This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Sophos completes acquisition of Astaro to launch network security division

Share this article:

Sophos' acquisition of Astaro will see the former offer a network security division.

The completion of the acquisition that was announced on May 6th, will combine endpoint protection with unified threat management (UTM). Once integration is complete, the Sophos portfolio of security products will combine Astaro's network security with Sophos' threat expertise with the initial integration of the Astaro Security Gateway and Sophos anti-virus.

Longer term, the integration will allow central management of anti-malware, web and data control policies across endpoint, mobile and network enforcement points, including consumer-owned mobile devices and branch, home or remote offices.

Also upon completing Astaro partner certification, Sophos partners will have access to the full network security portfolio.

Steve Munford, chief executive officer of Sophos, said: “Together, Sophos and Astaro have the ingredients to uniquely solve today and tomorrow's increasingly complex security challenges while allowing IT to enable users to work more flexibly and embrace new devices and applications.”

Jan Hichert, co-founder and former CEO of Astaro and now Sophos' senior vice president and general manager of network security, said: “We founded Astaro with the mission of bringing network security products to organisations of all sizes and accomplished this goal by creating easy-to-use, UTM solutions that addressed several facets of network security.  However, as the threat landscape continued to evolve it became clear that gateway security alone would no longer be sufficient to effectively secure a network.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.