SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Dave Fuchs, Account Executive
404.610.4729 ~ dave.fuchs@sophos.com
Sophos & You
Security Made Simple
Who is Sophos
1985
FOUNDED
OXFORD, UK
$450M
IN FY15 BILLING
(APPX.)
~2,600
EMPLOYEES
(APPX.)
200,000+
CUSTOMERS
100M+
USERS
NA Locations
Boston, MA
Santa Clara, CA
Vancouver, BC
90+%
BEST IN CLASS
RENEWAL RATES
2,000+
CHANNEL
PARTNERS
Powerful Unified Threat Management
for your entire network
High performance security for your
most critical systems and data
Endpoint, mobile and web security
licensed per user, not device
Unique Balance Between Endpoint and
Network
ENDPOINT NETWORK
A Recognized Industry Leader
COMPLETENESS OF VISION
ABILITYTOEXECUTE
Enterprise Mobility Management
UTM
Endpoint Protection
Mobile Data Protection
CHALLENGERS LEADERS
VISIONARIESNICHE PLAYERS
Gartner Magic Quadrant
ENDPOINT PROTECTION
Source: Gartner (December 2014)
Intel Security
(McAfee)
Symantec
Kaspersky Lab
Trend Micro
Sophos
Microsoft
Qihoo 360
Eset
Bitdefender
F-Secure
Check Point Software Technologies
ThreatTrackSecurity
Panda Security
IBM Webroot
Landesk
StormshieldNetwork Security
Lumension Security
Leading Provider of Enterprise IT
Security Solutions
Gartner Magic Quadrant
MOBILE DATA PROTECTION
Source: Gartner (September 2014)
Intel Security (McAfee)
Check Point Software Technologies
Sophos
Symantec
WinMagic
Digital Guardian
Dell
Trend Micro
Microsoft
Kaspersky Lab
CenterTools Wave Systems
The only vendor in the leadership quadrants for UTM, Endpoint Protection and Mobile Data Protection
Source: Gartner (August 2015)
Gartner Magic Quadrant
UNIFIED THREAT MANAGEMENT
Fortinet
Check Point Software Technologies
Dell
WatchGuard
Stormshield
gateprotect
Aker Security Solutions
Hillstone Networks
Huawei
Barracuda Networks
Juniper Networks
Cisco
Sophos
Only Vendor Ranked as a Leader in Endpoint,
UTM and Encryption
PRESENT in 1 of these
Gartner Magic Quadrants
LEADER in 1 of these
Gartner Magic Quadrants
LEADER in 2 of these
Gartner Magic Quadrants
LEADER in all 3 of these
Gartner Magic Quadrants
Notes:
1. Figures refer to fiscal year 2015. Fiscal year-end March 31
2. In February 2015, FrontRange and Lumension announced they would merge and form HEAT Software, backed by Clearlake Capital Group
Endpoint, UTM and Encryption Represent [73]% of Sophos Billings(1)
(2)
Leading Global Enterprises Trust Sophos
8
Pragmatic Enterprises Come in Many Sizes
Complete Security…
Made Simple.
Network End Users and DevicesServers
Simple Deployment Simple Protection Simple Management
• On premise
• Virtual
• Cloud
• User self provision
• Active Protection – real-time
protection powered by SophosLabs
• Live lookups via the Cloud
• SophosLabs experts tune the
protection so you don’t have to
Next Gen
Firewall
Anti-
malware
and IPS
URL
Filtering
Network
Access Control
Wireless VPN Anti-Spam Email
Encryption
Anti-
Malware
Mobile Encryption Patch
Assessment
Application
Control
Device
Control
Encryption
for Cloud
Endpoint Web
Protection
Anti-Malware
Webserver
Protection
Virtualization
Intuitive consoles:
On Premise or
From the Cloud
Backed by expert support
Complete Security, Made Simple
App Control
V-Shield
AT HOME AND ON THE MOVE
Mobile Control Endpoint Security
SafeGuard Encryption
HEADQUARTERS
Endpoint Security
SafeGuard Encryption
REMOTE OFFICE 1
NextGen Firewall
Secure Wi-Fi
Endpoint Security
SafeGuard Encryption
Secure Wi-Fi
Secure VPN
Client
Mobile Control
Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification
Administration
SOPHOS CLOUD
Web Application Firewall
Secure Email
Gateway
Secure Web
Gateway
Mobile Control
Network Storage Antivirus
Server Security
Guest Wi-Fi
UTM
NextGen Firewall
Secure Web Gateway
Secure Email Gateway
Web Application Firewall
REMOTE OFFICE 2
Secure Wi-Fi
Endpoint Security
SafeGuard Encryption
Mobile Control
Secure VPN RED
Sophos Complete Security in an Enterprise
)
Data
Encryption
Mobile Device
Management
Endpoint
Security
Server
Security
Email
Security
Web
Security
Network
Security
12
Sophos security. Cloud Simplicity.
Sophos Cloud
Unified Solution
 One cloud console to manage endpoints, web control and mobile devices
 Set a policy once and it automatically applies to all platforms
User Centric
 User based reporting
 Policies follow users across device, both on and off network
Server Specific Policies
 Recognizes server platforms and popular server applications and adapts to server environments
 Automatic exclusion to ensure compatibility and performance
Cloud-based, simple, economical and effective
 Set up and deploy in minutes, maintenance free
 Automatic software upgrades, threat updates, and real time policy refreshes
 Best practices implemented as the default policy
13
Network Protection
UTM 9.3 & SG Series Appliances: Where network threats go to die
Flexible deployment options
 Hardware, Software, Virtual and Cloud deployment options
available
Lightning Speed SG Appliances
 Intel multi-core technology
 Solid-state drives
 Accelerated in-memory content scanning for optimum speed
On-box reporting
 All SG series appliances contain a hard drive or solid-state disk,
delivering comprehensive on-box reporting
All on one box
 We don’t limit functionality based on box size – all features and
subscriptions are available on any of our appliances
Free Centralized Management
 Manage all UTMs from a single console
 MSPs: rapidly deploy UTMs and customized security services with
automated licensing
 Automate tasks and save time with object-oriented configuration
14
Next-Generation Enduser Protection
 User-based security policies protecting
users on all their devices
 Context-aware security - network level
threat protection integrated with
endpoint agents
 Corporate data encrypted in-transit
and across all devices
 Advanced threat protection agents
working together as a system
 Simple, user-based cloud management,
with proactive remediation
Comprehensive security for users and data
Sophos
Cloud
Policy & Management
Compromise Detection
& Response
Endpoint
Mobile Encryption
15
Heartbeat: Next Generation Security Protection
16
Sophos SafeGuard Encryption
 Ensures productivity by securing sensitive data wherever it is
stored: laptops, USB devices, network shares or even in the
cloud
 Provides key management that lets authorized users share
data securely and easily
 Makes regulatory compliance easier with policy enforcement
and reporting
 Uses the latest processor technology to make sure that
encrypted machines are faster than ever
Encryption without compromise.
17
Sophos Mobile Control
Mobile Device Management
 Single solution for all the latest mobile platforms
 Configure device policies and deploy them over the air
 Remotely location, lock and wipe devices
 On-premise & SaaS deployment options
Mobile Security
 Protect mobile devices from malicious apps able to steal data or create
costs
 Manage all settings from Sophos Mobile Control Console
 Protect devices from malicious websites
Mobile Encryption
 Access encrypted files in the cloud on iOS or Android devices
 Use a pre-defined passphrase
 Allows easy collaboration from any location
Countless devices, one solution.
18
Server Protection
Pro-Server. Anti-virus.
 Protects Windows, Linux and UNIX systems from the latest
threats
 Supports vSphere, Hyper-V and XenServer
 Minimizes resource use for optimal server performance
 Includes Antivirus for vShield to provide efficient agentless
scanning on vSphere
 Lets customers manage all systems from one easy to use
console
19
Sophos Global Support Services
• Team of experienced in-house experts
• Installation, configuration, upgrade and health-check packages
• Can be delivered on-site or remotely
• Full skills transfer for your staff
• Customized services available for specific requirements
Professional
Services
Technical
Support
Technical
Training
• In-house experts not offshore call centers
• One number to call for all products
• Standard/Premium/Platinum*
• Available 24 x 7 x 365 via phone, web or email*
• Local language support
• Delivered by Sophos employees
• Hands-on workshops cover all Sophos products
• Network deployment, system configuration and
troubleshooting
• Available at Sophos offices or on customer site
• Can be customized to suit your specific business needs
20
Sophos…in90seconds…
20
21
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 

Ähnlich wie Consider Sophos - Security Made Simple

New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
Javier Gonzalez
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 

Ähnlich wie Consider Sophos - Security Made Simple (20)

Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 

Consider Sophos - Security Made Simple

  • 1. Dave Fuchs, Account Executive 404.610.4729 ~ dave.fuchs@sophos.com Sophos & You Security Made Simple
  • 2. Who is Sophos 1985 FOUNDED OXFORD, UK $450M IN FY15 BILLING (APPX.) ~2,600 EMPLOYEES (APPX.) 200,000+ CUSTOMERS 100M+ USERS NA Locations Boston, MA Santa Clara, CA Vancouver, BC 90+% BEST IN CLASS RENEWAL RATES 2,000+ CHANNEL PARTNERS Powerful Unified Threat Management for your entire network High performance security for your most critical systems and data Endpoint, mobile and web security licensed per user, not device
  • 3. Unique Balance Between Endpoint and Network ENDPOINT NETWORK
  • 4. A Recognized Industry Leader COMPLETENESS OF VISION ABILITYTOEXECUTE Enterprise Mobility Management UTM Endpoint Protection Mobile Data Protection CHALLENGERS LEADERS VISIONARIESNICHE PLAYERS
  • 5. Gartner Magic Quadrant ENDPOINT PROTECTION Source: Gartner (December 2014) Intel Security (McAfee) Symantec Kaspersky Lab Trend Micro Sophos Microsoft Qihoo 360 Eset Bitdefender F-Secure Check Point Software Technologies ThreatTrackSecurity Panda Security IBM Webroot Landesk StormshieldNetwork Security Lumension Security Leading Provider of Enterprise IT Security Solutions Gartner Magic Quadrant MOBILE DATA PROTECTION Source: Gartner (September 2014) Intel Security (McAfee) Check Point Software Technologies Sophos Symantec WinMagic Digital Guardian Dell Trend Micro Microsoft Kaspersky Lab CenterTools Wave Systems The only vendor in the leadership quadrants for UTM, Endpoint Protection and Mobile Data Protection Source: Gartner (August 2015) Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT Fortinet Check Point Software Technologies Dell WatchGuard Stormshield gateprotect Aker Security Solutions Hillstone Networks Huawei Barracuda Networks Juniper Networks Cisco Sophos
  • 6. Only Vendor Ranked as a Leader in Endpoint, UTM and Encryption PRESENT in 1 of these Gartner Magic Quadrants LEADER in 1 of these Gartner Magic Quadrants LEADER in 2 of these Gartner Magic Quadrants LEADER in all 3 of these Gartner Magic Quadrants Notes: 1. Figures refer to fiscal year 2015. Fiscal year-end March 31 2. In February 2015, FrontRange and Lumension announced they would merge and form HEAT Software, backed by Clearlake Capital Group Endpoint, UTM and Encryption Represent [73]% of Sophos Billings(1) (2)
  • 9. Complete Security… Made Simple. Network End Users and DevicesServers Simple Deployment Simple Protection Simple Management • On premise • Virtual • Cloud • User self provision • Active Protection – real-time protection powered by SophosLabs • Live lookups via the Cloud • SophosLabs experts tune the protection so you don’t have to Next Gen Firewall Anti- malware and IPS URL Filtering Network Access Control Wireless VPN Anti-Spam Email Encryption Anti- Malware Mobile Encryption Patch Assessment Application Control Device Control Encryption for Cloud Endpoint Web Protection Anti-Malware Webserver Protection Virtualization Intuitive consoles: On Premise or From the Cloud Backed by expert support Complete Security, Made Simple App Control V-Shield
  • 10. AT HOME AND ON THE MOVE Mobile Control Endpoint Security SafeGuard Encryption HEADQUARTERS Endpoint Security SafeGuard Encryption REMOTE OFFICE 1 NextGen Firewall Secure Wi-Fi Endpoint Security SafeGuard Encryption Secure Wi-Fi Secure VPN Client Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administration SOPHOS CLOUD Web Application Firewall Secure Email Gateway Secure Web Gateway Mobile Control Network Storage Antivirus Server Security Guest Wi-Fi UTM NextGen Firewall Secure Web Gateway Secure Email Gateway Web Application Firewall REMOTE OFFICE 2 Secure Wi-Fi Endpoint Security SafeGuard Encryption Mobile Control Secure VPN RED Sophos Complete Security in an Enterprise
  • 12. 12 Sophos security. Cloud Simplicity. Sophos Cloud Unified Solution  One cloud console to manage endpoints, web control and mobile devices  Set a policy once and it automatically applies to all platforms User Centric  User based reporting  Policies follow users across device, both on and off network Server Specific Policies  Recognizes server platforms and popular server applications and adapts to server environments  Automatic exclusion to ensure compatibility and performance Cloud-based, simple, economical and effective  Set up and deploy in minutes, maintenance free  Automatic software upgrades, threat updates, and real time policy refreshes  Best practices implemented as the default policy
  • 13. 13 Network Protection UTM 9.3 & SG Series Appliances: Where network threats go to die Flexible deployment options  Hardware, Software, Virtual and Cloud deployment options available Lightning Speed SG Appliances  Intel multi-core technology  Solid-state drives  Accelerated in-memory content scanning for optimum speed On-box reporting  All SG series appliances contain a hard drive or solid-state disk, delivering comprehensive on-box reporting All on one box  We don’t limit functionality based on box size – all features and subscriptions are available on any of our appliances Free Centralized Management  Manage all UTMs from a single console  MSPs: rapidly deploy UTMs and customized security services with automated licensing  Automate tasks and save time with object-oriented configuration
  • 14. 14 Next-Generation Enduser Protection  User-based security policies protecting users on all their devices  Context-aware security - network level threat protection integrated with endpoint agents  Corporate data encrypted in-transit and across all devices  Advanced threat protection agents working together as a system  Simple, user-based cloud management, with proactive remediation Comprehensive security for users and data Sophos Cloud Policy & Management Compromise Detection & Response Endpoint Mobile Encryption
  • 15. 15 Heartbeat: Next Generation Security Protection
  • 16. 16 Sophos SafeGuard Encryption  Ensures productivity by securing sensitive data wherever it is stored: laptops, USB devices, network shares or even in the cloud  Provides key management that lets authorized users share data securely and easily  Makes regulatory compliance easier with policy enforcement and reporting  Uses the latest processor technology to make sure that encrypted machines are faster than ever Encryption without compromise.
  • 17. 17 Sophos Mobile Control Mobile Device Management  Single solution for all the latest mobile platforms  Configure device policies and deploy them over the air  Remotely location, lock and wipe devices  On-premise & SaaS deployment options Mobile Security  Protect mobile devices from malicious apps able to steal data or create costs  Manage all settings from Sophos Mobile Control Console  Protect devices from malicious websites Mobile Encryption  Access encrypted files in the cloud on iOS or Android devices  Use a pre-defined passphrase  Allows easy collaboration from any location Countless devices, one solution.
  • 18. 18 Server Protection Pro-Server. Anti-virus.  Protects Windows, Linux and UNIX systems from the latest threats  Supports vSphere, Hyper-V and XenServer  Minimizes resource use for optimal server performance  Includes Antivirus for vShield to provide efficient agentless scanning on vSphere  Lets customers manage all systems from one easy to use console
  • 19. 19 Sophos Global Support Services • Team of experienced in-house experts • Installation, configuration, upgrade and health-check packages • Can be delivered on-site or remotely • Full skills transfer for your staff • Customized services available for specific requirements Professional Services Technical Support Technical Training • In-house experts not offshore call centers • One number to call for all products • Standard/Premium/Platinum* • Available 24 x 7 x 365 via phone, web or email* • Local language support • Delivered by Sophos employees • Hands-on workshops cover all Sophos products • Network deployment, system configuration and troubleshooting • Available at Sophos offices or on customer site • Can be customized to suit your specific business needs