Date post: | 14-May-2015 |
Category: |
Technology |
Upload: | sophos |
View: | 1,198 times |
Download: | 3 times |
Sophos UTM: The Complete Security Box
Threats changing,
still increasing
Data everywhere, regulations
growing
Users everywhere,
using everything
We’re focused on protecting you
IT security sprawl
Router FirewallIntrusion prevention SSL VPN Gateway
Spam filter Gateway antivirus
Web filterWAN link balancer Load balancer
Endpoint protection
Complete SecurityBecause you’ve got enough to worry about
4
Wherever the user is, what ever they use
Our unique approach for better protection you can actually deploy
Quicker to setup, maintain and solve problems
SecurityEverywhere
WithoutComplexity
Active Protection
5
Complete SecurityProtecting every part of your business
Network Firewall
Network Protection
WirelessProtection
EmailProtection
WebServerProtection
EndpointProtection
WebProtection
Sophos UTMThe Complete Security Box
A first line of defenseStarting with network security
• Any computer connected to the internet is at risk• A computer outside a firewall will be attacked within minutes• Hardware firewalls can be complex to configure
Network firewallFree Firewall for business use
• Easy management with object-based rules• Stateful packet inspection• Place anywhere on network• IPv6 Support• Amazon Virtual Private Cloud Connector• Easy tunnelling with Windows Remote Access
Optimize your network and stop threatsBusinesses need more than just a basic firewall
• Firewalls only deal in ports, addresses and protocols• Malicious network traffic can still come through allowed ports• You want to get the best from your web connection• You need a way to let remote workers and offices connect
Network protectionOptimize and secure your network
• Intrusion prevention system• Flood protection• VPN (Site-to-site and client)• HTML 5 VPN portal• WAN link balancing
WiFi should be easy and safeYou don’t have to “make do” when it comes to wireless networking
• Separate wireless management solutions can be expensive• Lots of built in wireless hardware doesn’t give complete coverage• Configuring wireless networks in remote offices can be a hassle
Wireless protectionEasy central configuration for secure WiFi
• Central management• Plug & play deployment• Connect access points anywhere• Easy hotspot configuration
Email traffic is still a riskOld methods with some original techniques
• Over 98% of all email is spam• Many spam emails combine links to infected websites• Phishing attacks are on the rise• Data protection is key concern for businesses
Email protectionStopping threats and protecting data at your gateway
• Filter spam and stop malware• Let users manage their own quarantined items• Detects phishing urls in emails• Supports S/MIME and OpenPGP for encryption
Endpoints are everywhereAnd so is your network
• The anywhere network• Accessing the web outside your protection• Malware carried on USB sticks• You need more than signature-based AV
Endpoint protectionStop threats wherever users are and however they connect
• Endpoint anti malware• Live protection• Device control• Manage anywhere through our LiveConnect service
Why worry about the web?A great tool and a potential risk
• Lack of control can impact productivity• 85% of all malware comes from the web• Web threats are invisible• Targeted and controlling computers and stealing data
Web protectionLayered protection for computers connected to the web
• Gateway anti malware• URL Filtering• Web application control• Interactive usage and user reporting
Vulnerable websites are a targetDon’t let your organization become another statistic
• More than 30,000 websites infected every day• 80% of infected websites are legitimate• Exploits will often redirect users to malicious sites
Webserver protectionLet us be your web security expert
• Web application firewall• Anti malware scanning • Form hardening• URL hardening• Cookie protection
Choose your deployment type
Software Appliance
Virtual Appliance
Hardware Appliance
Hardware optionsHardwareAppliance 110/120 220 320 425 525 625 Multiple
+ RED
Environment Small network
Medium network
Medium network
Large network
Large network
Large network
Large networks
+ branches
Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple
Max. recommended firewall users
10/80 300 800 1.500 3.500 5.000 10.000+
Max. recommended UTM users
10/35 75 200 600 1.300 2.000 5.000
Software Appliance * Runs on Intel-compatible PCs and servers
VirtualAppliance *
VMware Ready & Citrix Ready certified Runs in Hyper-V, KVM, and other virtual environments
Choose your modules
FullGuard
NetworkFirewall
Web Protection
WebserverProtection
NetworkProtection
WirelessProtection
EmailProtection
EndpointProtection
www.sophos.com/unified