Enforce rules about online chatting and file sharing.

Instant messaging is often used for personal and non-work related content and users put themselves and others at risk by transferring files over this medium which can circumvent protection methods in place at the gateway. File sharing networks take up precious bandwidth slowing down the network and making others suffer. Using Astaro’s IM/P2P Filtering you save money by restricting access to these programs.

 

Descriptions & Screenshots IM/P2P Filtering

The Instant Message and Peer to Peer filtering provides extended security benefits over a firewall alone. Many programs have been cleverly designed to ensure they can connect through security devices, and have the ability to use common ports in order to reach the Internet. Some are smart enough to scan the device blocking them in order to find a port which is allowed through. They then configure themselves to use this path and can repeat this process upon each startup. With this design, they are impossible to block without a capable solution.

Using signature-based recognition, Astaro can identify IM and P2P programs easily, and gives the administrator the option to individually block these programs. Administrators can also monitor how often they are used, or remove the ability for Instant Message programs to send and receive files. Peer to Peer programs that use common transfer networks are recognized by their core technology. Many utilities and programs that appear to be a dedicated product are really just a wrapping for an engine like Bittorrent or Gnutella. Astaro’s filtering isn’t fooled by this and if Bittorrent is set to block, any program which uses this network will be blocked.

 


 

Available Platforms

Astaro Security Gateway Hardware Appliances

Astaro Security Gateway Hardware Appliances

Our hardware appliances are purpose built, high-performance security devices. They integrate Astaro’s security applications with a hardened Operating System on optimized Intel-compatible server systems that cater to every business size. This section details the series of Astaro Security Gateway hardware models available.

Astaro Security Gateway Software Appliance

Astaro Security Gateway Software Appliance

Our software appliances include the operating system and all security applications bundled within a single software image. While offering the same capabilities as the hardware platform, they can be easily installed on your hardware of choice – maximizing deployment flexibility. The Astaro Security Gateway software appliances are much easier and faster to set-up than software applications that require the installation of an operating system in advance.This section details the security applications available, technical information and deployment scenarios.p

Astaro Security Gateway Virtual Appliance for VMware

Astaro Security Gateway Virtual Appliance for VMware

Our virtual appliances include a software appliance which has already been pre-installed and pre-configured for VMware environments. Being the first unified threat management product that has been certified as “VMware Ready”, it allows for the secure and easy deployment of an "all-in-one" security solution within a virtual environment. This section details the security applications available, technical information and deployment scenarios.

 


 

Technical Information

Astaro’s IM/P2P Filtering technology reliably detects usage of even the smartest Instant Messaging and Peer-to-Peer programs like Skype and allows enforcing company-wide usage policies.

  • Manages the Use of Instant Messaging Clients:
    • AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google Talk/Jabber, Tencent QQ, Skype
  • Manages the Use of Peer-to-Peer Applications:
    • Applejuice, Ares, Bittorrent, Direct Connect, Edonkey, Gnutella, IMesh, MUTE, Manolito, Pando, Share, WinMX, Winny
  • Provides Flexible Control
    • Depending on application the administrator can decide to either allow or block it completely, block file transfers only or just log its usage
    • Specific users/IP addresses can be excluded from general rules
    • Specific hosts and networks can be excluded from IM/P2P control
  • Granular Bandwidth Control
    • Define max. allowed bandwidth per application