SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Discover Synchronized Security
Matt Fairbanks
Chief Marketing Officer
Founded and HQ near Oxford, UK
Over 230,000 customers and over 100 million protected endpoints
Largest software IPO in London Stock Exchange (LSE) history
Growing at 15-20% per year, 2x+ the rate of the market
3,000+ employees and 20,000+ partners
Sophos Snapshot
Synchronized Security
Linking network and endpoint security
to deliver unparalleled protection by
accelerating and automating
threat discovery, analysis, and response.
“No other company is close to delivering
this type of synchronized and integrated
communication between endpoint and
network security products.”
Chris Christiansen, VP of Security Products, IDC
Vendor Landscape
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Network Leader
Endpoint Leader
Sync Security
Cloud Intelligence
Sophos Labs
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
| 24x7x365, multi-continent operation |
URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules
Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere
Sophos Central
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
In Cloud On Prem
Synchronized Security Platform and Strategy
Endpoint/Next-Gen Endpoint
Mobile
Server
Encryption
UTM/Next-Gen Firewall
Wireless
Email
Web
Allows Partners to manage
multiple customer installations
Endpoint Protection
Email Security
Web Gateway
Server Protection
Encryption
Mobile Protection
Wireless Allows users to customize security
status and notifications
Sophos Central
Partner Dashboard Admin Self Service
Sophos Central
Cloud Intelligence
Sophos Labs
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
| 24x7x365, multi-continent operation |
URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules
Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
Mobile
Server
Encryption
Wireless
Email
Web
In Cloud On Prem
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall
Synchronized Security Platform and Strategy
Heartbeat
Cloud Intelligence
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
Sophos Labs | 24x7x365, multi-continent operation |
URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules
Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere
UTM/Next-Gen Firewall
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
Wireless
Email
Web
Synchronized Security Platform and Strategy
Endpoint/Next-Gen Endpoint
Mobile
Server
Encryption
Sophos Central
In Cloud On Prem
Synchronized
Encryption
Sophos Central
Cloud Intelligence
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
Mobile
Server
Encryption
Wireless
Email
Web
In Cloud On Prem
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall
Synchronized Security Platform and Strategy
Sophos Labs | 24x7x365, multi-continent operation |
URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules
Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere
Unknown App ID
Encryption
Cloud Intelligence
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
Sophos Labs | 24x7x365, multi-continent operation |
URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules
Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere
Sophos Central
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
Email
Web
In Cloud On Prem
Synchronized Security Platform and Strategy
UTM/Next-Gen Firewall
Wireless
Endpoint/Next-Gen Endpoint
Mobile
Server
Lateral Movement
Protection
THE 99%
Off the
shelf
Exploit
Kits
Executable
Malware
Doc / Script
Malware
Data
Leakage
THREATS
0days
Long dwell
Campaigns
Injection
Attacks
Targeted
Phishing
Bespoke
Malware
SIEM
Threat Intel
CONTROLS
Endpoint AV URL Filtering
Email Security
WAF
Encryption
CASB
NextGen Firewall
Sandboxing
NextGen
EP
DLP
User Behavior
Analytics
Security
Automation / Risk
Quantification
1%
Critical
Infrastructure /
Nation-State
Attacks
Supply Chain
Integrity
Compromises
Insider movement
PTH, Skeleton Key,
Golden Ticket
Deception
Networks /
DDW monitoring
COMPLEXITY
RISK BASED ROI
TIME
User Behavior
Analytics
Security
Automation / Risk
Quantification
1%
Critical
Infrastructure /
Nation-State
Attacks
Supply Chain
Integrity
Compromises
Insider movement
PTH, Skeleton Key,
Golden Ticket
Deception
Networks /
DDW monitoring
Off the
shelf
Exploit
Kits
Executable
Malware
Doc / Script
Malware
SIEM
Data
Leakage
Threat Intel
THREATSCONTROLS
Endpoint AV
THE 99%
URL Filtering
Email Security
WAF
Encryption
CASB
NextGen Firewall
0days
Long dwell
Campaigns
Injection
Attacks
Targeted
Phishing
Bespoke
Malware
Sandboxing
NextGen
EP
COMPLEXITY
RISK BASED ROI
CompleteSimple System
Endpoint/Next-Gen Endpoint
Mobile
Server
Encryption
UTM/Next-Gen Firewall
Wireless
Email
Web
Synchronized Security Platform and Strategy
Highlights
• Sophos SG UTM 9.4 adds Sophos Sandstorm
• Sophos XG Firewall 16 now available
• New Synchronized Security use cases
• Sophos Firewall Manager 16 shipping this month
• XG Firewall 16.5 with Sandstorm
• Sophos UTM 9.5 comes early 2017
• Additional Synchronized Security use cases
UTM/Firewalls: Two Platforms with Competitive Advantage
Trusted platform
getting stronger
New platform
for an exciting future
SG UTM XG Firewall
• Combined platform best of SG UTM and Cyberoam
• Feature superset of Sophos SG UTM
• Simplified user experience
• Comprehensive central management solution
on-prem and in the cloud
• Enhanced Synchronized Security
• Solid, stable platform customers and
partners know and love
• Sophos Sandstorm in v9.4
• WAF and VPN enhancements in v9.5
• Future-proofed and ready for SF-OS
whenever customers/partners choose
Synchronized Security
XG Firewall with SFOS v16: The Next Thing in Next-Gen
User Experience Feature Enhancement
Intuitive experience
across all areas
of the product from
navigation to policy to
logging and more
Over 100 new features and
adding 35 most-wanted
features with UTM 9 across
web, email, OTP and many
other areas
Adding new Synchronized
Security features to the
arsenal to improve
protection, enforcement
and reporting
Endpoint/Next-Gen Endpoint
Mobile
Server
Encryption
Email
Web
Synchronized Security Platform and Strategy
Highlights
• Sophos Wireless added to Sophos Central
• Uses Sophos Secure Access Points
• Provides usage insight to identify inappropriate behavior
• Sophos Wireless enhancements released every 3 weeks
• New Sophos Secure Access Points
• New XG 1x Series Wireless Appliances
UTM/Next-Gen Firewall
Wireless
Endpoint/Next-Gen Endpoint
Mobile
Server
EncryptionWeb
Synchronized Security Platform and Strategy
Highlights
• Sophos Email added to Sophos Central
• Sophos Email Appliance:
• Sophos Sandstorm
• Time-of-Click Protection
• New Anti-Spam Engine
• New Sophos Email Appliances
• Sophos Email Advanced:
• Sophos Sandstorm
• Time-of-Click Protection
UTM/Next-Gen Firewall
Wireless
Email
Endpoint/Next-Gen Endpoint
Mobile
Server
Encryption
Synchronized Security Platform and Strategy
Highlights
• Sophos Web Gateway in Sophos Central:
• Protection up and running in 5 minutes
• Protects PCs, Macs, Chromebooks, and Apple iOS
• Sophos Web Appliance adds Sophos Sandstorm
• Next-Gen Web Protection
• Hybrid On-Prem and Cloud Model
• Simplified licensing and pricing
UTM/Next-Gen Firewall
Wireless
Email
Web
Encryption
UTM/Next-Gen Firewall
Wireless
Email
Web
Synchronized Security Platform and Strategy
EndpointHighlights
• Always-on File Encryption
• Synchronized Encryption
• Sophos Central managed Full Disk Encryption
• Multiple Key Support
Mobile
Server
Server
Encryption
UTM/Next-Gen Firewall
Wireless
Email
Web
Synchronized Security Platform and Strategy
EndpointHighlights
• Hyper-V protection
• AWS Auto-scaling
• MTD for Linux, Windows
• Security Heartbeat
Mobile
Server
Encryption
UTM/Next-Gen Firewall
Wireless
Email
Web
Synchronized Security Platform and Strategy
Endpoint
Mobile
Highlights
• Unified Endpoint Management
• Security Heartbeat
• Sophos Central managed Full EMM
• iOS Mobile Security
Endpoint
Mobile
Server
Encryption
UTM/Next-Gen Firewall
Wireless
Email
Web
Synchronized Security Platform and Strategy
Highlights
• Next Gen Endpoint: Exploit Prevention,
Anti-Ransomware, Root Cause Analysis
• Sophos Clean
• Role-based Administration in Sophos Central
Sophos Home
25
Accounts Created
NPS Score
45
Industry
Average
19500,000
EXCELLENT
0
100,000
200,000
300,000
400,000
500,000
600,000
NOV
DEC
JAN
FEB
MAR
APR
MAY
JUN
JUL
AUG
SEP
Over
“
“I've found it to be easy to use, reliable, and not heavy on
system resources. It's also picked up on every bit of malware
that I've been able to throw at it. ZD Net Review
There are zero reasons for a home user to pay for AV now ...
and per-machine web-filters are a huge bonus for us
parents!!
Very unobtrusive program, doesn't have constant nag
windows trying to get me to upgrade. If I wanted to be
nagged to death I would go talk to my ex-wife.
Brad, Internal I.T. Ltd.
Anonymous User
“
“
“
“
Complete and intelligent security – made simple
Designed for IT organizations of any size
Integrated and synchronized technology
Managed and delivered through the cloud
‘Channel First’ sales model
Sophos Strategy
Get Secure with Sophos
matt.fairbanks@sophos.com
Discover Synchronized Security - Sophos Day Netherlands

Weitere ähnliche Inhalte

Was ist angesagt?

SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced FeaturesDavid Perkins
 
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureNRC
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?MenloSecurity
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 

Was ist angesagt? (19)

Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
Sandbox
SandboxSandbox
Sandbox
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 

Andere mochten auch

shah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyshah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyMeet Shah
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Benelux
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Benelux
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Sophos Benelux
 

Andere mochten auch (14)

shah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyshah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copy
 
Sophos Cloud advanced
Sophos Cloud advancedSophos Cloud advanced
Sophos Cloud advanced
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Sophos End User Protection
Sophos End User ProtectionSophos End User Protection
Sophos End User Protection
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
Sophos 2010
Sophos 2010 Sophos 2010
Sophos 2010
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 

Ähnlich wie Discover Synchronized Security - Sophos Day Netherlands

Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?S&T Consulting Hungary
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksCisco Service Provider
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 

Ähnlich wie Discover Synchronized Security - Sophos Day Netherlands (20)

Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Information Security
Information SecurityInformation Security
Information Security
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 

Mehr von Sophos Benelux

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos Benelux
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsSophos Benelux
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?Sophos Benelux
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control BoxSophos Benelux
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationSophos Benelux
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor USophos Benelux
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsSophos Benelux
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 

Mehr von Sophos Benelux (12)

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control Box
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor U
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day Netherlands
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 

Kürzlich hochgeladen

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Discover Synchronized Security - Sophos Day Netherlands

  • 1. Discover Synchronized Security Matt Fairbanks Chief Marketing Officer
  • 2. Founded and HQ near Oxford, UK Over 230,000 customers and over 100 million protected endpoints Largest software IPO in London Stock Exchange (LSE) history Growing at 15-20% per year, 2x+ the rate of the market 3,000+ employees and 20,000+ partners Sophos Snapshot
  • 3. Synchronized Security Linking network and endpoint security to deliver unparalleled protection by accelerating and automating threat discovery, analysis, and response.
  • 4. “No other company is close to delivering this type of synchronized and integrated communication between endpoint and network security products.” Chris Christiansen, VP of Security Products, IDC
  • 5. Vendor Landscape Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security Network Leader Endpoint Leader Sync Security
  • 6. Cloud Intelligence Sophos Labs Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere Sophos Central Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations In Cloud On Prem Synchronized Security Platform and Strategy Endpoint/Next-Gen Endpoint Mobile Server Encryption UTM/Next-Gen Firewall Wireless Email Web
  • 7. Allows Partners to manage multiple customer installations Endpoint Protection Email Security Web Gateway Server Protection Encryption Mobile Protection Wireless Allows users to customize security status and notifications Sophos Central Partner Dashboard Admin Self Service
  • 8. Sophos Central Cloud Intelligence Sophos Labs Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations Mobile Server Encryption Wireless Email Web In Cloud On Prem Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Synchronized Security Platform and Strategy Heartbeat
  • 9. Cloud Intelligence Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions Sophos Labs | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere UTM/Next-Gen Firewall Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations Wireless Email Web Synchronized Security Platform and Strategy Endpoint/Next-Gen Endpoint Mobile Server Encryption Sophos Central In Cloud On Prem Synchronized Encryption
  • 10. Sophos Central Cloud Intelligence Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations Mobile Server Encryption Wireless Email Web In Cloud On Prem Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Synchronized Security Platform and Strategy Sophos Labs | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere Unknown App ID
  • 11. Encryption Cloud Intelligence Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions Sophos Labs | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere Sophos Central Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations Email Web In Cloud On Prem Synchronized Security Platform and Strategy UTM/Next-Gen Firewall Wireless Endpoint/Next-Gen Endpoint Mobile Server Lateral Movement Protection
  • 12. THE 99% Off the shelf Exploit Kits Executable Malware Doc / Script Malware Data Leakage THREATS 0days Long dwell Campaigns Injection Attacks Targeted Phishing Bespoke Malware SIEM Threat Intel CONTROLS Endpoint AV URL Filtering Email Security WAF Encryption CASB NextGen Firewall Sandboxing NextGen EP DLP User Behavior Analytics Security Automation / Risk Quantification 1% Critical Infrastructure / Nation-State Attacks Supply Chain Integrity Compromises Insider movement PTH, Skeleton Key, Golden Ticket Deception Networks / DDW monitoring COMPLEXITY RISK BASED ROI
  • 13. TIME User Behavior Analytics Security Automation / Risk Quantification 1% Critical Infrastructure / Nation-State Attacks Supply Chain Integrity Compromises Insider movement PTH, Skeleton Key, Golden Ticket Deception Networks / DDW monitoring Off the shelf Exploit Kits Executable Malware Doc / Script Malware SIEM Data Leakage Threat Intel THREATSCONTROLS Endpoint AV THE 99% URL Filtering Email Security WAF Encryption CASB NextGen Firewall 0days Long dwell Campaigns Injection Attacks Targeted Phishing Bespoke Malware Sandboxing NextGen EP COMPLEXITY RISK BASED ROI CompleteSimple System
  • 14. Endpoint/Next-Gen Endpoint Mobile Server Encryption UTM/Next-Gen Firewall Wireless Email Web Synchronized Security Platform and Strategy Highlights • Sophos SG UTM 9.4 adds Sophos Sandstorm • Sophos XG Firewall 16 now available • New Synchronized Security use cases • Sophos Firewall Manager 16 shipping this month • XG Firewall 16.5 with Sandstorm • Sophos UTM 9.5 comes early 2017 • Additional Synchronized Security use cases
  • 15. UTM/Firewalls: Two Platforms with Competitive Advantage Trusted platform getting stronger New platform for an exciting future SG UTM XG Firewall • Combined platform best of SG UTM and Cyberoam • Feature superset of Sophos SG UTM • Simplified user experience • Comprehensive central management solution on-prem and in the cloud • Enhanced Synchronized Security • Solid, stable platform customers and partners know and love • Sophos Sandstorm in v9.4 • WAF and VPN enhancements in v9.5 • Future-proofed and ready for SF-OS whenever customers/partners choose
  • 16. Synchronized Security XG Firewall with SFOS v16: The Next Thing in Next-Gen User Experience Feature Enhancement Intuitive experience across all areas of the product from navigation to policy to logging and more Over 100 new features and adding 35 most-wanted features with UTM 9 across web, email, OTP and many other areas Adding new Synchronized Security features to the arsenal to improve protection, enforcement and reporting
  • 17. Endpoint/Next-Gen Endpoint Mobile Server Encryption Email Web Synchronized Security Platform and Strategy Highlights • Sophos Wireless added to Sophos Central • Uses Sophos Secure Access Points • Provides usage insight to identify inappropriate behavior • Sophos Wireless enhancements released every 3 weeks • New Sophos Secure Access Points • New XG 1x Series Wireless Appliances UTM/Next-Gen Firewall Wireless
  • 18. Endpoint/Next-Gen Endpoint Mobile Server EncryptionWeb Synchronized Security Platform and Strategy Highlights • Sophos Email added to Sophos Central • Sophos Email Appliance: • Sophos Sandstorm • Time-of-Click Protection • New Anti-Spam Engine • New Sophos Email Appliances • Sophos Email Advanced: • Sophos Sandstorm • Time-of-Click Protection UTM/Next-Gen Firewall Wireless Email
  • 19. Endpoint/Next-Gen Endpoint Mobile Server Encryption Synchronized Security Platform and Strategy Highlights • Sophos Web Gateway in Sophos Central: • Protection up and running in 5 minutes • Protects PCs, Macs, Chromebooks, and Apple iOS • Sophos Web Appliance adds Sophos Sandstorm • Next-Gen Web Protection • Hybrid On-Prem and Cloud Model • Simplified licensing and pricing UTM/Next-Gen Firewall Wireless Email Web
  • 20. Encryption UTM/Next-Gen Firewall Wireless Email Web Synchronized Security Platform and Strategy EndpointHighlights • Always-on File Encryption • Synchronized Encryption • Sophos Central managed Full Disk Encryption • Multiple Key Support Mobile Server
  • 21. Server Encryption UTM/Next-Gen Firewall Wireless Email Web Synchronized Security Platform and Strategy EndpointHighlights • Hyper-V protection • AWS Auto-scaling • MTD for Linux, Windows • Security Heartbeat Mobile
  • 22. Server Encryption UTM/Next-Gen Firewall Wireless Email Web Synchronized Security Platform and Strategy Endpoint Mobile Highlights • Unified Endpoint Management • Security Heartbeat • Sophos Central managed Full EMM • iOS Mobile Security
  • 23. Endpoint Mobile Server Encryption UTM/Next-Gen Firewall Wireless Email Web Synchronized Security Platform and Strategy Highlights • Next Gen Endpoint: Exploit Prevention, Anti-Ransomware, Root Cause Analysis • Sophos Clean • Role-based Administration in Sophos Central
  • 24.
  • 25. Sophos Home 25 Accounts Created NPS Score 45 Industry Average 19500,000 EXCELLENT 0 100,000 200,000 300,000 400,000 500,000 600,000 NOV DEC JAN FEB MAR APR MAY JUN JUL AUG SEP Over
  • 26. “ “I've found it to be easy to use, reliable, and not heavy on system resources. It's also picked up on every bit of malware that I've been able to throw at it. ZD Net Review There are zero reasons for a home user to pay for AV now ... and per-machine web-filters are a huge bonus for us parents!! Very unobtrusive program, doesn't have constant nag windows trying to get me to upgrade. If I wanted to be nagged to death I would go talk to my ex-wife. Brad, Internal I.T. Ltd. Anonymous User “ “ “ “
  • 27. Complete and intelligent security – made simple Designed for IT organizations of any size Integrated and synchronized technology Managed and delivered through the cloud ‘Channel First’ sales model Sophos Strategy
  • 28. Get Secure with Sophos matt.fairbanks@sophos.com

Hinweis der Redaktion

  1. ·         Introduced Synchronized Security last year with the launch of SFOSv15 ·         Security Heartbeat – the mechanism to allow the firewall and endpoint to work together for the first time ·         Rather than having a limited IP-centric view of the world, the firewall now had insight into users and even processes on the endpoint ·         Massive improvement to operating efficiency: what used to take hours or days of manual investigation became fully automated ·         This was just the beginning…
  2. ·         Until now, encryption solutions have relied on a single dimension, user-identity, to control access to encrypted files ·         While this is certainly necessary, it isn’t sufficient because it offers no defense against hosts becoming compromised, and attackers merely piggybacking on the authenticated user’s credentials ·         With Safeguard 8, we introduced Synchronized Encryption. Now our endpoint protection software exchanges information with the data protection software ·         This adds the dimensions of System integrity (has this machine been compromised?) and App integrity (is this instance of an application trustworthy?) to the key revocation and restoration processes
  3. ·         One of the features that made NGFW so popular was their ability to see beyond Layer4 all the way up to Layer7, and to report on applications ·         Without exception, some amount of traffic remains un-classifiable by NGFWs, resulting in the catch-all “Unknown” class ·         With our next SyncSec enhancement, when SFOS sees a flow that it’s deep packet inspection engine cannot classify, it will ask the endpoint, which will respond with process and related information, virtually eliminating “unknown” flows
  4. ·         It is a common MO for sophisticated attackers to establish footholds at easier-to-breach, lower-value targets, and to then move laterally through the network to higher value targets (like domain controllers) ·         There have been very few security controls focused on this kind of activity within a network, and those that do tend to be retrospective, offering no real-time defenses ·         This next example from our SyncSec roadmap will be a real-time defense against lateral movement ·         Based on information gathered from Sophos-protected endpoints, mobile devices, and servers, our firewalls and even our wireless access points, we will not only identify behaviors characteristic of lateral movement, but we will arrest bad actors in their tracks by isolating infected hosts from the rest of the network
  5. Innovation has a many meanings, but for our purposes, I’ll define it as “a materially positive change”. This could be an improvement to a previous solution, a new solution to a known problem, or a solution that completely anticipates a need. Proliferation is simply “the rate of adoption and diffusion of those innovations.”   The size of the bubbles is meant to represent the rate of proliferation, the bigger the bubble, the more diffuse the threat, or the more widely adopted the control. For example, on the left side we have exploit kits and executable malware, and the associated controls endpoint AV, email security, and URL filtering. While on the right we have less proliferated threats like 0days and associated controls like NextGen Endpoint. It is incumbent upon us as an industry to keep these roughly in balance to help manage asymmetries.   Recall also when I was discussing asymmetries, I mentioned that in addition to needing better defender synchronization, that we also need a way to accelerate the adoption of innovations. Looking at this chart, we do see some relatively new technologies like NGEP that understandably haven’t yet proliferated, but we also see some older technologies like 3rd party threat intel and SIEM.   Why haven’t these been more widely adopted yet, and how should we think about the most cutting edge threats and controls that we’re starting to see?
  6. UX New Left Nav Tabs for 2nd Level Nav (still a WIP) Enhanced Control Center Widgets Redesigned Web Policy Direct access to live log viewer from any screen (via magnifying glass) New network and device features Firewall Hostname Cloning of rules, objects, and policies Per-rule routing Policy routes Firewall-to-Firewall RED Tunnels Country filtering improvements Improved NAT Business Rule Creation New email features Per domain routing Full MTA – store and forward Enhanced anti-spam SPX Reply Portal New Sync Sec Missing Security Heartbeat Real-time App Visibility Destination-based Security Heartbeat
  7. 7.4 is the average amount of internet enabled devices per household in the UK: https://www.theguardian.com/technology/2015/apr/09/online-all-the-time-average-british-household-owns-74-internet-devices Industry Average NPS is for Software and Apps: https://www.netpromoter.com/compare/