Sophos XG Firewall Licensing

Size: px
Start display at page:

Download "Sophos XG Firewall Licensing"

Transcription

1 This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have made some strategic changes: New enhanced Base Firewall license incl. IPSec and SSL VPN plus Wireless Software/virtual licensed by the virtual cores/ram of the hardware Two new next-gen firewall bundles: EnterpriseGuard and EnterpriseProtect Significant changes to support licensing Details on all of these changes can be found below. Understanding the Naming of the Product Our new product is called Sophos XG Firewall. This is a completely new platform and not the next version of either the Sophos UTM or Cyberoam OS. It combines elements of both Sophos and Cyberoam UTM and nextgen firewall technology but also completely new innovations and features many of you have been requesting for some time. Under Sophos XG Firewall you may also find the following components mentioned: Sophos Firewall OS (SF-OS) which is the firmware XG Series Appliances which come pre-installed with SF-OS Further Products in the XG Firewall ecosystem are: Sophos Firewall Manager (SFM) for the central management of SF-OS firewalls Sophos Cloud Firewall Manager (CFM), a cloud version of the above, exclusive to partners in v1 Sophos iview v2 which is our central reporting tool for SF-OS, UTM 9 and Cyberoam OS firewalls

2 Deployment Options and Base Firewall XG Series Hardware All appliances which come pre-installed with SF-OS are labelled XG. We will offer the same line-up as with the SG Series and they have the same technical specifications but they do have a different BIOS. Upon launch there will be two additional XG models which will be introduced later for Sophos UTM 9 (as SG Series): the entry level desktop appliance, XG 85 (also available as XG 85w) and the high-end 2U XG 750. Please note: The installation of UTM 9.x on XG Series appliances will initially not be supported. XG Firewall comes preinstalled on XG Series and will only run on SG Series that have been upgraded from UTM 9.x. It is not possible to buy the XG Base Firewall or subscription and install directly on SG hardware. Please contact your Channel Account Manager if you have any questions. Base Firewall A perpetual Base Firewall license is included in the purchase price of every XG Series appliance. The Base Firewall includes: Network Firewall SSL and IPSec VPN (no renewal required but IPSec client licenses are sold separately) Complete wireless protection, incl. hotspot support and voucher system This is the equivalent of the Essential Firewall with Sophos UTM but with much enhanced features. Base Firewall Type of license How to buy perpetual Included in hardware purchase price Purchased when buying software/virtual Software/Virtual We have changed the way in which we license software and virtual for XG Firewall from IP/User bands to (virtual) cores/ram of the hardware it s being installed on. This will simplify the selection of the right license for many scenarios and is more in line with industry standards. Understanding the Naming for software/virtual Example: SFv4C6

3 Your product will only work with the number of (virtual) cores and (virtual) RAM it is licensed for. For example, if you add more RAM to the above license, not more than 6 GB will be addressed unless you change your license. In such cases, please contact your Channel Account Manager for a quote. What you are actually purchasing when you select one of our virtual/software options from the price list is the Base Firewall. See above for full details of what is included in the Base Firewall. Please note: Sophos UTM licensing for virtual/software remains unchanged. Subscriptions and Bundles As with Sophos UTM 9, you have the option to purchase individual software subscription to tailor your security to your needs, or you can buy one of our bundles which can offer a significant cost saving. Individual Subscriptions XG Firewall offers the following subscription modules for individual purchase Individual Software Subscriptions IPS, RED/HTML5, ATP, Security Heartbeat* URL, AV, AppCtrl Protection Antispam, AV, SPX, DLP Web Server Protection WAF, AV, Rev. Proxy * Requires Cloud Endpoint Protection Advanced or Cloud Enduser Protection The key differences to Sophos UTM are: No Wireless Protection subscription as that is now included in the Base Firewall license No Endpoint Protection subscription as we will use the Cloud Endpoint, e.g. for Heartbeat Feature upgrades/updates included for 90 days so a support option should be quoted on top Product Bundles With the introduction of two new bundles for XG Firewall we offer a simpler way for you to sell a nextgeneration firewall. New NGFW Software License Bundle EnterpriseGuard is a new software license bundle which includes: Enhanced Support It is the ideal choice for customers looking for next-generation firewall features.

4 New NGFW Appliance/Software Bundle EnterpriseProtect provides a complete next-gen firewall solution in a single SKU. It includes: Enhanced Support XG Series appliance OR software/virtual appliance of your choice FullGuard for XG Firewall Of course, it is still possible to offer a FullGuard software bundle and this remains the most cost-effective way to buy all-in-one protection. For XG Firewall FullGuard includes: Protection Web Server Protection Enhanced Support TotalProtect for XG Firewall TotalProtect will continue to be a lead product for many of your projects as it offers the best value for money when buying software together with an appliance (hardware/software/virtual). For XG Firewall TotalProtect includes: Protection Web Server Protection Enhanced Support XG Series appliance OR software/virtual appliance of your choice Please note: All product bundles include Enhanced Support

5 Savings with Bundles vs. Individual Subscriptions The following chart shows the benefits of bundles over individual subscriptions. These prices exclude support. Overview Sophos XG Firewall Licensing with Appliance Please note: A short video explanation of the licensing using an example with XG hardware is available for partners here

6 High Availability (HA) The first release of XG Firewall supports just two nodes in a cluster. When licensing products in active/passive or active/active mode the following table provides guidance on which licenses will be required. # Use case description Licenses 1 Hardware Active-Active 2 required, i.e. 1 for each device. Active subscriptions must match (e.g., Web Protection) Subscription expiry dates don t have to match although it is best practice for them to do so 2 Hardware Active-Passive 2 required, 1 for the Active/Master device and 1 (Base Firewall only) for the Passive device. The Base Firewall is included in the purchase price of the hardware. 3 Software/Virtual Active- Active 4 Software/Virtual Active- Passive (Same as for hardware) 2 required, i.e. 1 for each device. Active subscriptions must match (e.g., Web Protection) Subscription expiry dates don t have to match although it is best practice for them to do so 1 required for the Active/Master device The product allows another SW/Virtual device to be directly linked in as the Passive device. The Passive device will have no separate serial number and doesn t communicate with the licensing system. Please note: HA will not be supported for XG Series appliances with integrated wireless in the first release. Sophos Firewall Manager (SFM) SFM Product Licenses Sophos Firewall Manager is available as a hardware appliance and as a software ISO or virtual appliance for you to install on third-party hardware. The license is perpetual, i.e. requires no renewal, but we recommend that you add a support option to each quote for SFM to ensure your customer receives product updates and upgrades and warranty beyond the first year for HW models. The support option will have a fixed term and require renewal. See the Support Licensing section for more details. SFM is licensed by the number of devices which are to be managed. There are three hardware appliances: Hardware Model SFM200 SFM300 SFM400 Recommended # of managed devices Device # based on current estimates And six options for software/virtual SW/Virtual Appliance SFMv15 SFMv50 SFMv100 SFMv200 SFMv500 SFMv1000 Licensed # managed devices ,000

7 Please note: Sophos Firewall Manager can be used to manage appliances (hardware/virtual/software) running SF-OS only. Sophos Cloud Firewall Manager (CFM) CFM v1 Licensing The Sophos Cloud Firewall Manager is being introduced for Partners only in v1 and as an introductory offer, at no cost. CFM will be accessible through the Cloud Partner Dashboard. Sophos iview v2 iview Licenses Sophos iview is available as a software ISO or virtual appliance for you to install on third-party hardware. The license is perpetual, i.e. requires no renewal, but we recommend that you add a support option to each quote for iview to ensure your customer receives product updates and upgrades. The support option will have a fixed term and require renewal. See the Support Licensing section for more details. There are five options to purchase iview plus one free version for trial use iview v2 Virtual/Software Free New New Licensed Storage capacity 100 GB 500 GB 1 TB 4 TB 8 TB Unlimited Please note: Sophos iview v2 can be used to manage appliances (hardware/virtual/software) running SF-OS, Sophos UTM 9.x (recommended from v9.3) and Cyberoam OS. Other License Types Trial and Evaluation Licenses We offer options for your customers and prospects to try out all XG Firewall products. We also offer options for Sophos Partners to use our products. The table below gives you an overview Evaluation/Testing SF-OS iview SFM CFM Partners 1 yr license free (renewable) Free w/ v1 Unlimited free (+ 1 yr support renewable) 1,000 device virtual license free (+ 1 yr support renewable) Customers 30 day trial 100 GB free Manage 5 appliances for free TBD later

8 Support Licensing With XG Firewall we have introduced a new support licensing scheme. When purchasing individual subscription modules, please note that they now include software feature updates/upgrades for just 90 days and therefore, we would strongly recommend that you always quote a support option or select one of our bundles which already include Enhanced Support. What you get Included with purchase Enhanced Support Plan (Included in bundles) Enhanced Plus Support Plan Support Direct telephone and support Included for 90-days (business hours only) Included (24x7) VIP Access (Senior Support) (24x7) Security Updates & Patches For the life of the product Software Feature Updates & Upgrades Included with an active software subscription Included with an active software subscription Included for 90-days Included Included Included with an active software subscription Consulting Remote consultation on your firewall configuration and security with a Sophos Senior Technical Support Engineer Warranty and RMA For all hardware appliances 1 year (return/replace) Advance Exchange Included (up to 4 hours) Advance Exchange Technical Account Manager Dedicated named technical account manager Optional (extra cost) Optional (extra cost) Please note: Sophos RED/AP support & warranty (beyond first year) is included in the Enhanced Plus support of the XG they are connected to.

9 Further Information Should you have further questions related to XG Firewall licensing, please contact your Channel Account Manager. The following Knowledge Base Articles provide valuable information regarding licensing: Sophos/Cyberoam Appliances which can be upgraded Sophos XG Firewall License Migration - your new license names and components United Kingdom and Worldwide Sales Tel: +44 (0) sales@sophos.com North American Sales Toll Free: nasales@sophos.com Australia and New Zealand Sales Tel: sales@sophos.com.au Asia Sales Tel: salesasia@sophos.com Oxford, UK Boston, USA Copyright Sophos Ltd. All rights reserved. Registered in England and Wales No , The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners.

Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances

Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your

More information

Simplifying Branch Office Security

Simplifying Branch Office Security Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Sophos UTM Support Services Guide

Sophos UTM Support Services Guide Sophos UTM Support Services Guide Introduction This document provides a detailed description of Sophos Support Services which are offered by Sophos or Sophos partners for Sophos UTM appliance, RED and

More information

What is MyUTM? 2. How do I log in to MyUTM? 2. I m logged in, what can I do? 2. What s the Overview section? 2

What is MyUTM? 2. How do I log in to MyUTM? 2. I m logged in, what can I do? 2. What s the Overview section? 2 Contents What is MyUTM? 2 How do I log in to MyUTM? 2 I m logged in, what can I do? 2 What s the Overview section? 2 What s the Account Management section? 2 What are Contact sets? 3 What s the License

More information

Sales Consultant I Engineer I Architect I Support Engineer I MSP. A Simple Overview to Training and Certification

Sales Consultant I Engineer I Architect I Support Engineer I MSP. A Simple Overview to Training and Certification A Simple Overview to Training and Certification Sales Consultant I Engineer I Architect I Support Engineer I MSP 1 How to use this guide The Sophos Training and Certification Program gives our partners

More information

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense

More information

Sizing Guideline. Sophos UTM 9.1

Sizing Guideline. Sophos UTM 9.1 Sizing Guideline Sophos UTM 9.1 Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos UTM appliance for your customer. Specifying the right

More information

Protecting Your Data On The Network, Cloud And Virtual Servers

Protecting Your Data On The Network, Cloud And Virtual Servers Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public

More information

Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer

Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer In this session What we will cover XG What s included? What

More information

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Building a Next-Gen Managed Security Practice

Building a Next-Gen Managed Security Practice Building a Next-Gen Managed Security Practice IT Security MSPs: In the beginning We all remember the old days of Managed Service Providers (MSP). By acting as an IT security expert for companies who did

More information

Simple Security Is Better Security

Simple Security Is Better Security Simple Security Is Better Security How small and medium-sized businesses can benefit from cloud-based security By Tsailing Merrem, Senior Product Marketing Manager Most vendors seem to assume that small

More information

Sample Data Security Policies

Sample Data Security Policies This document provides three example data security policies that cover key areas of concern. They should not be considered an exhaustive list but rather each organization should identify any additional

More information

The Sophos Security Heartbeat:

The Sophos Security Heartbeat: The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that

More information

Sample Mobile Device Security Policy

Sample Mobile Device Security Policy Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.

More information

Protecting Your Roaming Workforce With Cloud-Based Security

Protecting Your Roaming Workforce With Cloud-Based Security Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers

More information

Managing BitLocker With SafeGuard Enterprise

Managing BitLocker With SafeGuard Enterprise Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption

More information

Wireless network security: A how-to guide for SMBs

Wireless network security: A how-to guide for SMBs Wireless network security: A how-to guide for SMBs Wireless network security: A how-to guide for SMBs WiFi networks are a requirement for doing business today. Employees rely on them to have constant access

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Botnets: The dark side of cloud computing

Botnets: The dark side of cloud computing Botnets: The dark side of cloud computing By Angelo Comazzetto, Senior Product Manager Botnets pose a serious threat to your network, your business, your partners and customers. Botnets rival the power

More information

Sophos is a Network Security company too

Sophos is a Network Security company too Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A

More information

Sophos UTM Software Appliance

Sophos UTM Software Appliance Sophos UTM Software Appliance Quick Start Guide Product version: 9.300 Document date: Monday, December 01, 2014 Sophos UTM Minimum Hardware Requirements Intel compatible CPU 1.5 GHz+ 1 GB RAM (2 GB recommended)

More information

Sophos Cloud and Partner Dashboard Jonathan Shaw

Sophos Cloud and Partner Dashboard Jonathan Shaw Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming

More information

Sophos SG 1 Session: Sophos UTM

Sophos SG 1 Session: Sophos UTM Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our

More information

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity

More information

Encryption Buyers Guide

Encryption Buyers Guide Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Your Company Data, Their Personal Device What Could Go Wrong?

Your Company Data, Their Personal Device What Could Go Wrong? Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Simplifying branch office security

Simplifying branch office security Simplifying branch office security By Udo Kerst, Director Product Management Network Security Securing your business network is more important than ever. Malware, botnets and other malicious programs threaten

More information

Seven Keys to Securing Your Growing Business

Seven Keys to Securing Your Growing Business Seven Keys to Securing Your Growing Business Common-sense guidelines for simplifying your security By Tsailing Merrem, Senior Product Marketing Manager The economy is picking up and business is growing

More information

Five Tips to Reduce Risk From Modern Web Threats

Five Tips to Reduce Risk From Modern Web Threats Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Two Great Ways to Protect Your Virtual Machines From Malware

Two Great Ways to Protect Your Virtual Machines From Malware Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase

More information

Network protection and UTM Buyers Guide

Network protection and UTM Buyers Guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Sophos XG Firewall. Unrivalled performance, security and control

Sophos XG Firewall. Unrivalled performance, security and control Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Deciphering the Code: A Simple Guide to Encryption

Deciphering the Code: A Simple Guide to Encryption Deciphering the Code: A Simple Guide to Encryption By Anthony Merry, Director of Product Management - Data Protection A business s success is increasingly dependent on its ability to leverage its data.

More information

Global Support Services

Global Support Services Global Support Services Supporting your investment in Sophos Technical Support has the highest priority within Sophos. Our comprehensive support service delivers the full range of benefits you would expect

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

Firewall Buyers Guide

Firewall Buyers Guide Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider

More information

Sophos Certified Architect Course overview

Sophos Certified Architect Course overview Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting

More information

Cloud Infrastructure Licensing, Packaging and Pricing

Cloud Infrastructure Licensing, Packaging and Pricing Cloud Infrastructure Licensing, Packaging and Pricing ware, August 2011 2009 ware Inc. All rights reserved On July 12 2011 ware is Introducing a Major Upgrade of the Entire Cloud Infrastructure Stack vcloud

More information

Centralize it Secure it Simplify IT!

Centralize it Secure it Simplify IT! Centralize it Secure it Simplify IT! Dedicated to helping network administrators and IT executives securely manage remote connections, network accesses, passwords and credentials. Remote Desktop Manager

More information

Operating Instructions. Sophos Access Points

Operating Instructions. Sophos Access Points Sophos Access Points Foreword We are pleased to welcome you as a new Sophos Access Point customer. These operating instructions will help you install and configure the access point and provide technical

More information

COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS

COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS Updated June 13, 2014 *Subject to Change* Table of Contents 1-2 Overview of Virtual Private Servers 2-3 Benefits 2 Reduce IT Cost and

More information

See the Sample Scenario Section at the end of this document for a description of when these components are applied.

See the Sample Scenario Section at the end of this document for a description of when these components are applied. EMAIL SECURITY New Email Security Licensing Model Introduction SonicWALL has introduced a new Email Security Licensing Model that increases the flexibility and scalability of licensing for organizations

More information

Cyberoam Perspective BFSI Security Guidelines. Overview

Cyberoam Perspective BFSI Security Guidelines. Overview Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial

More information

VMware vsphere with Operations Management and VMware vsphere

VMware vsphere with Operations Management and VMware vsphere VMware vsphere with Operations Management and VMware vsphere Licensing, Pricing and Packaging WHITE PAPER Table of Contents Executive Summary.... 3 VMware vsphere with Operations Management Overview....

More information

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved. KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet

More information

Total Business Continuity with Cyberoam High Availability

Total Business Continuity with Cyberoam High Availability White paper Cyberoam UTM Total Business Continuity with Cyberoam High Availability Companies, big and small, must ensure constant availability of their company's network and data and prepare themselves

More information

WHITE PAPER. VMware Infrastructure 3 Pricing, Packaging and Licensing Overview

WHITE PAPER. VMware Infrastructure 3 Pricing, Packaging and Licensing Overview WHITE PAPER VMware Infrastructure 3 Pricing, Packaging and Licensing Overview Table of Contents Introduction to VMware Infrastructure 3.......................................3 Pricing, Packaging & Licensing

More information

Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security.

Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security. Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security. Kris Hagerman, CEO Sophos Simple security Strategy - Networks 3

More information

TMG Replacement Guide

TMG Replacement Guide Your guide to replacing Microsoft Forefront Threat Management Gateway By Chris McCormack, Senior Product Marketing Manager and Angelo Comazzetto, UTM Product Manager During one of the most active periods

More information

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

How To Establish IPSec VPN between Cyberoam and Microsoft Azure How To Establish IPSec VPN between Cyberoam and Microsoft Azure How To Establish IPSec VPN Connection between Cyberoam and Microsoft Azure Applicable Version: 10.00 onwards Overview Microsoft Azure is

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

Sophos Ltd. All rights reserved.

Sophos Ltd. All rights reserved. Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Advanced Persistent Threats: Detection, Protection and Prevention

Advanced Persistent Threats: Detection, Protection and Prevention Advanced Persistent Threats: Detection, Protection and Prevention By Barbara Hudson, Senior Product Marketing Manager The many ways in which industry experts have defined advanced persistent threats (APT)

More information

How To Choose A Dell Sonicwall Firewall From Awna.Com

How To Choose A Dell Sonicwall Firewall From Awna.Com 2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall

More information

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises www.cyberoam.com sales@cyberoam.com As Enterprise and MSSP networks expand with more offices, users and experience trends

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Solution Brief: Next Generation Endpoint Security

Solution Brief: Next Generation Endpoint Security Solution Brief: Next Generation Endpoint Security Next Generation Endpoint Security has been defined many ways. Some vendors offer point products designed to take on a particular task such as exploit prevention

More information

A node is a device managed by GMS. For example, SKU 01-SSC-7665 gives you the right to manage, monitor, and report on ten SonicWALL devices.

A node is a device managed by GMS. For example, SKU 01-SSC-7665 gives you the right to manage, monitor, and report on ten SonicWALL devices. GMS GMS Licensing for Windows and UMA EM5000 Purchase Decision Process and SKU Overview Step 1 Decide whether you would like to have GMS as an appliance (UMA), or run it as software that can be installed

More information

Astaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ

Astaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ Active/Active-Cluster Licensing Partner FAQ Author: Udo Kerst (uke) Date: 2007-05-11 Content Page Which applications are being load balanced within an Astaro Security Gateway cluster?...2 Which licenses

More information

Packaged Unified Communications Solution. The all-in-one integrated collaboration solution that s simple, scalable and affordable.

Packaged Unified Communications Solution. The all-in-one integrated collaboration solution that s simple, scalable and affordable. Packaged Unified Communications Solution The all-in-one integrated collaboration solution that s simple, scalable and affordable. Collaboration is at the heart of your business operations. And today, an

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Check Point taps the power of virtualization to simplify security for private clouds

Check Point taps the power of virtualization to simplify security for private clouds Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private

More information

Overview and Deployment Guide. Sophos UTM on AWS

Overview and Deployment Guide. Sophos UTM on AWS Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2

More information

Donation Tracker Information

Donation Tracker Information C A S C A D E D A T A S O L U T I O N S Donation Tracker Information Our mission is to provide powerful, yet easy to use, Campaign Management software with excellent Support. When you purchase Donation

More information

PERSONAL FIREWALL SHOWDOWN: SOFTWARE VERSUS APPLIANCE

PERSONAL FIREWALL SHOWDOWN: SOFTWARE VERSUS APPLIANCE 83-10-49 DATA SECURITY MANAGEMENT PERSONAL FIREWALL SHOWDOWN: SOFTWARE VERSUS APPLIANCE Darrin Mourer INSIDE Level of Protection; Manageability; Cost Analysis; Feature Set Comparison; Future Outlook; Current

More information

G-Cloud Managed Exchange SaaS. Service Description

G-Cloud Managed Exchange SaaS. Service Description G-Cloud Managed Exchange SaaS Service Description G-Cloud Managed Exchange SaaS Service Description 2 INDEX TO SUNGARD MANAGED EXCHANGE SAAS SUNGARD CLOUD SERVICES... 3 Managed Exchange SaaS Overview...

More information

Lab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices

Lab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices Lab Testing Detailed Report DR131118 January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG 900-20 Secure Web Gateway, Proxy Edition Check

More information

Check Point 2200 Appliance

Check Point 2200 Appliance Datasheet: Check Point 2200 Appliance 2200 Branch & Small Office Solution Enterprise security in a desktop package Check Point 2200 Appliance Today the Internet gateway is more than a firewall. It is a

More information

How To Configure Syslog over VPN

How To Configure Syslog over VPN How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

Eight Rock Solid Reasons Why You Should Buy OEM From Us

Eight Rock Solid Reasons Why You Should Buy OEM From Us Accelerating Your Success Eight Rock Solid Reasons Why You Should Buy OEM From Us Avnet Technology Solutions recommends genuine Microsoft software SOFTWARE Contents Reason 1: Our strong OEM heritage...

More information

Introduction to VMware EVO: RAIL. White Paper

Introduction to VMware EVO: RAIL. White Paper Introduction to VMware EVO: RAIL White Paper Table of Contents Introducing VMware EVO: RAIL.... 3 Hardware.................................................................... 4 Appliance...............................................................

More information

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard: Your Security Partner of Choice. Carlos Vieira WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices

More information

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

BES12 Frequently Asked Questions. BEs12. questions. FAQs

BES12 Frequently Asked Questions. BEs12. questions. FAQs 1 BEs12 Frequently asked questions FAQs 2 Contents Overview... 3 Pricing... 4 Technical: Upgrade, Migration & Installation... 5 Additional Migration Questions... 10 Installation... 11 System... 12 BES5

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information