View Post

Reporting coming to Clavister InControl

In Blog post by Mattias Nordlund0 Comments

Reporting is a new feature that will be integrated and included in Clavister InControl version 1.50 which will be available later this summer. This new reporting feature will allow you to generate informative reports using our predefined reports, or fully customised reports to suit your specific needs. It will give you as an administrator a good view into what is happening in your networks and give you the ability to share this information with users and customers in an easy and powerful way. Highlights Multiple pre-defined reports Powerful report design tool where you can create your own reports and define and customise each report section with Section Title, Body Text, Graphs, Log Analyzer Query and Filters Possibility to …

View Post

IT and network security lessons from Game of Thrones

In Articles by Clavister Blog Staff0 Comments

The epic fantasy drama Game of Thrones chronicles the struggles of the family houses of Lannister, Stark, Baratheon and Targaryen to secure absolute leadership of the Seven Kingdoms. Underpinning the political plotting and military manouvers to win the Iron Throne are a series of security leaks, breaches and flaws which prove pivotal to families’ successes – and failures.  Despite the fact that communications in Westeros are done by messengers on horseback and ravens, rather than email, mobile and IM, there are still serious security lessons that can be learned. InformationAge has published an article by Clavister CEO, Jim Carlsson which looks at the key security issues highlighted in the TV series, …

View Post

itSoft delivers security-as-a-service with Clavister

In Articles by Clavister Blog Staff0 Comments

We have recently extended our partnership with itSoft, a leading ISP and cloud managed services provider in Croatia.  itSoft is using our next-generation firewalls to secure its own data centers, and deliver a suite of managed security services to customers in central Europe. itSoft is offering its customers a range of service options based on Clavister solutions, from firewall-only to firewall with IPS, bandwidth management, application control, and so on.  Customers can build their own security-as-a-service (SECaaS) package which can be updated and changed to meet current requirements, paying only for the services that they deploy. Vedran Vujasinović, itSoft’s Chief Information Security Officer, said: “As we deliver hosted solutions to our …

View Post

Clavister introduces its new blog

In Blog post by Nikolas Georgii0 Comments

Welcome to our brand new blog – Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments. Our network security solutions are used by a wide range of organizations throughout the world, including mobile and network security solutions for large enterprises, cloud service providers and telecom operators. Our product portfolio demonstrates world-class performance, flexibility and robustness. We continue to innovate and pioneer new and exciting areas in network security. Our Clavister product line is available both as hardware appliances and virtual appliances. Each appliance series offers the same award-winning Clavister functionality and gives you the ultimate choice in selecting the right network …

View Post

Gemalto: An Uneasy Sense of Deja vu

In Articles, Blog post by Nikolas Georgii0 Comments

Following the recent revelation that NSA and the British GCHQ hacked into leading digital security company Gemalto, potentially stealing millions of SIM card encryption keys, the IT Security and comms industry could be forgiven for feeling a strong sense of déjà vu. Less than two years since the initial Snowden leaks, the news should perhaps should come as no surprise, but once again businesses globally were left asking just exactly who was targeting their data. While ‘lawful interception’, that is a well-documented, clearly traceable process with a legal basis and that offers no surprises, has always been accepted, the uncovering of widespread state sponsored hacks and surveillance has led to …