Entries in Astaro (16)

Wednesday
Jun242015

Practical IT: What is encryption and how can I use it to protect my corporate data?

by Ross McKerchar on May 21, 2015    from nakedscurity

There’s been a lot of talk about encryption in the media lately.

You hear about who uses encryption, and who doesn’t (lots of companies don’t, to their own detriment).

And you hear about who wants to be able to bypass encryption (some law enforcement and national security agencies), and who doesn’t (Google, Apple, privacy advocates, etc.).

The encryption debate is important, but unfortunately, encryption is complex and the discussion can be hard to follow for people outside of the security community.

Businesses often don't realise why encryption is important, and how they can use it to protect their data.

In this article I will seek to answer some common questions about encryption by covering two areas: 1) a very brief explanation of encryption, and 2) a couple of the most common use-cases which business needs to be aware of.

What is encryption?

Encryption is a method of scrambling messages in a format that is unreadable by unauthorised users - it is, simply put, the best way to keep data secure from spies, thieves or accidental exposure. (Not to be confused with steganography, which is all about hiding messages, rather than making them unreadable).

Cryptography - the art and science behind encryption - uses algorithms to turn readable data (plaintext) into unreadable format (ciphertext).

Without getting too deep into the details, it's helpful to think about it like this: when you encrypt data you are storing it like you would money in a safe - you need a key to unlock the safe to get the money out (my apologies to any cryptographers reading this for the gross over-simplification!).

(If you want to learn more, I recommend my fellow Naked Security writer Paul Ducklin's great explanation of public-private key encryption.)

There are loads of ways to use encryption, but for organisations concerned about data loss, two very important areas to understand are full-disk encryption and file-level encryption.

Full-disk encryption vs. file-level encryption

Encryption can be used in many different ways.

Say your employee accidentally loses a USB drive with valuable data on a train, or their laptop gets stolen when they leave it alone in a coffee shop while they go to the bathroom (it happens).

The physical kit can be replaced, but the data on them could end up in the wrong hands and cause considerable harm - you might face financial penalties (depending on your local laws and industry regulations).

Or you might lose customers when word gets out that their personal data was leaked. You may very well be legally obliged to tell them. Of course, morally, telling them is always the right thing to do, regardless of legality.

However, if the laptop or USB drive was strongly encrypted, the data is unreadable to someone without they key and you likely won’t have legal issues to worry about.

Laptops, USB drives, and even smartphones can be encrypted using what is known as full-disk encryption. That means the entire hard drive of the device and everything on it is protected by encryption - from the operating system to program files all the way down to temporary files.

Full-disk encryption is also relatively simple to implement - laptops and smartphones now come with the capability built in, what’s called native encryption.

However, full-disk encryption can only keep your stuff secure when it's on the device. The second anything leaves the encrypted device, it is "magically" decrypted and readable by all. This has important implications for your backups or files you've uploaded to a cloud service or attached to an email.

If you think about the analogy of money in a safe, the encrypted disk is the safe, and the money is your data. Once you take your money out of the safe it is no longer protected.

Conversely, if you have file-level encryption, every file has a "padlock."

With file-level encryption, your data is protected when it is in transit, or stored somewhere in the cloud.

But there is a downside - file-level encryption is harder to manage than full-disk encryption, because whenever you want to access the data, you need the key. As you may want access from many devices and many places, this requires careful key management.

When and how should you use encryption?

Full-disk encryption barely affects system performance at all, but if you try to encrypt everything at the file level, it will quickly become unmanageable.

You need to think a bit more about what data you want to encrypt and why. You'll likely want to focus on file-level encryption for sensitive data and/or data that you copy to other places - for example, documents you want to access on your phone as well as your desktop, or from a service like Dropbox.

It's important to understand that file-level encryption doesn't replace full-disk encryption. They complement each other. If you only encrypt your own files and not the full disk then it's very easy to miss something. Chances are your computer stores copies of your data in all sorts of places you didn't think about.

Most companies will also want the IT department to carefully manage the encryption keys across various devices. Without this central management, data could easily be lost if a person leaves the company or loses their decryption password. Unlike passwords used for access, passwords used for encryption can't simply be reset by a sysadmin if they're forgotten.

A smart company will make sure the master decryption keys are very well protected. Even smarter companies will ensure that no single person has full access to the powerful key. One way of doing this is designing a system such that two or more people need to contribute towards the decryption process (segregation of duties).

Good encryption software will have capabilities to make key management and segregation of duties relatively simple.

Friday
Nov232012

ASG V7 will end-of-life soon

imageSophos  

Upgrade before end December 2012

Important: Version 7 of the Astaro Security Gateway (ASG) will end-of-life on 31 December 2012. On this date Sophos will stop all security patching, pattern updates, firmware updates and technical support for this version. If you still have an active installation of ASG V7 you should move to a newer version before this date.

Your migration options
You should migrate to the latest stable version of Sophos UTM 9 or ASG V8, both of which continue to receive security fixes and deliver ongoing protection for your company. For a complete list of current options, pricing, and any other questions you have please contact us at Computer Connections.

You can also take advantage of our special, limited-time opportunity to get a new appliance model at a discounted price through our Hardware Refresh Program! Speak to us to learn more.

Hardware
Hardware appliances running V7.510+ can use the option on the Up2Date menu to one-touch-upgrade to ASG V8. This brings you to the V8 platform automatically but requires further Up2Dates after the migration is complete to be on the latest version of V8.

UTM 9 is the successor to ASG V8 and includes a number of new features including the HTML 5 VPN portal and the option to add Endpoint protection. You cannot upgrade directly to this platform from ASG V7 via a one-touch operation. To move from ASG V7 to UTM 9 you will need to install UTM 9 and then restore a backup file. While your legacy configuration should import successfully, for best results you should first restore your backup into ASG V8 and then take a backup from that platform into UTM 9.

Software
Installations running an ASG V7 software appliance on their own hardware need to install an updated version and then restore a backup file of their configuration. This will apply all your settings except for log files and on-box reports. Logs can be exported in bulk from within the WebAdmin beforehand. Reports will begin anew on your updated platform as existing reports will be removed.

For further information or help upgrading please call us at 724-838-7526 and we will get one of our technical support team assigned to assist you.

Thursday
Aug162012

Sophos (Astaro) UTM H/W refresh program is here!

Upgrading to the new UTM9 version software may not be available if you have older Astaro hardware. See table below:

image

The previous table provides on overview about ASG/UTM hardware models and revisions supported by UTM 9, where each revision belongs to one of the following categories:
“Not Supported”
 UTM 9 will not install
“Not Recommended but Supported”
 UTM 9 will install
 Warning at install time about possible performance issues
“Fully Supported”
 UTM 9 will install
 No warnings

The program is available beginning July 16th, 2012 and ending March 31st, 2013. Delivery of the replacement units will begin September 12st, 2012. Every ASG appliance is eligible for participation in the program – in advance registration of serial number is required.

There is a one-time discount that will be given directly to you the customer. This depends on the model that your are replacing. See table below for what would be your discount:

image

Contact us for the proper procedure to follow to take advantage of this discount. 1-800-640-7506.

Wednesday
May232012

Astaro Security Gateway V7 End-of-Life Reminder

imagePress Release: As originally announced last year to our partners, Version 7 of Astaro Security Gateway will be end-of-life on December 31st 2012.  As this date approaches we’d like to provide an update on the options available if you still run this version of our product. If you do not have an ASG V7 installation you are unaffected by this announcement (and following ones) and can disregard it. If however you maintain an active installation of ASG V7, you should read on for what the sun setting on this version means for you.

On December 31st 2012, we will conclude all maintenance, security patching, updates, and any further kind of support for Astaro Security Gateway (ASG) Version 7. Before this date occurs, you should migrate to the latest stable version - either to ASG V8 or its successor UTM V9 that will launch in July 2012.  Customers with an existing valid license and maintenance can choose several paths for upgrading their installation to a newer version. For a complete list of current options, pricing, and anything not covered in this reminder announcement, you should always contact your partner or sales representative who will be happy to assist you in answering any questions.

Installations running an ASG V7 software appliance on their own hardware need to install an updated version and then restore a backup file of their configuration, which will apply all your settings except for log files and on-box reports. Logs can be exported in bulk from within the WebAdmin beforehand, while reports will begin anew on your updated platform as existing ones will be purged. If you have an Astaro Security Gateway hardware appliance running V7.510+, there is the option from the Up2Date menu to one-touch-upgrade to ASG V8. This will bring you to the V8 platform automatically, but will require further Up2Dates to be applied after the migration is complete to bring you to the very latest release of the V8 platform. This summer in July of 2012, we will release UTM 9 which is currently in open beta. This platform cannot be directly upgraded to from ASG V7 via a one-touch operation. In order to move from ASG V7 to UTM 9, you will need to re-install UTM 9 when it is released and then restore a backup file. Most features should import successfully, but for best results you should first restore your backup into ASG V8 and then take a backup from that platform into UTM 9.

As we move closer to the End-of-Life date for V7, we will send out additional notices and information covering this topic via email to registered V7 administrators, our Partner newsletter, and other channels. Our newest versions offer complete security, better performance, and hundreds of new features to make your business safer and more productive. We look forward to having you as customer on our latest technology.

-Angelo Comazzetto

Sr. Product Manager

Monday
Oct032011

National Cyber Security Awareness Month

Cyber Security Awareness Contest for Students!

Astaro is asking us to join them in their quest to educate students about cyber security! During the month of October, Astaro will be running a contest, giving students the chance to win a free laptop!

The rules are simple: Record a 1-2 minute video answering two important questions: What does cyber security mean to you, and what do you do to stay safe online? Act it out, record a song, make up a dance, or come up with some other way to express your thoughts on cyber security!

Check out some of the submissions now and vote for your favorite!

Watch Now

Cyber Security Month more info

Astaro Promotes Cyber Security Awareness more info

Tuesday
Sep062011

PR: Astaro V8.201 HTTP Proxy Issues

imageSince the release of Astaro Security Gateway Version 8.201, we have noticed an increased amount of customer issues regarding the HTTP Proxy. Below is an overview of the issues raised:

  • 18771: Passwords with special characters (@, =, etc.) cause authentication to fail when using "Transparent w/ Auth" mode
  • 18929: "Transparent Proxy w/ Auth" is not working properly
  • 18880: Edir SSO authentication still times out in HTTP Proxy after V8.201
  • 18825: HTTP Proxy doesn't reauthenticate AD SSO client after auth exception matched
  • 18653: If the HTTPs Proxy is enabled, login to some websites may result in an "Internal Server Error"
  • 18936: HTTP Proxy: SSL tunnel handler does not close client connection in all cases

For a complete list of open issues, please refer to our Known Issues List in our KnowledgeBase: http://www.astaro.com/lists/Known_Issues-ASG-V8.txt

We are working on a HTTP Proxy patch package, which we plan to release early next week.

Tuesday
Aug232011

PR: Astaro Version 8.2 Released

Astaro has officially released Astaro Security Gateway Version 8.2 which you can now easily install via the Up2Date system in your WebAdmin.

The latest version of Astaro's flagship product includes more than 60 new features. The major ones are:

  • A new web reporting engine*
  • Support for 3G/UMTS USB modems
  • Web Application Security form hardening
  • Next Generation Firewall/Application control features
  • A technical preview of Astaro Log Management

Application Control
One of the new features: Application control – gain visibility and block unwanted applications

V8.2 also offers up to triple IPS performance and double VPN performance than former releases, depending on the hardware model. Also the new Application Control engine is twice as fast as the former IM/P2P engine.

Additionally available via Astaro Up2Date, is V8.201 which solidifies the V8.2 release and should be installed simultaneously. You can find more information regarding the latest releases in our Up2Date Blog here:

Best regards,
Your Astaro Team

*Important Note* -Installing ASG 8.200 via Up2Date from 8.103 will clear the existing Web Reporting Data. This is necessary as the database systems are vastly different. If your Web Security reports are critical, please wait before installing V8.2. We are currently working on an update where web reports can be re-added manually from log files. We will let you know as soon as this feature is ready.

Wednesday
Aug172011

ASG V8 Support–Problems and Work Arounds

PR:Open issues with 8.2 and 8.201

Article Number: AKB001197

They plan to fix them version 8.202. This list can also be found at http://www.astaro.com/lists/Known_Issues-ASG-V8.txt.

ID18567 8.200 "MIME blocking inspects HTTP body" is broken
Description: By enabling "MIME blocking inspects HTTP body" in the HTTP proxy, there might be some cases where the recognition of the MIME type fails and files cannot be downloaded.
Workaround:
Fixed in: 8.202

ID18653 8.200 If the HTTPs-Proxy is enabled, login to some websites may result in "Internal server error"
Description: By using the HTTPs-Proxy, some websites requiring authentication might not be reachable. This happens on websites using HTTP keepalives using POST requests.
Workaround:
Fixed in: 8.202

ID18769 8.200 If virus scanning of a website failed, no error message is shown in the browser.
Description: If virus scanning of a website failed, no error message is shown in the browser. Instead, the user gets a blank page.
Workaround:
Fixed in: 8.202

ID18695 8.200 Policy routing in combination with Application Control may cause problems
Description: Policy routing in combination with Application Control may cause problems. This is caused by wrong connection handling.
Workaround: Disable Application Control.
Fixed in: 8.202

ID18604 8.200 Web Application Firewall mixes backend websites
Description: In case multiple virtual web servers exist with exactly the same settings but listening on different interfaces, the WebAppication Firewall mixes the real web server sites. This only happens, if the first entry in the domain list is the same for all involved virtual web servers.
Workaround: Make sure that each virtual web server's first domain name is unique.
Fixed in: 8.202

This article can be found under "https://support.astaro.com/support/index.php/Open_issues_with_8_2_and_8_201"

Monday
Aug152011

PR: Astaro RED 10 Revision Now Available

2011-08-15_1323New Astaro RED 10 Revision Now Shipping

The successful solution for branch office security, Astaro RED, has undergone an upgrade with major new enhancements. The new revision is now shipping.

We are pleased to announce that the revision 2 of our successful RED 10 appliance is now shipping from our warehouses.

The new revision offers the following major enhancements:

  • USB port for connecting 3G/UMTS modems for WAN failover via mobile networks
  • Dual firmware support, which keeps the unit alive - even if someone pulls the plug while the unit is downloading and flashing a new firmware
  • Additional status LEDs allowing for easier diagnostics

Please note: The new revision is supported by all Astaro Security Gateway (ASG) software releases starting from V7.508. However, the USB port requires at least V8.200 running on your central ASG.

Monday
Aug152011

PR: Astaro Security Gateway V8.2 is Available!

2011-08-15_1323With the release of Astaro Security Gateway Version 8.2, Astaro’s flagship product now includes more than 60 exciting new features.

The major ones include:

  • A new web reporting engine
  • Support for 3G/UMTS USB modems
  • Web Application Security form hardening
  • Next Generation Firewall/Application control features
  • A technical preview of Astaro Log Management

You can find more information and a guide on how to install the up2date Package here.

V8.201 will be available via Astaro’s download servers shortly. This update fixes some smaller issues found in the new version. Both, Versions 8.200 and 8.201 will be available for direct installation via your WebAdmin interface by the end of the month.

Thursday
Jul282011

Astaro, bug fix 16593 is listed below

The updates went from 8.103 to 8.200, which will be released next week.  
We will see what happens after I get 8.200 installed for everyone. 
2011-07-28_1340

Matt Shafer

Tuesday
Jul052011

Astaro Acquisition by Sophos Completed

Astaro - Sophos Network SecurityWe received an email detailing primarily that there will be little change in the overall function that we have with Astaro and the products that we work with from them. What we will see is a different email format for our contacts, a new logo and updated marketing material but for the most part it will be business as usual.

We look forward to the expanded product line and adding the long list of Sophos products to our arsenal. As we become more familiar with these products look for more information in this blog as we explore these new products.

Friday
Jul012011

Astaro Version 7

Logo AstaroFrom the Astaro Blog:

Astaro will continue to support the release V7 of ASG, AMG and AWG for 18 months after that date, until it’s End-of-Life on December 31st, 2012. Support includes bug and security fixes (System Up2Dates) and Pattern Up2Dates and technical support (via web form and phone).

If a customer decides to renew for longer than a year now, we should plan on upgrading them to V8.  The process takes approximately 1 hr, if everything goes smoothly.

1. Clone existing Astaro to new hard-drive.

2. Load version 8.

3. Restore config file.

Monday
May092011

Special News: Astaro joins Sophos

imageAstaro announced that Sophos and Astaro have signed a definitive agreement to be acquired by Sophos. Together with Sophos they will offer a complete security solution, deliver protection regardless of where the use is, what device they are using, or where the company’s network boundary may lie.

imageWith more than 100 million users in 150 countries, Sophos is the fastest growing of the three largest endpoint security companies. And with more than two decades of experience, Sophos is regarded as a leader in security and data protection by top analyst firms and has received many industry awards.

Astaro will be the network security product line within Sophos and will be able to leverage a global brand and a larger organization with complementary technologies. We will stay very focused on high quality network security products and their role in what will be the industry's first coordinated gateway and endpoint security solution.

We see this as a positive change giving both companies the products that each needs to widen their security support.

Tuesday
Apr052011

Astaro Endpoint Security–Coming Soon

USB drives are the most popular way to transfer data. Keeping endpoints safe and preventing data loss on PCs and mobile devices is a challenging task. Astaro Endpoint Security solves this by controlling the usage of USB ports, DVD drives, and other peripheral devices. Managed by a central Astaro Security Gateway, security agents can be easily enrolled to all endpoints on your local network or even at remote locations. Comprehensive reporting tools allow you to analyze device usage and even track their location.

Click to read more ...

Friday
Dec032010

Astaro Mail Archiving

2010-12-03_1239Mailbox servers often suffer from the heavy load of growing email traffic and administrators struggle with mailbox quotas and user storage demands. Through the Astaro Mail Archiving Service, you can free up valuable server resources and get control of compliance requirements while improving productivity of end-users at the same time. All of this is provided as a reliable hosted service with no need for additional hardware or software. Learn more about the individual features which make up the Mail Archiving service.

Compliance
Enforce requirements from local laws and regulations.

In many countries, businesses are obliged to archive emails for several years due to legal requirements. Astaro Mail Archiving Service lets you decide what needs to be archived and for how long. Where email audits are necessary, discovery tasks can be fulfilled with special auditor privileges within the archive, following a four-eye principle to comply with data protection requirements.

2010-12-03_1253Modern industrial and governmental rules and regulations make email archiving an obligation for all businesses. Emails must be archived for a certain period of time and in the case of audits, specific information must be presented within due time.

The Astaro Mail Archiving Service gives enables you to offload emails from your messaging servers and provides end users with a stunning discovery experience. The archive also offers granular control over retention periods, so that you can set individual periods per mailbox or even filter for specific content or exclude certain emails from being archived at all.

While these easy-to-enforce retention policies can be configured within the graphical interface of the ArchiveManager, the even more important question is how you will rapidly find and produce important emails when required. Users with special auditor privileges – optionally based on a four-eye principle – can instantly access and search through the companies entire email communication, providing results within seconds. Accessible through a web-based discovery portal, legal departments or auditors are now enabled to easily retrieve information so that the IT department is no longer involved in these tasks.

Designed as a cloud-based service, Astaro Mail Archiving doesn’t require the deployment of additional hardware or software. By hosting the service in redundant data centers that are highly available and practically offer unlimited scalability, initial deployment efforts are kept to a minimum and in the future will scale automatically when requirements are growing.

Capacity:

  • Storage Capacity: unlimited
  • User Capacity: unlimited.

Supported E-Mail Servers & Protocols:

  • Microsoft Exchange Server 2003, 2007, 2010
  • Support for SMTP, POP3
  • IMAP based Journaling

Supported Clients:

  • Microsoft Outlook Client 2003, 2007, 2010