EndUser Protection. Peter Skondro. Sophos



Similar documents
Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Sophos Mobile Control

Sophos Mobile Control User guide for Apple ios. Product version: 4

Secure Your Mobile Workplace

Feature List for Kaspersky Security for Mobile

The User is Evolving. July 12, 2011

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Android

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3.6

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

BYOD: End-to-End Security

Embracing Complete BYOD Security with MDM and NAC

Kaspersky Security for Mobile Administrator's Guide

When enterprise mobility strategies are discussed, security is usually one of the first topics

Sophos Mobile Control Startup guide. Product version: 3.5

Ben Hall Technical Pre-Sales Manager

Kaspersky Security 10 for Mobile Implementation Guide

Sophos Mobile Control User guide for Android. Product version: 4

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Sophos Mobile Control Technical guide

Addressing NIST and DOD Requirements for Mobile Device Management

Sophos Mobile Control user help. Product version: 6.1

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Sophos Mobile Control Startup guide. Product version: 3

Endpoint protection for physical and virtual desktops

Sophos Mobile Control Technical Guide. Product version: 3.5

MTP. MTP AirWatch Integration Guide. Release 1.0

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Kaspersky Security for Mobile

An Introduction to Commulynx

Securing Corporate on Personal Mobile Devices

Endpoint protection for physical and virtual desktops

The ForeScout Difference

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

How To Manage A Mobile Device Management (Mdm) Solution

Sophos Cloud Help Document date: January 2016

Mobile Device Management

Sophos Roadshow. Complete Security Vision

Sophos Enterprise Console Help

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Guideline on Safe BYOD Management

IT Resource Management & Mobile Data Protection vs. User Empowerment

Sophos Mobile Control Technical Guide. Product version: 3

Did you know your security solution can help with PCI compliance too?

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Microsoft Enterprise Mobility Suite

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

Administrator's Guide

Dell World Software User Forum 2013

Mobile First Government

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Healthcare Buyers Guide: Mobile Device Management

Exchange ActiveSync (EAS)

Interact Intranet Version 7. Technical Requirements. August Interact

Symantec Mobile Management Suite

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Introduction. PCI DSS Overview

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Cortado Corporate Server

Move over, TMG! Replacing TMG with Sophos UTM

ForeScout MDM Enterprise

RFI Template for Enterprise MDM Solutions

IBM United States Software Announcement , dated February 3, 2015

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Simple security is better security Or: How complexity became the biggest security threat

Symantec Mobile Management for Configuration Manager 7.2

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Chris Boykin VP of Professional Services

FileCloud Security FAQ

Kaspersky Lab Mobile Device Management Deployment Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

ADDING STRONGER AUTHENTICATION for VPN Access Control

GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers

Cyber Security. John Leek Chief Strategist

Sophos Mobile Control User guide for Windows Mobile

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Sophos Enterprise Console policy setup guide. Product version: 5.2

Enterprise Mobility as a Service

Managing and Securing the Mobile Device Invasion IBM Corporation

Transcription:

EndUser Protection Peter Skondro Sophos

Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases

Endpoint

Sophos EndUser Solutions EndUser Protection AV Firewall Application Control Data Control Device Control Web Control Patch Assessment SafeGuard Enterprise HDD Encryption File Encryption

EndUser Protection Anti-Virus, Client Firewall & Application Control Anti-Virus and HIPS Reliable AV Protection Host Intrusion Prevention System Buffer Overflow Protection Live Protection & URL Filtering Firewall Stops attacks, Worms & Trojans Rule-based on application and/or network level Central management & logging Application Control Controls which applications are allowed to run Predefined applications & application categories e.g. File-Sharing Tools, Browser, Cloud Storage etc. New version definitions are provided automatically

EndUser Protection Device Control, Web Control & DLP Device Control Central management, logging &unlocking of devices Selective use of devices for specific computer groups Support of storage media, smartphones & network interfaces Unlocking of specific devices or device modes Web Control Reduces the attack surface of the clients 14 categories of websites (e.g. alcohol, gambling, hacking) Manual definition of additional White- & Blacklists Upgradable in combination with the Sophos Web Appliance or Sophos UTM Data Control Protection against accidental data loss Checks for file type or contents Transmission can be blocked or has to be confirmed by the user Predefined policies and contents are provided

EndUser Protection Device Control, Web Control & DLP Patch Assessment Checks operating systems and applications for missing patches Support of Microsoft, Adobe, Oracle, Citrix and others Threats are rated based on real threats HDD Encryption (SafeGuard Enterprise) HDD Encryption based on Sophos technology and/or BitLocker & FileVault2 Pre-Boot- Authentication Integrated password recovery mechanisms File Encryption (SafeGuard Enterprise) File Encryption based on Sophos technology Encryption for Removable Media, File Shares & Cloud Storage Key-Ring concept Portable component available

Endpoint Use Cases

How to protect mobile workers from web threats? Challenge While being in the company network notebooks are protected from web threats by the corporate firewalls. But what happens when the notebook leaves the secure network? Solution Sophos Endpoint can be used together with the Sophos Web Appliance and UTM Mobile workers are accessing the internet directly but with the current policies defined on the Web Appliance/ UTM.

How to prevent the loss of sensitive information? Challenge Sensitive information is found everywhere in the company. How can we prevent that this information is accidently transferred to USB Keys/ E-Mail applications/web Browsers/Applications? Solution Sophos EndUser Protection provides a set of features that enable you to easily protect your sensitive data Define DLP rules using Data Control, block unwanted applications and disallow the use of USB storage devices

How to protect sensitive information? Challenge Nowadays sensitive data can be found on every notebook or USB storage? How can this data be protected when devices get lost or stolen? Solution Sophos Encryption solutions make it possible to appropriately protect data on mobile devices and storage media.

How to find out which patches are Challenge important? New patches for business critical applications are introduced every day. How can we figure out which patches are really important for my company? Solution The Sophos Patch component provides all required information on relevant patches. Patches are prioritized so your can first handle the most important ones.

Mobile

Sophos Mobile Control Central management of Smartphones & Tablets Central management & configuration Central management for mobile devices Configuration distribution (Mail, WLAN, VPN, etc.) Inventory overview Broad platform support Apple ios Android Windows Mobile, Windows Phone 8 & BlackBerry Countermeasures in case loss & theft Lock Wipe Locate (optional)

Sophos Mobile Control Compliance, Access Control & App Management Compliance Definition of compliance settings Monitoring of device compliance state Automated actions in case of incompliant devices Control of E-Mail and network access E-Mail access control via Exchange Active Sync (EAS) Proxy Network access control via Sophos UTM, Cisco or Checkpoint Only compliant devices get access to company data App Management Installation & Removal of Apps (VPP Support) Enterprise App Store White- & Blacklisting of Apps

Sophos Mobile Control Malware Protection, Encryption, On-Premise & SaaS Malware Protection for Android Smartphones & Tablets Central management of the AV component for Android devices Automatic malware scan during App installation & update Web Control prevent access to certain website categories App Control prevent launch of specified applications Mobile Encryption Access to encrypted documents of mobile devices Broad support of Public Cloud Storage providers Support of Private Clouds using WebDAV Purchasing Options On-Premise Installation Software as a Service (SaaS)

Mobile Use Cases

How to ensure that data on mobile devices is secure? Challenge When a smartphone or tablet is stolen non-authorized persons may have access to sensitive data. How can we protect the data in such situations? Solution Sophos Mobile Control allows you to distribute password policies on all supported platforms including wiping after n unsuccessful login attempts. Additionally you may remotely lock or wipe the smartphone/tablet.

How to prevent that personal devices can synchronize with my mail server? Challenge Users can easily transfer the mail server settings from a company device to a personal devices. How do we prevent that unmanaged devices access company mails? Solution Sophos Mobile Control offers compliance settings which block access to company resources in case that unmanaged devices try to connect.

How to prevent that personal devices can synchronize with my mail server? Challenge Users can easily transfer the mail server settings from a company device to a personal devices. How do we prevent that unmanaged devices access company mails? Solution Sophos Mobile Control offers compliance settings which block access to company resources in case that unmanaged devices try to connect.

How to prevent that non-compliant devices connect to my Wi-Fi or VPN? Challenge Users can easily transfer the Wi-Fi or VPN connection settings to personal devices. How can we prevent that unmanaged devices access our company network? Solution Sophos Mobile Control can be used in combination with network security solutions (e.g. Sophos UTM) to prevent that unmanaged devices connect via Wi-Fi or VPN.

SMC & UTM Setup

SMC & UTM Setup

Network Access Control

Push Configuration

How to protect Android devices against malware or unwanted apps? Challenge Malware on the Android platform is more and more becoming a problem. How can I protect my users against malware on their smartphones and tablets? How can I prevent that my users access malicious websites or run unwanted applications? Solution Sophos Mobile Control in combination with Sophos Mobile Security protects against malicious apps and websites and also blocks unwanted applications.

Thank you