See where employees spend their time online and how they use email.

It is critical to have feedback on how effective a security device is. With clear, detailed, searchable reports, Astaro can save you thousands by providing the information you need to adjust configurations, properly state how the Internet can be used, and get the most out of the product.

 

Descriptions & Screenshots User Reporting

Companies can be surprised by exactly how much is lost in wages and time while 50% of their workforce wastes two hours each day surfing to inappropriate places.. The mere act of installing a filter on your network can set the perception that Internet usage is monitored. As soon as the first “blocked” page is seen, employees will adjust their surfing habits accordingly knowing that where they go is now being monitored.

Detailed reports also demonstrate how much bandwidth is being used so that if a single person is responsible for the majority of web use at the company, this can be investigated and addressed. Reports are available at a high level summary viewer you can dive deeper into an individual user’s usage and get a full list of their activity. Reporting by category is also useful reverse reports showing all users that accessed a particular site or category can be created and inappropriate web-usage can be addressed.

User reports are also available for Email, letting you know what amounts of messages are sent and received by everyone in the company, so if a user is infected with a program that is sending hundreds of advertising messages per second, this behavior can be recognized and stopped.

 


 

Available Platforms

Astaro Security Gateway Hardware Appliances

Astaro Security Gateway Hardware Appliances

Our hardware appliances are purpose built, high-performance security devices. They integrate Astaro’s security applications with a hardened Operating System on optimized Intel-compatible server systems that cater to every business size. This section details the series of Astaro Security Gateway hardware models available.

Astaro Security Gateway Software Appliance

Astaro Security Gateway Software Appliance

Our software appliances include the operating system and all security applications bundled within a single software image. While offering the same capabilities as the hardware platform, they can be easily installed on your hardware of choice – maximizing deployment flexibility. The Astaro Security Gateway software appliances are much easier and faster to set-up than software applications that require the installation of an operating system in advance.This section details the security applications available, technical information and deployment scenarios.p

Astaro Security Gateway Virtual Appliance for VMware

Astaro Security Gateway Virtual Appliance for VMware

Our virtual appliances include a software appliance which has already been pre-installed and pre-configured for VMware environments. Being the first unified threat management product that has been certified as “VMware Ready”, it allows for the secure and easy deployment of an "all-in-one" security solution within a virtual environment. This section details the security applications available, technical information and deployment scenarios.

 


 

Technical Information

Astaro’s products are equipped with one of the most extensive logging and reporting systems keeping you always up-to-date on what’s going on within your network.

  • Inline Reports
    • offer up-to-date statistical information for each security application, like Top Domains/Users by traffic or time spend, top email senders/receivers or top blocked attacks
  • Reporting Graphs
    • Provide RRD style flow graphs with daily, weekly, monthly and yearly statistics about hardware components such as CPU, RAM, and hard disk usage, IPS activity, and web usage by IP address or user name
  • Executive Reports
    • Includes a summary as well as mayn details about TOP-10 statistics taken from Inline reports and reporting graphs for over 60 areas
    • Can be generated at will and also emailed out to a list of users (e.g. admin and/or CEO) on configurable schedules
  • Report Anonymization
    • Hides user names and addresses within reports
    • Uses 4-eyes-principle to unhide selected names