Tag: gfi

Astaro Security Gateway V8 is End-of-Life December 31st, 2014

This is your official reminder that Version 8 of Astaro Security Gateway will be end-of-life on December 31st 2014.  If you are not running any Astaro Security Gateway Version 8 installations, you unaffected by this announcement and can disregard it. If you still maintain an active ASG V8, it is important that you read on for what this end-of-life means for you

Sophos ASG 8.310 Up2Date Released

We have released an update for those running Astaro Security Gateway V8. Version 8.310 is a bugfix release that stabilizes your installation and improves the Web Filtering and RED along with some other fixes.. For more information, read on! ASG 8.310 Up2Date Details News  -Bugfix release -Stability improvements for Web Filter -Stability improvements for RED -Bug fixes in mail proxies for mails with mixed Japanses charsets -Update timezone definitions   Remarks -System will be rebooted -Configuration will be Upgraded Bugfixes [22922] Loadbar hangs while scrolling on dashboard Download: Link: ftp.astaro.com/ASG/v8/up2date/u2d-sys-8.310.tgz.gpg MD5Sum:  ftp://ftp.astaro.com/ASG/v8/up2date/u2d-sys-8.310.tgz.gpg.md5 Size: ~123MB  Up2Date Installation:  Sophos Up2Date technology makes it easy to update your Astaro Security Gateway.

Google and the Zero-Day Conundrum

Last week Google announced a significant change to the way they disclose vulnerabilities. In cases where a zero-day vulnerability has made it into the wild and is being actively exploited, Google will now give a scant 7 days to the software vendor whose product is being exploited before ”…support(ing) researchers (by) making details available so that users can take steps to protect themselves.” We hope that the details Google will make available do not include full disclosu…

IT-Harvest Interviews Fortinet’s John Maddison (video)

In the following video, IT-Harvest’s Richard Stiennon interviews John Maddison, Fortinet’s vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company’s product line and the company’s technology innovation.

Twitter Adds 2FA

Yesterday Twitter announced that it has enabled two-factor authentication for users of their popular service. As we wrote in our Two-Factor Authentication Solution Brief earlier this year: the password as you know it is dead. As we continue to move into a world where literally everything we do touches the Internet in some fashion, companies owe it to their users and customers ways of ensuring they provide safe and secure methods of authentication

Cutting Wires, Costs: A Look at Creating Wireless Efficiencies

Wireless network infrastructure – for anyone in business, it’s a necessary evil and, perhaps ironically, one that isn’t short on infrastructure. You need a controller and wireless routers or access points – lots of them – enabling wireless networks to join an existing wired network. You’ll have to invest in a site planner/survey tool, or risk incorrectly guessing where the APs should go

App Security Wins Move at Snail’s Pace

Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…