Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Security Products for SBS Server

Posted on 2006-04-20
8
Medium Priority
?
139 Views
Last Modified: 2010-04-11
I have been researching Security products and ran into a company call Astaro.  I have never really heard of them myself and was wondering if anyone has any info or experiance with this company and the quality of their products?
0
Comment
Question by:waytron
  • 4
  • 4
8 Comments
 
LVL 6

Expert Comment

by:nexissteve
ID: 16507587
Astaro makes excellent products.

The firewall they produce is excellent. In large enterprise most companies utilise microsoft ISA, Checkpoint, Cisco etc.

I have seen Astaro implementations in SOHO, Small - medium business and Technial Institutes.

I have used Astaro at home for my personal use for a number of years.

SBS server utilises ISA, The biggest issue facing SBS users in small to medium budiness is how to get support from microsoft when utilising a 3rd parties product in front of one of their products. I would suggest that this is why you do not see as many implementations of Astaro in the "microsoft" areas. Also Astaro would require a seperate server / machine.

Hope this helps.

Cheers

S

0
 
LVL 1

Author Comment

by:waytron
ID: 16507649
Thank you for your response.  I am not sure that I understand.  Why would it require a seperate machine?
0
 
LVL 6

Accepted Solution

by:
nexissteve earned 1000 total points
ID: 16512565
Astaro is a linux distribution. If I understand your question you are asking if you can run it with Microsoft SBS.

The answer would be NO.

Astaro installs on its own machine and is designed to be used between your servers and un trusted environments.

ie. Between your SBS server and the internet.

http://en.wikipedia.org/wiki/Demilitarized_zone_(computing)

If you check the diagram in the link above, Astaro would be the box represented as the firewall.

Microsoft SBS is designed for small business up to 75 employees and has a built in firewall "ISA".

Hope this helps

S
0
The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

 
LVL 1

Author Comment

by:waytron
ID: 16512707
Ok, I understand now.  I was thinking it was a software firewall like Zonealarm or BlackIce that could be installed on a windows computer.  Now I see why they sell the whole firewall appliance.

Thank you very much.
0
 
LVL 6

Expert Comment

by:nexissteve
ID: 16512713
Your very welcome,

You should take a look at the product some time. All the config is via Web and the install is simple.

The layout is very much like checkpoint.

Cheers

Steve
0
 
LVL 1

Author Comment

by:waytron
ID: 16512728
What is needed for hardware?  Just a linux box with 2 NIC cards?
0
 
LVL 6

Expert Comment

by:nexissteve
ID: 16512742
Just a box with 2 nics. The CD has an install wizard.

512mb with 500mhz processor or better.

Its way easy to instal. and free for home use. Allows up to 10 machines to connect to it at home.

cheers

Steve
0
 
LVL 1

Author Comment

by:waytron
ID: 16512779
Unfortunitly, I have more than 10 here at home, but I have many extra PIII 500 or better to try it out.  I have 9 computers on my home network, 3 ReplayTV units, 2 network video cameras and a couple of Network attached hard drives.  So I would be over the 10 max, but I might just give it a try anyway just to check it out.

Thanks again for all the info.  Very Helpful!!
0

Featured Post

Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question