Sophos is a Network Security company too
|
|
- Cora Pierce
- 8 years ago
- Views:
Transcription
1 Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October
2 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A THE Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October
3 Only Vendor That Is a Gartner Leader in EP and UTM Gartner Magic Quadrant ENDPOINT PROTECTION Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos Inc. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. 3
4 Unique Balance Between Endpoint and Network ENDPOINT NETWORK 10.8% 49.96% 100.0% 93.7% 100.0% 100.0% 100.0% 100.0% 100.0% 100.0% 100.0% 100.0% 89.2% 50.04% 6.3% 4
5 Today s Set List 1. Sophos Network Security Portfolio 2. Top complaints about Firewalls 3. How Sophos UTM Wins Today 4. Project Copernicus: Sophos Firewall 5. How to get started selling Bonus Track: 7. The Competition 5
6 Sophos Network Security Portfolio Accelerate NGFW/UTM Combine the strengths of Sophos and Cyberoam Grow Secure Web Gateway Revitalize technology and launch a hybrid offering Grow Secure Gateway Revitalize technology and launch a cloud offering UTM/Next-Gen Firewall IPS Application Control User-based Policies Web filtering security Secure Wi-FI RED (Remote Ethernet Device) iview Reporting Secure Web Appliance Virtual Web Appliance Cloud Web Gateway Secure Appliance Virtual Appliance PureMessage for Unix PureMessage for Exchange Sophos UTM Manager (SUM) Sophos UTM for Amazon Web Services Cloud Gateway 6
7 Secure Web Gateway solutions for every buyer 7
8 Secure Gateway solutions for every buyer UTM Dedicated Appliances For Exchange For UNIX Software Cloud Services Anti-Spam Anti-Virus Encryption Data Leak Prevention Archiving 8
9 Why buyers choose Sophos for UTM/Firewall 9
10 Top complaints about current firewalls IT Manager Survey on SpiceWorks Insufficient reporting & visibility Insufficient security & control Not easy to manage Poor value Profit Poor performance 10
11 How Sophos Wins More and more organizations are switching to Sophos for their next firewall 1. Simpler 2. Faster 3. On-box reporting 4. All-in-one protection 5. Trusted industry leader 11
12 1. Simpler 12
13 Simplifying common tasks Firewall Rule App Control Policy Activiation HTTPS Filtering Sophos UTM Competitor Firewall 13
14 How SPX Encryption works < Sender composes their exactly the same way as usual < They can force encryption using the new SPX Encrypt button Add-in for Outlook Or encryption can happen automatically based on the presence of sensitive data detected by the UTM \/ < The contents of the mail are encapsulated in an encrypted PDF before leaving the network 14
15 How SPX Encryption works Recipient Replying securely is equally as easy /\ /\ The recipient receives an with the encrypted PDF attached to their regular inbox /\ They simply enter the required password to decrypt the contents and view the message and attachments > 15
16 How SPX Encryption works On any device < SPX Encrypted s are viewable on any device that supports PDFs < Branding is customizable < A great advantage is that your encrypted mail is in your inbox with the rest of your mail and can be viewed even when you re offline 16
17 2. Faster 17
18 SG Series Appliance Portfolio Hardware Appliance Soon: SG 85 SG 105 / 115 SG 125 / 135 SG 210 / 230 SG 310 / 330 SG 430 / 450 SG 550 SG 650 Soon: SG 750 Category Small Desktop Small Desktop Small Desktop Medium Midrange 1U Medium Midrange 1U Medium Midrange 1U Large High-end 2U Large High-end 2U Large High-end 2U Network Ports (standard) & 2 SFP 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) FleXi Port Expansion Bays n/a n/a n/a Maximum Ports Redundancy n/a n/a n/a n/a n/a 2 SSD (RAID) & 2 nd hot-swap power optional (SG 450 only) 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies Wireless Integr n optional Integr n optional Integr ac optional n/a n/a n/a n/a n/a n/a 18
19 Lightening speed with AV proxy scanning 19
20 3. On-Box Reporting 20
21 All-in-One includes Reporting Complete on-box reporting Standard! 21
22 4. All-in-One Protection 22
23 One Box Solution Refers to functionality included in a unified solution only.. = Comparable functionality with separate appliance only,.. = Requires Sophos Mobile Control subscription. 24
24 Project Copernicus: Sophos Firewall 25
25 Project Copernicus: Sophos Firewall OS Leading Threat Protection RED for Distributed Networks Secure Wi-Fi & Access Points Web Protection Technologies Layer 8 User Identity Policies Leading Application Control Accelerated Packet Filtering User Threat Quoient + New innovations Security Heartbeat Interactive Control Center Simplified Policy Authoring Expanded reporting 26
26 Sophos Firewall: What does it include? Heartbeat Sophos Firewall OS (SF-OS) New Firewall Operating System and Software Platform Proven Appliances Identical to SG Series except come preloaded with SF-OS Security Heartbeat Support for Security Heartbeat with Sophos Cloud Endpoints Migration Tools Early next year for migrating UTM 9 to SF-OS Sophos Firewall Manager (SFM) New on-premise Centralized Management Sophos Cloud Firewall Manager (CFM) Centralized Firewall Management in the Cloud (for partners only initially) Sophos iview Reporting Updated on-premise Centralized Reporting 27
27 How does Sophos Firewall strengthen our story? 1. Simpler 2. Faster 3. On-box reporting 4. All-in-one protection 5. Trusted industry leader 28
28 1. Simpler 29
29 30
30 Unified Policy Management Don t need to navigate multiple modules, or tabs to find polices All policies on one screen Users & Networking Business Applications Sort and Filter by Rule type Source Zone Destination Zone Status 31
31 Integrated Policies Everything on one screen Layer-8 User Identity Polices Zone based policies Web and App Control per policy IPS and Traffic Flow per Policy Security Heartbeat Policy Limit access for Red or Yellow Heartbeats 32
32 Business App Policy Templates Templates simplify WAF protection for common business applications Exchange Sharepoint Lync And Much More Templates can be customized Templates can be shared 33
33 Sophos Firewall: Simply solving common problems Difficult to identify and prioritize issues Complexity of policy creation and management Firewalls full of jargon and difficult to navigate Interactive dashboard instant data and drilldown Policy templates, easy to understand Self-documenting interface and menus 34
34 2. Faster 35
35 FastPath Packet Optimization Policy Engine (Who are you? Where are you going?) Malware Engine (Are you carrying anything dangerous?) FastPath Packet Optimization (e.g. for approved traffic travelling together ) Stream scanning (e.g. visual inspection only) FastPath optimizes firewall connectivity and routing Once connection is deemed trusted, all related packets take the fast path It is NOT Stream scanning which lightly scans packets as they pass for malware We properly scan all content in real-time or batch mode we do not stream scan 36
36 3. On-Box Reporting 37
37 38
38 New Application and User Risk Analysis App Risk Meter Identifies overall risk level Application dashboard identifies risky apps and who s using them User Risk Quotient (UTQ) Identifies risky users Based on recent web browsing history and advanced threat event triggers 39
39 Security Heartbeat & Advanced Threats Accelerated discovery Positive identification Automated response Instant insights into compromised systems Hostname, IP User Time period Threat App/Process Incidents/Count 40
40 4. All-in-One Protection 41
41 Competitive Chart $ = Another product required New Differentiators New competitive differentiators Security Heartbeat Unified policy User Threat Quotient New comparative differentiators FastPath Discover Mode User-based Firewall Policies 42
42 Summary 45
43 How does Sophos Firewall strengthen our story? 1. Simpler: Solving top firewall usability issues 2. Faster: FastPath packet optimization 3. On-box reporting: UTQ and App Risk 4. All-in-one protection: Revolutionary Security Heartbeat 5. Trusted industry leader: One of 3 46
44 Sophos Firewall: Making it easier to grow your business Easier to Sell Easier to Demo / PoC Easier to Manage Easier to Cross-Sell Simpler Faster More-in-one Reporting Leader 5-Reasons Sophos is better than Competitors Discover (TAP) Mode Sophos Firewall Manager Cloud Firewall Manager iview Reporting Wireless APs / RED New: Centralized Management Centralized Reporting 47
45 Two platforms in parallel? Initial Target Market Segments SF-OS Targeting New Prospects or Customers with no UTM Cloud customers (gain Security Heartbeat) SEC customers migrating to Cloud (more reason to switch) UTM 9 Business as usual for existing UTM customers We WILL look after them! Don t worry about migration just yet Consider at renewal Or when migration tools available (CQ1) 48
46 Migration Guidance For Your Customers Free upgrade to SF-OS Automatic licensing migration Supports ing/sg + refresh program New capabilities for all customers! For You 2 year active development on existing platforms Rich education programs/certification Partner exclusive early access programs CY 2015 CY 2016 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 SUM 4.3 EAL4+ V9.35 RED Wifi App Accuracy MESH impr Copernicus V1 V9.4 Migration Sandbox subsc SG85, AP15C, RED15W V9.5 More features & performance V1.5 V2 V3 V MR MR MR 49
47 Lots of Opportunity in the UK: Sophos Network Security Portfolio Accelerate NGFW/UTM Combine the strengths of Sophos and Cyberoam Grow Secure Web Gateway Revitalize technology and launch a hybrid offering Grow Secure Gateway Revitalize technology and launch a cloud offering UTM/Next-Gen Firewall IPS Application Control User-based Policies Web filtering security Secure Wi-FI RED (Remote Ethernet Device) iview Reporting Secure Web Appliance Virtual Web Appliance Cloud Web Gateway (Q2) Secure Appliance Virtual Appliance PureMessage for Unix PureMessage for Exchange Sophos UTM Manager (SUM) Sophos UTM for Amazon Web Services 52
48 How to get started selling? The Partner Portal Announcements Videos Webcasts Feature Comparisons Training Powerpoints/PDFs 53
49 Questions? 54
50 Coffee Break 55
51 Sophos Ltd. All rights reserved. 56
Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer
Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer In this session What we will cover XG What s included? What
More informationSophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationSophos XG Firewall Licensing
This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationSophos SG 1 Session: Sophos UTM
Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationSophos Roadshow. Complete Security Vision
Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality
More informationSophos Ltd. All rights reserved.
Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to
More informationSophos Security made simple.
Sophos Security made simple. Fabio Baldassarre Sales Engineer fabio.baldassarre@sophos.it Cell: +39 3351294073 1 Sophos Snapshot Founded 1985 in Abingdon, UK $450+ million in FY15 billings Solid cash EBITDA
More informationSophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationRELEASE ANNOUNCEMENT Kaseya Network Discovery and Network Monitoring Version 1.0
KASEYA INTERNATIONAL LIMITED RELEASE ANNOUNCEMENT Network Discovery and Network Monitoring Version 1.0 ANNOUNCEMENT DATE: DECEMBER 2010 TARGET AVAILABILITY: DECEMBER 2010 i TABLE OF CONTENTS OVERVIEW...
More informationDell SonicWALL report portfolio
Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer
More informationOverview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
More informationThis Readme includes information pertaining to Novell Service Desk 7.0.
Novell Service Desk 7.0 November 14, 2012 Novell Novell Service Desk is a complete service management solution that allows you to easily monitor and solve services issues so that there is minimal disruption
More informationSSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationCisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationUnified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationCyberoam Next-Generation Security. 11 de Setembro de 2015
Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in
More informationFortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
More informationAstaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
More informationSam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860
Sam Cavaliere Unified Communications Solutions Sales Professional Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Agenda Define UC Foundation for Communications Demo Wrap up Q&A Confusing,
More informationCLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
More informationWhat s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationFortinet Advanced Threat Protection- Part 3
Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced
More informationOffice 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
More informationYour Security Partner of Choice
Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide
More informationThe SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014
The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation
More informationCopyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationAVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
More informationWeb Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
More informationTrend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
More informationA Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
More informationStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
More informationGFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"
More informationAutomate your IT Security Services
Automate your IT Security Services Presenter: Cyberoam Our Products Network Security Appliances - UTM, NGFW (Hardware & Virtual) Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Modem
More informationNext-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
More informationMobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationKopano product strategy & roadmap
Kopano product strategy & roadmap 11 January 2016 INTRODUCING KOPANO For many years Zarafa has provided software solutions for organising the lives of busy professionals. Emailing and advanced calendaring
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationSophos XG Firewall. Unrivalled performance, security and control
Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information
More informationCA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationContent-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
More informationSimple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group
Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationSURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September 2015. An Osterman Research Survey Report
SURVEY REPORT N sponsored by An Osterman Research Survey Report Published September 2015 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630
More informationWatchGuard Technologies. 2011 WatchGuard Technologies
WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000
More informationNGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
More informationVMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
More informationemail management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
More informationRiverbed SaaS. 04 de Setembro de 2015. Copyright 2015 Data Systems, todos os direitos reservados.
Riverbed SaaS 04 de Setembro de 2015 Agenda Objetivos da apresentação Apresentação SaaS Optimization com Riverbed Video de funcionamento SaaS Optimization Conclusões/Dúvidas 2 RiOS: Overcoming the Bottlenecks
More informationSeagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
More informationMICROSOFT LYNC SOLUTIONS. Unifying Communications with the Active Communications Solution
MICROSOFT LYNC SOLUTIONS Unifying Communications with the Active Communications Solution CONTENTS 1 Who are VideoCentric? 2 What is Unified Communications? - How can UC help my company? 3 What sorts of
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationTMG Replacement Guide
Your guide to replacing Microsoft Forefront Threat Management Gateway By Chris McCormack, Senior Product Marketing Manager and Angelo Comazzetto, UTM Product Manager During one of the most active periods
More informationYou ll learn about our roadmap across the Symantec email and gateway security offerings.
#SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection
More informationFebruary 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
More informationIntelligent Logging & Reporting Cyberoam iview Appliance
Cyberoam iview Appliance Cyberoam iview - Intelligent Logging & Reporting 1. Need for Centralized Logging & Reporting 2. Cyberoam iview 3. Integration with Vendors/Devices 4. Business Scenario 5. What
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationSophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11
Sophos XG Firewall Features List For Sophos and Cyberoam Customers Document Date: November 2015 November 2015 Page 1 of 11 Sophos XG Firewall v 15.01.0 Features List Contents Sophos XG Firewall Features...
More informationBUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
More informationCloud Database Demystified to Deliver SaaS Customer Value
Cloud Database Demystified to Deliver SaaS Customer Value 2 The business of Cloud Savvis ranks as a leader Magic Quadrant for Cloud Infrastructure-as-a-Service and Web Hosting The Magic Quadrant is copyrighted
More informationExtend the value of Microsoft Dynamics ERP with other technology innovations from Microsoft
Extend the value of Microsoft Dynamics ERP with other technology innovations from Microsoft Combined with these products and technologies, Microsoft Dynamics ERP solutions can help you gain momentum in
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationWebsense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
More information2014 Cisco and/or its affiliates. All rights reserved.
2014 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, and MDM, centrally managed over the web - Built from the
More informationAmazon.com, Inc. and its affiliates. All rights reserved.
Amazon.com, Inc. and its affiliates. All rights reserved. How Enterprises Use AWS Augment On-Premises resources with cloud capacity Migrate existing apps & data to the cloud Build new apps, sites, services
More informationMailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationThe Solution: End to End Product Portfolio
@ Ridley Ruth COO 1 The Solution: End to End Product Portfolio 1 DropMySite Safeguard your website and database. Backup, Monitor and Restore. All in the cloud. 2 DropMyEmail Start backing/archiving your
More informationIn this age of heightened awareness of information security issues...
Secure Messaging Business Buyer Information In this age of heightened awareness of information security issues... Businesses of every size, in every industry - both regulated and non regulated - are recognizing
More informationHttp://www.passcert.com
Http://www.passcert.com Exam : 70-337 Title : Enterprise Voice & Online Services with Microsoft Lync Server 2013 Version : DEMO 1 / 18 Topic 1, Litware, Inc Case A Overview Litware, Inc., is an international
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationHP FlexNetwork and IPv6
HP FlexNetwork and IPv6 Miha Petrač ESSN HP Networking presales 25.1.2012 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Magic Quadrant:
More informationThe Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
More informationExtending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS
Extending your Enterprise IT with Amazon Virtual Private Cloud Oyvind Roti Principal Solutions Architect, AWS Three Things Some AWS Concepts Let s build a Virtual Private Cloud together Three New Services
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationExchange Online Protection In-Depth
Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to
More informationCYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
More informationMasters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationHow To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
More informationSizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances
Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your
More informationBryan Von Axelson Partner Solutions Advisor Microsoft Corporation
Bryan Von Axelson Partner Solutions Advisor Microsoft Corporation MARKET TRANSITIONS INTERNET Mid 90s Browsers, Email, ecommerce, Hosting, Wi-Fi, Web 2.0 CLOUD 2000s &Future Cloud Computing, Social Networks
More informationData Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy
Data Loss Prevention and Secure Access for Mobile Content Ojas Rege VP Strategy Agenda Problem definition Enterprise requirements MobileIron Docs@Work solution Architecture and user experience Traditional
More information#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationWildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More information