN performance increases by up to 100% and more. Additional information about features and enhancements can be found here: www.astaro.com/blog/up2date/ASG8200 .

In addition to the new features available in version 8.2 of the Astaro Security Gateway, the newest edition of the flagship Unified Threat Management solution also includes a technical preview of Astaro’s upcoming Log Management product. It is integrated into Astaro Security Gateway and all users will be able to try it out for free.

About Astaro With over 56,000 installations worldwide, Astaro protects business, school, healthcare and government networks against IT security threats. Astaro combines the latest technologies in all-in-one solutions that are easy to deploy and manage. Distributed by a global network of certified partners, Astaro provides complete protection for headquarters, branch offices and data centers. Founded in 2000, Astaro, now a Sophos company, continues to be a leading vendor in the fast-growing market for Unified-Threat-Management. More information can be found at www.astaro.com

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...