Sophos Security made simple.
|
|
|
- Sharlene Harrell
- 10 years ago
- Views:
Transcription
1 Sophos Security made simple. Fabio Baldassarre Sales Engineer Cell:
2 Sophos Snapshot Founded 1985 in Abingdon, UK $450+ million in FY15 billings Solid cash EBITDA margin (20%+) and strong cash conversion 2,400 employees Over 200,000 customers 100+ million users 90%+ best in class renewal rates 15,000+ channel partners SophosLabs: one of world's leading threat research laboratories Channel first go to market model Key OEM Partners: Cisco, IBM, Juniper, Citrix, Lenovo, Rackspace History of organic and acquired growth Sophos HQ, Abingdon, UK 2
3 Sophos History Evolution to complete security Founded in Abingdon (Oxford), UK Supplied security software to UK forces in 1st Gulf War TA Associates minority investment Acquired Utimaco Safeware AG Acquired Astaro Divested noncore Cyber business Peter Lammer c1985 Jan Hruska c First checksumbased antivirus software Voted best small/medium sized company in UK First signaturebased antivirus software US presence established in Boston Acquired ActiveState Awarded 3 Queen s Awards for Enterprise, Innovation and International Trade Majority interest sold to Apax Partners Acquired DIALOGS Acquired Cyberoam Acquired Mojave Networks 3
4 Ability to execute Ability to execute Ability to execute Note: Gartner requires special permission for any use of any MQ slide. So this slide is for internal use only. If you d like to use Gartner MQs in sales or marketing efforts, please use the full Gartner MQ reports. Sophos has purchased distribution rights for all the relevant MQ reports. Thank you. Leading Provider of Enterprise IT Security Solutions Magic quadrant for UTM Magic quadrant for endpoint protection platform Magic quadrant for mobile data protection Challengers Leaders Challengers Leaders Challengers Leaders Fortinet Juniper Networks Cisco Dell Check Point Software Technologies WatchGuard Microsoft Trend Micro Symantec McAfee Kaspersky Lab Check Point Software Technologies McAfee Huawei Hillstone Networks Aker Security Solutions Barracuda Networks Clavister gateprotect Stormshield Cyberoam ThreatTrack Security Eset Bitdefender F-Secure Check Point Software Technologies BeyondTrust Panda Security Webroot IBM Arkoon Network Security LANDesk Lumension Security Microsoft Center Tools Kaspersky Lab Symantec WinMagic Dell Trend Micro Digital Guardian Wave System Niche players Visionaries Completeness of vision Niche players Visionaries Completeness of vision Niche players Completeness of vision Visionaries Source: Gartner (August 2014) Source: Gartner (January 2014) Source: Gartner (September 2014) The only vendor in the leadership quadrants for UTM, endpoint protection and mobile data protection 4
5 Focus on SMB and Mid-Market Small and mid-market enterprises and Pragmatic Enterprises of any size > 5,000 employees 10,000 Companies WW 20% of Sophos Billings Similar security threats as large enterprises Limited IT security staff Need security made simple 100 5,000 employees < 100 employees 500,000 Companies WW 57% of Sophos Billings 20 million Companies WW 23% of Sophos Billings Note: Based on fiscal 2014 financials; pro forma for divestiture of non-core Cyber (2Q FY 14); fiscal year ends March 31 5
6 Most Enterprises Lack IT Security Staff Average number of People in Organization Dedicated to IT Security % of IT Security Spend Employees Challenged by Complexity Limited by Resources Employees ,999 Employees ,999 Employees 20,000+ Employees 6
7 Complete security Endpoint Network Web Mobile Data 7 7
8 Complete security Endpoint Web Data Mobile Network Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working URL Filtering Web Application Firewall Endpoint Web Protection Encryption for cloud Data Control Access control Automation WiFi security Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help Device Control Application Control Secure branch offices Mobile app security Intrusion prevention Firewall Clean up Technical support Encryption Live Protection encryption 8
9 Project Galileo Next Gen Network Security ~ Project Galileo ~ Technology Integration that Enables Context-Aware Security Cloud Managed Next Gen Endpoint 9
10 What We Believe: Security must be comprehensive The capabilities required to fully satisfy customer need Security can be made simple Platform, deployment, licensing, user experience Security is more effective as a system New possibilities through technology cooperation 10
11 And We re Just Getting Started Next Gen Endpoint Every Endpoint is an Endpoint Advanced Threat Protection in EP Encryption Everywhere Project Galileo Network Security v10: user-based policy, web + app control Off-box reporting New network security MSP offering Heartbeat monitoring (Galileo) Project Galileo Support New support website NetPromoter focus New pricing/packaging Sophos Labs Emulator Big Data Correlation Server Lockdown Whitelisting File Reputation Application Reputation Project Galileo Sophos Cloud Encryption Server Freemium Project Galileo Technology Integration that Enables Context-Aware Security Marketing More Leads More Apps More Free Tools Sophos Home Free tools Brand recognition Telemetry 11
12 Sophos UTM 12
13 Complete protection made simple (and fast) Reputation Data Active Protection SophosLabs Correlated intelligence Content Classification AT HOME AND ON THE MOVE REMOTE OFFICE 1 REMOTE OFFICE 2 Mobile Control Endpoint Security UTM Or RED Secure Wi-Fi Secure VPN RED Secure Wi-Fi Secure VPN Client Endpoint Security Mobile Control Endpoint Security Mobile Control HEADQUARTERS SOPHOS CLOUD Network Storage Antivirus Server Security Administration Mobile Control Endpoint Security Secure Wi-Fi NextGen Firewall Guest Wi-Fi 13
14 Our all-in-one approach Complete Network Protection Endpoint and Mobile integration Networking features for high availability and load balancing Complete , web & network protection integrated VPN & wireless extensions Flexible Deployment Software Appliance Virtual Appliance Central, browser-based management & reporting of all applications 14
15 Modular Security features Enterprise-class security for small and mid-market organizations Endpoint Protection Wireless Protection Wireless Controller for Access Points Multi-Zone (SSID) support Hotspot Support Device Control AntiVirus Web-in-Endpoint Essential Firewall Stateful Firewall Object based rules User self-service portal Network Protection Intrusion Prevention (IPS) Client & Site-to-Site VPN Quality of Service (QoS) Advanced Threat Prot. (ATP) Web Server Protection Web Protection Reverse Proxy Web Application Firewall Antivirus Mail Protection Anti Spam & Phishing Dual Virus Protection DLP & Encryption URL Filtering Policies Web Threat Protection Application Control 15
16 Choose your modules Network Firewall Web Protection Web Server Protection Endpoint Protection Network Protection Wireless Protection Protection Either UTM Endpoint or other Sophos Endpoint product FullGuard (TotalProtect) 16
17 Advanced Threat Protection in UTM Preventing, Blocking, Identifying, Sandboxing 6 Selective Sandboxing Suspicious samples representing potential unknown threats are sent to the SophosLabs cloud for analysis. New threat intelligence is passed back to the UTM. X 3 Block Network Attacks Firewall and newly optimized IPS block network attacks and prevent breaches at the network gateway 1 2 Multi-layered Protection Sophos Web, and Endpoint protection prevent infections from entering the network in the first place Web Malware Detection New advanced web malware detection in 9.2 can emulate JavaScript to catch even the most sophisticated obfuscated and polymorphic threats X X X X!!! 4 5 Block Calls-Home With ATP in 9.2, DNS, App control, and Web proxy work together to identify C&C traffic patterns and block them Identify Infected Systems With ATP in 9.2 hosts attempting to communicate with C&C are immediately identified and contained. 17
18 Network Protection Full-featured network firewall protection Simple and Intuitive Management (Object-based rules) Quality-of-Service (QoS) bandwidth management & traffic shaping Intrusion Prevention System (IPS) Secure VPN Access (exhaustive choice: IPSec, SSL, HTML5 and many more) Site-to-Site VPN (enhanced with unique RED devices) Self-Service User Portal (for quarantine, VPN clients, etc.) New in UTM 9.2 Advanced Threat Protection (with selective sandboxing) Two-Factor authentication (with one-time password solution) New in UTM 9.3 One-click secure remote assistance for Sophos Support remote access 18
19 Wireless Protection Easy central configuration for secure WiFi Central management Plug & play deployment Mesh Networking (wireless repeating and bridging) Easy hotspot configuration with full customization New in UTM 9.2 Fully customizable login pages and vouchers Support for backend authentication Support for two-factor authentication New in UTM 9.3 Hotspot signup and authentication via SMS Smart performance optimization (channel selection) 19
20 Web protection Layered protection for computers connected to the web Web threat protection URL Filtering Policy for Users/Groups Web application control Interactive user reporting New in UTM 9.2 Web in Endpoint for Sophos Enterprise Console managed clients Transparent user authentication with SSO for AD Policy setting simplified and enhanced (https, warn, PUAs) Device-specific authentication (browser prompt for mobile devices) Policy test tool for quick troubleshooting New in UTM 9.3 Time quotas, site tagging, and true-file-type detection Selective HTTPS scanning Updated App Control Engine (for over 1300 Apps) 20
21 Web in Endpoint Sophos Endpoints (anywhere) Web policy Activity Live Connect Features - Web threat protection and policy enforcement on the endpoint Benefits - Users are protected when they leave the network - everywhere - Policy is pushed out and reporting is pulled in - Admins can manage offsite users the same as onsite - No backhauling, VPN s, or datacenters involved 21
22 protection All-in-one anti-spam, anti-malware, DLP and encryption Anti-spam and Anti-virus to stop spam and phishing attacks Self-serve Quarantine (users manage their own quarantined mail) Standards based TLS, S/MIME and OpenPGP encryption New in UTM 9.2 Simple SPX encryption requiring no infrastructure Outlook Add-in to force encryption or tag as spam DLP for automatic policy-based encryption New in UTM 9.3 SPX Self-Registration for Passwords Live Anti-Virus Protection 22
23 How SPX Encryption Works Sender < Sender composes their exactly the same way as usual < They can force encryption using the new SPX Encrypt button Add-in for Outlook Or encryption can happen automatically based on the presence of sensitive data detected by the UTM \/ < The contents of the mail are encapsulated in an encrypted PDF before leaving the network 23
24 How SPX Encryption Works Recipient Replying securely is equally as easy /\ /\ The recipient receives an with the encrypted PDF attached to their regular inbox /\ They simply enter the required password to decrypt the contents and view the message and attachments > 24
25 How SPX Encryption Works On any device < SPX Encrypted s are viewable on any device that supports PDFs < Branding is customizable < A great advantage is that your encrypted mail is in your inbox with the rest of your mail and can be viewed even when you re offline 25
26 Endpoint protection Integrated Windows desktop/laptop protection Easy deployment and management from the UTM Endpoint anti-virus and malware protection Web in Endpoint (policy and protection everywhere) Live protection Device control (USB devices, Bluetooth, etc.) New in UTM 9.2 Integration of Sophos Enterprise Console managed endpoints Existing Endpoint customers can use the UTM for Web policy Allows larger deployments than UTM integrated Endpoint Admin alerts upon infection for UTM Endpoint clients 26
27 Mobile NAC Integration with Sophos Mobile Control Only from Sophos: UTM and SMC working better together Push WiFi and VPN settings from UTM to SMC SMC shared device compliance status with UTM Mobile NAC block non-compliant devices from network access WiFi & VPN Settings Mobile NAC Device Compliance Status 27
28 Web Server Protection The ideal replacement for Microsoft Forefront TMG Web Application Firewall (WAF) protects web servers and applications Server Hardening with deep link protection, form hardening Cookie tampering protection Anti-virus scanning on file uploads SSL offloading for added server performance New in UTM 9.2 Reverse proxy authentication (offloading) for TMG-like OWA authentication More TMG feature parity New in UTM 9.3 Persistent web form logins so users are not prompted repeatedly for credentials WAF allow/block lists 28
29 Why Sophos for your Next Firewall 29
30 More and more organizations are switching to Sophos UTM 1. We re simpler 2. We re faster 3. We offer everything in a single box 4. Including reporting 5. And we re a trusted industry leader 30
31 One Box Solution Refers to functionality included in a unified solution only.. = Comparable functionality with separate appliance only,.. = Requires Sophos Mobile Control subscription. 31
32 The key word is ONE FOURtiNet FortiAnlayser for Reporting FortiMail for Encryption/DLP FortiWeb for WAF 32
33 2. On-Box Reporting 33
34 All-in-One includes Reporting Complete on-box reporting Standard! 34
35 3. We Keep it Simple 35
36 Simplicity is our Mantra 36
37 It makes a difference Number of steps to complete every-day tasks Sophos UTM Competitor Firewall Firewall Rule App Control Policy Activiation HTTPS Filtering 37
38 UTM Deployment & Licensing 38
39 Deployment models SG-Series Hardware Appliances Software or Virtual 39
40 SG Series Appliance Portfolio Available Now Available Now Available Now Hardware Appliance SG 105 / 115 SG 125 / 135 SG 210 / 230 SG 310 / 330 SG 430 / 450 SG 550 SG 650 Category Small Desktop Small Desktop Medium Midrange 1U Medium Midrange 1U Medium Midrange 1U Large High-end 2U Large High-end 2U Network Ports (standard) FleXi Port Expansion Bays & 2 SFP 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) n/a n/a Redundancy n/a n/a n/a n/a 2 SSD (RAID) & 2 nd hot-swap power optional (SG 450 only) 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies Software Appliance Runs on dedicated Intel compatible PCs and servers and within virtual environments like VMware, Citrix, Hyper-V, KVM and other virtual environments 40
41 Sophos UTM Hardware Appliances Entry-level Desktop Models SG 105/115/125/135 1U performance Desktop form factor and price Plus models with integrated WiFi coming later this year Entry-level Mid-range Desktop Models 1U SG Rackmount 105/115/125/135 Models SG 210/230/310/330/ 1U performance 430/450 Desktop form factor and price Unrivalled performance Plus Unmatched models with flexibility integrated WiFi coming later this year Top-of-the-line 2U Rackmount Models SG 550/650 Ultimate connectivity and performance 41
42 High Availability Options Flexible and easy solutions to a complex problem Unique zero configuration plug-and-play hotstandby high availability Clustering support for up to 10 appliances. WAN link balancing and multi-path routing across any mix of 3G, UMTS or Ethernet services Support for 802.3ad (LACP) link aggregation 42
43 Sophos Ltd. All rights reserved. 43
Sophos SG 1 Session: Sophos UTM
Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
Sophos is a Network Security company too
Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A
TMG Replacement Guide
Your guide to replacing Microsoft Forefront Threat Management Gateway By Chris McCormack, Senior Product Marketing Manager and Angelo Comazzetto, UTM Product Manager During one of the most active periods
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
Synchronized Security
Synchronized Security Revolutionizing Advanced Threat Protection Justinas Valentukevicius Channel Account Executive, Baltics 1 About Sophos 3 Sophos Snapshot Founded 1985 in Oxford, UK Appx. $400 million
Sophos Roadshow. Complete Security Vision
Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality
BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity
Sophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
Boston Area Windows Server User Group April 2010
Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past
Sophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer
Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer In this session What we will cover XG What s included? What
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Fortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Firewall Buyers Guide
Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider
Sophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November 2015. November 2015 Page 1 of 11
Sophos XG Firewall Features List For Sophos and Cyberoam Customers Document Date: November 2015 November 2015 Page 1 of 11 Sophos XG Firewall v 15.01.0 Features List Contents Sophos XG Firewall Features...
Sophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
Cyberoam Next-Generation Security. 11 de Setembro de 2015
Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in
Automate your IT Security Services
Automate your IT Security Services Presenter: Cyberoam Our Products Network Security Appliances - UTM, NGFW (Hardware & Virtual) Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Modem
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
Cisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
Check Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
An Introduction to Commulynx
An Introduction to Commulynx Commulynx Key Team Members Commulynx has 17 people in our team, however the key people are as follows: Stephen Knights the founder and Managing Director with over 20 years
Building Your Complete Remote Access Infrastructure on Windows Server 2012
Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Sophos XG Firewall Licensing
This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have
Overview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
WatchGuard Technologies. 2011 WatchGuard Technologies
WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! [email protected]
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! [email protected] 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare
Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
EndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
Cisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure [email protected]
Protecting the Irreplacable November Athens Ian Whiteside, F-Secure [email protected] PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the
Cisco Web Security: Protection, Control, and Value
Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security
Internal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Results of Testing: Juniper Branch SRX Firewalls
Executive Summary : Juniper Branch SRX Firewalls by Joel Snyder / Opus One prepared for Juniper Networks June 2012 Copyright 2012 : Juniper Branch SRX Firewalls Table of Contents Introduction....1 Firewall
PCI DSS. Get Compliant, Stay Compliant Seminar
PCI DSS Get Compliant, Stay Compliant Seminar ValueSYS Solutions & Services Wael Hosny CEO ValueSYS [email protected] Solutions you Need, with Quality you Deserve Seminar Agenda Time 09:00 10:00
Advanced Persistent Threats: Detection, Protection and Prevention
Advanced Persistent Threats: Detection, Protection and Prevention By Barbara Hudson, Senior Product Marketing Manager The many ways in which industry experts have defined advanced persistent threats (APT)
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
MSP Dashboard. Solution Guide
Solution Guide MSP Dashboard This document discusses the Cisco Meraki Managed Services Dashboard, which contains features purpose-built for Managed Service Providers offering cloud-managed networking as
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
Cisco Email Security Appliances
Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework
Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Endpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
McAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
overview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment
Microsoft TMG Replacement How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment 1. Introduction This document gives an overview of FortiGate features
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
High Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management
White Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
