Astaro RED Simplifies Branch Office SecurityAstaro RED Simplifies Branch Office Security
Remote Ethernet Device offers UTM security for branch offices
May 27, 2010
May, 26 2010 (Wilmington, MA)– Astaro Corporation (http://www.astaro.com), a leading Unified Threat Management vendor, today announced that Astaro RED, (Remote Ethernet Device) is now available. Astaro RED combines VPN functionality and complete IT security for branch offices by automatically connecting with a central Astaro Security Gateway. The devices can cut the cost of securing and administering a branch office’s security by up to 80% by eliminating the need for IT staff and additional security products at the remote office.
Astaro RED is designed to secure remote offices of all sizes. Because the devices are managed through the central office using an Astaro Security Gateway, no training, licensing or technical expertise is required at the remote location in order to secure the branch office. Additionally, security policy and configuration changes made at the central office can be pushed to the remote sites without any technical involvement at the branch office. This means organizations can affordably secure and manage the security for even the smallest branch office.
“Astaro RED eliminates the need for having a technical person in all offices. You just ship a device to the site, and it works”, said Paul Smith, Senior Network Engineer at Metafore Technologies Inc., who participated in the BETA testing of Astaro RED. “It saved me at least two hours per branch office, where I would normally have to pre-configure a device and ship it, and then work with someone onsite to get it online. This is a totally unique approach to branch office connectivity.”
Upon viewing Astaro RED during a security conference, security industry expert Richard Stiennon stated: “Astaro’s RED box is the single most innovative product I saw [At RSA 2010]. It leverages the investment in security at one location by extending it to many. It is simple and inexpensive.”
Setting up the Astaro RED is completed within minutes. Once the device is connected to the Internet it automatically registers with the central Astaro Security Gateway and receives its IP address via Dynamic Host Configuration Protocol. The remote office is then connected with the headquarters via an Astaro VPN tunnel and is immediately protected as the web traffic is filtered through the central gateway. Additional configurations and policy changes are also done centrally, therefore Astaro RED requires no GUI. With Astaro RED, it is possible to connect approximately 100 branch offices in one day.
“We developed Astaro RED as we saw an urgent demand on the market for a solution to secure branch offices that is really easy and reasonably priced”, said Gert Hansen, VP Product Management at Astaro. “So far, organizations could use low-cost Firewalls or VPN Gateways or even small UTM appliances, but then had to cope with high acquisition costs, high installation and maintenance effort or lacking security features. Astaro RED ends these dangerous and resource devouring compromises.”
More information about Astaro RED can be found here: http://www.astaro.com/products/astaro-red http://www.astaro.com/landingpages/2min-explainer-red
About Astaro Corporation Astaro offers the most complete and easy to use Internet security appliances available. Astaro’s award-winning products provide the latest protection with the best total cost of ownership. Software, hardware and virtual appliance offerings provide users the flexibility to meet a wide variety of deployment scenarios. Distributed by a growing worldwide network of more than 2,500 resellers, Astaro products protect over 100,000 networks across 60 countries. Astaro, headquartered in Wilmington, Massachusetts, USA and Karlsruhe, Germany, offers free downloads of its products at www.astaro.com.
Press Contact: Jessica Lavery-Pozerski Astaro Corporation [email protected] 978-974-2648 Join "Astaro" on Facebook
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks