SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Sophos UTM:
The Complete Security Box
We’re focused on protecting you


             Threats             Data
          changing, st        everywhere,
                ill           regulations
           increasing           growing


                        Users
                     everywhere,
                        using
                      everything
IT security sprawl

Intrusion prevention      SSL VPN Gateway          Router         Firewall


          Spam filter        Endpoint protection     Gateway antivirus



      WAN link balancer            Web filter          Load balancer
Complete Security
Because you’ve got enough to worry about


                       Security              Without           Active
                      Everywhere            Complexity       Protection


                     Wherever              Quicker to       Our unique
                     the user is,          setup, maintai   approach for
                     what ever             n and solve      better
                     they use              problems         protection you
                                                            can actually
                                                            deploy




4
Complete Security
Protecting every part of your business




5
Sophos UTM
The Complete Security Box




                                Network                 Wireless
                                Firewall                Protection




                                                                             Email
                Network                                                    Protection
                Protection




                                                                     Endpoint
                       WebServer                                     Protection
                       Protection

                                             Web
                                           Protection
A first line of defense
Starting with network security



• Any computer connected to the internet is at risk
• A computer outside a firewall will be attacked within minutes
• Hardware firewalls can be complex to configure
Network firewall
Free Firewall for business use



•   Easy management with object-based rules
•   Stateful packet inspection
•   Place anywhere on network
•   IPv6 Support
•   Amazon Virtual Private Cloud Connector
•   Easy tunnelling with Windows Remote Access
Optimize your network
and stop threats
Businesses need more than just a basic firewall



•   Firewalls only deal in ports, addresses and protocols
•   Malicious network traffic can still come through allowed ports
•   You want to get the best from your web connection
•   You need a way to let remote workers and offices connect
Network protection
Optimize and secure your network




•   Intrusion prevention system
•   Flood protection
•   VPN (Site-to-site and client)
•   HTML 5 VPN portal
•   WAN link balancing
WiFi should be easy and safe
You don’t have to “make do” when it comes to wireless networking




• Separate wireless management solutions can be expensive
• Lots of built in wireless hardware doesn’t give complete coverage
• Configuring wireless networks in remote offices can be a hassle
Wireless protection
Easy central configuration for secure WiFi




•   Central management
•   Plug & play deployment
•   Connect access points anywhere
•   Easy hotspot configuration
Email traffic is still a risk
Old methods with some original techniques




•   Over 98% of all email is spam
•   Many spam emails combine links to infected websites
•   Phishing attacks are on the rise
•   Data protection is key concern for businesses
Email protection
Stopping threats and protecting data at your gateway




•   Filter spam and stop malware
•   Let users manage their own quarantined items
•   Detects phishing urls in emails
•   Supports S/MIME and OpenPGP for encryption
Endpoints are everywhere
And so is your network



•   The anywhere network
•   Accessing the web outside your protection
•   Malware carried on USB sticks
•   You need more than signature-based AV
Endpoint protection
Stop threats wherever users are and however they connect




•   Endpoint anti malware
•   Live protection
•   Device control
•   Manage anywhere through our LiveConnect service
Why worry about the web?
A great tool and a potential risk




•   Lack of control can impact productivity
•   85% of all malware comes from the web
•   Web threats are invisible
•   Targeted and controlling computers and stealing data
Web protection
Layered protection for computers connected to the web




•   Gateway anti malware
•   URL Filtering
•   Web application control
•   Interactive usage and user reporting
Vulnerable websites are a target
Don’t let your organization become another statistic




• More than 30,000 websites infected every day
• 80% of infected websites are legitimate
• Exploits will often redirect users to malicious sites
Webserver protection
Let us be your web security expert




•   Web application firewall
•   Anti malware scanning
•   Form hardening
•   URL hardening
•   Cookie protection
Choose your deployment type


           Hardware Appliance




           Software Appliance




            Virtual Appliance
Hardware options
Hardware                                                                                               Multiple
                 110/120    220              320             425            525              625
Appliance                                                                                               + RED




                                                                                                         Large
                  Small    Medium          Medium           Large          Large             Large
Environment                                                                                            networks
                 network   network         network         network        network           network
                                                                                                      + branches

Network ports      4         8                 8          6 & 2 SFP     10 & 4 SFP      10 & 8 SFP     Multiple

Max.
recommended       10/80     300              800            1.500          3.500             5.000     10.000+
firewall users
Max.
recommended       10/35      75              200             600           1.300             2.000      5.000
UTM users

Software
Appliance *                               Runs on Intel-compatible PCs and servers


Virtual                                     VMware Ready & Citrix Ready certified
Appliance *                          Runs in Hyper-V, KVM, and other virtual environments
Choose your modules


   Network       Web          Webserver
   Firewall      Protection   Protection
                                           Endpoint
                                           Protection


   Network       Wireless     Email
   Protection    Protection   Protection



                FullGuard
www.sophos.com/unified

Weitere ähnliche Inhalte

Was ist angesagt?

Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your FirewallSophos
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XSophos Benelux
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Benelux
 

Was ist angesagt? (19)

Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
FireEye
FireEyeFireEye
FireEye
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
FireEye Engineering
FireEye Engineering FireEye Engineering
FireEye Engineering
 

Andere mochten auch

unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementMilan Petrásek
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified EngineerFranklin Nsude
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Alphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, AdministrationAlphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, AdministrationAlphorm
 
Intervista a Lorena Cecchini di ISPRA TV
Intervista a Lorena Cecchini di ISPRA TVIntervista a Lorena Cecchini di ISPRA TV
Intervista a Lorena Cecchini di ISPRA TVPaola Vaccaro
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutionsAnthony Daniel
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Gol D Roger
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat ReportSophos
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareSophos
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domainNetProtocol Xpert
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation Mohit Kumar
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 

Andere mochten auch (20)

unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified Engineer
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Alphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, AdministrationAlphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, Administration
 
Sophos - UTM
Sophos - UTMSophos - UTM
Sophos - UTM
 
Intervista a Lorena Cecchini di ISPRA TV
Intervista a Lorena Cecchini di ISPRA TVIntervista a Lorena Cecchini di ISPRA TV
Intervista a Lorena Cecchini di ISPRA TV
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domain
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 

Ähnlich wie UTM - The Complete Security Box

BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowNetFlow Analyzer
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleSACHIN SHARMA
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxamalouwarda1
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
Network security is actually two words
Network security is actually two wordsNetwork security is actually two words
Network security is actually two wordsAhmed Sultan
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 

Ähnlich wie UTM - The Complete Security Box (20)

BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Information Security
Information SecurityInformation Security
Information Security
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptx
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
Network security is actually two words
Network security is actually two wordsNetwork security is actually two words
Network security is actually two words
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 

Mehr von Sophos

8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes MobileSophos
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)Sophos
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 

Mehr von Sophos (6)

8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

UTM - The Complete Security Box

  • 2. We’re focused on protecting you Threats Data changing, st everywhere, ill regulations increasing growing Users everywhere, using everything
  • 3. IT security sprawl Intrusion prevention SSL VPN Gateway Router Firewall Spam filter Endpoint protection Gateway antivirus WAN link balancer Web filter Load balancer
  • 4. Complete Security Because you’ve got enough to worry about Security Without Active Everywhere Complexity Protection Wherever Quicker to Our unique the user is, setup, maintai approach for what ever n and solve better they use problems protection you can actually deploy 4
  • 5. Complete Security Protecting every part of your business 5
  • 6. Sophos UTM The Complete Security Box Network Wireless Firewall Protection Email Network Protection Protection Endpoint WebServer Protection Protection Web Protection
  • 7.
  • 8. A first line of defense Starting with network security • Any computer connected to the internet is at risk • A computer outside a firewall will be attacked within minutes • Hardware firewalls can be complex to configure
  • 9. Network firewall Free Firewall for business use • Easy management with object-based rules • Stateful packet inspection • Place anywhere on network • IPv6 Support • Amazon Virtual Private Cloud Connector • Easy tunnelling with Windows Remote Access
  • 10. Optimize your network and stop threats Businesses need more than just a basic firewall • Firewalls only deal in ports, addresses and protocols • Malicious network traffic can still come through allowed ports • You want to get the best from your web connection • You need a way to let remote workers and offices connect
  • 11. Network protection Optimize and secure your network • Intrusion prevention system • Flood protection • VPN (Site-to-site and client) • HTML 5 VPN portal • WAN link balancing
  • 12. WiFi should be easy and safe You don’t have to “make do” when it comes to wireless networking • Separate wireless management solutions can be expensive • Lots of built in wireless hardware doesn’t give complete coverage • Configuring wireless networks in remote offices can be a hassle
  • 13. Wireless protection Easy central configuration for secure WiFi • Central management • Plug & play deployment • Connect access points anywhere • Easy hotspot configuration
  • 14. Email traffic is still a risk Old methods with some original techniques • Over 98% of all email is spam • Many spam emails combine links to infected websites • Phishing attacks are on the rise • Data protection is key concern for businesses
  • 15. Email protection Stopping threats and protecting data at your gateway • Filter spam and stop malware • Let users manage their own quarantined items • Detects phishing urls in emails • Supports S/MIME and OpenPGP for encryption
  • 16. Endpoints are everywhere And so is your network • The anywhere network • Accessing the web outside your protection • Malware carried on USB sticks • You need more than signature-based AV
  • 17. Endpoint protection Stop threats wherever users are and however they connect • Endpoint anti malware • Live protection • Device control • Manage anywhere through our LiveConnect service
  • 18. Why worry about the web? A great tool and a potential risk • Lack of control can impact productivity • 85% of all malware comes from the web • Web threats are invisible • Targeted and controlling computers and stealing data
  • 19. Web protection Layered protection for computers connected to the web • Gateway anti malware • URL Filtering • Web application control • Interactive usage and user reporting
  • 20. Vulnerable websites are a target Don’t let your organization become another statistic • More than 30,000 websites infected every day • 80% of infected websites are legitimate • Exploits will often redirect users to malicious sites
  • 21. Webserver protection Let us be your web security expert • Web application firewall • Anti malware scanning • Form hardening • URL hardening • Cookie protection
  • 22. Choose your deployment type Hardware Appliance Software Appliance Virtual Appliance
  • 23. Hardware options Hardware Multiple 110/120 220 320 425 525 625 Appliance + RED Large Small Medium Medium Large Large Large Environment networks network network network network network network + branches Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple Max. recommended 10/80 300 800 1.500 3.500 5.000 10.000+ firewall users Max. recommended 10/35 75 200 600 1.300 2.000 5.000 UTM users Software Appliance * Runs on Intel-compatible PCs and servers Virtual VMware Ready & Citrix Ready certified Appliance * Runs in Hyper-V, KVM, and other virtual environments
  • 24. Choose your modules Network Web Webserver Firewall Protection Protection Endpoint Protection Network Wireless Email Protection Protection Protection FullGuard

Hinweis der Redaktion

  1. We see that there are three main problems making IT security more difficult today:Threats like fakeAV are still getting through defencesData is still getting lost on disks, laptops and via email. At the same time your IT infrastructure is getting more complex with users on mobile devices, using home computers, in satellite offices - all using data and services in the cloud, as well as behind your firewall.Too often the onus is put on the IT teamto address all these risks. This means you buy, configure and manage multiple security software and hardware solutions that let you deal with the aftermath of defences being breached. You also have to solve new security problems as they emerge, often by buying and deploying even more new products. What you need is complete security from a vendor you trust.
  2. Securing IT to protect data is a job that keeps getting harder. Internet connections are faster, threats are more complex and users are more mobile. The result is what we see here. Software and hardware solutions are added as they’re needed. So your server room starts to fill up with an appliance or server for every job you need to do. As a result you’re spending more, you’re managing more and you’re adding complexity.
  3. Stopping threats and protecting your data is what we do. And we believe our job is to do that comprehensively, without making your job more complicated. This is our mantra: Complete Security, Without Complexity, Active protection.What we do, How we do it, How we do it better.Complete security isabout taking care of yourprotection at every stagewithout it having to be complicated..
  4. That’s why we give you solutions for every part of your business. Endpoint, Network, Data, Email, Web and Mobile. We protect them all. So your users and data are protected wherever they are and whatever they use.
  5. To deal with today’s networks and combat modern threats we’re delivering a UTM that is the Complete Security appliance. From network management and protection, to gateway filtering and endpoint security this is a truly unified solution that can grow with your business.
  6. Each of the modules will work however you decide to deploy it. So if you don’t need Wireless protection today, no worries, just subscribe to that module when you do. Then you’ll be able to access the settings for that module from the same familiar console you’re already using. We have an aggressive roadmap for Sophos UTM, adding mobile device management and data protection to the appliance within the year.
  7. Having a connected business is essential to being successful, but computers have to be protected from threats targeting you. Having an internet connection allows you to connect out but also makes your network visible to attackers. A computer connected directly to the web will be targeted by a hacker within minutes so it’s important that essential protection is in place for computers in your network. The problem is that many network firewalls are complicated to setup and need specialist knowledge.
  8. The Essential Firewall contains the fundamental basis security functions which every business should use such as a firewall, network tools, routing and secure remote access. These are all available free of charge for all Astaro appliances - also for commercial use.A good firewall can prevent exploits that lead to data loss or theft, infected computers, and other incidents that cost you time and money. The protective features in our Essential Network Firewall are designed for simplicity. We make it easy to control incoming and outgoing traffic. So you can be assured that you are configured for complete protection.With the integrated firewall, unauthorized access to internal and external resources are rejected and hacker attacks blocked.
  9. Firewalls are only the most basic protection for networks more complex attack will get through these defenses or target your network in a different ways like exploiting a vulnerable application or moving from one computer to another. Protecting your network and keeping your business running isn’t just about stopping threats. You also want to make sure that your optimizing your bandwidth and allowing remote offices and workers secure and reliable connections to your systems.
  10. Sophos Network Protection includes many fully integrated features: an intrusion prevention system, denial-of-service protection, a VPN gateway, an HTML5 VPN portal, advanced routing and more. We help protect your network by keeping bad traffic out and enabling secure access to authorized users. Advanced routing capabilities in Sophos Network Protection provide optimal path selection, load balancing and stability.
  11. Your wireless networks need the same policies and protection as the wired network. This can be difficult without a way to centrally manage the network and extend your security. Many dedicated wireless management solutions are expensive and difficult to configure, with almost too many features for most businesses. The other option, with wireless built into the hardware doesn’t give the coverage or flexibility needed. And if you’re an organization with lots of remote offices setting up wireless connections in each one can be a challenge.
  12. Sophos UTM helps you easily create, manage and secure wireless networks so you get consistency across your organization. Our wireless access points can be plugged in anywhere and configured centrally from the Sophos UTM. It’s like having built in wireless but with the flexibility that gives you complete coverage. And you can also set up wifi hotspots and access options for guests to your offices or remote branches.
  13. There is still a huge amount of spam email out there, without any protection your users inboxes would be crammed full of useless messages that stop them being productive. Today lots of emails also carry links to malicious websites or phishing sites that want to steal data. Protecting email against viruses, spam and data loss can be hard work. You must address infections caused by viruses that get past your desktop defenses, manage spam quarantines and ensure employees properly encrypt their email.
  14. Sophos UTM Email Protection makes it easy to keep your inboxes clear of viruses and spam. Dual yet individual virus engines operate in parallel to scan and block threats in content before it has a chance to enter the network. Astaro Mail Security stops spam, phishing and other unwanted email before it gets delivered and clutters up mailboxes. The combination of many different recognition mechanisms offer a high hit rate and low amount of false positives.We give youhandy management tools to make life easier for you and your users. And we let you secure email that leaves your business with email encryption options.
  15. Traditionally networks were groups of computers joined together and usually in the same location. But today the network really can be anywhere. With laptops as the most popular choice as workstations for users in businesses they aren’t just connected to managed and protected internal networks, they might also be connected to the web at home, hotels or coffee shops. It’s not realistic to expect these users to connect to the corporate VPN every time they want to browse the web but that also means that when they do they aren’t protected by the web protection that’s at your gateway. Lots of different devices also get connected to endpoints and these carry a risk all of their own, either because data put onto them isn’t secure or because they are a common method for carrying malware. The protection for these computers must move beyond traditional signature based antivirus.
  16. Endpoint protection in Sophos UTM lets you install an agent to your computers to keep them protected wherever they go, with detection and blocking of viruses, trojans, spyware and adware. With Live protection you can also be sure that if they try to visit an infected site when they aren’t connected to your gateway they’ll still be protected. Instantly. We’ve also built in device control, to reduce the risk of infection and let you protect data moved to USB sticks. And you’ll always be able to see your computers to know they’re protected with our LiveConnect service. It uses the cloud to let you set polices and see the status of endpoints however they’re connected.
  17. Today the web is at the center of almost everything that we do with IT, we could argue that it’s just at the center of everything we do. This is a challenge for people in your business who are so used to using it that perhaps sometimes they use it a little too much and sometimes not in the right way, which can impact on their work. It’s also the reason why the web is the number one source of malware infections, with many people browsing and getting infected without even knowing it.
  18. Sophos Web Protection prevents malware infections and gives you control over employees’ web use. Spyware and viruses are stopped before they can enter the network.You create easy policies that set where and how employees spend time online. With our web application control we help you control the applications that could cause security or legal problems, like P2P or instant messaging. So you get a handle on the unwanted applications that clog your network. And everything is tracked and arranged in detailed reports so you can see what people are doing and make changes as needed.
  19. At Sophos we estimate that over 30,000 websites are infected every day. The majority of these sites began as a legitimate web presence for businesses just like yours. If a customer browsing to your site gets a warning from their antivirus to tell them it’s infected you might be looking at a loss of reputation. Most of these infected websites will attempt to use a weakness in the way the site is setup to redirect the browser to a site hosting the malicious code. The problem is that manually protecting the web server against these threats requires specialized expertise.
  20. Sophos Web Server Protection eliminates this need. We use a reverse proxy to protect your web server and web applications against the unknown. A clear administrative interface simplifies policy setting. Our web application firewall is continually scanning for probes and attacks targeted at your web server. Our anti malware scanner is also letting the webserver scan its own files to make sure it’s not handing out infected content to your customers. We can also stop sql injection attacks that use invalid form data and we make sure that only valid url request are allowed so attackers can’t create a backdoor. With cookie protection we make sure that each one is digitally signed so the information in it is approved.
  21. We provide better flexibility by offering a huge set of different deployment options – all providing the same functionality.The hardware appliance product line covers models for small networks and remote locations with up to 10 users to large networks with up to 5000 users and even more within large distributed networks.As opposed to other UTM solutions, Astaro software can be also installed on your own servers. Our gateways run on standard Intel-compatible PCs and servers not requiring any proprietary ASICs. This allows for easy installation also in home or in virtual environments and for fast update with new features as new threats arise.We also allow easy usage within an Amazon environment by offering Amazon Machine Images (AMI) and also facilitate the usage of Amazon VPCs through our VPC connector.Furthermore, every hardware appliance contains an integrated hard drive for local spam quarantine and log/reporting information. Therefore, even the smallest remote office can get the same protection as a company's central office - without compromise.
  22. The Sophos UTM product line covers models for small networks and remote locations with up to 10 users to large networks with up to 5000 users.As opposed to other UTM solutions, oursoftware can be also installed on your own servers.The same set of security applications, including features such as Active/Active Clustering, WAN Uplink Balancing or Active Directory Integration, is available on all our UTM models - no matter if the hardware, software or virtual appliance is deployed.Furthermore, every hardware appliance contains an integrated hard drive for local spam quarantine and log/reporting information. Soeven the smallest remote office can get the same protection as a company's central office - without compromise.The UTM 525 and 625 models offer the highest availability through a redundant hard drive and power supply.
  23. To find out more about us visit www.sophos.com, thanks for listening.