Access "Product Review: Astaro Mail Gateway 4000"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
EMAIL SECURITY Astaro Price: $7,995 plus $3,945 for security subscription Network firewall vendor Astaro has widened its portfolio with the introduction of the Astaro Mail Gateway, an antispam/antivirus security appliance. We tested the AMG 4000, the largest of four Mail Gateway appliances, and found it well-suited for the small business market with an easy-to-use management system, appropriate feature set and reasonable antispam performance. Antispam B We looked at how well the AMG fared in a real-world test of 10,000 live email messages. Astaro has positioned itself against Barracuda, with a similar feature set and market focus. We tested sending the same messages through both gateways as they entered our network, with similar results. The AMG caught between 76 percent and 94 percent of spam compared to Barracuda catching between 83 percent and 90 percent. The range of numbers is because both gateways use the concept of "suspected spam," so the figures depend on whether you consider suspected spam to be spam or not. Based on an easy-to-configure policy, ... Access >>>
Premium Content for Free.
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
- 10 tips to improve your network security strategy in a recession
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
- Product Review: PGP Endpoint
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
- Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Secure file transfer: Send large files fast, but keep your system safe
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
Is your mobile security strategy combating the wrong enemy?
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
What's the best focus for MDM strategy now?
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...