Simple security is better security Or: How complexity became the biggest security threat



Similar documents
Move over, TMG! Replacing TMG with Sophos UTM

Network protection and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide

Sophos Certified Architect Course overview

TMG Replacement Guide

Fortigate Features & Demo

Sophos Roadshow. Complete Security Vision

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Astaro Gateway Software Applications

Sophos SG 1 Session: Sophos UTM

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Applications erode the secure network How can malware be stopped?

The Next Level of Secure Channel Partnership

Firewall Buyers Guide

Dell SonicWALL Portfolio

SVN5800 Secure Access Gateway

Firewall and UTM Solutions Guide

Locking down a Hitachi ID Suite server

Boston Area Windows Server User Group April 2010

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

Secure Your Mobile Workplace

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

Overview and Deployment Guide. Sophos UTM on AWS

Sophos Security made simple.

USG6600 Next-Generation Firewall

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Zscaler Internet Security Frequently Asked Questions

Cisco SA 500 Series Security Appliances

USG6300 Next-Generation Firewall

Cisco SA 500 Series Security Appliances

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Cisco Small Business ISA500 Series Integrated Security Appliances

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Fortinet Certified Network Security Administrator

Results of Testing: Juniper Branch SRX Firewalls

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Networking for Caribbean Development

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Unified Threat Management, Managed Security, and the Cloud Services Model

Cisco Actualtests Exam Questions & Answers

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Sophos XG Firewall Features List. For Sophos and Cyberoam Customers Document Date: November November 2015 Page 1 of 11

Section 12 MUST BE COMPLETED BY: 4/22

Assuring Your Business Continuity

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Cyberoam Perspective BFSI Security Guidelines. Overview

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Next Generation Enterprise Network Security Platform

AVG AntiVirus. How does this benefit you?

Internet threats: steps to security for your small business

EndUser Protection. Peter Skondro. Sophos

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Huawei Eudemon200E-N Next-Generation Firewall

Advanced Persistent Threats: Detection, Protection and Prevention

An Introduction to Commulynx

Security Services. 30 years of experience in IT business

Sophos is a Network Security company too

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

Simplifying Branch Office Security

The Fortinet Secure Health Architecture

Connect and Secure Retail

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Advantages of Managed Security Services

Using a VPN with Niagara Systems. v0.3 6, July 2013

Gigabit SSL VPN Security Router

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

Cisco RV215W Wireless-N VPN Router

Fight Malware, Malfeasance, and Malingering with F5

Mobile Security and Management Opportunities for Telcos and Service Providers

The Benefits of SSL Content Inspection ABSTRACT

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

Application Intelligence, Control and Visualization

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Ensuring the security of your mobile business intelligence

Implementing Core Cisco ASA Security (SASAC)

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Transcription:

Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1

What do they have in common? DATA BREACH 2

Security is HARD! Components of good security 1. Careful planning 2. User education 3. Choosing the right tools 4. Using the tools correctly (takes time and expertise) 3

Sophos Simple Security 4

60,0 50,0 50 40,0 Sophos core customers 30,0 20,0 10,0,0 0 1 100-499 Employees Challenged by Complexity Limited by Resources 500-999 Employees 3 1000-4,999 Employees 8 5000-19,999 Employees 20,000+ Employees 5

Users Are Everywhere What About Securing My Servers? Regulations & Compliance Transition to the Cloud Go Wireless Console Proliferation & Agent Pollution Downtime Unacceptable Protect My Data Help Desk Queries Corporate Owned and BYOD Can t Control Users via Brute Force 6

Users Are Everywhere Polymorphic Threats Affect Everyone Go Wireless What About Securing My Servers? New Attack Surfaces (Android, ios) Regulations & Compliance IT Systems Are The Lifeblood for Any Size Org Console Proliferation & Agent Pollution Transition to the Cloud Macs Are No Longer Immune Downtime Unacceptable Protect My Data Not Just A Big Company Problem Corporate Owned and BYOD Can t Control Users via Brute Force Help Desk Queries 250,000 New Threats Will Appear Today 7

Anti-spam Encryption Firewall Anti-malware BYOD solution Security Management Usage policies Sophos Complete Security 8 8

UTM overview - A truly simple firewall 9

Security, Made Simple Security Security technologies Next Gen Firewall VPN Anti-Spam Email Encryption Endpoint Web Protection Wireless Antimalware and IPS URL Filtering Webserver Protection Made Simple. Simple Deployment Simple Protection Simple Management Hardware Software Virtual Cloud Active Protection real-time protection powered by SophosLabs Live lookups via the Cloud SophosLabs experts tune the protection so you don t have to Intuitive consoles Centralised management Backed by expert support 10

Sophos UTM a truly simple firewall Complete Security in a single solution Network Firewall Network Protection Web Protection Email Protection Wireless Protection Webserver Protection Endpoint Protection 11

Network firewall - the first line of defense Starting with network security Any computer connected to the internet is at risk A computer outside a firewall can be attacked and compromised within minutes Hardware firewalls can be complex to configure 12

Network firewall Free Firewall for business use Easy management with object-based rules Stateful packet inspection NAT and Masquerading Dynamic (OSPF, BGP) and static routing Bridging and multicast routing IPv6 Support Amazon Virtual Private Cloud Connector Easy tunneling with Windows Remote Access (PPTP & L2TP) 13

Network protection - detect and stop threats Businesses need more than just a basic firewall Firewalls only deal in ports, addresses and protocols Malicious network traffic can still come through allowed ports You want to get the best from your web connection You need a way to let remote workers and offices connect You need protection from today s most advanced threats 14

Network protection Optimize and secure your network Intrusion prevention system Site-to-site VPN (IPsec and SSL) IPsec and SSL Client VPN (Cisco supported*) HTML 5 VPN portal WAN link balancing High Availability (active/passive and active/active) Advanced Threat Protection Botnet/Command-and control detection Cloud-based selective sandbox (requires Web Protection) 15

Wireless Protection -WiFi should be easy You don t have to make do when it comes to wireless networking Separate wireless management solutions can be expensive Many built in wireless hardware doesn t give complete coverage Configuring wireless networks in remote offices can be a hassle Guest and visitor access can be complex 16

Wireless Protection Easy central configuration for secure WiFi Central management Plug & play deployment Connect access points anywhere Easy hotspot configuration with full customization Wireless repeating and bridging (AP50) Fully customizable login pages and vouchers with QR code support Support for two-factor authentication 17

An industry first! UTM + integrated 802.11ac Wi-Fi SG 125w and SG 135w beat DELL s new TZ appliances Same Intel platform 3 x 3 MIMO, one radio Being introduced as Rev.2 Integrated SSD Can also add external APs Coming soon: SG 135/SG 135w Test vs. Dell, Fortinet, WatchGuard Dell claims: Fastest small deep packet inspection firewall SSL inspection eliminates encrypted threats Integrated 802.11ac wireless controller Sophos facts: We re as small, as fast if not faster We SSL inspection included already We ve really got integrated 802.11ac Wi-Fi 18

Email Protection - Still a risk Old methods with some original techniques Over 98% of all email is spam Many spam emails combine links to infected websites Phishing attacks are on the rise Data protection is a key concern for businesses Email encryption not easy to use 19

Email protection Stopping threats and protecting data at your gateway Filter spam and stop malware Let users manage their own quarantined items Detects phishing URLs in emails Supports S/MIME and OpenPGP for encryption Simple SPX encryption requiring no infrastructure DLP for automatic policy-based encryption and filtering 20

Email protection Encrypting emails via SPX Recipient self registration for easier password management and improved confidentiality 1. User sends an email with sensitive data 2. UTM sends a registration request to the recipient 3. The recipient opens the request and browses to the SPX registration portal mypassword 5. UTM encrypts the email as a PDF and sends it to the recipient 4. Recipient registers with UTM 6. Recipient decrypts the attached PDF with the registered password 21

Web Protection - Why worry about the web? A great tool and a potential risk Lack of control can impact productivity 85% of all malware comes from the web Web threats are invisible Targeted and controlling computers and stealing data 22

Web protection Layered protection for computers connected to the web Gateway anti malware Transparent and proxy-based filtering URL Filtering both HTTP and HTTPS Web application control (NGFW) Interactive usage and user reporting Transparent user authentication with SSO for AD Transparent HTTPS filtering without certificate deployment Device-specific authentication 23

Web Protection UTM v.9.3 Introduced more enterprise level features powerful, flexible, simple Site tagging enables sites to be tagged and tags to be used in policies (e.g. customer sites or research sites ) Time quota policy - users can browse specified categories for a set period per day Selective HTTPS Scanning automatically determines which encrypted connections to scan 24

Web Protection Site tagging - Tag sites to create unlimited custom categories Use tags in policy just like other categories 25

Web Protection Web Surfing Quotas Policy: Select the categories and the time quota User Experience Helpdesk (Reset if needed) 26

Web Protection Site tagging - Tag sites to create unlimited custom categories Use tags in policy just like other categories 27

Web Protection Selective HTTPS scanning Increase privacy, only scan risks 28

Endpoint Protection - Devices everywhere And so is your network The anywhere network Accessing the web outside your protection Malware carried on USB sticks You need more than signature-based AV 29

Endpoint protection Stop threats wherever users are and however they connect Endpoint anti-malware Live protection Device control Web in Endpoint Manage anywhere through our LiveConnect service 30

Web in Endpoint Safer surfing with increased web security and control Consistent protection everywhere Combines Gateway, Endpoint and Cloud Web in Endpoint set policy once to apply everywhere On or off the network, it doesn t matter Instant insight and visibility See user activity no matter where they are Activity from offsite endpoints is instantly available No extra cost With the following subscriptions: UTM Endpoint Protection UTM Web Protection Or add to an existing Sophos Endpoint deployment 31

Web Server Protection Don t make headlines By letting your organization become another statistic More than 30,000 websites infected every day 80% of infected websites are legitimate Exploits will often redirect users to malicious sites 32

Web Server Protection Let us be your web security expert Web application firewall Anti malware scanning Form hardening URL hardening Cookie protection SQL Injection and XSS filtering Reverse proxy authentication (offloading and delegation) With Single Sign-On Best TMG replacement currently available 33

RED - Remote and branch offices made easy Or do you want to keep sending technicians on site? Remote offices often have no skilled IT staff on site As a result, they often have inferior security Central IT staff can t always solve problems remotely Easily become the weak spot in the network 34

Sophos RED Simple, plug & play branch office security Securely connect remote locations Completely configuration free Same protection for all offices Fully encrypted traffic No hassle New in UTM 9.2 Tunnel compression for RED VLAN tagging per port for RED 50 35

Sophos UTM and SMC better together Wi-Fi & VPN Configuration Wi-Fi & VPN Access 36

37

Sophos Ltd. All rights reserved. 38