View Post

How do you solve a problem like Heartbleed?

In Blog post by Clavister Blog Staff0 Comments

Nearly 18 months after it was discovered, the widespread Heartbleed vulnerability is still affecting hundreds of thousands of devices globally, especially in connected ‘Internet of Things’ systems. The IoT search engine Shodan has discovered over 200,000 devices which still have the vulnerability.  Shodan posted on Twitter a map displaying the countries which had the highest numbers of connected devices. Heartbleed was discovered in April 2014, and is a serious flaw in the popular OpenSSL cryptographic software library.  It enables the information protected by the SSL/TLS encryption used to secure the Internet to be stolen, and is built by default into millions of software and hardware products, including network devices such as home …

View Post

Security salvation for German church administration

In Blog post by Clavister Blog Staff0 Comments

These days, even churches need network security to protect their data against worldly problems such as hacking, interception and malware attacks.  A major church administration in southern Germany is protecting its private cloud with Clavister’s Eagle series, deployed by our German partner IT-Systemhaus Jerg.   The administration has been using our E5 firewall appliance since the start of the year for functions such as antivirus and web content filtering. Over the next two and a half years, more than 100 of the firewalls will be deployed across the parish network.   The administration manages the pastoral, educational and other ecumenical activities of all the churches within the network. With the …

View Post

Hacking the smart city – time to take notice of the warning signs

In Blog post by Clavister Blog Staff0 Comments

The recent demonstrations of how modern cars’ controls can be hacked and tampered with remotely has highlighted the need to build security into the Internet of Things, to stop hackers using the ever-increasing connectivity of important safety-related systems to their advantage.   There was another reminder of the urgency of this earlier this week, when a bored French hacker accessed a sign on a major road in the city of Lille and altered its usual messages to something which took motorists by surprise.   This did not lead to any significant disruption  –  just some amusement, and maybe mild offence to some passers-by.  But it is another clear example of …

Clavister Continues Company Expansion with New Research & Development and Support Centre

In Blog post by Clavister Blog Staff0 Comments

This week we announced that we are set to open a new research and development centre in Umeå, northern Sweden, focusing on developing Clavister’s technologies to meet market demand for next-generation security solutions to protect carrier-grade networks, smart cities and the Internet of Things. The centre will also house an expanded service and support team to serve the needs of the company’s growing customer and partner base.  The new offices will be close to the internationally renowned University of Umeå and less than 100 km from Clavister HQ in Örnsköldsvik, as we look to attract Sweden’s best technical talent to the company. The new centre follows on from our announcement …

View Post

Small on the outside, big on the inside: Clavister’s E5 next-generation firewall tested

In Blog post by Clavister Blog Staff0 Comments

The leading German IT publication, Admin, has recently published online its hands-on review of the Clavister E5 next-generation firewall, which is positioned as an entry-level appliance for small or branch office deployments. Admin magazine praised the E5’s features, commenting that “With the E5, Clavister has completed its product portfolio at entry level.  Its performance easily matches that of larger, more expensive equipment and provides application-level firewalling, intrusion and malware detection and even high availability. The purchase costs are currently lower than what some competitors charge for comparable units.” You can read the full review is here, and you can find out more about the E5’s advanced specifications and performance here.

View Post

Clavister signs agreement with Regus to secure its network infrastructure globally

In Articles by Clavister Blog Staff0 Comments

We recently signed an agreement with Regus, the leading operator of business centres, which will see the company using our physical and virtual next-generation firewalls to secure thousands of Regus sites globally.  The three-year agreeement has an initial value of 1.9million euro and covers solution licenses and support. Regus has been using Clavister’s technology, for firewalling, network segregation and traffic management since 2009, covering its network of 3,000 business centres in more than 100 countries.  The Clavister solutions support global VPN communications to Regus’ data centres, enable secure remote access to its internal applications and servers, and also secure Internet connectivity and other value-added security services on-demand to Regus clients and tenants. …

View Post

Small Devices, Big Security – Protecting the Internet of Things

In Blog post by Clavister Blog Staff0 Comments

Just in case you haven’t encountered the phrase before, the Internet of Things (IoT) is the expanding network of interconnected, internet-enabled devices. To give you an idea of scale, this means that everything from controllers for central heating and household appliances, to vehicles and military equipment, all have the potential to be internet enabled, communicating to a variety of third parties, and to be controlled from a centralised device using the power of the internet.   The IoT offers a range of opportunities, not just for consumers wanting to set their TV to record an episode of their favourite TV show whilst eating out, but also for a range of businesses including …

View Post

How SDN and NFV are redefining security

In Blog post by Clavister Blog Staff0 Comments

There are big changes happening in the way large networks are being built, provisioned and managed.  Virtualization is being embraced by telcos, service and hosting providers to deliver maximum computing power at lower cost, by minimising the need for specialised physical appliances.  This allows these organisations to use commercial-off-the-shelf platforms to run their virtualized networks, reducing costs and complexity while also enabling rapid deployment, scalability and easier management to support their future needs.   And as networks change, the way those networks are secured also needs to change.  Clavister is a leader in delivering security to critical, large-scale networks for telcos, ISPs and data centre hosts, and our CTO John Vestberg …

View Post

Security: Sometimes More Is Less

In Blog post by Clavister Blog Staff0 Comments

In 2004, the US psychologist Barry Schwartz published a book titled The Paradox of Choice: Why More Is Less.​  The book puts forward the argument that the sheer range of possibilities and options presented to us in our daily lives leads to ‘choice overload,’ and causes people to set unrealistic expectations of the good, services and products they choose.  Those expectations are frequently not met, causing people to question their choices.   It’s the same in IT security.  Security vendors are continually developing new technologies and methods to address the latest emerging threats.  Organisations are investing in those solutions and deploying them – but despite these ongoing investments, breaches and attacks are …

View Post

Clavister & Artesyn collaborate on securing embedded systems

In Blog post by Clavister Blog Staff0 Comments

Earlier this week, we entered into a reseller agreement with Artesyn Embedded Technologies, a global leader in embedded computing solutions for the communications, telecom, broadcast, military, aerospace and industrial automation sectors.  The agreement means that Artesyn will offer our security solutions to its key markets and customers, and our security software will be integrated onto Artesyn’s computing hardware for embedded systems. The upshot of this will be a range of advanced, secure platforms for next-generation IT with extremely high performance and capacity.  Our two companies have already collaborated over a long period, developing solutions for LTE/4G mobile networks, and the partnership will extend this collaboration even further. Embedded computing is a …