Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1
What do they have in common? DATA BREACH 2
Security is HARD! Components of good security 1. Careful planning 2. User education 3. Choosing the right tools 4. Using the tools correctly (takes time and expertise) 3
Sophos Simple Security 4
60,0 50,0 50 40,0 Sophos core customers 30,0 20,0 10,0,0 0 1 100-499 Employees Challenged by Complexity Limited by Resources 500-999 Employees 3 1000-4,999 Employees 8 5000-19,999 Employees 20,000+ Employees 5
Users Are Everywhere What About Securing My Servers? Regulations & Compliance Transition to the Cloud Go Wireless Console Proliferation & Agent Pollution Downtime Unacceptable Protect My Data Help Desk Queries Corporate Owned and BYOD Can t Control Users via Brute Force 6
Users Are Everywhere Polymorphic Threats Affect Everyone Go Wireless What About Securing My Servers? New Attack Surfaces (Android, ios) Regulations & Compliance IT Systems Are The Lifeblood for Any Size Org Console Proliferation & Agent Pollution Transition to the Cloud Macs Are No Longer Immune Downtime Unacceptable Protect My Data Not Just A Big Company Problem Corporate Owned and BYOD Can t Control Users via Brute Force Help Desk Queries 250,000 New Threats Will Appear Today 7
Anti-spam Encryption Firewall Anti-malware BYOD solution Security Management Usage policies Sophos Complete Security 8 8
UTM overview - A truly simple firewall 9
Security, Made Simple Security Security technologies Next Gen Firewall VPN Anti-Spam Email Encryption Endpoint Web Protection Wireless Antimalware and IPS URL Filtering Webserver Protection Made Simple. Simple Deployment Simple Protection Simple Management Hardware Software Virtual Cloud Active Protection real-time protection powered by SophosLabs Live lookups via the Cloud SophosLabs experts tune the protection so you don t have to Intuitive consoles Centralised management Backed by expert support 10
Sophos UTM a truly simple firewall Complete Security in a single solution Network Firewall Network Protection Web Protection Email Protection Wireless Protection Webserver Protection Endpoint Protection 11
Network firewall - the first line of defense Starting with network security Any computer connected to the internet is at risk A computer outside a firewall can be attacked and compromised within minutes Hardware firewalls can be complex to configure 12
Network firewall Free Firewall for business use Easy management with object-based rules Stateful packet inspection NAT and Masquerading Dynamic (OSPF, BGP) and static routing Bridging and multicast routing IPv6 Support Amazon Virtual Private Cloud Connector Easy tunneling with Windows Remote Access (PPTP & L2TP) 13
Network protection - detect and stop threats Businesses need more than just a basic firewall Firewalls only deal in ports, addresses and protocols Malicious network traffic can still come through allowed ports You want to get the best from your web connection You need a way to let remote workers and offices connect You need protection from today s most advanced threats 14
Network protection Optimize and secure your network Intrusion prevention system Site-to-site VPN (IPsec and SSL) IPsec and SSL Client VPN (Cisco supported*) HTML 5 VPN portal WAN link balancing High Availability (active/passive and active/active) Advanced Threat Protection Botnet/Command-and control detection Cloud-based selective sandbox (requires Web Protection) 15
Wireless Protection -WiFi should be easy You don t have to make do when it comes to wireless networking Separate wireless management solutions can be expensive Many built in wireless hardware doesn t give complete coverage Configuring wireless networks in remote offices can be a hassle Guest and visitor access can be complex 16
Wireless Protection Easy central configuration for secure WiFi Central management Plug & play deployment Connect access points anywhere Easy hotspot configuration with full customization Wireless repeating and bridging (AP50) Fully customizable login pages and vouchers with QR code support Support for two-factor authentication 17
An industry first! UTM + integrated 802.11ac Wi-Fi SG 125w and SG 135w beat DELL s new TZ appliances Same Intel platform 3 x 3 MIMO, one radio Being introduced as Rev.2 Integrated SSD Can also add external APs Coming soon: SG 135/SG 135w Test vs. Dell, Fortinet, WatchGuard Dell claims: Fastest small deep packet inspection firewall SSL inspection eliminates encrypted threats Integrated 802.11ac wireless controller Sophos facts: We re as small, as fast if not faster We SSL inspection included already We ve really got integrated 802.11ac Wi-Fi 18
Email Protection - Still a risk Old methods with some original techniques Over 98% of all email is spam Many spam emails combine links to infected websites Phishing attacks are on the rise Data protection is a key concern for businesses Email encryption not easy to use 19
Email protection Stopping threats and protecting data at your gateway Filter spam and stop malware Let users manage their own quarantined items Detects phishing URLs in emails Supports S/MIME and OpenPGP for encryption Simple SPX encryption requiring no infrastructure DLP for automatic policy-based encryption and filtering 20
Email protection Encrypting emails via SPX Recipient self registration for easier password management and improved confidentiality 1. User sends an email with sensitive data 2. UTM sends a registration request to the recipient 3. The recipient opens the request and browses to the SPX registration portal mypassword 5. UTM encrypts the email as a PDF and sends it to the recipient 4. Recipient registers with UTM 6. Recipient decrypts the attached PDF with the registered password 21
Web Protection - Why worry about the web? A great tool and a potential risk Lack of control can impact productivity 85% of all malware comes from the web Web threats are invisible Targeted and controlling computers and stealing data 22
Web protection Layered protection for computers connected to the web Gateway anti malware Transparent and proxy-based filtering URL Filtering both HTTP and HTTPS Web application control (NGFW) Interactive usage and user reporting Transparent user authentication with SSO for AD Transparent HTTPS filtering without certificate deployment Device-specific authentication 23
Web Protection UTM v.9.3 Introduced more enterprise level features powerful, flexible, simple Site tagging enables sites to be tagged and tags to be used in policies (e.g. customer sites or research sites ) Time quota policy - users can browse specified categories for a set period per day Selective HTTPS Scanning automatically determines which encrypted connections to scan 24
Web Protection Site tagging - Tag sites to create unlimited custom categories Use tags in policy just like other categories 25
Web Protection Web Surfing Quotas Policy: Select the categories and the time quota User Experience Helpdesk (Reset if needed) 26
Web Protection Site tagging - Tag sites to create unlimited custom categories Use tags in policy just like other categories 27
Web Protection Selective HTTPS scanning Increase privacy, only scan risks 28
Endpoint Protection - Devices everywhere And so is your network The anywhere network Accessing the web outside your protection Malware carried on USB sticks You need more than signature-based AV 29
Endpoint protection Stop threats wherever users are and however they connect Endpoint anti-malware Live protection Device control Web in Endpoint Manage anywhere through our LiveConnect service 30
Web in Endpoint Safer surfing with increased web security and control Consistent protection everywhere Combines Gateway, Endpoint and Cloud Web in Endpoint set policy once to apply everywhere On or off the network, it doesn t matter Instant insight and visibility See user activity no matter where they are Activity from offsite endpoints is instantly available No extra cost With the following subscriptions: UTM Endpoint Protection UTM Web Protection Or add to an existing Sophos Endpoint deployment 31
Web Server Protection Don t make headlines By letting your organization become another statistic More than 30,000 websites infected every day 80% of infected websites are legitimate Exploits will often redirect users to malicious sites 32
Web Server Protection Let us be your web security expert Web application firewall Anti malware scanning Form hardening URL hardening Cookie protection SQL Injection and XSS filtering Reverse proxy authentication (offloading and delegation) With Single Sign-On Best TMG replacement currently available 33
RED - Remote and branch offices made easy Or do you want to keep sending technicians on site? Remote offices often have no skilled IT staff on site As a result, they often have inferior security Central IT staff can t always solve problems remotely Easily become the weak spot in the network 34
Sophos RED Simple, plug & play branch office security Securely connect remote locations Completely configuration free Same protection for all offices Fully encrypted traffic No hassle New in UTM 9.2 Tunnel compression for RED VLAN tagging per port for RED 50 35
Sophos UTM and SMC better together Wi-Fi & VPN Configuration Wi-Fi & VPN Access 36
37
Sophos Ltd. All rights reserved. 38