SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Endpoint Security
     and Control
Sophos Endpoint Security
Sophos’ unified, automated console provides a single point from which to deploy, update and report on
both anti-virus and firewall protection across thousands of Windows, Mac and Linux computers. By
simplifying and automating protection, we drive down your costs, ensuring fewer clicks per task and
better visibility of your entire network.

Central Management Console:
   •   Sophos Anti-Virus comes equipped with enterprise management console capable of viewing
       each server across multiple platforms from one view. One console to manage all your Windows,
       Mac OS X, and Linux platforms.
Unified Single Anti-Malware Scanner:
   •   One scan with our single anti-virus client detects viruses, spyware and adware, suspicious files,
       suspicious behavior, unauthorized VoIP, IM, P2P, and gaming software - eliminating your
       reliance on separate standalone products. Sophos provides complete protection against
       Spyware and fully meets all industry requirements for Spyware protection as set by West Coast
       Labs (http://www.westcoastlabs.org).
Integrated Application Control:
   •   Sophos includes adware protection at no additional charge and ability to manage application
       policy from the console.
Integrated Zero-Day Protection:
   •   Unique Behavioral Genotype® Protection automatically guards against new and targeted threats
       by analyzing behavior before code executes.
   •   Most effective Zero-Day protection in the industry
       (http://www.sophos.com/pressoffice/news/articles/2007/12/proactive-test.html).
Synchronization with Active Directory:
   •   Security policies are automatically enforced as new computers join your network. This eliminates
       the risk of unprotected computers compromising your security.

NAC integrated:

   •   Automatically check and fix managed computers
       Microsoft/Windows Update (patching), Service Packs, Sophos or Windows firewall, SAV: on,
       enabled, up to date, no malware or controlled apps
   •   Control unmanaged computers
       Control access with agent or Microsoft DHCP, unmanaged computer assessment with web agent
   •   Simple to manage – integrated with Enterprise Console
       o   Pre-defined policies for managed and unmanaged computers
       o   Integrated NAC agent deployment via Enterprise Console
       o   Uses existing Enterprise Console groups
Independent & Analyst Reviews
                                                 ImageTrak Business IT Survey Ranks
                                                 SOPHOS highest in customer
                                                 satisfaction.

                                                 Each security vendor was scored against
                                                 five satisfaction criteria - quality of
                                                 support, ease of integration,
                                                 manageability, reliability and return on
                                                 investment. Sophos was rated very
                                                 highly throughout and was classed as
                                                 either the No. 1 or No. 2 brand
                                                 consistently ahead of key competitors,
                                                 McAfee, Symantec and Trend Micro.


Faster Response than Alternatives

Independent analysis regularly shows that
Sophos responds more quickly than other
leading vendors. This is a great testament to
our rapid response to virus outbreaks from our
global network of integrated virus, spyware
and spam analysis centers and the innovative
proactive detection capabilities of our
Genotype™ virus detection technology -




                                                 True Alternative to Symantec and
                                                 McAfee

                                                 Sophos successfully intercepted 86% of
                                                 the malware tested against prior to
                                                 execution, compared to 43% for McAfee
                                                 and 51% for Symantec. In addition,
                                                 Sophos's run-time HIPS protection
                                                 detected further malware samples at
                                                 execution raising proactive detection of
                                                 zero-day threats to an "impressive" 97% in
                                                 Cascadia Labs' anti-virus tests.
Leader in Zero-Day Protection
Sophos detected more new unknown malware reported to the independent AVIEWS mailing list in
a four month period than any other vendor. AVIEWS is the Anti-Virus Information & Early Warning
System, an online community that shares information about breaking malware threats between
anti-virus vendors, researchers, security experts, and system administrators.




In the four month study Sophos was found to proactively detect 80% of all unknown malware
reported to the mailing list, higher than any other vendor, compared to 50% for Microsoft, 35% for
Symantec and 30% for McAfee.
Gartner Magic Quadrant

                                                            “Sophos…has a
                                                            better understanding
                                                            of business needs,
                                                            particularly the need
                                                            to provide return on
                                                            investment for the
                                                            buyer and to
                                                            balance advanced
                                                            features with low
                                                            administration."


Gartner's Magic Quadrant for Endpoint Protection Platforms is based on an assessment of a company's
ability to execute and completeness of vision. According to Gartner, "Leaders demonstrate balanced
progress and effort in all execution and vision categories. Their actions raise the competitive bar for all
products in the market, and they can change the course of the industry."

Gartner specifically identified the following strengths in Sophos as deserving of a position in the Leaders
Quadrant:

   •   Significantly improved and simple management, that gives a real time view from which actions
       can be immediately taken (e.g. force an update on all those computers).
   •   Excellent integrated network access control (NAC) capability with the ability to monitor, assess
       and remediate competitive EPP clients (NAC will be available April 2008).
   •   Roadmap commitments for data encryption, with basic media port controls already in place.
What do licenses include?
Free Home Use for Employees:
   •   Sophos provides free home use for employees at no additional charge – customer responsible
       for home use support.


24/7/365 Engineer-Level Technical Support:
   •   Access to frontline Sophos employed technical specialists 24x7x365 to provide multi-language
       support.

Server Coverage:
   •   Sophos will charge client price for server environment if servers do not exceed 25% of total
       licenses purchased.


29 Platform Coverage:
   •   Sophos gives you access to 29 platforms – more operating systems then any other vendor in the
       market – at no additional cost.


Free Upgrades and Maintenance:
   •   All maintenance and upgrade pricing included over term of agreement.
Benefits of Sophos transition services
We have successfully engaged with some of the most recognized organizations in the world to meet
their specific requirements and assure rapid, optimal deployment of Sophos products. Our expertise is
delivered through standard or customized packages, provided on site or remotely, to ensure the
maximum return on your investment.


Sophos Endpoint Implementation:

Designed to ensure optimal installation and configuration of Sophos endpoint solutions, this service
package provides assistance with implementation. The service includes:

   •   Product installation
   •   Product training sessions
   •   Skills transfer
   •   Best practice tutorials for network and system security.
   •   Removal of legacy anti-virus software can also be included in the service, if required, ensuring a
       rapid rollout of Sophos Anti-Virus while maintaining the security of your network.




Customized transition plan:

Our experts work with your security team to develop a plan for efficient deployment and upgrade of
Sophos products with minimal impact on your network.

Skills transfer:

Your security team works alongside Sophos professionals to gain immediate experience of our industry-
leading solutions and optimize administration and policy enforcement.

Industry-leading expertise:

Our consultants advise on threat prevention best practices, including compliance with email and
endpoint security policies, and defense against unauthorized computers, malware, and spam.

Maximum return on investment:

Whether on site or remotely, a Sophos security expert assesses your network environment and selects
the module or configuration that best suits your requirements.
Sophos Premium Support
Customers can select one of three support service options: Standard, Premium and Platinum.

Standard Support is included in the license fee and is available 24 hours per day, 365 days per year to
all Sophos customers. Premium Support and Platinum Support are available for an additional annual
percentage fee based on the license cost.

The deliverables included within each service option are outlined below, together with the levels of
service, including target response and escalation times.
Sophos Customers

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (19)

Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
 
Ambesh
AmbeshAmbesh
Ambesh
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
MSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListMSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping List
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 

Andere mochten auch

Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
Lee Dalton
 
shah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyshah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copy
Meet Shah
 
Sophos company-profile-cpna
Sophos company-profile-cpnaSophos company-profile-cpna
Sophos company-profile-cpna
aveiganeto
 
Rich Desktop Applications
Rich Desktop ApplicationsRich Desktop Applications
Rich Desktop Applications
goldoraf
 
智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案
OFMKT
 

Andere mochten auch (20)

Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
shah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyshah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copy
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Sophos Cloud advanced
Sophos Cloud advancedSophos Cloud advanced
Sophos Cloud advanced
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
SĂŠcuritĂŠ UTM / Arkoon
SĂŠcuritĂŠ UTM / ArkoonSĂŠcuritĂŠ UTM / Arkoon
SĂŠcuritĂŠ UTM / Arkoon
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Sophos End User Protection
Sophos End User ProtectionSophos End User Protection
Sophos End User Protection
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos company-profile-cpna
Sophos company-profile-cpnaSophos company-profile-cpna
Sophos company-profile-cpna
 
Rich Desktop Applications
Rich Desktop ApplicationsRich Desktop Applications
Rich Desktop Applications
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案
 
Mobile Application Development Using Java
Mobile Application Development Using JavaMobile Application Development Using Java
Mobile Application Development Using Java
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
CafĂŠ technologique SĂŠcuritĂŠ et Gestion des mobiles pour l'entreprise
CafĂŠ technologique SĂŠcuritĂŠ et Gestion des mobiles pour l'entrepriseCafĂŠ technologique SĂŠcuritĂŠ et Gestion des mobiles pour l'entreprise
CafĂŠ technologique SĂŠcuritĂŠ et Gestion des mobiles pour l'entreprise
 
PrĂŠsentation de la plateforme MonPFE
PrĂŠsentation de la plateforme MonPFEPrĂŠsentation de la plateforme MonPFE
PrĂŠsentation de la plateforme MonPFE
 

Ähnlich wie Sophos 2010

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
Coverity Data Sheet
Coverity Data SheetCoverity Data Sheet
Coverity Data Sheet
Jon Lundquist
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
SolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfSolPartner_InterceptX.pdf
SolPartner_InterceptX.pdf
ssusera76ea9
 

Ähnlich wie Sophos 2010 (20)

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Coverity Data Sheet
Coverity Data SheetCoverity Data Sheet
Coverity Data Sheet
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdf
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Key features of sophos xg firewall
Key features of sophos xg firewallKey features of sophos xg firewall
Key features of sophos xg firewall
 
SolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfSolPartner_InterceptX.pdf
SolPartner_InterceptX.pdf
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 

KĂźrzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂźrzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Sophos 2010

  • 1. Endpoint Security and Control
  • 2. Sophos Endpoint Security Sophos’ unified, automated console provides a single point from which to deploy, update and report on both anti-virus and firewall protection across thousands of Windows, Mac and Linux computers. By simplifying and automating protection, we drive down your costs, ensuring fewer clicks per task and better visibility of your entire network. Central Management Console: • Sophos Anti-Virus comes equipped with enterprise management console capable of viewing each server across multiple platforms from one view. One console to manage all your Windows, Mac OS X, and Linux platforms. Unified Single Anti-Malware Scanner: • One scan with our single anti-virus client detects viruses, spyware and adware, suspicious files, suspicious behavior, unauthorized VoIP, IM, P2P, and gaming software - eliminating your reliance on separate standalone products. Sophos provides complete protection against Spyware and fully meets all industry requirements for Spyware protection as set by West Coast Labs (http://www.westcoastlabs.org). Integrated Application Control: • Sophos includes adware protection at no additional charge and ability to manage application policy from the console. Integrated Zero-Day Protection: • Unique Behavioral GenotypeÂŽ Protection automatically guards against new and targeted threats by analyzing behavior before code executes. • Most effective Zero-Day protection in the industry (http://www.sophos.com/pressoffice/news/articles/2007/12/proactive-test.html). Synchronization with Active Directory: • Security policies are automatically enforced as new computers join your network. This eliminates the risk of unprotected computers compromising your security. NAC integrated: • Automatically check and fix managed computers Microsoft/Windows Update (patching), Service Packs, Sophos or Windows firewall, SAV: on, enabled, up to date, no malware or controlled apps • Control unmanaged computers Control access with agent or Microsoft DHCP, unmanaged computer assessment with web agent • Simple to manage – integrated with Enterprise Console o Pre-defined policies for managed and unmanaged computers o Integrated NAC agent deployment via Enterprise Console o Uses existing Enterprise Console groups
  • 3. Independent & Analyst Reviews ImageTrak Business IT Survey Ranks SOPHOS highest in customer satisfaction. Each security vendor was scored against five satisfaction criteria - quality of support, ease of integration, manageability, reliability and return on investment. Sophos was rated very highly throughout and was classed as either the No. 1 or No. 2 brand consistently ahead of key competitors, McAfee, Symantec and Trend Micro. Faster Response than Alternatives Independent analysis regularly shows that Sophos responds more quickly than other leading vendors. This is a great testament to our rapid response to virus outbreaks from our global network of integrated virus, spyware and spam analysis centers and the innovative proactive detection capabilities of our Genotype™ virus detection technology - True Alternative to Symantec and McAfee Sophos successfully intercepted 86% of the malware tested against prior to execution, compared to 43% for McAfee and 51% for Symantec. In addition, Sophos's run-time HIPS protection detected further malware samples at execution raising proactive detection of zero-day threats to an "impressive" 97% in Cascadia Labs' anti-virus tests.
  • 4. Leader in Zero-Day Protection Sophos detected more new unknown malware reported to the independent AVIEWS mailing list in a four month period than any other vendor. AVIEWS is the Anti-Virus Information & Early Warning System, an online community that shares information about breaking malware threats between anti-virus vendors, researchers, security experts, and system administrators. In the four month study Sophos was found to proactively detect 80% of all unknown malware reported to the mailing list, higher than any other vendor, compared to 50% for Microsoft, 35% for Symantec and 30% for McAfee.
  • 5. Gartner Magic Quadrant “Sophos…has a better understanding of business needs, particularly the need to provide return on investment for the buyer and to balance advanced features with low administration." Gartner's Magic Quadrant for Endpoint Protection Platforms is based on an assessment of a company's ability to execute and completeness of vision. According to Gartner, "Leaders demonstrate balanced progress and effort in all execution and vision categories. Their actions raise the competitive bar for all products in the market, and they can change the course of the industry." Gartner specifically identified the following strengths in Sophos as deserving of a position in the Leaders Quadrant: • Significantly improved and simple management, that gives a real time view from which actions can be immediately taken (e.g. force an update on all those computers). • Excellent integrated network access control (NAC) capability with the ability to monitor, assess and remediate competitive EPP clients (NAC will be available April 2008). • Roadmap commitments for data encryption, with basic media port controls already in place.
  • 6. What do licenses include? Free Home Use for Employees: • Sophos provides free home use for employees at no additional charge – customer responsible for home use support. 24/7/365 Engineer-Level Technical Support: • Access to frontline Sophos employed technical specialists 24x7x365 to provide multi-language support. Server Coverage: • Sophos will charge client price for server environment if servers do not exceed 25% of total licenses purchased. 29 Platform Coverage: • Sophos gives you access to 29 platforms – more operating systems then any other vendor in the market – at no additional cost. Free Upgrades and Maintenance: • All maintenance and upgrade pricing included over term of agreement.
  • 7. Benefits of Sophos transition services We have successfully engaged with some of the most recognized organizations in the world to meet their specific requirements and assure rapid, optimal deployment of Sophos products. Our expertise is delivered through standard or customized packages, provided on site or remotely, to ensure the maximum return on your investment. Sophos Endpoint Implementation: Designed to ensure optimal installation and configuration of Sophos endpoint solutions, this service package provides assistance with implementation. The service includes: • Product installation • Product training sessions • Skills transfer • Best practice tutorials for network and system security. • Removal of legacy anti-virus software can also be included in the service, if required, ensuring a rapid rollout of Sophos Anti-Virus while maintaining the security of your network. Customized transition plan: Our experts work with your security team to develop a plan for efficient deployment and upgrade of Sophos products with minimal impact on your network. Skills transfer: Your security team works alongside Sophos professionals to gain immediate experience of our industry- leading solutions and optimize administration and policy enforcement. Industry-leading expertise: Our consultants advise on threat prevention best practices, including compliance with email and endpoint security policies, and defense against unauthorized computers, malware, and spam. Maximum return on investment: Whether on site or remotely, a Sophos security expert assesses your network environment and selects the module or configuration that best suits your requirements.
  • 8. Sophos Premium Support Customers can select one of three support service options: Standard, Premium and Platinum. Standard Support is included in the license fee and is available 24 hours per day, 365 days per year to all Sophos customers. Premium Support and Platinum Support are available for an additional annual percentage fee based on the license cost. The deliverables included within each service option are outlined below, together with the levels of service, including target response and escalation times.