Biodata offers Astaro Gateway Security firewall for free

June 2009 Information Security

Biodata, the only reseller of the Astaro security products in southern Africa, is offering resellers a never-to-be-repeated offer on the Astaro Security Gateway 120 appliance for small networks.

New and existing resellers can now receive the Astaro Security Gateway 120 appliance free of charge, including trial security keys valid for one month. Should the reseller or their client be interested in the product, but want to spend more time with it, the trial keys can be extended by one additional month.

“Customers who are interested in the product but are unfamiliar with its capabilities, will now be able to take the time out to get to know the product and experience it first hand, without any initial capital outlay,” says Ingrid Reimschüssel, marketing director of Biodata.

But there is more good news for clients wanting to keep the product after the trial period. They do not pay for the hardware, but just have to purchase the software kit at a dramatically reduced price. The software kit includes Gold Maintenance, Secure Web and secure e-mail filtering for one year.

“Resellers who see a potential for the product amongst their clients and are looking to take advantage of this offer, will be offered free workshops, which include sales and technical information, over and above the free take home offer,” adds Reimschüssel.

Securing over 30 000 businesses globally, Astaro Security products protect networks from the endless amount of viruses, spam and hackers that threaten to compromise a network’s security. The products are powerful, easy to manage and secure solutions that assist IT managers in executing the mission critical security functions necessary for optimum network protection.

The Astaro Gateway Security 120 for small networks is best known for its ability to secure e-mail traffic by way of anti spam and anti phishing, dual virus protection and transparent encryption. Its network protection capabilities extend from intrusion prevention to remote and VPN access, as well as traffic shaping. Its filtering of Web access provides users the ability to perform content filtering, take advantage of built in antivirus and spyware, and well as IM and P2P control.

“With this offer we hope to encourage resellers to either try the product out themselves so that they are well acquainted with its capabilities, or to give it to their customers and let them test drive it,” ends Reimschüssel.

The offer is limited until 1 September 2009, whilst stocks last. New and existing resellers should contact Matthew Johnstone at Biodata on +27 (0)11 234 3650 or e-mail: [email protected] for further information and availability.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...