Orange County Computer Consultant

My photo
Orange County Computer Consultant helps small businesses with networking, installations and small business software.

Tuesday, May 10, 2011

Sophos aquires Astaro

Sophos Ltd. today made a move into the network security space by announcing its intention to acquire Astaro GmbH & Co. KG. Traditionally an endpoint protection company, Sophos has branched out, via acquisitions during the past five years to offer a deeper portfolio of products that includes encryption, application control, data protection and network access control. Terms of the deal were not announced.

The security landscape is getting nastier too, and smaller companies realize having basic protection or none at all doesn’t cut it.

Arabella Hallawell, vice president of corporate strategy, Sophos Ltd.

Astaro specializes in network security hardware, software and virtual appliances for SMBs and midmarket organizations. Its Astaro Security Gateway products serve small shops of 10 or fewer employees, all the way up to 5,000, and provide integrated network security offerings including VPN, firewall and intrusion prevention technology.

Unified threat management, Astaro’s primary business, is attractive to the midmarket because of its form factor, ease of management and relative costs compared to buying individual best-of-breed products. IDC puts the UTM market at $2 billion worldwide for 2010.

According to a Sophos press release, Astaro did $56 million worth of business last year and had 30% year-over-year growth, making it the fourth largest UTM vendor. Astaro has more than 200 employees, and is based in Karlsruhe, Germany, and Wilmington, MA.

More on Sophos:
Sophos integrates encryption into endpoint, email security:
Sophos Endpoint Security and Data Protection is the first software to integrate encryption from its acquisition of Utimaco in 2008.
Sophos sells majority stake to private equity group:
Apax Partners, a private equity investment firm, buys a majority interest in computer security vendor Sophos. Sophos is valued at $830 million in the transaction.
Strategically, the acquisition gives Sophos visibility into endpoint and network activity, data that can be centrally managed and reported. Sophos sees an opportunity to close a market and portfolio gap with the acquisition by eventually integrating Web and application security controls with network security, according to vice president of corporate strategy Arabella Hallawell. She said there currently is no coordination between endpoint and network security that provides visibility for respective admins and analysts into what’s happening on either platform.

Astaro’s Security Gateway products are its principal offering. Its three form factors, including a virtual appliance, combine firewall, IPS, denial-of-service protection and remote office connectivity via IPsec- and SSL-based VPNs. Astaro also offers log management and mail archiving, as well as a management console.

“If you look at some current IT trends, there are many more distributed worksites, especially the rate SMBs are adding remote sites is increasing quickly,” Hallawell said. “It becomes untenable to add more devices and locations. The security landscape is getting nastier too, and smaller companies realize having basic protection or none at all doesn’t cut it. We looked closely at this area and it became clear there was unmet need for better integrated security that includes Web and application security controls and policy controls.”

In the short term, expect to see Sophos incorporate its threat prevention technology, including real-time lookups on malicious websites into the Astaro gateways. In addition, some initial coordination between the two product lines could include some policy setting and reporting for events on the Astaro line integrated with Web filtering and malicious site detection and enforcement on the Sophos endpoint.

Orange County Computer Security | Small Business Security

Would you go out of business if your company was hacked? Think about this. Office Max, Discount Shoe Ware House and even TJ Max have been hacked in the past. The attackers got millions of credit card numbers and sold them on the Internet!

What are you doing to secure your corporate information? Can your clients trust your data security? Would you lose clients if you got hacked and it was printed in the papers that you have poor security?

Every day determined attackers and script kiddies are looking for vulnerable host's on the Internet. Do you have a firewall in place? Is it configured properly? Are you running a wireless network? Can people in your parking lot access it? Are they on your network right now? Dont wait until it is too late. Orange County Computer Consultant can test your security. We will install and configure the latest security appliances for your small business. Give us a call or email us today.

Orange County Computer Security PH. 714-589-9423

Solutions for small business in the Orange County Area.

Layered Network Security.

Secure Remote Access.

Web and Email Security.

Encryption Technologies.

Small Business Firewall | Orange County Computer Consultant

Orange County Computer Consultant recommends Sonicwall.

The TZ Series revolution continues with the all new TZ 100, the entry point of the TZ Series making high performance Unified Threat Management available and affordable for everyone. Combining a powerful Stateful Packet Inspection Firewall, real-time Reassembly-Free Deep Packet Inspection, state-of-the-art high-speed architecture, and five configurable 10/100 interfaces, the revolutionary TZ 100 delivers uncompromising protection at up to two-and-a-half times faster performance than previous TZ 180 and 150 models. By integrating SSL VPN support, a wireless switch controller, and ultra-fast 802.11n wireless technology (Wireless-N version), the TZ 100 future-proofs network security for distributed enterprises and small and medium-sized businesses.

• Flexibility - Fits into any distributed enterprise or small organization.
• Ease-of-Use - Easy to set up, operate and manage.
• Business Continuity - Failover, failback and more.

Protects your business

Deep Packet Inspection Engine - capable of configurable, high-performance scanning across all ports, including Web traffic, e-mail, file transfers, Windows services and DNS.
ICSA-Certified Stateful Packet Inspection Firewall (Pending) - ensuring industry-standard integrity and validity for each connection, packet, source and destination.
Comprehensive Security - including Comprehensive Anti-Spam Service, Gateway Anti-Virus, Anti-Spyware, Intrusion and Prevention Service, Enforced Client Anti-Virus and Content Filtering Service (Premium Business Edition).
SonicWALL PortShield - provides the flexibility to configure port level security for the LAN, delivering protection not only from the WAN and DMZ, but also between devices inside the LAN.
Voice and Video over IP - offers high-performance standards-based security for voice (audio), streaming video and other latency-sensitive media over IP-based networks.

Protection that performs

High-performance Architecture - using advanced SonicWALL NSA technology, delivers throughput performance of 100 Mbps for Stateful Packet Inspection and up to 25 Mbps for UTM.
Wireless (802.11b/g/n) - supports 802.11n (up to 5X faster than status quo 802.11g) yet is still compatible with older wireless devices.

Delivers flexibility with control

Wireless Guest Services - permits wireless Internet connections for guest users such as consultants and contractors, without providing access to the corporate network.
Configurable Interfaces – are flexibly customizable as a second LAN, a second WAN, a WLAN, a DMZ or other network zone, using SonicWALL PortShield.
Multiple Zones for Different User Types - offers complete control without compromising network security.
Time-based and Group Policies - granularly enforceable by individual or group policy, pre-defined schedules, or start and end range, thus simplifying User Level Authentication for Internet and VPN access.
Virtual Private Networking (VPN) - offers SSL VPN and IPSec VPN for secure site-to-site and remote access, featuring gateway enforcement, centralized management and flexible configuration.

Easy to set up, and easy to use

Set-up and Management - is easily configured using a suite of wizards for common configurations such as public servers, VPNs and NAT.
Integrated 5-Port auto-MDIX Switch - automatically and transparently detects and corrects incorrectly wired cables such as cross-over cables, making network installation substantially simpler and less expensive.
SonicWALL Global Management System (GMS) - provides tools for simplified configuration, comprehensive enforcement and central management of multiple global security policies, VPNs and services for multiple systems.
Keeps your business continuous

Failover and Failback Technologies - ensures continuous uptime of IPSec VPN tunnels by failing over to a secondary WAN upon primary connection failure, automatically failing back when connection is re-established.
WAN Redundancy and Load Balancing – provides highly-efficient bandwidth maximization using a secondary WAN port in “active-active” load sharing or failover configuration.
ISP Failover – ensures highly reliable and continuous uptime for Internet and IPSec VPN connectivity by failing over to a second ISP link should the primary link fail.

Orange County Computer Security

I often get asked by clients "Why would a hacker attack my computer?". Hackers do not necessarily care about what you store on your computer. They can use your computer and turn it into a zombie to attack other computers. They can use your computer to store stolen information. They can store their tools on your computer. I have read stories of attackers putting child porn on a victims computer! The worst part is that they then called the authorities and told them that the person was a pedophile and should check his computer. Can you imagine that being published in the newspaper?

I help small businesses secure their computers. I can help protect you. Give me a call or email me today. I stay on top of the latest vulnerabilities in this industry. I often get alerts to security holes before they go public.

Orange County Computer Consultant provides small businesses with installation, repairs and upgrades of networks, servers and desktops. We specialize in computer security.

Orange County Computer Security

Are you a small business owner in Orange County? Do you have a wireless network? Is it secure?

The reason I ask is some can be on your network right now! What are they looking at? Do they have access to your internal data? Are your clients credit cards at risk? Their social security numbers? It is not difficult to hack wireless networks with tools. WEP can easily be cracked. I can help secure your 802.11 network. Dont leave your network open to a attack. Give me a call or email me today.

Netgear ProSafe FVG318 8 Wireless VPN/Firewall - 8 x 10/100Base-TX LAN, 1 x 10/100Base-TX WAN

Give Orange County Computer Consultant today for all of your computer security needs. We will install, configure and monitor your security devices. We also can test the security of your network and make recommendations. Dont wait until its to late.

This comprehensive and affordable solution offers wired and wireless connectivity and business class protection for small office and remote/branch office users. It combines five functions in a single, compact package, Stateful Packet Inspection (SPI) firewall, 802.11g wireless access point, IPSec Virtual Private Network (VPN) appliance, NAT router, and eight-port Fast Ethernet switch. Powerful and standards-based, it delivers both 10 and 100 Mbps connections for wired devices, plus 802.11b/g devices at speeds up to 108 Mbps. This complete solution offers high-performance features in a space-saving, easy-to-use design.

Orange County Computer Security | Orange County Computer Consultant

Orange County Computer Consultant follows a security methodology for testing your security.
Orange County Computer Security helps secure small business servers and networks in the Orange County area.

The first step we do is gather information. We want to know your IP address ranges, employee names, DNS information, emails. We look on wesbites such as Facebook, we look on forums, job boards. We look at your company from a attackers view. We use the same tools attackers use to test your defenses.

Target Discovery. At this stage we check to see what type of operating systems you are running. How is the network setup? What type of applications are you running? What versions? This is also known as operating system fingerprinting. Once we have this information we will see if you are vulnerable.

Enumerating the target- We will check to see what ports are open. We use various scanning techniques to avoid intrusion detection systems or bypass your firewalls. We see what applications are listening and check to see if they are exploitable.

At this point we can attempt to gain access to your system. We require written permission for all of the following testing. Give us a call today if you are concerned about the security of your network.

Orange County Computer Security

Do you currently have internal documents on your servers that can be accesses through Google? Attackers can use Google to search your web servers for documents. I can currently pull back thousands of internal documents online!

Attackers use social networks like Facebook, Linkedin and Myspace to gain data about employees at companies. Information on these sites include birthdays, interests and even schools that you graduated from. Attackers can use this information to guess passwords. Some sites even ask this information for password resets.

What websites are your employees browsing at work? Have you heard of XSS? This stands for Cross Site scripting. It basically tricks your employees in thinking that they are on a trusted website. In the background the code is grabbing information off your desktop. It can also be used to trick the user into entering their password information on a website that looks like Bank Of America.

Orange County Computer Consultant can test the security of your network.

Orange County Computer Security

Orange County Computer Consultant provides the following security services:

Vulnerability Identification.
Server Hardening
Scan your network for open ports.
Firewall configurations.
Anti-Virus solutions.


If you are a small business with under 25 users we can provide you with a custom security solution. There are stories daily about companies being hacked. How confident are you about the security of your infrastructure? Is your clients data secured? Are your leads secured? Are employees sending out confidential data through email? Is any company information being posted on Facebook?

Orange County Computer Consultant can work with you to secure your network, servers and desktops. Dont wait for a hacker to gain valuable information from you. Give us a call or email us today.

Orange County Computer Security

Are you a small business owner? Are you concerned about the security of your network or servers? If you are on the Internet chances are attackers are testing your defenses. Do you have anti-virus in place? Do you have a firewall? Is it configured correctly? Do you have laptops that are used in your business? Is the data on those laptops secure? Is it encrypted?

I can help with all of these issues. I can install security software on your business servers. I can cut down the amount of SPAM you receive. I will have your email servers scan for viruses, trojans and other malware. I can install and configure encryption software on your laptops to protect confidential information.

If you have security needs. Give me a call or email me today.