Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer

Size: px
Start display at page:

Download "Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer"

Transcription

1 Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer

2 In this session What we will cover XG What s included? What s in it for customers? What s in it for partners? Competitive Update XG vs UTM 9 features XG Hardware Licensing & Pricing Support Plans Cross-Selling Opportunities

3 XG What s Included? 3

4 XG Firewall: What does it include? Heartbeat Sophos Firewall OS (SF-OS) New Firewall Operating System and Software Platform XG Series Appliances Identical to SG Series except come preloaded with SF-OS Security Heartbeat Support for Security Heartbeat with Sophos Cloud Endpoints Migration Tools Later this year for migrating UTM 9 to SF-OS Sophos Firewall Manager (SFM) New on-premise Centralized Management Sophos Cloud Firewall Manager (CFM) Centralized Firewall Management in the Cloud (for partners only initially) Sophos iview Reporting Updated on-premise Centralized Reporting

5 Initial Target Market Segments Simple! XG Firewall Targeting New Prospects or Customers with no UTM Cloud customers (gain Security Heartbeat!) SEC customers migrating to Cloud UTM 9 Business as usual for existing UTM customers We WILL look after them! Don t worry about migration just yet Consider at renewal Or when migration tools available (CQ1)

6 Migration Starting as early as next For Customers Free upgrade to SF-OS Phased migration tools Ultimately push-button migration Automatic licensing migration Supports NG/SG + refresh program New capabilities for all customers! quarter For Partners 2 year active development on existing platforms Rich education programs/certification Global partner council as active advisors Partner exclusive early access programs CY 2015 CY 2016 UTM 9 SUM 4.3 XG Firewall CyberoamOS Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 EAL4 + V9.35 RED Wifi App Accuracy MESH impr V1 V9.4 Migration Sandbox subsc SG85, AP15C, RED15W V9.5 Minor features & performance V1.5 V2 V3 V MR MR MR

7 What s in it for Customers? 7

8 Compelling Reasons to Switch.. 1. Simpler 2. Faster 3. All-in-one protection 4. On-box reporting 5. Trusted industry leader

9 How does XG Firewall strengthen our story?

10 1. Simpler

11 XG Firewall: Simply solving common problems Difficult to identify and prioritize issues Complexity of policy creation and management Firewalls full of jargon and difficult to navigate Identifying risks Interactive dashboard instant data and drilldown Policy templates, easy to understand Self-documenting interface and menus User Threat Quotient and App Risk monitoring

12 Unified Policy Management Don t need to navigate multiple modules, or tabs to find polices All policies on one screen Users & Networking Business Applications Sort and Filter by Rule type Source Zone Destination Zone Status

13 Integrated Policies Everything on one screen Layer-8 User Identity Polices Zone based policies Web and App Control per policy IPS and Traffic Flow per Policy Security Heartbeat Policy Limit access for Red or Yellow Heartbeats

14 Business App Policy Templates Templates simplify WAF protection for common business applications Exchange Sharepoint Lync And Much More Templates can be customized Templates can be shared

15 2. Faster

16 Fast Path Technology FastPath optimizes firewall connectivity and routing Once connection is deemed trusted, all related packets take the fast path We properly scan all content in real-time or batch mode we do not stream scan Policy Engine (Who are you? Where are you going?) Malware Engine (Are you carrying anything dangerous?) FastPath Packet Optimization (e.g. for approved traffic travelling together ) Stream scanning (e.g. visual inspection only)

17 3. All-in-One Protection

18 Security Heartbeat & Advanced Threats Accelerated discovery Positive identification Automated response Instant insights into compromised systems Hostname, IP User Time period Threat App/Process

19 Security Heartbeat Network and Endpoint working better together to revolutionize advanced threat protection No Security issues Unwanted Application Compromised Infected Suspect Endpoint Endpoints Automatically isolate systems with Red Heartbeat Advanced Threat Protection 1. ATP detects and blocks suspect C&C connection 2. Context requested from Endpoint 3. Full information exchanged (user, process, etc.) 4. Admin notified about ATP event including context Heartbeat in Network Policies XG Firewall Server Internet Set more restrictive policies for systems with Yellow Heartbeat XG Firewall Accelerated Discovery Endpoint and network protection combine to identify unknown threats faster. Active Identification Reduces time taken to identify infected or at risk device or host by IP address alone. Automated Response Compromised endpoints can be automatically isolated or restricted by firewall policies based on Heartbeat status.

20 Heatbeat demo

21 4. On-Box Reporting

22 All-in-One includes Reporting Complete on-box reporting Standard! New Application and User Risk Analysis App Risk Meter Identifies overall risk level Application dashboard identifies risky apps and who s using them User Risk Quotient (UTQ) Identifies risky users Based on recent web browsing history and advanced threat event triggers

23 User Threat Quotient Identify risky users before they become a problem UTQ based on recent web history and ATP triggers Enables: Quick and easy policy changes User education Targeted intervention

24 UTQ demo

25 5. Trusted Industry Leader

26 Gartner MQ - Leader Sophos: 4th year as a leader in the UTM MQ One of three leaders in a hot space Recognized for our focus on ease of use Only leader to move up and right this year No significant cautions Fortinet: Slips in vision. Still a very strong competitor. Gartner: Difficult to sell and support. Usability and performance doesn t meet expectations Checkpoint: Expensive! Gartner: clients often cite price as the reason for not choosing Checkpoint Dell: Demoted out of the Leaders quadrant. Weakening. Gartner on Sonicwall: Poor usability, Channel disruption Watchguard: Demoted out of the Leaders quadrant. Stagnant. Gartner on Watchguard: Not visible, Not a competitive threat

27 Competitive Chart Sophos Fortinet XG Firewall FG Network Firewall/Protection $ = Another product required Dell SonicWALL TZ Series WatchGuard XTM Series Advanced threat protection Network and Endpoint Integration [Heartbeat] Unified Policies User Risk Visibility [User Threat Quotient] FastPath Packet Optimization Site to site and remote user VPN Secure web gateway Complete Protection [AV, AS, Enc., DLP] Dual antivirus $ $ $ Wi-Fi Reverse proxy Web application firewall User portal Full Reporting Best TMG feature parity $ $ $ $ $ Discover (TAP) Mode Deployment

28 XG Firewall vs. UTM 9 28

29 XG Firewall vs UTM 9 Feature Overlap Lots of compelling reasons to be excited about XG Highly requested features IN Copernicus (NOT in UTM 9) - User-based firewall polices - Zone based policies - IPS and QoS settings per policy - Firmware roll-back - Improved reporting - TAP mode deployments - Improved user authentication - Packet capture in UI - IMAP Proxy - Configuration API Innovations (NOT in UTM 9) - Security Heartbeat - Unified policy model - WAF Policy Templates - Transparent web filtering - Pharming protection Great Sophos UTM Technology - Wireless - RED - WAF - ATP - SPX - Object Model - Web Proxy Engine - Sophos AV Engine - Clientless Access Great Cyberoam Technology Added - User-Identity based Firewall - FastPath packet optimization (200%!) - Authentication - IPS - App Control - iview Reporting - Centralized Management & Reporting UTM features NOT in Copernicus - 3+ Node clustering - Clustering/HA for w models - RED to RED Tunnels - Some web security features (override, category quotas) - Endpoint Management (shifting to Cloud integration for HB) - SMC Integration - 2FA Support

30 XG Firewall: Making it easier to grow Easier to Sell Easier to Demo / PoC Easier to Manage Easier to Cross-Sell Simpler Faster More-inone Reporting Leader 5-Reasons Sophos is better than Competitors Discover (TAP) Mode Sophos Firewall Manager Cloud Firewall Manager iview Reporting Wireless APs / RED New: Centralized Management Centralized Reporting

31 What s in it for Sophos Partners? 31

32 Centralized Management and Reporting Sophos Firewall Manager (and CFM) Sophos iview Reporting Full-featured central mgmt/monitoring of SF-OS devices Free license for partners Reports on SF-OS, UTM 9, & CyberoamOS devices Free license for partners

33 Discover Mode Two options to easily evaluate and produce a comprehensive Security Audit Report TAP/Mirror Mode Existing Firewall Discover Mode Mirror Port Existing Switch Bridge Mode TAP/Mirror Mode No disruptive changes to the network Mirrors traffic through UTM/NGFW Monitor only, no enforcement Visibility (no enforcement) into: User Behavior User-App Risks & Usage Web Risks & Usage Intrusion Attacks & ATP Client Insights (Heartbeat), Virus, VPN coming post v1 Security Audit Report Protected Network Bridge Mode Offers extended reporting insight including Heartbeat Allows optional policy enforcement Traffic is passing through UTM/NGFW Possible use of bypass module

34 Hardware Appliances 34

35 XG Series Appliance Portfolio Hardware Appliance XG 85 XG 105 / 115 XG 125 / 135 XG 210 / 230 XG 310 / 330 XG 430 / 450 XG 550 XG 650 XG 750 Category Small Desktop Small Desktop Small Desktop Medium Midrange 1U Medium Midrange 1U Medium Midrange 1U Large High-end 2U Large High-end 2U Large High-end 2U Network Ports (standard) & 2 SFP 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) FleXi Port Expansion Bays Maximum Ports n/a n/a n/a Redundancy n/a n/a n/a n/a n/a 2 SSD (RAID) & 2 nd hot-swap power optional (SG 450 only) 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies Wireless Integr n optional Integr n optional Integr ac optional n/a n/a n/a n/a n/a n/a

36 Positioning for new models XG 85(w) XG 85/ XG 85w Introduced due to demand for lower cost model Same chassis as XG/SG 105/115 but no VGA port Some differences to other models: 8 GB Flash memory no HDD Does not support on-box reporting (use iview free option) No dual AV for V1, Sophos only w model 2 x 2:2 MIMO

37 Positioning for new models XG 750 XG 750 Opens up additional enterprise opportunities 2U chassis 8 FleXi Port bays (1 x 8 GE copper included) max 64 ports Hot swap SSDs, redundant power supplies and fans Different manufacturer, so different FleXi Ports

38 Accessories FleXi Ports, Transceivers & co. Additions to the price list XG 750 FleXi Port Modules 4 x 10GE SFP+* Module for 1U and 750 (550/650 coming later) LAN bypass modules (different for 1U, 550/650 and 750) *Please note: transceivers (mini GBICs) are never included for SFP and SFP+ ports and need to be ordered separately. LAN bypass what s that? Enables fail open operation data flows through the appliance even if there is a hw/sw fault or power outage. Uses relays to create a physical connection between two ports (bypass pair). Use for Bridge Mode when the appliance is connected behind the main firewall. new new BP 1/2 3/4 BP 1/2 3/4 WAN Normal mode LAN LAN LAN WAN Bypass mode LAN LAN LAN

39 XG Firewall Licensing 39

40 Base Firewall Firewall & VPN & Wireless Protection Modules: Network Protection EnterpriseGuard Firewall & VPN & Wireless Included Protection: Network Protection FullGuard Firewall & VPN & Wireless Included Protection: Network Protection Web Protection Protection Web Server Protect. Web Protection Enhanced Support + XG Series Appliance Web Protection Protection Web Server Protect. EnterpriseProtect Enhanced Support + XG Series Appliance TotalProtect

41 Software & Virtual 41

42 Changes to how we license SW/Virtual Addresses sales complexity such as: WAF protecting single server w/ many 1,000s of external users Double counts for IPv4 and IPv6 for the same user In-line with method used by the market in general Changed due to enhanced Base Firewall Sophos UTM XG Firewall Hardware SW / Virtual Hardware SW / Virtual One-time payment Per IP/users One-time payment Per (v) core/ram Incl. Essential Firewall Incl. Essential Firewall Incl. Base Firewall One-time fee for Base

43 Cross-sell Options 43

44 More Opportunities to Cross-Sell 1. RED and Wireless Access Points 2. Centralized Management Heartbeat 3. Centralized Reporting 4. Security Heartbeat with Sophos Cloud Endpoints 5. Support Plans

45 RED and Wireless Wireless included in Base Firewall Don t need to pay more for software Just buy the Access Points Perpetual license use it without renewal RED requires Network Protection Subscription Comes with IPS, ATP, Clientless VPN, and Security Heartbeat

46 Central Management Sophos Firewall Manager (SFM) 3 hardware models, 6 Virtual/SW models Virtual SFM based on # managed devices Support license req d (includes upgrades) Perpetual device management license HW Model SFM200 SFM300 SFM400 Recom. # managed devices Numbers are current estimates SW/Virtual Appliance Model SFMv15 SFMv50 SFMv100 SFMv200 SFMv500 SFMv1000 Licensed # managed devices ,000 Sophos Cloud Firewall Manager (CFM) Version 1 exclusively for Partners No charge for first version

47 Sophos iview v2 Perpetual license Licensing based on the storage size customer wants to report on Support license required (includes upgrades) iview v2 Virtual Appliance Models Central Reporting NEW NEW 100 GB 500 GB 1 TB 4 TB 8 TB Unlimited Free $ 995 $ 1,795 $ 5,995 $ 9,995 $ 19,995 iview v2 is clearly marked on the price list and will be introduced after SF-OS

48 Questions? 48

49

Sophos is a Network Security company too

Sophos is a Network Security company too Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A

More information

Sophos XG Firewall Licensing

Sophos XG Firewall Licensing This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

Fortinet Advanced Threat Protection- Part 3

Fortinet Advanced Threat Protection- Part 3 Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced

More information

Sophos Ltd. All rights reserved.

Sophos Ltd. All rights reserved. Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to

More information

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

Sophos SG 1 Session: Sophos UTM

Sophos SG 1 Session: Sophos UTM Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our

More information

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Sophos XG Firewall. Unrivalled performance, security and control

Sophos XG Firewall. Unrivalled performance, security and control Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

Sophos Roadshow. Complete Security Vision

Sophos Roadshow. Complete Security Vision Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality

More information

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises www.cyberoam.com sales@cyberoam.com As Enterprise and MSSP networks expand with more offices, users and experience trends

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Overview and Deployment Guide. Sophos UTM on AWS

Overview and Deployment Guide. Sophos UTM on AWS Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Sophos Certified Architect Course overview

Sophos Certified Architect Course overview Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting

More information

Network protection and UTM Buyers Guide

Network protection and UTM Buyers Guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection

More information

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance

More information

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Cyberoam Perspective BFSI Security Guidelines. Overview

Cyberoam Perspective BFSI Security Guidelines. Overview Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

Check Point taps the power of virtualization to simplify security for private clouds

Check Point taps the power of virtualization to simplify security for private clouds Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private

More information

Fortigate Features & Demo

Fortigate Features & Demo & Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Cyberoam Next-Generation Security. 11 de Setembro de 2015 Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in

More information

Why Upgrade to the New CyberoamOS?

Why Upgrade to the New CyberoamOS? Why Upgrade to the New CyberoamOS? Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Cyberoam continuously enhances and updates its security features to offer latest security to its customers

More information

Hillstone Intelligent Next Generation Firewall

Hillstone Intelligent Next Generation Firewall Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,

More information

Firewall Buyers Guide

Firewall Buyers Guide Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider

More information

Boston Area Windows Server User Group April 2010

Boston Area Windows Server User Group April 2010 Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past

More information

Sophos Security made simple.

Sophos Security made simple. Sophos Security made simple. Fabio Baldassarre Sales Engineer fabio.baldassarre@sophos.it Cell: +39 3351294073 1 Sophos Snapshot Founded 1985 in Abingdon, UK $450+ million in FY15 billings Solid cash EBITDA

More information

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of

More information

Internal Network Firewall (INFW) Protecting your network from the inside out

Internal Network Firewall (INFW) Protecting your network from the inside out Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda

More information

Workflow Guide. Configuring Web Protection. For Customers with Sophos Firewall Document Date: November 2015. November 2015 Page 1 of 44

Workflow Guide. Configuring Web Protection. For Customers with Sophos Firewall Document Date: November 2015. November 2015 Page 1 of 44 Workflow Guide Configuring Web Protection For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 44 Contents Overview... 3 Implementing Web Anti Virus (Web AV)... 3 Use

More information

Sophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11

Sophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11 Sophos XG Firewall Features List For Sophos and Cyberoam Customers Document Date: November 2015 November 2015 Page 1 of 11 Sophos XG Firewall v 15.01.0 Features List Contents Sophos XG Firewall Features...

More information

Nominee: Barracuda Networks

Nominee: Barracuda Networks Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network

More information

Introduction to VMware EVO: RAIL. White Paper

Introduction to VMware EVO: RAIL. White Paper Introduction to VMware EVO: RAIL White Paper Table of Contents Introducing VMware EVO: RAIL.... 3 Hardware.................................................................... 4 Appliance...............................................................

More information

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard: Your Security Partner of Choice. Carlos Vieira WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices

More information

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments* SonicWALL Team Nordic Recommendations for safe Unified Threat Management () Deployments* nordic@sonicwall.com tel: +46 8 410 71 700 TZ100/100W 01-SSC-8739 01-SSC-8739 01-SSC-8723 $470/$536W 128Mb RAM 5FE

More information

The Sophos Security Heartbeat:

The Sophos Security Heartbeat: The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that

More information

WatchGuard Technologies. 2011 WatchGuard Technologies

WatchGuard Technologies. 2011 WatchGuard Technologies WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

How To Choose A Dell Sonicwall Firewall From Awna.Com

How To Choose A Dell Sonicwall Firewall From Awna.Com 2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall

More information

Sophos Cloud and Partner Dashboard Jonathan Shaw

Sophos Cloud and Partner Dashboard Jonathan Shaw Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming

More information

Masters Project Proxy SG

Masters Project Proxy SG Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the

More information

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.] Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless

More information

SonicWALL WAN Acceleration FAQ Document

SonicWALL WAN Acceleration FAQ Document SonicWALL WAN Acceleration FAQ Document Technology, Models, Licensing 1. What is SonicWALL s WAN Acceleration solution and how is it deployed? The SonicWALL WXA series available as live CD, Hardware and

More information

Unified Threat Management Throughput Performance

Unified Threat Management Throughput Performance Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did

More information

Securing the Small Business Network. Keeping up with the changing threat landscape

Securing the Small Business Network. Keeping up with the changing threat landscape Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not

More information

TITANXR Multi-Switch Management Software

TITANXR Multi-Switch Management Software TITANXR Multi-Switch Management Software Centralized management of APCON network monitoring switches Features Centralized APCON system management View status and alerts Configurable Dashboards Monitor

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Appliance Comparison Chart

Appliance Comparison Chart 202 Appliances 2200 4200 4400 4600 4800 Small-Office Enterprise Grade Production Performance (Security Benchmark) Security 4 4 223 374 623 Firewall (Gbps).4.4 2.2 3.4 5.8 Firewall and IPS (Mbps) 50 50

More information

Securing and Accelerating Databases In Minutes using GreenSQL

Securing and Accelerating Databases In Minutes using GreenSQL Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update

More information

Xirrus Management System

Xirrus Management System DATASHEET Xirrus Management System The Xirrus Management System is a wireless network lifecycle management platform enabling network administrators to efficiently operate, configure and maintain Xirrus

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

Fortinet Certified Network Security Administrator

Fortinet Certified Network Security Administrator Fortigate 1 Fortinet Certified Network Security Administrator Objectives The Fortinet Certified Network Security Administratordesignation certifies that individuals have the expertise necessary to manage

More information

How To - Deploy Cyberoam in Gateway Mode

How To - Deploy Cyberoam in Gateway Mode How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

Meraki as Cisco Cloud Services Manage your network Where ever you are!

Meraki as Cisco Cloud Services Manage your network Where ever you are! Meraki as Cisco Cloud Services Manage your network Where ever you are! Marketing/Technical description for services Scope of the Service Cloud services can deliver big technology benefits to midsized and

More information

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,

More information

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Providing Secure IT Management & Partnering Solution for Bendigo South East College Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,

More information

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection

More information

The Next Level of Secure Channel Partnership

The Next Level of Secure Channel Partnership The Next Level of Secure Channel Partnership Copyright 2015 ADVANCED NETWORK SECURITY WatchGuard s Channel Ecosystem Is Focused, and the Opportunity for Engaged WatchGuardONE Partners Is Better Than Ever

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

Cloud Infrastructure Licensing, Packaging and Pricing

Cloud Infrastructure Licensing, Packaging and Pricing Cloud Infrastructure Licensing, Packaging and Pricing ware, August 2011 2009 ware Inc. All rights reserved On July 12 2011 ware is Introducing a Major Upgrade of the Entire Cloud Infrastructure Stack vcloud

More information

Imperva SecureSphere Appliances

Imperva SecureSphere Appliances Imperva SecureSphere Appliances DA T A SH E E T Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior and resiliency for demanding data center environments. With fail open interfaces,

More information

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures Firewall Agenda Unit 1 Understanding of Firewall s definition and Categorization Unit 2 Understanding of Firewall s Deployment Architectures Unit 3 Three Representative Firewall Deployment Examples in

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER

More information

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it

More information

Future-ready Security

Future-ready Security Future-ready Security Justinas Valentukevičius Channel Manager Baltics Unified Threat Management Agenda of Presentation Let s meet - Brief introduction to Cyberoam Next generation firewall or maybe Next

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

Introducing FortiDDoS. Mar, 2013

Introducing FortiDDoS. Mar, 2013 Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

How to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances

How to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances How to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances Consider the following typical deployment scenario where Head Quarters and Remote Office are connected

More information

Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances

Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your

More information

February 2014. Considerations When Choosing a Secure Web Gateway

February 2014. Considerations When Choosing a Secure Web Gateway February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own

More information

SecureSphere Appliances

SecureSphere Appliances DATASHEET SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding datacenter environments. With fail open interfaces,

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information