Sophos XG Firewall Licensing
|
|
- Griselda Nash
- 8 years ago
- Views:
Transcription
1 This article provides a detailed overview of the licensing for Sophos XG Firewall and related products. Although the Sophos XG Firewall licensing is very similar to what we offer for UTM 9 today, we have made some strategic changes: New enhanced Base Firewall license incl. IPSec and SSL VPN plus Wireless Software/virtual licensed by the virtual cores/ram of the hardware Two new next-gen firewall bundles: EnterpriseGuard and EnterpriseProtect Significant changes to support licensing Details on all of these changes can be found below. Understanding the Naming of the Product Our new product is called Sophos XG Firewall. This is a completely new platform and not the next version of either the Sophos UTM or Cyberoam OS. It combines elements of both Sophos and Cyberoam UTM and nextgen firewall technology but also completely new innovations and features many of you have been requesting for some time. Under Sophos XG Firewall you may also find the following components mentioned: Sophos Firewall OS (SF-OS) which is the firmware XG Series Appliances which come pre-installed with SF-OS Further Products in the XG Firewall ecosystem are: Sophos Firewall Manager (SFM) for the central management of SF-OS firewalls Sophos Cloud Firewall Manager (CFM), a cloud version of the above, exclusive to partners in v1 Sophos iview v2 which is our central reporting tool for SF-OS, UTM 9 and Cyberoam OS firewalls
2 Deployment Options and Base Firewall XG Series Hardware All appliances which come pre-installed with SF-OS are labelled XG. We will offer the same line-up as with the SG Series and they have the same technical specifications but they do have a different BIOS. Upon launch there will be two additional XG models which will be introduced later for Sophos UTM 9 (as SG Series): the entry level desktop appliance, XG 85 (also available as XG 85w) and the high-end 2U XG 750. Please note: The installation of UTM 9.x on XG Series appliances will initially not be supported. XG Firewall comes preinstalled on XG Series and will only run on SG Series that have been upgraded from UTM 9.x. It is not possible to buy the XG Base Firewall or subscription and install directly on SG hardware. Please contact your Channel Account Manager if you have any questions. Base Firewall A perpetual Base Firewall license is included in the purchase price of every XG Series appliance. The Base Firewall includes: Network Firewall SSL and IPSec VPN (no renewal required but IPSec client licenses are sold separately) Complete wireless protection, incl. hotspot support and voucher system This is the equivalent of the Essential Firewall with Sophos UTM but with much enhanced features. Base Firewall Type of license How to buy perpetual Included in hardware purchase price Purchased when buying software/virtual Software/Virtual We have changed the way in which we license software and virtual for XG Firewall from IP/User bands to (virtual) cores/ram of the hardware it s being installed on. This will simplify the selection of the right license for many scenarios and is more in line with industry standards. Understanding the Naming for software/virtual Example: SFv4C6
3 Your product will only work with the number of (virtual) cores and (virtual) RAM it is licensed for. For example, if you add more RAM to the above license, not more than 6 GB will be addressed unless you change your license. In such cases, please contact your Channel Account Manager for a quote. What you are actually purchasing when you select one of our virtual/software options from the price list is the Base Firewall. See above for full details of what is included in the Base Firewall. Please note: Sophos UTM licensing for virtual/software remains unchanged. Subscriptions and Bundles As with Sophos UTM 9, you have the option to purchase individual software subscription to tailor your security to your needs, or you can buy one of our bundles which can offer a significant cost saving. Individual Subscriptions XG Firewall offers the following subscription modules for individual purchase Individual Software Subscriptions IPS, RED/HTML5, ATP, Security Heartbeat* URL, AV, AppCtrl Protection Antispam, AV, SPX, DLP Web Server Protection WAF, AV, Rev. Proxy * Requires Cloud Endpoint Protection Advanced or Cloud Enduser Protection The key differences to Sophos UTM are: No Wireless Protection subscription as that is now included in the Base Firewall license No Endpoint Protection subscription as we will use the Cloud Endpoint, e.g. for Heartbeat Feature upgrades/updates included for 90 days so a support option should be quoted on top Product Bundles With the introduction of two new bundles for XG Firewall we offer a simpler way for you to sell a nextgeneration firewall. New NGFW Software License Bundle EnterpriseGuard is a new software license bundle which includes: Enhanced Support It is the ideal choice for customers looking for next-generation firewall features.
4 New NGFW Appliance/Software Bundle EnterpriseProtect provides a complete next-gen firewall solution in a single SKU. It includes: Enhanced Support XG Series appliance OR software/virtual appliance of your choice FullGuard for XG Firewall Of course, it is still possible to offer a FullGuard software bundle and this remains the most cost-effective way to buy all-in-one protection. For XG Firewall FullGuard includes: Protection Web Server Protection Enhanced Support TotalProtect for XG Firewall TotalProtect will continue to be a lead product for many of your projects as it offers the best value for money when buying software together with an appliance (hardware/software/virtual). For XG Firewall TotalProtect includes: Protection Web Server Protection Enhanced Support XG Series appliance OR software/virtual appliance of your choice Please note: All product bundles include Enhanced Support
5 Savings with Bundles vs. Individual Subscriptions The following chart shows the benefits of bundles over individual subscriptions. These prices exclude support. Overview Sophos XG Firewall Licensing with Appliance Please note: A short video explanation of the licensing using an example with XG hardware is available for partners here
6 High Availability (HA) The first release of XG Firewall supports just two nodes in a cluster. When licensing products in active/passive or active/active mode the following table provides guidance on which licenses will be required. # Use case description Licenses 1 Hardware Active-Active 2 required, i.e. 1 for each device. Active subscriptions must match (e.g., Web Protection) Subscription expiry dates don t have to match although it is best practice for them to do so 2 Hardware Active-Passive 2 required, 1 for the Active/Master device and 1 (Base Firewall only) for the Passive device. The Base Firewall is included in the purchase price of the hardware. 3 Software/Virtual Active- Active 4 Software/Virtual Active- Passive (Same as for hardware) 2 required, i.e. 1 for each device. Active subscriptions must match (e.g., Web Protection) Subscription expiry dates don t have to match although it is best practice for them to do so 1 required for the Active/Master device The product allows another SW/Virtual device to be directly linked in as the Passive device. The Passive device will have no separate serial number and doesn t communicate with the licensing system. Please note: HA will not be supported for XG Series appliances with integrated wireless in the first release. Sophos Firewall Manager (SFM) SFM Product Licenses Sophos Firewall Manager is available as a hardware appliance and as a software ISO or virtual appliance for you to install on third-party hardware. The license is perpetual, i.e. requires no renewal, but we recommend that you add a support option to each quote for SFM to ensure your customer receives product updates and upgrades and warranty beyond the first year for HW models. The support option will have a fixed term and require renewal. See the Support Licensing section for more details. SFM is licensed by the number of devices which are to be managed. There are three hardware appliances: Hardware Model SFM200 SFM300 SFM400 Recommended # of managed devices Device # based on current estimates And six options for software/virtual SW/Virtual Appliance SFMv15 SFMv50 SFMv100 SFMv200 SFMv500 SFMv1000 Licensed # managed devices ,000
7 Please note: Sophos Firewall Manager can be used to manage appliances (hardware/virtual/software) running SF-OS only. Sophos Cloud Firewall Manager (CFM) CFM v1 Licensing The Sophos Cloud Firewall Manager is being introduced for Partners only in v1 and as an introductory offer, at no cost. CFM will be accessible through the Cloud Partner Dashboard. Sophos iview v2 iview Licenses Sophos iview is available as a software ISO or virtual appliance for you to install on third-party hardware. The license is perpetual, i.e. requires no renewal, but we recommend that you add a support option to each quote for iview to ensure your customer receives product updates and upgrades. The support option will have a fixed term and require renewal. See the Support Licensing section for more details. There are five options to purchase iview plus one free version for trial use iview v2 Virtual/Software Free New New Licensed Storage capacity 100 GB 500 GB 1 TB 4 TB 8 TB Unlimited Please note: Sophos iview v2 can be used to manage appliances (hardware/virtual/software) running SF-OS, Sophos UTM 9.x (recommended from v9.3) and Cyberoam OS. Other License Types Trial and Evaluation Licenses We offer options for your customers and prospects to try out all XG Firewall products. We also offer options for Sophos Partners to use our products. The table below gives you an overview Evaluation/Testing SF-OS iview SFM CFM Partners 1 yr license free (renewable) Free w/ v1 Unlimited free (+ 1 yr support renewable) 1,000 device virtual license free (+ 1 yr support renewable) Customers 30 day trial 100 GB free Manage 5 appliances for free TBD later
8 Support Licensing With XG Firewall we have introduced a new support licensing scheme. When purchasing individual subscription modules, please note that they now include software feature updates/upgrades for just 90 days and therefore, we would strongly recommend that you always quote a support option or select one of our bundles which already include Enhanced Support. What you get Included with purchase Enhanced Support Plan (Included in bundles) Enhanced Plus Support Plan Support Direct telephone and support Included for 90-days (business hours only) Included (24x7) VIP Access (Senior Support) (24x7) Security Updates & Patches For the life of the product Software Feature Updates & Upgrades Included with an active software subscription Included with an active software subscription Included for 90-days Included Included Included with an active software subscription Consulting Remote consultation on your firewall configuration and security with a Sophos Senior Technical Support Engineer Warranty and RMA For all hardware appliances 1 year (return/replace) Advance Exchange Included (up to 4 hours) Advance Exchange Technical Account Manager Dedicated named technical account manager Optional (extra cost) Optional (extra cost) Please note: Sophos RED/AP support & warranty (beyond first year) is included in the Enhanced Plus support of the XG they are connected to.
9 Further Information Should you have further questions related to XG Firewall licensing, please contact your Channel Account Manager. The following Knowledge Base Articles provide valuable information regarding licensing: Sophos/Cyberoam Appliances which can be upgraded Sophos XG Firewall License Migration - your new license names and components United Kingdom and Worldwide Sales Tel: +44 (0) sales@sophos.com North American Sales Toll Free: nasales@sophos.com Australia and New Zealand Sales Tel: sales@sophos.com.au Asia Sales Tel: salesasia@sophos.com Oxford, UK Boston, USA Copyright Sophos Ltd. All rights reserved. Registered in England and Wales No , The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners.
Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances
Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your
More informationSimplifying Branch Office Security
Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationSophos UTM Support Services Guide
Sophos UTM Support Services Guide Introduction This document provides a detailed description of Sophos Support Services which are offered by Sophos or Sophos partners for Sophos UTM appliance, RED and
More informationWhat is MyUTM? 2. How do I log in to MyUTM? 2. I m logged in, what can I do? 2. What s the Overview section? 2
Contents What is MyUTM? 2 How do I log in to MyUTM? 2 I m logged in, what can I do? 2 What s the Overview section? 2 What s the Account Management section? 2 What are Contact sets? 3 What s the License
More informationSales Consultant I Engineer I Architect I Support Engineer I MSP. A Simple Overview to Training and Certification
A Simple Overview to Training and Certification Sales Consultant I Engineer I Architect I Support Engineer I MSP 1 How to use this guide The Sophos Training and Certification Program gives our partners
More informationComparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition
Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense
More informationSizing Guideline. Sophos UTM 9.1
Sizing Guideline Sophos UTM 9.1 Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos UTM appliance for your customer. Specifying the right
More informationProtecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
More informationSophos XG Firewall. Integrated Security for Better Protection. Jon Hope Channel Manager UK&I Network Security. James Burchell. Senior Sales Engineer
Sophos XG Firewall Integrated Security for Better Protection Jon Hope Channel Manager UK&I Network Security James Burchell Senior Sales Engineer In this session What we will cover XG What s included? What
More informationA Manager s Guide to Unified Threat Management and Next-Gen Firewalls
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationBuilding a Next-Gen Managed Security Practice
Building a Next-Gen Managed Security Practice IT Security MSPs: In the beginning We all remember the old days of Managed Service Providers (MSP). By acting as an IT security expert for companies who did
More informationSimple Security Is Better Security
Simple Security Is Better Security How small and medium-sized businesses can benefit from cloud-based security By Tsailing Merrem, Senior Product Marketing Manager Most vendors seem to assume that small
More informationSample Data Security Policies
This document provides three example data security policies that cover key areas of concern. They should not be considered an exhaustive list but rather each organization should identify any additional
More informationThe Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
More informationSample Mobile Device Security Policy
Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.
More informationProtecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
More informationManaging BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
More informationWireless network security: A how-to guide for SMBs
Wireless network security: A how-to guide for SMBs Wireless network security: A how-to guide for SMBs WiFi networks are a requirement for doing business today. Employees rely on them to have constant access
More informationSophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
More informationBotnets: The dark side of cloud computing
Botnets: The dark side of cloud computing By Angelo Comazzetto, Senior Product Manager Botnets pose a serious threat to your network, your business, your partners and customers. Botnets rival the power
More informationSophos is a Network Security company too
Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A
More informationSophos UTM Software Appliance
Sophos UTM Software Appliance Quick Start Guide Product version: 9.300 Document date: Monday, December 01, 2014 Sophos UTM Minimum Hardware Requirements Intel compatible CPU 1.5 GHz+ 1 GB RAM (2 GB recommended)
More informationSophos Cloud and Partner Dashboard Jonathan Shaw
Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming
More informationSophos SG 1 Session: Sophos UTM
Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our
More informationStrengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
More informationEncryption Buyers Guide
Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationYour Company Data, Their Personal Device What Could Go Wrong?
Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationSimplifying branch office security
Simplifying branch office security By Udo Kerst, Director Product Management Network Security Securing your business network is more important than ever. Malware, botnets and other malicious programs threaten
More informationSeven Keys to Securing Your Growing Business
Seven Keys to Securing Your Growing Business Common-sense guidelines for simplifying your security By Tsailing Merrem, Senior Product Marketing Manager The economy is picking up and business is growing
More informationFive Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationTwo Great Ways to Protect Your Virtual Machines From Malware
Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationSophos XG Firewall. Unrivalled performance, security and control
Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationDeciphering the Code: A Simple Guide to Encryption
Deciphering the Code: A Simple Guide to Encryption By Anthony Merry, Director of Product Management - Data Protection A business s success is increasingly dependent on its ability to leverage its data.
More informationGlobal Support Services
Global Support Services Supporting your investment in Sophos Technical Support has the highest priority within Sophos. Our comprehensive support service delivers the full range of benefits you would expect
More informationSophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationWho s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
More informationFirewall Buyers Guide
Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider
More informationSophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
More informationCloud Infrastructure Licensing, Packaging and Pricing
Cloud Infrastructure Licensing, Packaging and Pricing ware, August 2011 2009 ware Inc. All rights reserved On July 12 2011 ware is Introducing a Major Upgrade of the Entire Cloud Infrastructure Stack vcloud
More informationCentralize it Secure it Simplify IT!
Centralize it Secure it Simplify IT! Dedicated to helping network administrators and IT executives securely manage remote connections, network accesses, passwords and credentials. Remote Desktop Manager
More informationOperating Instructions. Sophos Access Points
Sophos Access Points Foreword We are pleased to welcome you as a new Sophos Access Point customer. These operating instructions will help you install and configure the access point and provide technical
More informationCOMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS
COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS Updated June 13, 2014 *Subject to Change* Table of Contents 1-2 Overview of Virtual Private Servers 2-3 Benefits 2 Reduce IT Cost and
More informationSee the Sample Scenario Section at the end of this document for a description of when these components are applied.
EMAIL SECURITY New Email Security Licensing Model Introduction SonicWALL has introduced a new Email Security Licensing Model that increases the flexibility and scalability of licensing for organizations
More informationCyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
More informationVMware vsphere with Operations Management and VMware vsphere
VMware vsphere with Operations Management and VMware vsphere Licensing, Pricing and Packaging WHITE PAPER Table of Contents Executive Summary.... 3 VMware vsphere with Operations Management Overview....
More informationKASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.
KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet
More informationTotal Business Continuity with Cyberoam High Availability
White paper Cyberoam UTM Total Business Continuity with Cyberoam High Availability Companies, big and small, must ensure constant availability of their company's network and data and prepare themselves
More informationWHITE PAPER. VMware Infrastructure 3 Pricing, Packaging and Licensing Overview
WHITE PAPER VMware Infrastructure 3 Pricing, Packaging and Licensing Overview Table of Contents Introduction to VMware Infrastructure 3.......................................3 Pricing, Packaging & Licensing
More informationComplex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security.
Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security. Kris Hagerman, CEO Sophos Simple security Strategy - Networks 3
More informationTMG Replacement Guide
Your guide to replacing Microsoft Forefront Threat Management Gateway By Chris McCormack, Senior Product Marketing Manager and Angelo Comazzetto, UTM Product Manager During one of the most active periods
More informationHow To Establish IPSec VPN between Cyberoam and Microsoft Azure
How To Establish IPSec VPN between Cyberoam and Microsoft Azure How To Establish IPSec VPN Connection between Cyberoam and Microsoft Azure Applicable Version: 10.00 onwards Overview Microsoft Azure is
More informationSSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
More informationSophos Ltd. All rights reserved.
Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to
More informationAstaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
More informationAdvanced Persistent Threats: Detection, Protection and Prevention
Advanced Persistent Threats: Detection, Protection and Prevention By Barbara Hudson, Senior Product Marketing Manager The many ways in which industry experts have defined advanced persistent threats (APT)
More informationHow To Choose A Dell Sonicwall Firewall From Awna.Com
2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall
More informationNext-Generation Centralized Security Management for MSSPs & Distributed Enterprises
Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises www.cyberoam.com sales@cyberoam.com As Enterprise and MSSP networks expand with more offices, users and experience trends
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationSolution Brief: Next Generation Endpoint Security
Solution Brief: Next Generation Endpoint Security Next Generation Endpoint Security has been defined many ways. Some vendors offer point products designed to take on a particular task such as exploit prevention
More informationA node is a device managed by GMS. For example, SKU 01-SSC-7665 gives you the right to manage, monitor, and report on ten SonicWALL devices.
GMS GMS Licensing for Windows and UMA EM5000 Purchase Decision Process and SKU Overview Step 1 Decide whether you would like to have GMS as an appliance (UMA), or run it as software that can be installed
More informationAstaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ
Active/Active-Cluster Licensing Partner FAQ Author: Udo Kerst (uke) Date: 2007-05-11 Content Page Which applications are being load balanced within an Astaro Security Gateway cluster?...2 Which licenses
More informationPackaged Unified Communications Solution. The all-in-one integrated collaboration solution that s simple, scalable and affordable.
Packaged Unified Communications Solution The all-in-one integrated collaboration solution that s simple, scalable and affordable. Collaboration is at the heart of your business operations. And today, an
More informationRequest for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
More informationThe Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
More informationDeploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
More informationCisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationYour Security Partner of Choice
Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide
More informationUNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify
More informationCisco Email Security Appliances
Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationCheck Point taps the power of virtualization to simplify security for private clouds
Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private
More informationOverview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
More informationDonation Tracker Information
C A S C A D E D A T A S O L U T I O N S Donation Tracker Information Our mission is to provide powerful, yet easy to use, Campaign Management software with excellent Support. When you purchase Donation
More informationPERSONAL FIREWALL SHOWDOWN: SOFTWARE VERSUS APPLIANCE
83-10-49 DATA SECURITY MANAGEMENT PERSONAL FIREWALL SHOWDOWN: SOFTWARE VERSUS APPLIANCE Darrin Mourer INSIDE Level of Protection; Manageability; Cost Analysis; Feature Set Comparison; Future Outlook; Current
More informationG-Cloud Managed Exchange SaaS. Service Description
G-Cloud Managed Exchange SaaS Service Description G-Cloud Managed Exchange SaaS Service Description 2 INDEX TO SUNGARD MANAGED EXCHANGE SAAS SUNGARD CLOUD SERVICES... 3 Managed Exchange SaaS Overview...
More informationLab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices
Lab Testing Detailed Report DR131118 January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG 900-20 Secure Web Gateway, Proxy Edition Check
More informationCheck Point 2200 Appliance
Datasheet: Check Point 2200 Appliance 2200 Branch & Small Office Solution Enterprise security in a desktop package Check Point 2200 Appliance Today the Internet gateway is more than a firewall. It is a
More informationHow To Configure Syslog over VPN
How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information
More informationEndpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationSonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
More informationEight Rock Solid Reasons Why You Should Buy OEM From Us
Accelerating Your Success Eight Rock Solid Reasons Why You Should Buy OEM From Us Avnet Technology Solutions recommends genuine Microsoft software SOFTWARE Contents Reason 1: Our strong OEM heritage...
More informationIntroduction to VMware EVO: RAIL. White Paper
Introduction to VMware EVO: RAIL White Paper Table of Contents Introducing VMware EVO: RAIL.... 3 Hardware.................................................................... 4 Appliance...............................................................
More informationWatchGuard: Your Security Partner of Choice. Carlos Vieira
WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices
More informationProduct Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
More informationDIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
More informationWhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
More informationBES12 Frequently Asked Questions. BEs12. questions. FAQs
1 BEs12 Frequently asked questions FAQs 2 Contents Overview... 3 Pricing... 4 Technical: Upgrade, Migration & Installation... 5 Additional Migration Questions... 10 Installation... 11 System... 12 BES5
More informationMANAGED DATABASE SOLUTIONS
Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution
More information