{"id":944,"date":"2011-05-06T00:00:00","date_gmt":"2011-05-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2011\/05\/06\/sophos-acquires-astaro\/"},"modified":"2021-12-30T11:38:27","modified_gmt":"2021-12-30T11:38:27","slug":"sophos-acquires-astaro","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2011\/05\/06\/sophos-acquires-astaro\/","title":{"rendered":"Sophos acquires Astaro"},"content":{"rendered":"<p>Sophos buys Astaro.. wow, interesting move.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThe combination of Astaro\u2019s comprehensive portfolio of network security solutions alongside our endpoint, mobile, and email and web threat and data protection capabilities will enable us to continue to deliver on our vision of providing complete security without complexity wherever the user and company data resides,\u201d stated Steve Munford, Chief Executive Officer, Sophos.<\/p>\n<p>The market for multi-function security appliances has continued to grow because organizations of all sizes want better protection against security threats and need to support their users and distributed workplaces in a comprehensive, easy to use, efficient way. <\/p>\n<p>&#8230;Astaro, with $56 million in billings and 30% year over year growth in 2010, is the fourth largest dedicated unified threat management (UTM) provider, leads the market and has sustained fast growth due to its strong track record of innovation and robust portfolio of feature rich network security solutions. <\/p>\n<p>&#8230;\u201cDemand for network security solutions with more comprehensive and high-quality protection is accelerating fast, and yet companies are struggling with the complexity of multiple security solutions to serve these needs,\u201d stated Jan Hichert, Chief Executive Officer, Astaro. &#8230;  Together, we will deliver to customers the ability to apply consistent security and web and application controls regardless of where the user is or where the network boundary may lie.\u201d<\/p>\n<p>&#8230;Solutions Fuelled by Best-in-Class Threat and Data Protection and Web and Application Control: Solutions will offer complete protection to meet complex threats and malware challenges, especially from the web, applications and social engineering vectors that require full visibility and coordination, supported by SophosLabs and renowned malware and threat expertise.<\/p>\n<p>Enriched Channel Offerings: The combination of Sophos and Astaro will offer partners a complete and differentiated range of security solutions and services to meet customer needs not answered in the market today.   Partners can deliver coordinated threat and data protection, and policy from any endpoint to any network boundary with solutions that can be deployed in any way: software, virtual, appliance, via a cloud services platform and backed by security updates from Sophos Live Protection for real-time, high-performance protection for end users no matter where they are.<\/p>\n<p>http:\/\/blogs.csoonline.com\/1498\/sophos_acquires_astaro<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-944","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=944"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/944\/revisions"}],"predecessor-version":[{"id":3431,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/944\/revisions\/3431"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}