Sophos for Astaro Security Gateway v8.2 Winner Winner
Astaro Security Gateway offers complete UTM protection and can be installed as either hardware, software or as a virtual appliance. For more sophisticated deployment scenarios, the company offers additional Gateway Accessories that enable new functionality for the gateway. The Astaro Security Gateway uses a combination of anti-spam, encryption and anti-virus scanning such as reputation service with spam outbreak detection, reputation service with spam outbreak detection, recipient verification, reverse-DNS & HELO syntax checks, dual independent virus scanners with multiple detection methods and more.
Version 8.2 of Astaro Security Gateway includes several new features, including application control (next-generation firewall), log management and several other enhancements. These improvements will help organizations protect their network from modern threats. It simplifies security by making it easy to deploy and manage while still being powerful enough to protect against email, web, network and web application threats, as well as wireless security.
Astaro is the only VMware-ready certified UTM vendor. This distinction allows organizations of all sizes to take advantage of Astaro's network protection in the deployment model that best fits their organization's needs. The Astaro Security Gateway also offers an easy to use graphical user interface that makes administrating the appliances simple. Another advantage is Astaro's integration of not only network, web and mail subscriptions, but also web application security, next-generation firewall functions, log management, wireless security and Astaro RED integration.
Business and other organizations benefit from investing in Astaro's products for a variety of reasons beyond the typical benefits of having IT security in place. Specifically, companies are able to improve productivity in the IT department because IT only has to manage one solution for network, web and mail security without having to sacrifice quality. Because Astaro is software-based and not tied to specific hardware, it is completely scalable. All products, regardless of size or platform, have the same functionality and web interface so their security can grow with the company, maximizing their investment.
Some of the technical specifications in the Astaro Security Gateway that keep networks safe include stateful deep inspection packet filter firewall, transparent proxies for HTTP, FTP, SMTP, POP3, DNS and SOCKA, 6,000-plus IPS rules with real-time signature updates, in- and outbound traffic shaping, daily executive reports, and support for integrated, as well as external certificate authorities.
UTM extenders, like Astaro RED and Astaro Wireless Security, make it possible for companies to affordably secure their entire network, regardless of geographic distribution or the number of wireless connections. This helps companies control costs while securing their networks. It also ensures policies are consistent across the network. Also, Astaro offers a flexible subscription model so customers only have to purchase the subscriptions that will meet their individual needs.
One example of how the Astaro Security Gateway has benefited corporations is NeuroScience Consultants. The organization saved $100,000 a year by creating VPN overlay connections with the Astaro Security Gateway with assistance from Astaro partner RemoteWorks. The physician group also reprioritized network traffic and used the product's content filtering, anti-virus and anti-spam capabilities to increase productivity and stop all spyware, malware and spam on their network. Another illustration is Mid-Americas Overseas, which reduced IT administration time by 75 percent by deploying the Astaro Security Gateway. The Clanton Alabama Police Department was able to make the city safer using the Astaro Security Gateway by keeping police officers on the street, rather than continually returning to the station to file reports. This made the city safer and helped reduce crime.
Email security addresses the ability to exchange email messages securely. This includes ensuring the privacy of sensitive messages, limiting the repercussions of email forgery, and managing other aspects of email security within the organization. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use, and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, etc., and more.