SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Endpoint Security
     and Control
Sophos Endpoint Security
Sophos’ unified, automated console provides a single point from which to deploy, update and report on
both anti-virus and firewall protection across thousands of Windows, Mac and Linux computers. By
simplifying and automating protection, we drive down your costs, ensuring fewer clicks per task and
better visibility of your entire network.

Central Management Console:
   •   Sophos Anti-Virus comes equipped with enterprise management console capable of viewing
       each server across multiple platforms from one view. One console to manage all your Windows,
       Mac OS X, and Linux platforms.
Unified Single Anti-Malware Scanner:
   •   One scan with our single anti-virus client detects viruses, spyware and adware, suspicious files,
       suspicious behavior, unauthorized VoIP, IM, P2P, and gaming software - eliminating your
       reliance on separate standalone products. Sophos provides complete protection against
       Spyware and fully meets all industry requirements for Spyware protection as set by West Coast
       Labs (http://www.westcoastlabs.org).
Integrated Application Control:
   •   Sophos includes adware protection at no additional charge and ability to manage application
       policy from the console.
Integrated Zero-Day Protection:
   •   Unique Behavioral Genotype® Protection automatically guards against new and targeted threats
       by analyzing behavior before code executes.
   •   Most effective Zero-Day protection in the industry
       (http://www.sophos.com/pressoffice/news/articles/2007/12/proactive-test.html).
Synchronization with Active Directory:
   •   Security policies are automatically enforced as new computers join your network. This eliminates
       the risk of unprotected computers compromising your security.

NAC integrated:

   •   Automatically check and fix managed computers
       Microsoft/Windows Update (patching), Service Packs, Sophos or Windows firewall, SAV: on,
       enabled, up to date, no malware or controlled apps
   •   Control unmanaged computers
       Control access with agent or Microsoft DHCP, unmanaged computer assessment with web agent
   •   Simple to manage – integrated with Enterprise Console
       o   Pre-defined policies for managed and unmanaged computers
       o   Integrated NAC agent deployment via Enterprise Console
       o   Uses existing Enterprise Console groups
Independent & Analyst Reviews
                                                 ImageTrak Business IT Survey Ranks
                                                 SOPHOS highest in customer
                                                 satisfaction.

                                                 Each security vendor was scored against
                                                 five satisfaction criteria - quality of
                                                 support, ease of integration,
                                                 manageability, reliability and return on
                                                 investment. Sophos was rated very
                                                 highly throughout and was classed as
                                                 either the No. 1 or No. 2 brand
                                                 consistently ahead of key competitors,
                                                 McAfee, Symantec and Trend Micro.


Faster Response than Alternatives

Independent analysis regularly shows that
Sophos responds more quickly than other
leading vendors. This is a great testament to
our rapid response to virus outbreaks from our
global network of integrated virus, spyware
and spam analysis centers and the innovative
proactive detection capabilities of our
Genotype™ virus detection technology -




                                                 True Alternative to Symantec and
                                                 McAfee

                                                 Sophos successfully intercepted 86% of
                                                 the malware tested against prior to
                                                 execution, compared to 43% for McAfee
                                                 and 51% for Symantec. In addition,
                                                 Sophos's run-time HIPS protection
                                                 detected further malware samples at
                                                 execution raising proactive detection of
                                                 zero-day threats to an "impressive" 97% in
                                                 Cascadia Labs' anti-virus tests.
Leader in Zero-Day Protection
Sophos detected more new unknown malware reported to the independent AVIEWS mailing list in
a four month period than any other vendor. AVIEWS is the Anti-Virus Information & Early Warning
System, an online community that shares information about breaking malware threats between
anti-virus vendors, researchers, security experts, and system administrators.




In the four month study Sophos was found to proactively detect 80% of all unknown malware
reported to the mailing list, higher than any other vendor, compared to 50% for Microsoft, 35% for
Symantec and 30% for McAfee.
Gartner Magic Quadrant

                                                            “Sophos…has a
                                                            better understanding
                                                            of business needs,
                                                            particularly the need
                                                            to provide return on
                                                            investment for the
                                                            buyer and to
                                                            balance advanced
                                                            features with low
                                                            administration."


Gartner's Magic Quadrant for Endpoint Protection Platforms is based on an assessment of a company's
ability to execute and completeness of vision. According to Gartner, "Leaders demonstrate balanced
progress and effort in all execution and vision categories. Their actions raise the competitive bar for all
products in the market, and they can change the course of the industry."

Gartner specifically identified the following strengths in Sophos as deserving of a position in the Leaders
Quadrant:

   •   Significantly improved and simple management, that gives a real time view from which actions
       can be immediately taken (e.g. force an update on all those computers).
   •   Excellent integrated network access control (NAC) capability with the ability to monitor, assess
       and remediate competitive EPP clients (NAC will be available April 2008).
   •   Roadmap commitments for data encryption, with basic media port controls already in place.
What do licenses include?
Free Home Use for Employees:
   •   Sophos provides free home use for employees at no additional charge – customer responsible
       for home use support.


24/7/365 Engineer-Level Technical Support:
   •   Access to frontline Sophos employed technical specialists 24x7x365 to provide multi-language
       support.

Server Coverage:
   •   Sophos will charge client price for server environment if servers do not exceed 25% of total
       licenses purchased.


29 Platform Coverage:
   •   Sophos gives you access to 29 platforms – more operating systems then any other vendor in the
       market – at no additional cost.


Free Upgrades and Maintenance:
   •   All maintenance and upgrade pricing included over term of agreement.
Benefits of Sophos transition services
We have successfully engaged with some of the most recognized organizations in the world to meet
their specific requirements and assure rapid, optimal deployment of Sophos products. Our expertise is
delivered through standard or customized packages, provided on site or remotely, to ensure the
maximum return on your investment.


Sophos Endpoint Implementation:

Designed to ensure optimal installation and configuration of Sophos endpoint solutions, this service
package provides assistance with implementation. The service includes:

   •   Product installation
   •   Product training sessions
   •   Skills transfer
   •   Best practice tutorials for network and system security.
   •   Removal of legacy anti-virus software can also be included in the service, if required, ensuring a
       rapid rollout of Sophos Anti-Virus while maintaining the security of your network.




Customized transition plan:

Our experts work with your security team to develop a plan for efficient deployment and upgrade of
Sophos products with minimal impact on your network.

Skills transfer:

Your security team works alongside Sophos professionals to gain immediate experience of our industry-
leading solutions and optimize administration and policy enforcement.

Industry-leading expertise:

Our consultants advise on threat prevention best practices, including compliance with email and
endpoint security policies, and defense against unauthorized computers, malware, and spam.

Maximum return on investment:

Whether on site or remotely, a Sophos security expert assesses your network environment and selects
the module or configuration that best suits your requirements.
Sophos Premium Support
Customers can select one of three support service options: Standard, Premium and Platinum.

Standard Support is included in the license fee and is available 24 hours per day, 365 days per year to
all Sophos customers. Premium Support and Platinum Support are available for an additional annual
percentage fee based on the license cost.

The deliverables included within each service option are outlined below, together with the levels of
service, including target response and escalation times.
Sophos Customers

Weitere ähnliche Inhalte

Was ist angesagt?

Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseLumension
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...gemmarie1
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSiemplify
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROISiemplify
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointMarcoTechnologies
 
MSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListMSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListSiemplify
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?Siemplify
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security ServicesJad Bejjani
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationEnterprise Management Associates
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT Innovators
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID EraCitrin Cooperman
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 

Was ist angesagt? (19)

Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
 
Ambesh
AmbeshAmbesh
Ambesh
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
MSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListMSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping List
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 

Andere mochten auch

Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlusLee Dalton
 
shah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyshah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyMeet Shah
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XSophos Benelux
 
Sécurité UTM / Arkoon
Sécurité UTM / ArkoonSécurité UTM / Arkoon
Sécurité UTM / Arkoonpimp uncle
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Sophos company-profile-cpna
Sophos company-profile-cpnaSophos company-profile-cpna
Sophos company-profile-cpnaaveiganeto
 
Rich Desktop Applications
Rich Desktop ApplicationsRich Desktop Applications
Rich Desktop Applicationsgoldoraf
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案OFMKT
 
Mobile Application Development Using Java
Mobile Application Development Using JavaMobile Application Development Using Java
Mobile Application Development Using JavaNexSoftsys
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Benelux
 
Café technologique Sécurité et Gestion des mobiles pour l'entreprise
Café technologique Sécurité et Gestion des mobiles pour l'entrepriseCafé technologique Sécurité et Gestion des mobiles pour l'entreprise
Café technologique Sécurité et Gestion des mobiles pour l'entrepriseInfoteam Informatique Technique SA
 
Présentation de la plateforme MonPFE
Présentation de la plateforme MonPFEPrésentation de la plateforme MonPFE
Présentation de la plateforme MonPFEMajdi SAIBI
 

Andere mochten auch (20)

Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
shah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copyshah-meet-cloud-certified-engineer[6] copy
shah-meet-cloud-certified-engineer[6] copy
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Sophos Cloud advanced
Sophos Cloud advancedSophos Cloud advanced
Sophos Cloud advanced
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
Sécurité UTM / Arkoon
Sécurité UTM / ArkoonSécurité UTM / Arkoon
Sécurité UTM / Arkoon
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Sophos End User Protection
Sophos End User ProtectionSophos End User Protection
Sophos End User Protection
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos company-profile-cpna
Sophos company-profile-cpnaSophos company-profile-cpna
Sophos company-profile-cpna
 
Rich Desktop Applications
Rich Desktop ApplicationsRich Desktop Applications
Rich Desktop Applications
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案智慧型行動裝置安全管控解決方案
智慧型行動裝置安全管控解決方案
 
Mobile Application Development Using Java
Mobile Application Development Using JavaMobile Application Development Using Java
Mobile Application Development Using Java
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
Café technologique Sécurité et Gestion des mobiles pour l'entreprise
Café technologique Sécurité et Gestion des mobiles pour l'entrepriseCafé technologique Sécurité et Gestion des mobiles pour l'entreprise
Café technologique Sécurité et Gestion des mobiles pour l'entreprise
 
Présentation de la plateforme MonPFE
Présentation de la plateforme MonPFEPrésentation de la plateforme MonPFE
Présentation de la plateforme MonPFE
 

Ähnlich wie Sophos 2010

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous DeliveryMainstay
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideJeremiah Grossman
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdfAklnt
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
SolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfSolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfssusera76ea9
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 

Ähnlich wie Sophos 2010 (20)

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Coverity Data Sheet
Coverity Data SheetCoverity Data Sheet
Coverity Data Sheet
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdf
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Key features of sophos xg firewall
Key features of sophos xg firewallKey features of sophos xg firewall
Key features of sophos xg firewall
 
SolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfSolPartner_InterceptX.pdf
SolPartner_InterceptX.pdf
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Sophos 2010

  • 1. Endpoint Security and Control
  • 2. Sophos Endpoint Security Sophos’ unified, automated console provides a single point from which to deploy, update and report on both anti-virus and firewall protection across thousands of Windows, Mac and Linux computers. By simplifying and automating protection, we drive down your costs, ensuring fewer clicks per task and better visibility of your entire network. Central Management Console: • Sophos Anti-Virus comes equipped with enterprise management console capable of viewing each server across multiple platforms from one view. One console to manage all your Windows, Mac OS X, and Linux platforms. Unified Single Anti-Malware Scanner: • One scan with our single anti-virus client detects viruses, spyware and adware, suspicious files, suspicious behavior, unauthorized VoIP, IM, P2P, and gaming software - eliminating your reliance on separate standalone products. Sophos provides complete protection against Spyware and fully meets all industry requirements for Spyware protection as set by West Coast Labs (http://www.westcoastlabs.org). Integrated Application Control: • Sophos includes adware protection at no additional charge and ability to manage application policy from the console. Integrated Zero-Day Protection: • Unique Behavioral Genotype® Protection automatically guards against new and targeted threats by analyzing behavior before code executes. • Most effective Zero-Day protection in the industry (http://www.sophos.com/pressoffice/news/articles/2007/12/proactive-test.html). Synchronization with Active Directory: • Security policies are automatically enforced as new computers join your network. This eliminates the risk of unprotected computers compromising your security. NAC integrated: • Automatically check and fix managed computers Microsoft/Windows Update (patching), Service Packs, Sophos or Windows firewall, SAV: on, enabled, up to date, no malware or controlled apps • Control unmanaged computers Control access with agent or Microsoft DHCP, unmanaged computer assessment with web agent • Simple to manage – integrated with Enterprise Console o Pre-defined policies for managed and unmanaged computers o Integrated NAC agent deployment via Enterprise Console o Uses existing Enterprise Console groups
  • 3. Independent & Analyst Reviews ImageTrak Business IT Survey Ranks SOPHOS highest in customer satisfaction. Each security vendor was scored against five satisfaction criteria - quality of support, ease of integration, manageability, reliability and return on investment. Sophos was rated very highly throughout and was classed as either the No. 1 or No. 2 brand consistently ahead of key competitors, McAfee, Symantec and Trend Micro. Faster Response than Alternatives Independent analysis regularly shows that Sophos responds more quickly than other leading vendors. This is a great testament to our rapid response to virus outbreaks from our global network of integrated virus, spyware and spam analysis centers and the innovative proactive detection capabilities of our Genotype™ virus detection technology - True Alternative to Symantec and McAfee Sophos successfully intercepted 86% of the malware tested against prior to execution, compared to 43% for McAfee and 51% for Symantec. In addition, Sophos's run-time HIPS protection detected further malware samples at execution raising proactive detection of zero-day threats to an "impressive" 97% in Cascadia Labs' anti-virus tests.
  • 4. Leader in Zero-Day Protection Sophos detected more new unknown malware reported to the independent AVIEWS mailing list in a four month period than any other vendor. AVIEWS is the Anti-Virus Information & Early Warning System, an online community that shares information about breaking malware threats between anti-virus vendors, researchers, security experts, and system administrators. In the four month study Sophos was found to proactively detect 80% of all unknown malware reported to the mailing list, higher than any other vendor, compared to 50% for Microsoft, 35% for Symantec and 30% for McAfee.
  • 5. Gartner Magic Quadrant “Sophos…has a better understanding of business needs, particularly the need to provide return on investment for the buyer and to balance advanced features with low administration." Gartner's Magic Quadrant for Endpoint Protection Platforms is based on an assessment of a company's ability to execute and completeness of vision. According to Gartner, "Leaders demonstrate balanced progress and effort in all execution and vision categories. Their actions raise the competitive bar for all products in the market, and they can change the course of the industry." Gartner specifically identified the following strengths in Sophos as deserving of a position in the Leaders Quadrant: • Significantly improved and simple management, that gives a real time view from which actions can be immediately taken (e.g. force an update on all those computers). • Excellent integrated network access control (NAC) capability with the ability to monitor, assess and remediate competitive EPP clients (NAC will be available April 2008). • Roadmap commitments for data encryption, with basic media port controls already in place.
  • 6. What do licenses include? Free Home Use for Employees: • Sophos provides free home use for employees at no additional charge – customer responsible for home use support. 24/7/365 Engineer-Level Technical Support: • Access to frontline Sophos employed technical specialists 24x7x365 to provide multi-language support. Server Coverage: • Sophos will charge client price for server environment if servers do not exceed 25% of total licenses purchased. 29 Platform Coverage: • Sophos gives you access to 29 platforms – more operating systems then any other vendor in the market – at no additional cost. Free Upgrades and Maintenance: • All maintenance and upgrade pricing included over term of agreement.
  • 7. Benefits of Sophos transition services We have successfully engaged with some of the most recognized organizations in the world to meet their specific requirements and assure rapid, optimal deployment of Sophos products. Our expertise is delivered through standard or customized packages, provided on site or remotely, to ensure the maximum return on your investment. Sophos Endpoint Implementation: Designed to ensure optimal installation and configuration of Sophos endpoint solutions, this service package provides assistance with implementation. The service includes: • Product installation • Product training sessions • Skills transfer • Best practice tutorials for network and system security. • Removal of legacy anti-virus software can also be included in the service, if required, ensuring a rapid rollout of Sophos Anti-Virus while maintaining the security of your network. Customized transition plan: Our experts work with your security team to develop a plan for efficient deployment and upgrade of Sophos products with minimal impact on your network. Skills transfer: Your security team works alongside Sophos professionals to gain immediate experience of our industry- leading solutions and optimize administration and policy enforcement. Industry-leading expertise: Our consultants advise on threat prevention best practices, including compliance with email and endpoint security policies, and defense against unauthorized computers, malware, and spam. Maximum return on investment: Whether on site or remotely, a Sophos security expert assesses your network environment and selects the module or configuration that best suits your requirements.
  • 8. Sophos Premium Support Customers can select one of three support service options: Standard, Premium and Platinum. Standard Support is included in the license fee and is available 24 hours per day, 365 days per year to all Sophos customers. Premium Support and Platinum Support are available for an additional annual percentage fee based on the license cost. The deliverables included within each service option are outlined below, together with the levels of service, including target response and escalation times.