Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer
|
|
- Neil Parsons
- 7 years ago
- Views:
Transcription
1 Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer
2 In this session What we will cover XG What s included? What s in it for customers? What s in it for partners? Competitive Update XG vs UTM 9 features XG Hardware Licensing & Pricing Support Plans Cross-Selling Opportunities
3 XG What s Included? 3
4 XG Firewall: What does it include? Heartbeat Sophos Firewall OS (SF-OS) New Firewall Operating System and Software Platform XG Series Appliances Identical to SG Series except come preloaded with SF-OS Security Heartbeat Support for Security Heartbeat with Sophos Cloud Endpoints Migration Tools Later this year for migrating UTM 9 to SF-OS Sophos Firewall Manager (SFM) New on-premise Centralized Management Sophos Cloud Firewall Manager (CFM) Centralized Firewall Management in the Cloud (for partners only initially) Sophos iview Reporting Updated on-premise Centralized Reporting
5 Initial Target Market Segments Simple! XG Firewall Targeting New Prospects or Customers with no UTM Cloud customers (gain Security Heartbeat!) SEC customers migrating to Cloud UTM 9 Business as usual for existing UTM customers We WILL look after them! Don t worry about migration just yet Consider at renewal Or when migration tools available (CQ1)
6 Migration Starting as early as next For Customers Free upgrade to SF-OS Phased migration tools Ultimately push-button migration Automatic licensing migration Supports NG/SG + refresh program New capabilities for all customers! quarter For Partners 2 year active development on existing platforms Rich education programs/certification Global partner council as active advisors Partner exclusive early access programs CY 2015 CY 2016 UTM 9 SUM 4.3 XG Firewall CyberoamOS Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 EAL4 + V9.35 RED Wifi App Accuracy MESH impr V1 V9.4 Migration Sandbox subsc SG85, AP15C, RED15W V9.5 Minor features & performance V1.5 V2 V3 V MR MR MR
7 What s in it for Customers? 7
8 Compelling Reasons to Switch.. 1. Simpler 2. Faster 3. All-in-one protection 4. On-box reporting 5. Trusted industry leader
9 How does XG Firewall strengthen our story?
10 1. Simpler
11 XG Firewall: Simply solving common problems Difficult to identify and prioritize issues Complexity of policy creation and management Firewalls full of jargon and difficult to navigate Identifying risks Interactive dashboard instant data and drilldown Policy templates, easy to understand Self-documenting interface and menus User Threat Quotient and App Risk monitoring
12 Unified Policy Management Don t need to navigate multiple modules, or tabs to find polices All policies on one screen Users & Networking Business Applications Sort and Filter by Rule type Source Zone Destination Zone Status
13 Integrated Policies Everything on one screen Layer-8 User Identity Polices Zone based policies Web and App Control per policy IPS and Traffic Flow per Policy Security Heartbeat Policy Limit access for Red or Yellow Heartbeats
14 Business App Policy Templates Templates simplify WAF protection for common business applications Exchange Sharepoint Lync And Much More Templates can be customized Templates can be shared
15 2. Faster
16 Fast Path Technology FastPath optimizes firewall connectivity and routing Once connection is deemed trusted, all related packets take the fast path We properly scan all content in real-time or batch mode we do not stream scan Policy Engine (Who are you? Where are you going?) Malware Engine (Are you carrying anything dangerous?) FastPath Packet Optimization (e.g. for approved traffic travelling together ) Stream scanning (e.g. visual inspection only)
17 3. All-in-One Protection
18 Security Heartbeat & Advanced Threats Accelerated discovery Positive identification Automated response Instant insights into compromised systems Hostname, IP User Time period Threat App/Process
19 Security Heartbeat Network and Endpoint working better together to revolutionize advanced threat protection No Security issues Unwanted Application Compromised Infected Suspect Endpoint Endpoints Automatically isolate systems with Red Heartbeat Advanced Threat Protection 1. ATP detects and blocks suspect C&C connection 2. Context requested from Endpoint 3. Full information exchanged (user, process, etc.) 4. Admin notified about ATP event including context Heartbeat in Network Policies XG Firewall Server Internet Set more restrictive policies for systems with Yellow Heartbeat XG Firewall Accelerated Discovery Endpoint and network protection combine to identify unknown threats faster. Active Identification Reduces time taken to identify infected or at risk device or host by IP address alone. Automated Response Compromised endpoints can be automatically isolated or restricted by firewall policies based on Heartbeat status.
20 Heatbeat demo
21 4. On-Box Reporting
22 All-in-One includes Reporting Complete on-box reporting Standard! New Application and User Risk Analysis App Risk Meter Identifies overall risk level Application dashboard identifies risky apps and who s using them User Risk Quotient (UTQ) Identifies risky users Based on recent web browsing history and advanced threat event triggers
23 User Threat Quotient Identify risky users before they become a problem UTQ based on recent web history and ATP triggers Enables: Quick and easy policy changes User education Targeted intervention
24 UTQ demo
25 5. Trusted Industry Leader
26 Gartner MQ - Leader Sophos: 4th year as a leader in the UTM MQ One of three leaders in a hot space Recognized for our focus on ease of use Only leader to move up and right this year No significant cautions Fortinet: Slips in vision. Still a very strong competitor. Gartner: Difficult to sell and support. Usability and performance doesn t meet expectations Checkpoint: Expensive! Gartner: clients often cite price as the reason for not choosing Checkpoint Dell: Demoted out of the Leaders quadrant. Weakening. Gartner on Sonicwall: Poor usability, Channel disruption Watchguard: Demoted out of the Leaders quadrant. Stagnant. Gartner on Watchguard: Not visible, Not a competitive threat
27 Competitive Chart Sophos Fortinet XG Firewall FG Network Firewall/Protection $ = Another product required Dell SonicWALL TZ Series WatchGuard XTM Series Advanced threat protection Network and Endpoint Integration [Heartbeat] Unified Policies User Risk Visibility [User Threat Quotient] FastPath Packet Optimization Site to site and remote user VPN Secure web gateway Complete Protection [AV, AS, Enc., DLP] Dual antivirus $ $ $ Wi-Fi Reverse proxy Web application firewall User portal Full Reporting Best TMG feature parity $ $ $ $ $ Discover (TAP) Mode Deployment
28 XG Firewall vs. UTM 9 28
29 XG Firewall vs UTM 9 Feature Overlap Lots of compelling reasons to be excited about XG Highly requested features IN Copernicus (NOT in UTM 9) - User-based firewall polices - Zone based policies - IPS and QoS settings per policy - Firmware roll-back - Improved reporting - TAP mode deployments - Improved user authentication - Packet capture in UI - IMAP Proxy - Configuration API Innovations (NOT in UTM 9) - Security Heartbeat - Unified policy model - WAF Policy Templates - Transparent web filtering - Pharming protection Great Sophos UTM Technology - Wireless - RED - WAF - ATP - SPX - Object Model - Web Proxy Engine - Sophos AV Engine - Clientless Access Great Cyberoam Technology Added - User-Identity based Firewall - FastPath packet optimization (200%!) - Authentication - IPS - App Control - iview Reporting - Centralized Management & Reporting UTM features NOT in Copernicus - 3+ Node clustering - Clustering/HA for w models - RED to RED Tunnels - Some web security features (override, category quotas) - Endpoint Management (shifting to Cloud integration for HB) - SMC Integration - 2FA Support
30 XG Firewall: Making it easier to grow Easier to Sell Easier to Demo / PoC Easier to Manage Easier to Cross-Sell Simpler Faster More-inone Reporting Leader 5-Reasons Sophos is better than Competitors Discover (TAP) Mode Sophos Firewall Manager Cloud Firewall Manager iview Reporting Wireless APs / RED New: Centralized Management Centralized Reporting
31 What s in it for Sophos Partners? 31
32 Centralized Management and Reporting Sophos Firewall Manager (and CFM) Sophos iview Reporting Full-featured central mgmt/monitoring of SF-OS devices Free license for partners Reports on SF-OS, UTM 9, & CyberoamOS devices Free license for partners
33 Discover Mode Two options to easily evaluate and produce a comprehensive Security Audit Report TAP/Mirror Mode Existing Firewall Discover Mode Mirror Port Existing Switch Bridge Mode TAP/Mirror Mode No disruptive changes to the network Mirrors traffic through UTM/NGFW Monitor only, no enforcement Visibility (no enforcement) into: User Behavior User-App Risks & Usage Web Risks & Usage Intrusion Attacks & ATP Client Insights (Heartbeat), Virus, VPN coming post v1 Security Audit Report Protected Network Bridge Mode Offers extended reporting insight including Heartbeat Allows optional policy enforcement Traffic is passing through UTM/NGFW Possible use of bypass module
34 Hardware Appliances 34
35 XG Series Appliance Portfolio Hardware Appliance XG 85 XG 105 / 115 XG 125 / 135 XG 210 / 230 XG 310 / 330 XG 430 / 450 XG 550 XG 650 XG 750 Category Small Desktop Small Desktop Small Desktop Medium Midrange 1U Medium Midrange 1U Medium Midrange 1U Large High-end 2U Large High-end 2U Large High-end 2U Network Ports (standard) & 2 SFP 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) FleXi Port Expansion Bays Maximum Ports n/a n/a n/a Redundancy n/a n/a n/a n/a n/a 2 SSD (RAID) & 2 nd hot-swap power optional (SG 450 only) 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies Wireless Integr n optional Integr n optional Integr ac optional n/a n/a n/a n/a n/a n/a
36 Positioning for new models XG 85(w) XG 85/ XG 85w Introduced due to demand for lower cost model Same chassis as XG/SG 105/115 but no VGA port Some differences to other models: 8 GB Flash memory no HDD Does not support on-box reporting (use iview free option) No dual AV for V1, Sophos only w model 2 x 2:2 MIMO
37 Positioning for new models XG 750 XG 750 Opens up additional enterprise opportunities 2U chassis 8 FleXi Port bays (1 x 8 GE copper included) max 64 ports Hot swap SSDs, redundant power supplies and fans Different manufacturer, so different FleXi Ports
38 Accessories FleXi Ports, Transceivers & co. Additions to the price list XG 750 FleXi Port Modules 4 x 10GE SFP+* Module for 1U and 750 (550/650 coming later) LAN bypass modules (different for 1U, 550/650 and 750) *Please note: transceivers (mini GBICs) are never included for SFP and SFP+ ports and need to be ordered separately. LAN bypass what s that? Enables fail open operation data flows through the appliance even if there is a hw/sw fault or power outage. Uses relays to create a physical connection between two ports (bypass pair). Use for Bridge Mode when the appliance is connected behind the main firewall. new new BP 1/2 3/4 BP 1/2 3/4 WAN Normal mode LAN LAN LAN WAN Bypass mode LAN LAN LAN
39 XG Firewall Licensing 39
40 Base Firewall Firewall & VPN & Wireless Protection Modules: Network Protection EnterpriseGuard Firewall & VPN & Wireless Included Protection: Network Protection FullGuard Firewall & VPN & Wireless Included Protection: Network Protection Web Protection Protection Web Server Protect. Web Protection Enhanced Support + XG Series Appliance Web Protection Protection Web Server Protect. EnterpriseProtect Enhanced Support + XG Series Appliance TotalProtect
41 Software & Virtual 41
42 Changes to how we license SW/Virtual Addresses sales complexity such as: WAF protecting single server w/ many 1,000s of external users Double counts for IPv4 and IPv6 for the same user In-line with method used by the market in general Changed due to enhanced Base Firewall Sophos UTM XG Firewall Hardware SW / Virtual Hardware SW / Virtual One-time payment Per IP/users One-time payment Per (v) core/ram Incl. Essential Firewall Incl. Essential Firewall Incl. Base Firewall One-time fee for Base
43 Cross-sell Options 43
44 More Opportunities to Cross-Sell 1. RED and Wireless Access Points 2. Centralized Management Heartbeat 3. Centralized Reporting 4. Security Heartbeat with Sophos Cloud Endpoints 5. Support Plans
45 RED and Wireless Wireless included in Base Firewall Don t need to pay more for software Just buy the Access Points Perpetual license use it without renewal RED requires Network Protection Subscription Comes with IPS, ATP, Clientless VPN, and Security Heartbeat
46 Central Management Sophos Firewall Manager (SFM) 3 hardware models, 6 Virtual/SW models Virtual SFM based on # managed devices Support license req d (includes upgrades) Perpetual device management license HW Model SFM200 SFM300 SFM400 Recom. # managed devices Numbers are current estimates SW/Virtual Appliance Model SFMv15 SFMv50 SFMv100 SFMv200 SFMv500 SFMv1000 Licensed # managed devices ,000 Sophos Cloud Firewall Manager (CFM) Version 1 exclusively for Partners No charge for first version
47 Sophos iview v2 Perpetual license Licensing based on the storage size customer wants to report on Support license required (includes upgrades) iview v2 Virtual Appliance Models Central Reporting NEW NEW 100 GB 500 GB 1 TB 4 TB 8 TB Unlimited Free $ 995 $ 1,795 $ 5,995 $ 9,995 $ 19,995 iview v2 is clearly marked on the price list and will be introduced after SF-OS
48 Questions? 48
49
Sophos is a Network Security company too
Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A
More informationSophos XG Firewall Licensing
This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationSophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
More informationFortinet Advanced Threat Protection- Part 3
Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced
More informationSophos Ltd. All rights reserved.
Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to
More informationSophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
More informationCisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationSophos SG 1 Session: Sophos UTM
Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our
More informationCisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats
More informationYour Security Partner of Choice
Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationSophos XG Firewall. Unrivalled performance, security and control
Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationSophos Roadshow. Complete Security Vision
Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality
More informationNext-Generation Centralized Security Management for MSSPs & Distributed Enterprises
Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises www.cyberoam.com sales@cyberoam.com As Enterprise and MSSP networks expand with more offices, users and experience trends
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationOverview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationSophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationCopyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
More informationActive Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
More informationCyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
More informationAstaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
More informationGame changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
More informationNext-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
More informationCheck Point taps the power of virtualization to simplify security for private clouds
Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private
More informationFortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationCyberoam Next-Generation Security. 11 de Setembro de 2015
Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in
More informationWhy Upgrade to the New CyberoamOS?
Why Upgrade to the New CyberoamOS? Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Cyberoam continuously enhances and updates its security features to offer latest security to its customers
More informationHillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
More informationFirewall Buyers Guide
Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider
More informationBoston Area Windows Server User Group April 2010
Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past
More informationSophos Security made simple.
Sophos Security made simple. Fabio Baldassarre Sales Engineer fabio.baldassarre@sophos.it Cell: +39 3351294073 1 Sophos Snapshot Founded 1985 in Abingdon, UK $450+ million in FY15 billings Solid cash EBITDA
More informationVMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
More informationInternal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
More informationWorkflow Guide. Configuring Web Protection. For Customers with Sophos Firewall Document Date: November 2015. November 2015 Page 1 of 44
Workflow Guide Configuring Web Protection For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 44 Contents Overview... 3 Implementing Web Anti Virus (Web AV)... 3 Use
More informationSophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11
Sophos XG Firewall Features List For Sophos and Cyberoam Customers Document Date: November 2015 November 2015 Page 1 of 11 Sophos XG Firewall v 15.01.0 Features List Contents Sophos XG Firewall Features...
More informationNominee: Barracuda Networks
Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network
More informationIntroduction to VMware EVO: RAIL. White Paper
Introduction to VMware EVO: RAIL White Paper Table of Contents Introducing VMware EVO: RAIL.... 3 Hardware.................................................................... 4 Appliance...............................................................
More informationWatchGuard: Your Security Partner of Choice. Carlos Vieira
WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices
More informationSonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*
SonicWALL Team Nordic Recommendations for safe Unified Threat Management () Deployments* nordic@sonicwall.com tel: +46 8 410 71 700 TZ100/100W 01-SSC-8739 01-SSC-8739 01-SSC-8723 $470/$536W 128Mb RAM 5FE
More informationThe Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
More informationWatchGuard Technologies. 2011 WatchGuard Technologies
WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationHow To Choose A Dell Sonicwall Firewall From Awna.Com
2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall
More informationSophos Cloud and Partner Dashboard Jonathan Shaw
Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming
More informationMasters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
More informationCisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
More informationSonicWALL WAN Acceleration FAQ Document
SonicWALL WAN Acceleration FAQ Document Technology, Models, Licensing 1. What is SonicWALL s WAN Acceleration solution and how is it deployed? The SonicWALL WXA series available as live CD, Hardware and
More informationUnified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
More informationSecuring the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
More informationTITANXR Multi-Switch Management Software
TITANXR Multi-Switch Management Software Centralized management of APCON network monitoring switches Features Centralized APCON system management View status and alerts Configurable Dashboards Monitor
More informationCity of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
More informationCisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
More informationIREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
More informationAppliance Comparison Chart
202 Appliances 2200 4200 4400 4600 4800 Small-Office Enterprise Grade Production Performance (Security Benchmark) Security 4 4 223 374 623 Firewall (Gbps).4.4 2.2 3.4 5.8 Firewall and IPS (Mbps) 50 50
More informationSecuring and Accelerating Databases In Minutes using GreenSQL
Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update
More informationXirrus Management System
DATASHEET Xirrus Management System The Xirrus Management System is a wireless network lifecycle management platform enabling network administrators to efficiently operate, configure and maintain Xirrus
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationBest Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationEndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
More informationFortinet Certified Network Security Administrator
Fortigate 1 Fortinet Certified Network Security Administrator Objectives The Fortinet Certified Network Security Administratordesignation certifies that individuals have the expertise necessary to manage
More informationHow To - Deploy Cyberoam in Gateway Mode
How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article
More informationHuawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationMeraki as Cisco Cloud Services Manage your network Where ever you are!
Meraki as Cisco Cloud Services Manage your network Where ever you are! Marketing/Technical description for services Scope of the Service Cloud services can deliver big technology benefits to midsized and
More informationProduct Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
More informationProviding Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
More informationSSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
More informationThe Next Level of Secure Channel Partnership
The Next Level of Secure Channel Partnership Copyright 2015 ADVANCED NETWORK SECURITY WatchGuard s Channel Ecosystem Is Focused, and the Opportunity for Engaged WatchGuardONE Partners Is Better Than Ever
More informationTECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents
TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3
More informationWho s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
More informationCloud Infrastructure Licensing, Packaging and Pricing
Cloud Infrastructure Licensing, Packaging and Pricing ware, August 2011 2009 ware Inc. All rights reserved On July 12 2011 ware is Introducing a Major Upgrade of the Entire Cloud Infrastructure Stack vcloud
More informationImperva SecureSphere Appliances
Imperva SecureSphere Appliances DA T A SH E E T Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior and resiliency for demanding data center environments. With fail open interfaces,
More informationAgenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures
Firewall Agenda Unit 1 Understanding of Firewall s definition and Categorization Unit 2 Understanding of Firewall s Deployment Architectures Unit 3 Three Representative Firewall Deployment Examples in
More informationSonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
More informationBUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
More informationDeploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
More informationFuture-ready Security
Future-ready Security Justinas Valentukevičius Channel Manager Baltics Unified Threat Management Agenda of Presentation Let s meet - Brief introduction to Cyberoam Next generation firewall or maybe Next
More informationIBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationSophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
More informationIntroducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
More informationUnified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationHow to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances
How to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances Consider the following typical deployment scenario where Head Quarters and Remote Office are connected
More informationSizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances
Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your
More informationFebruary 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
More informationSecureSphere Appliances
DATASHEET SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding datacenter environments. With fail open interfaces,
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More information