Sophos Security made simple.

Size: px
Start display at page:

Download "Sophos Security made simple."

Transcription

1 Sophos Security made simple. Fabio Baldassarre Sales Engineer Cell:

2 Sophos Snapshot Founded 1985 in Abingdon, UK $450+ million in FY15 billings Solid cash EBITDA margin (20%+) and strong cash conversion 2,400 employees Over 200,000 customers 100+ million users 90%+ best in class renewal rates 15,000+ channel partners SophosLabs: one of world's leading threat research laboratories Channel first go to market model Key OEM Partners: Cisco, IBM, Juniper, Citrix, Lenovo, Rackspace History of organic and acquired growth Sophos HQ, Abingdon, UK 2

3 Sophos History Evolution to complete security Founded in Abingdon (Oxford), UK Supplied security software to UK forces in 1st Gulf War TA Associates minority investment Acquired Utimaco Safeware AG Acquired Astaro Divested noncore Cyber business Peter Lammer c1985 Jan Hruska c First checksumbased antivirus software Voted best small/medium sized company in UK First signaturebased antivirus software US presence established in Boston Acquired ActiveState Awarded 3 Queen s Awards for Enterprise, Innovation and International Trade Majority interest sold to Apax Partners Acquired DIALOGS Acquired Cyberoam Acquired Mojave Networks 3

4 Ability to execute Ability to execute Ability to execute Note: Gartner requires special permission for any use of any MQ slide. So this slide is for internal use only. If you d like to use Gartner MQs in sales or marketing efforts, please use the full Gartner MQ reports. Sophos has purchased distribution rights for all the relevant MQ reports. Thank you. Leading Provider of Enterprise IT Security Solutions Magic quadrant for UTM Magic quadrant for endpoint protection platform Magic quadrant for mobile data protection Challengers Leaders Challengers Leaders Challengers Leaders Fortinet Juniper Networks Cisco Dell Check Point Software Technologies WatchGuard Microsoft Trend Micro Symantec McAfee Kaspersky Lab Check Point Software Technologies McAfee Huawei Hillstone Networks Aker Security Solutions Barracuda Networks Clavister gateprotect Stormshield Cyberoam ThreatTrack Security Eset Bitdefender F-Secure Check Point Software Technologies BeyondTrust Panda Security Webroot IBM Arkoon Network Security LANDesk Lumension Security Microsoft Center Tools Kaspersky Lab Symantec WinMagic Dell Trend Micro Digital Guardian Wave System Niche players Visionaries Completeness of vision Niche players Visionaries Completeness of vision Niche players Completeness of vision Visionaries Source: Gartner (August 2014) Source: Gartner (January 2014) Source: Gartner (September 2014) The only vendor in the leadership quadrants for UTM, endpoint protection and mobile data protection 4

5 Focus on SMB and Mid-Market Small and mid-market enterprises and Pragmatic Enterprises of any size > 5,000 employees 10,000 Companies WW 20% of Sophos Billings Similar security threats as large enterprises Limited IT security staff Need security made simple 100 5,000 employees < 100 employees 500,000 Companies WW 57% of Sophos Billings 20 million Companies WW 23% of Sophos Billings Note: Based on fiscal 2014 financials; pro forma for divestiture of non-core Cyber (2Q FY 14); fiscal year ends March 31 5

6 Most Enterprises Lack IT Security Staff Average number of People in Organization Dedicated to IT Security % of IT Security Spend Employees Challenged by Complexity Limited by Resources Employees ,999 Employees ,999 Employees 20,000+ Employees 6

7 Complete security Endpoint Network Web Mobile Data 7 7

8 Complete security Endpoint Web Data Mobile Network Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working URL Filtering Web Application Firewall Endpoint Web Protection Encryption for cloud Data Control Access control Automation WiFi security Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help Device Control Application Control Secure branch offices Mobile app security Intrusion prevention Firewall Clean up Technical support Encryption Live Protection encryption 8

9 Project Galileo Next Gen Network Security ~ Project Galileo ~ Technology Integration that Enables Context-Aware Security Cloud Managed Next Gen Endpoint 9

10 What We Believe: Security must be comprehensive The capabilities required to fully satisfy customer need Security can be made simple Platform, deployment, licensing, user experience Security is more effective as a system New possibilities through technology cooperation 10

11 And We re Just Getting Started Next Gen Endpoint Every Endpoint is an Endpoint Advanced Threat Protection in EP Encryption Everywhere Project Galileo Network Security v10: user-based policy, web + app control Off-box reporting New network security MSP offering Heartbeat monitoring (Galileo) Project Galileo Support New support website NetPromoter focus New pricing/packaging Sophos Labs Emulator Big Data Correlation Server Lockdown Whitelisting File Reputation Application Reputation Project Galileo Sophos Cloud Encryption Server Freemium Project Galileo Technology Integration that Enables Context-Aware Security Marketing More Leads More Apps More Free Tools Sophos Home Free tools Brand recognition Telemetry 11

12 Sophos UTM 12

13 Complete protection made simple (and fast) Reputation Data Active Protection SophosLabs Correlated intelligence Content Classification AT HOME AND ON THE MOVE REMOTE OFFICE 1 REMOTE OFFICE 2 Mobile Control Endpoint Security UTM Or RED Secure Wi-Fi Secure VPN RED Secure Wi-Fi Secure VPN Client Endpoint Security Mobile Control Endpoint Security Mobile Control HEADQUARTERS SOPHOS CLOUD Network Storage Antivirus Server Security Administration Mobile Control Endpoint Security Secure Wi-Fi NextGen Firewall Guest Wi-Fi 13

14 Our all-in-one approach Complete Network Protection Endpoint and Mobile integration Networking features for high availability and load balancing Complete , web & network protection integrated VPN & wireless extensions Flexible Deployment Software Appliance Virtual Appliance Central, browser-based management & reporting of all applications 14

15 Modular Security features Enterprise-class security for small and mid-market organizations Endpoint Protection Wireless Protection Wireless Controller for Access Points Multi-Zone (SSID) support Hotspot Support Device Control AntiVirus Web-in-Endpoint Essential Firewall Stateful Firewall Object based rules User self-service portal Network Protection Intrusion Prevention (IPS) Client & Site-to-Site VPN Quality of Service (QoS) Advanced Threat Prot. (ATP) Web Server Protection Web Protection Reverse Proxy Web Application Firewall Antivirus Mail Protection Anti Spam & Phishing Dual Virus Protection DLP & Encryption URL Filtering Policies Web Threat Protection Application Control 15

16 Choose your modules Network Firewall Web Protection Web Server Protection Endpoint Protection Network Protection Wireless Protection Protection Either UTM Endpoint or other Sophos Endpoint product FullGuard (TotalProtect) 16

17 Advanced Threat Protection in UTM Preventing, Blocking, Identifying, Sandboxing 6 Selective Sandboxing Suspicious samples representing potential unknown threats are sent to the SophosLabs cloud for analysis. New threat intelligence is passed back to the UTM. X 3 Block Network Attacks Firewall and newly optimized IPS block network attacks and prevent breaches at the network gateway 1 2 Multi-layered Protection Sophos Web, and Endpoint protection prevent infections from entering the network in the first place Web Malware Detection New advanced web malware detection in 9.2 can emulate JavaScript to catch even the most sophisticated obfuscated and polymorphic threats X X X X!!! 4 5 Block Calls-Home With ATP in 9.2, DNS, App control, and Web proxy work together to identify C&C traffic patterns and block them Identify Infected Systems With ATP in 9.2 hosts attempting to communicate with C&C are immediately identified and contained. 17

18 Network Protection Full-featured network firewall protection Simple and Intuitive Management (Object-based rules) Quality-of-Service (QoS) bandwidth management & traffic shaping Intrusion Prevention System (IPS) Secure VPN Access (exhaustive choice: IPSec, SSL, HTML5 and many more) Site-to-Site VPN (enhanced with unique RED devices) Self-Service User Portal (for quarantine, VPN clients, etc.) New in UTM 9.2 Advanced Threat Protection (with selective sandboxing) Two-Factor authentication (with one-time password solution) New in UTM 9.3 One-click secure remote assistance for Sophos Support remote access 18

19 Wireless Protection Easy central configuration for secure WiFi Central management Plug & play deployment Mesh Networking (wireless repeating and bridging) Easy hotspot configuration with full customization New in UTM 9.2 Fully customizable login pages and vouchers Support for backend authentication Support for two-factor authentication New in UTM 9.3 Hotspot signup and authentication via SMS Smart performance optimization (channel selection) 19

20 Web protection Layered protection for computers connected to the web Web threat protection URL Filtering Policy for Users/Groups Web application control Interactive user reporting New in UTM 9.2 Web in Endpoint for Sophos Enterprise Console managed clients Transparent user authentication with SSO for AD Policy setting simplified and enhanced (https, warn, PUAs) Device-specific authentication (browser prompt for mobile devices) Policy test tool for quick troubleshooting New in UTM 9.3 Time quotas, site tagging, and true-file-type detection Selective HTTPS scanning Updated App Control Engine (for over 1300 Apps) 20

21 Web in Endpoint Sophos Endpoints (anywhere) Web policy Activity Live Connect Features - Web threat protection and policy enforcement on the endpoint Benefits - Users are protected when they leave the network - everywhere - Policy is pushed out and reporting is pulled in - Admins can manage offsite users the same as onsite - No backhauling, VPN s, or datacenters involved 21

22 protection All-in-one anti-spam, anti-malware, DLP and encryption Anti-spam and Anti-virus to stop spam and phishing attacks Self-serve Quarantine (users manage their own quarantined mail) Standards based TLS, S/MIME and OpenPGP encryption New in UTM 9.2 Simple SPX encryption requiring no infrastructure Outlook Add-in to force encryption or tag as spam DLP for automatic policy-based encryption New in UTM 9.3 SPX Self-Registration for Passwords Live Anti-Virus Protection 22

23 How SPX Encryption Works Sender < Sender composes their exactly the same way as usual < They can force encryption using the new SPX Encrypt button Add-in for Outlook Or encryption can happen automatically based on the presence of sensitive data detected by the UTM \/ < The contents of the mail are encapsulated in an encrypted PDF before leaving the network 23

24 How SPX Encryption Works Recipient Replying securely is equally as easy /\ /\ The recipient receives an with the encrypted PDF attached to their regular inbox /\ They simply enter the required password to decrypt the contents and view the message and attachments > 24

25 How SPX Encryption Works On any device < SPX Encrypted s are viewable on any device that supports PDFs < Branding is customizable < A great advantage is that your encrypted mail is in your inbox with the rest of your mail and can be viewed even when you re offline 25

26 Endpoint protection Integrated Windows desktop/laptop protection Easy deployment and management from the UTM Endpoint anti-virus and malware protection Web in Endpoint (policy and protection everywhere) Live protection Device control (USB devices, Bluetooth, etc.) New in UTM 9.2 Integration of Sophos Enterprise Console managed endpoints Existing Endpoint customers can use the UTM for Web policy Allows larger deployments than UTM integrated Endpoint Admin alerts upon infection for UTM Endpoint clients 26

27 Mobile NAC Integration with Sophos Mobile Control Only from Sophos: UTM and SMC working better together Push WiFi and VPN settings from UTM to SMC SMC shared device compliance status with UTM Mobile NAC block non-compliant devices from network access WiFi & VPN Settings Mobile NAC Device Compliance Status 27

28 Web Server Protection The ideal replacement for Microsoft Forefront TMG Web Application Firewall (WAF) protects web servers and applications Server Hardening with deep link protection, form hardening Cookie tampering protection Anti-virus scanning on file uploads SSL offloading for added server performance New in UTM 9.2 Reverse proxy authentication (offloading) for TMG-like OWA authentication More TMG feature parity New in UTM 9.3 Persistent web form logins so users are not prompted repeatedly for credentials WAF allow/block lists 28

29 Why Sophos for your Next Firewall 29

30 More and more organizations are switching to Sophos UTM 1. We re simpler 2. We re faster 3. We offer everything in a single box 4. Including reporting 5. And we re a trusted industry leader 30

31 One Box Solution Refers to functionality included in a unified solution only.. = Comparable functionality with separate appliance only,.. = Requires Sophos Mobile Control subscription. 31

32 The key word is ONE FOURtiNet FortiAnlayser for Reporting FortiMail for Encryption/DLP FortiWeb for WAF 32

33 2. On-Box Reporting 33

34 All-in-One includes Reporting Complete on-box reporting Standard! 34

35 3. We Keep it Simple 35

36 Simplicity is our Mantra 36

37 It makes a difference Number of steps to complete every-day tasks Sophos UTM Competitor Firewall Firewall Rule App Control Policy Activiation HTTPS Filtering 37

38 UTM Deployment & Licensing 38

39 Deployment models SG-Series Hardware Appliances Software or Virtual 39

40 SG Series Appliance Portfolio Available Now Available Now Available Now Hardware Appliance SG 105 / 115 SG 125 / 135 SG 210 / 230 SG 310 / 330 SG 430 / 450 SG 550 SG 650 Category Small Desktop Small Desktop Medium Midrange 1U Medium Midrange 1U Medium Midrange 1U Large High-end 2U Large High-end 2U Network Ports (standard) FleXi Port Expansion Bays & 2 SFP 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) n/a n/a Redundancy n/a n/a n/a n/a 2 SSD (RAID) & 2 nd hot-swap power optional (SG 450 only) 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies Software Appliance Runs on dedicated Intel compatible PCs and servers and within virtual environments like VMware, Citrix, Hyper-V, KVM and other virtual environments 40

41 Sophos UTM Hardware Appliances Entry-level Desktop Models SG 105/115/125/135 1U performance Desktop form factor and price Plus models with integrated WiFi coming later this year Entry-level Mid-range Desktop Models 1U SG Rackmount 105/115/125/135 Models SG 210/230/310/330/ 1U performance 430/450 Desktop form factor and price Unrivalled performance Plus Unmatched models with flexibility integrated WiFi coming later this year Top-of-the-line 2U Rackmount Models SG 550/650 Ultimate connectivity and performance 41

42 High Availability Options Flexible and easy solutions to a complex problem Unique zero configuration plug-and-play hotstandby high availability Clustering support for up to 10 appliances. WAN link balancing and multi-path routing across any mix of 3G, UMTS or Ethernet services Support for 802.3ad (LACP) link aggregation 42

43 Sophos Ltd. All rights reserved. 43

Sophos SG 1 Session: Sophos UTM

Sophos SG 1 Session: Sophos UTM Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Sophos is a Network Security company too

Sophos is a Network Security company too Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A

More information

TMG Replacement Guide

TMG Replacement Guide Your guide to replacing Microsoft Forefront Threat Management Gateway By Chris McCormack, Senior Product Marketing Manager and Angelo Comazzetto, UTM Product Manager During one of the most active periods

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Network protection and UTM Buyers Guide

Network protection and UTM Buyers Guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection

More information

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance

More information

Synchronized Security

Synchronized Security Synchronized Security Revolutionizing Advanced Threat Protection Justinas Valentukevicius Channel Account Executive, Baltics 1 About Sophos 3 Sophos Snapshot Founded 1985 in Oxford, UK Appx. $400 million

More information

Sophos Roadshow. Complete Security Vision

Sophos Roadshow. Complete Security Vision Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality

More information

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER

More information

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

Boston Area Windows Server User Group April 2010

Boston Area Windows Server User Group April 2010 Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past

More information

Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer

Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer In this session What we will cover XG What s included? What

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Fortigate Features & Demo

Fortigate Features & Demo & Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Firewall Buyers Guide

Firewall Buyers Guide Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider

More information

Sophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11

Sophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11 Sophos XG Firewall Features List For Sophos and Cyberoam Customers Document Date: November 2015 November 2015 Page 1 of 11 Sophos XG Firewall v 15.01.0 Features List Contents Sophos XG Firewall Features...

More information

Sophos Certified Architect Course overview

Sophos Certified Architect Course overview Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting

More information

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Cyberoam Next-Generation Security. 11 de Setembro de 2015 Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in

More information

Automate your IT Security Services

Automate your IT Security Services Automate your IT Security Services Presenter: Cyberoam Our Products Network Security Appliances - UTM, NGFW (Hardware & Virtual) Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Modem

More information

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information

An Introduction to Commulynx

An Introduction to Commulynx An Introduction to Commulynx Commulynx Key Team Members Commulynx has 17 people in our team, however the key people are as follows: Stephen Knights the founder and Managing Director with over 20 years

More information

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Building Your Complete Remote Access Infrastructure on Windows Server 2012 Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Sophos XG Firewall Licensing

Sophos XG Firewall Licensing This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have

More information

Overview and Deployment Guide. Sophos UTM on AWS

Overview and Deployment Guide. Sophos UTM on AWS Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2

More information

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity

More information

The Fortinet Secure Health Architecture

The Fortinet Secure Health Architecture The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

WatchGuard Technologies. 2011 WatchGuard Technologies

WatchGuard Technologies. 2011 WatchGuard Technologies WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! [email protected]

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! [email protected] 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

The Fortinet Secure Health Architecture

The Fortinet Secure Health Architecture The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare

More information

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1 Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

Cisco IronPort X1070 Email Security System

Cisco IronPort X1070 Email Security System Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure [email protected]

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com Protecting the Irreplacable November Athens Ian Whiteside, F-Secure [email protected] PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the

More information

Cisco Web Security: Protection, Control, and Value

Cisco Web Security: Protection, Control, and Value Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security

More information

Internal Network Firewall (INFW) Protecting your network from the inside out

Internal Network Firewall (INFW) Protecting your network from the inside out Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Results of Testing: Juniper Branch SRX Firewalls

Results of Testing: Juniper Branch SRX Firewalls Executive Summary : Juniper Branch SRX Firewalls by Joel Snyder / Opus One prepared for Juniper Networks June 2012 Copyright 2012 : Juniper Branch SRX Firewalls Table of Contents Introduction....1 Firewall

More information

PCI DSS. Get Compliant, Stay Compliant Seminar

PCI DSS. Get Compliant, Stay Compliant Seminar PCI DSS Get Compliant, Stay Compliant Seminar ValueSYS Solutions & Services Wael Hosny CEO ValueSYS [email protected] Solutions you Need, with Quality you Deserve Seminar Agenda Time 09:00 10:00

More information

Advanced Persistent Threats: Detection, Protection and Prevention

Advanced Persistent Threats: Detection, Protection and Prevention Advanced Persistent Threats: Detection, Protection and Prevention By Barbara Hudson, Senior Product Marketing Manager The many ways in which industry experts have defined advanced persistent threats (APT)

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

MSP Dashboard. Solution Guide

MSP Dashboard. Solution Guide Solution Guide MSP Dashboard This document discusses the Cisco Meraki Managed Services Dashboard, which contains features purpose-built for Managed Service Providers offering cloud-managed networking as

More information

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research

More information

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected

More information

FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview

FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

McAfee Endpoint Protection Products

McAfee Endpoint Protection Products McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment Microsoft TMG Replacement How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment 1. Introduction This document gives an overview of FortiGate features

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

High Performance NGFW Extended

High Performance NGFW Extended High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material

More information

How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server

How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Sophos SG Series Appliances

Sophos SG Series Appliances Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to

More information