Sophos Security made simple. Fabio Baldassarre Sales Engineer fabio.baldassarre@sophos.it Cell: +39 3351294073 1
Sophos Snapshot Founded 1985 in Abingdon, UK $450+ million in FY15 billings Solid cash EBITDA margin (20%+) and strong cash conversion 2,400 employees Over 200,000 customers 100+ million users 90%+ best in class renewal rates 15,000+ channel partners SophosLabs: one of world's leading threat research laboratories Channel first go to market model Key OEM Partners: Cisco, IBM, Juniper, Citrix, Lenovo, Rackspace History of organic and acquired growth Sophos HQ, Abingdon, UK 2
Sophos History Evolution to complete security Founded in Abingdon (Oxford), UK Supplied security software to UK forces in 1st Gulf War TA Associates minority investment Acquired Utimaco Safeware AG Acquired Astaro Divested noncore Cyber business Peter Lammer c1985 Jan Hruska c1985 1985 1988 1989 1991 1996 2002 2003 2008 2010 2011 2012 2013 2014 First checksumbased antivirus software Voted best small/medium sized company in UK First signaturebased antivirus software US presence established in Boston Acquired ActiveState Awarded 3 Queen s Awards for Enterprise, Innovation and International Trade Majority interest sold to Apax Partners Acquired DIALOGS Acquired Cyberoam Acquired Mojave Networks 3
Ability to execute Ability to execute Ability to execute Note: Gartner requires special permission for any use of any MQ slide. So this slide is for internal use only. If you d like to use Gartner MQs in sales or marketing efforts, please use the full Gartner MQ reports. Sophos has purchased distribution rights for all the relevant MQ reports. Thank you. Leading Provider of Enterprise IT Security Solutions Magic quadrant for UTM Magic quadrant for endpoint protection platform Magic quadrant for mobile data protection Challengers Leaders Challengers Leaders Challengers Leaders Fortinet Juniper Networks Cisco Dell Check Point Software Technologies WatchGuard Microsoft Trend Micro Symantec McAfee Kaspersky Lab Check Point Software Technologies McAfee Huawei Hillstone Networks Aker Security Solutions Barracuda Networks Clavister gateprotect Stormshield Cyberoam ThreatTrack Security Eset Bitdefender F-Secure Check Point Software Technologies BeyondTrust Panda Security Webroot IBM Arkoon Network Security LANDesk Lumension Security Microsoft Center Tools Kaspersky Lab Symantec WinMagic Dell Trend Micro Digital Guardian Wave System Niche players Visionaries Completeness of vision Niche players Visionaries Completeness of vision Niche players Completeness of vision Visionaries Source: Gartner (August 2014) Source: Gartner (January 2014) Source: Gartner (September 2014) The only vendor in the leadership quadrants for UTM, endpoint protection and mobile data protection 4
Focus on SMB and Mid-Market Small and mid-market enterprises and Pragmatic Enterprises of any size > 5,000 employees 10,000 Companies WW 20% of Sophos Billings Similar security threats as large enterprises Limited IT security staff Need security made simple 100 5,000 employees < 100 employees 500,000 Companies WW 57% of Sophos Billings 20 million Companies WW 23% of Sophos Billings Note: Based on fiscal 2014 financials; pro forma for divestiture of non-core Cyber (2Q FY 14); fiscal year ends March 31 5
Most Enterprises Lack IT Security Staff Average number of People in Organization Dedicated to IT Security 60 50 50 40 50% of IT Security Spend 30 20 10 0 0 1 100-499 Employees Challenged by Complexity Limited by Resources 500-999 Employees 3 1000-4,999 Employees 8 5000-19,999 Employees 20,000+ Employees 6
Complete security Endpoint Network Web Mobile Email Data 7 7
Complete security Endpoint Web Email Data Mobile Network Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working URL Filtering Web Application Firewall Endpoint Web Protection Encryption for cloud Data Control Access control Automation WiFi security Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help Device Control Application Control Secure branch offices Mobile app security Intrusion prevention Firewall Clean up Technical support Encryption Live Protection Email encryption 8
Project Galileo Next Gen Network Security ~ Project Galileo ~ Technology Integration that Enables Context-Aware Security Cloud Managed Next Gen Endpoint 9
What We Believe: Security must be comprehensive The capabilities required to fully satisfy customer need Security can be made simple Platform, deployment, licensing, user experience Security is more effective as a system New possibilities through technology cooperation 10
And We re Just Getting Started Next Gen Endpoint Every Endpoint is an Endpoint Advanced Threat Protection in EP Encryption Everywhere Project Galileo Network Security v10: user-based policy, web + app control Off-box reporting New network security MSP offering Heartbeat monitoring (Galileo) Project Galileo Support New support website NetPromoter focus New pricing/packaging Sophos Labs Emulator Big Data Correlation Server Lockdown Whitelisting File Reputation Application Reputation Project Galileo Sophos Cloud Encryption Server Freemium Project Galileo Technology Integration that Enables Context-Aware Security Marketing More Leads More Apps More Free Tools Sophos Home Free tools Brand recognition Telemetry 11
Sophos UTM 12
Complete protection made simple (and fast) Reputation Data Active Protection SophosLabs Correlated intelligence Content Classification AT HOME AND ON THE MOVE REMOTE OFFICE 1 REMOTE OFFICE 2 Mobile Control Endpoint Security UTM Or RED Secure Wi-Fi Secure VPN RED Secure Wi-Fi Secure VPN Client Endpoint Security Mobile Control Endpoint Security Mobile Control HEADQUARTERS SOPHOS CLOUD Network Storage Antivirus Server Security Administration Mobile Control Endpoint Security Secure Wi-Fi NextGen Firewall Guest Wi-Fi 13
Our all-in-one approach Complete Network Protection Endpoint and Mobile integration Networking features for high availability and load balancing Complete email, web & network protection integrated VPN & wireless extensions Flexible Deployment Software Appliance Virtual Appliance Central, browser-based management & reporting of all applications 14
Modular Security features Enterprise-class security for small and mid-market organizations Endpoint Protection Wireless Protection Wireless Controller for Access Points Multi-Zone (SSID) support Hotspot Support Device Control AntiVirus Web-in-Endpoint Essential Firewall Stateful Firewall Object based rules User self-service portal Network Protection Intrusion Prevention (IPS) Client & Site-to-Site VPN Quality of Service (QoS) Advanced Threat Prot. (ATP) Web Server Protection Web Protection Reverse Proxy Web Application Firewall Antivirus Mail Protection Anti Spam & Phishing Dual Virus Protection DLP & Encryption URL Filtering Policies Web Threat Protection Application Control 15
Choose your modules Network Firewall Web Protection Web Server Protection Endpoint Protection Network Protection Wireless Protection Email Protection Either UTM Endpoint or other Sophos Endpoint product FullGuard (TotalProtect) 16
Advanced Threat Protection in UTM Preventing, Blocking, Identifying, Sandboxing 6 Selective Sandboxing Suspicious samples representing potential unknown threats are sent to the SophosLabs cloud for analysis. New threat intelligence is passed back to the UTM. X 3 Block Network Attacks Firewall and newly optimized IPS block network attacks and prevent breaches at the network gateway 1 2 Multi-layered Protection Sophos Web, Email and Endpoint protection prevent infections from entering the network in the first place Web Malware Detection New advanced web malware detection in 9.2 can emulate JavaScript to catch even the most sophisticated obfuscated and polymorphic threats X X X X!!! 4 5 Block Calls-Home With ATP in 9.2, DNS, App control, and Web proxy work together to identify C&C traffic patterns and block them Identify Infected Systems With ATP in 9.2 hosts attempting to communicate with C&C are immediately identified and contained. 17
Network Protection Full-featured network firewall protection Simple and Intuitive Management (Object-based rules) Quality-of-Service (QoS) bandwidth management & traffic shaping Intrusion Prevention System (IPS) Secure VPN Access (exhaustive choice: IPSec, SSL, HTML5 and many more) Site-to-Site VPN (enhanced with unique RED devices) Self-Service User Portal (for quarantine, VPN clients, etc.) New in UTM 9.2 Advanced Threat Protection (with selective sandboxing) Two-Factor authentication (with one-time password solution) New in UTM 9.3 One-click secure remote assistance for Sophos Support remote access 18
Wireless Protection Easy central configuration for secure WiFi Central management Plug & play deployment Mesh Networking (wireless repeating and bridging) Easy hotspot configuration with full customization New in UTM 9.2 Fully customizable login pages and vouchers Support for backend authentication Support for two-factor authentication New in UTM 9.3 Hotspot signup and authentication via SMS Smart performance optimization (channel selection) 19
Web protection Layered protection for computers connected to the web Web threat protection URL Filtering Policy for Users/Groups Web application control Interactive user reporting New in UTM 9.2 Web in Endpoint for Sophos Enterprise Console managed clients Transparent user authentication with SSO for AD Policy setting simplified and enhanced (https, warn, PUAs) Device-specific authentication (browser prompt for mobile devices) Policy test tool for quick troubleshooting New in UTM 9.3 Time quotas, site tagging, and true-file-type detection Selective HTTPS scanning Updated App Control Engine (for over 1300 Apps) 20
Web in Endpoint Sophos Endpoints (anywhere) Web policy Activity Live Connect Features - Web threat protection and policy enforcement on the endpoint Benefits - Users are protected when they leave the network - everywhere - Policy is pushed out and reporting is pulled in - Admins can manage offsite users the same as onsite - No backhauling, VPN s, or datacenters involved 21
Email protection All-in-one anti-spam, anti-malware, DLP and encryption Anti-spam and Anti-virus to stop spam and phishing attacks Self-serve Quarantine (users manage their own quarantined mail) Standards based TLS, S/MIME and OpenPGP encryption New in UTM 9.2 Simple SPX encryption requiring no infrastructure Outlook Add-in to force encryption or tag as spam DLP for automatic policy-based encryption New in UTM 9.3 SPX Self-Registration for Passwords Live Anti-Virus Protection 22
How SPX Encryption Works Sender < Sender composes their email exactly the same way as usual < They can force encryption using the new SPX Encrypt button Add-in for Outlook Or encryption can happen automatically based on the presence of sensitive data detected by the UTM \/ < The contents of the mail are encapsulated in an encrypted PDF before leaving the network 23
How SPX Encryption Works Recipient Replying securely is equally as easy /\ /\ The recipient receives an email with the encrypted PDF attached to their regular inbox /\ They simply enter the required password to decrypt the contents and view the message and attachments > 24
How SPX Encryption Works On any device < SPX Encrypted emails are viewable on any device that supports PDFs < Branding is customizable < A great advantage is that your encrypted mail is in your inbox with the rest of your mail and can be viewed even when you re offline 25
Endpoint protection Integrated Windows desktop/laptop protection Easy deployment and management from the UTM Endpoint anti-virus and malware protection Web in Endpoint (policy and protection everywhere) Live protection Device control (USB devices, Bluetooth, etc.) New in UTM 9.2 Integration of Sophos Enterprise Console managed endpoints Existing Endpoint customers can use the UTM for Web policy Allows larger deployments than UTM integrated Endpoint Admin alerts upon infection for UTM Endpoint clients 26
Mobile NAC Integration with Sophos Mobile Control Only from Sophos: UTM and SMC working better together Push WiFi and VPN settings from UTM to SMC SMC shared device compliance status with UTM Mobile NAC block non-compliant devices from network access WiFi & VPN Settings Mobile NAC Device Compliance Status 27
Web Server Protection The ideal replacement for Microsoft Forefront TMG Web Application Firewall (WAF) protects web servers and applications Server Hardening with deep link protection, form hardening Cookie tampering protection Anti-virus scanning on file uploads SSL offloading for added server performance New in UTM 9.2 Reverse proxy authentication (offloading) for TMG-like OWA authentication More TMG feature parity New in UTM 9.3 Persistent web form logins so users are not prompted repeatedly for credentials WAF allow/block lists 28
Why Sophos for your Next Firewall 29
More and more organizations are switching to Sophos UTM 1. We re simpler 2. We re faster 3. We offer everything in a single box 4. Including reporting 5. And we re a trusted industry leader 30
One Box Solution Refers to functionality included in a unified solution only.. = Comparable functionality with separate appliance only,.. = Requires Sophos Mobile Control subscription. 31
The key word is ONE FOURtiNet FortiAnlayser for Reporting FortiMail for Encryption/DLP FortiWeb for WAF 32
2. On-Box Reporting 33
All-in-One includes Reporting Complete on-box reporting Standard! 34
3. We Keep it Simple 35
Simplicity is our Mantra 36
It makes a difference Number of steps to complete every-day tasks 45 40 35 30 25 20 15 Sophos UTM Competitor Firewall 10 5 0 Firewall Rule App Control Policy Email Activiation HTTPS Filtering 37
UTM Deployment & Licensing 38
Deployment models SG-Series Hardware Appliances Software or Virtual 39
SG Series Appliance Portfolio Available Now Available Now Available Now Hardware Appliance SG 105 / 115 SG 125 / 135 SG 210 / 230 SG 310 / 330 SG 430 / 450 SG 550 SG 650 Category Small Desktop Small Desktop Medium Midrange 1U Medium Midrange 1U Medium Midrange 1U Large High-end 2U Large High-end 2U Network Ports (standard) FleXi Port Expansion Bays 4 8 6 8 & 2 SFP 8 (FleXi Port) 8 (FleXi Port) 8 (FleXi Port) n/a n/a 1 1 2 3 4 Redundancy n/a n/a n/a n/a 2 SSD (RAID) & 2 nd hot-swap power optional (SG 450 only) 2 hot-swap SSD (RAID) 2 hot-swap power supplies 2 hot-swap SSD (RAID) 2 hot-swap power supplies Software Appliance Runs on dedicated Intel compatible PCs and servers and within virtual environments like VMware, Citrix, Hyper-V, KVM and other virtual environments 40
Sophos UTM Hardware Appliances Entry-level Desktop Models SG 105/115/125/135 1U performance Desktop form factor and price Plus models with integrated WiFi coming later this year Entry-level Mid-range Desktop Models 1U SG Rackmount 105/115/125/135 Models SG 210/230/310/330/ 1U performance 430/450 Desktop form factor and price Unrivalled performance Plus Unmatched models with flexibility integrated WiFi coming later this year Top-of-the-line 2U Rackmount Models SG 550/650 Ultimate connectivity and performance 41
High Availability Options Flexible and easy solutions to a complex problem Unique zero configuration plug-and-play hotstandby high availability Clustering support for up to 10 appliances. WAN link balancing and multi-path routing across any mix of 3G, UMTS or Ethernet services Support for 802.3ad (LACP) link aggregation 42
Sophos Ltd. All rights reserved. 43