SlideShare une entreprise Scribd logo
1  sur  36
UTM meets Endpoint
Du Preez van Wyk
NetXactics – Sales Consultant
At a glance: Network Security Group
The Network Security Group of Sophos
(formerly Astaro) is Europe’s market leader
for Unified Threat Management (UTM).



    • The Astaro business was founded in
      2000 and is since 2011 part of Sophos
    • Constantly gaining market share
    • Common Criteria and ICSA
      certified products
    • Received more than 120
      product awards
    • Approximately 65.000 installations
    • Design and engineering
      made in Germany


3
Unified Threat Management
Internet threats on the increase




          Crackers   Botnets Spam Phishing     Scam Hoax    Viruses Spyware Gray ware
Intrusions Denial of Service Distributed    Denial of Service Ping floods   Eavesdropper Script
Kiddies     Espionage Malware Root kits Adware P2P File sharing Trojans Spit Bots Backdoors
     Buffer Overflows Hackers Malcode Bugs Key loggers Crime ware Pharming Competitors
         Exploits
Identity theft           DNS poisoning Snarf attacks Spam bots Spy bots Trap doors
War driving Ransomware ASCII bombs     Bluesnarfing Worms Decrypting Reverse engineering
                             Phreaking Port Scanning



 8
Network security solutions today
                              Cost   Time Investment

          Router
          Firewall
          IPS

          SSL VPN Gateway
          Email/Spam Filter
          Anti Virus Filter

          Web Filter

          WAN Link Balancer
          Load Balancer

          Total:



9
Modern IT-Security challenges (1)
Protect internet communication with office computers and servers




                                                                 Branch office
                                Internet
                                                     VPN




                       VPN




       Roadwarrior




                                                Central office



10
Modern IT-security challenges (2)
Protect communication with endpoints and endpoints itself




                                                                 Branch office
      Mobile user               Internet




       Roadwarrior




                                                Central office



11
Sophos UTM v9
Unified threat management appliances
Our all-in-one approach
Complete protection for your network




                                       Endpoint Security
                                       & Mobile Control
                                                                        Integration of
     Networking features                                             complete email, web
     for high availability                                           & network protection
      and load balancing




                                 Flexible Deployment

        VPN & wireless                   Software Appliance        Central, browser-based
          extensions                                               management & reporting
                                                                     of all applications
                                               Virtual Appliance


13
Security features
Enterprise-class security for small and mid-size businesses
                                     Endpoint
                                     Protection

                                     Device Control
                                     AntiVirus
     Wireless                                                     Network
     Protection                        optional                   Protection

     • Wireless Controller for    Essential                       •   IPS incl. MAPP
       Astaro Access Points       Firewall                        •   IPSec/SSL/RED VPN
     • Multi-Zone (SSID)                                          •   WAN Link Balancing
       support                    • Stateful Firewall             •   SSL Portal (HTML5)
     • Captive Portal/Voucher     • Network Address Translation
                                  • PPTP/L2TP Remote Access



     Web Server                                                   Web
     Protection                                                   Protection
                                                   optional

     • Reverse Proxy                                              • URL Filter
     • Web Application Firewall    Mail                           • Antivirus & Antispyware
     • Antivirus                   Protection                     • Application Control

                                   • Anti Spam & Phishing
                                   • Dual Virus Protection
                                   • E-Mail Encryption

14
Management made easy




     Intuitive Dashboard   Individual UserPortal   Comprehensive Reporting

15
Sophos UTM
     Hardware                                                                                                        Multiple
                      110/120    220              320             425             525               625
     Appliance                                                                                                       + RED




                       Small    Medium          Medium           Large           Large             Large         Large networks
     Environment
                      network   network         network         network         network           network          + branches


     Network ports      4         8                8           6 & 2 SFP      10 & 4 SFP         10 & 8 SFP           Multiple

     Max.
     recommended       10/80     300              800            1.500           3.500             5.000              10.000+
     firewall users
     Max.
     recommended       10/35      75              200             600            1.300             2.000               5.000
     UTM users

     Software
     Appliance *                               Runs on Intel-compatible PCs and servers


     Virtual                                     VMware Ready & Citrix Ready certified
     Appliance *                          Runs in Hyper-V, KVM, and other virtual environments




                                                                                                           *Pricing based #IPs/Users
16
Branch Office Security
Securely connect branch offices
Branch Office Security - challenges
Businesses with many small branch offices need an easy and affordable way to
connect them back to the headquarter location and keep their Internet access secure.




18
Available solutions

              Routers for private users




              Low-end UTM appliances




              MPLS and managed VPN services




19
Sophos RED
The easiest and most economic way to secure your branch offices in a few
minutes – without the need for technical personnel at the remote site!




20
Deployment scenario
Sophos Branch Office Security




21
Sophos Provisioning Service


3. Connect RED Device                                       1. Enter RED name & ID




          Remote Office                                      Central Office



                                      5. Establish Tunnel

       RED          Internet Router
                                                                 Sophos UTM


   Ship the RED without configuration
Sophos RED 10
Technical information


     •   Solid steel chassis
     •   No moving parts
     •   1 WAN port
     •   4-Port LAN switch
     •   1 USB 3G/UMTS modem port
     •   30 Mbit/s VPN-throughput
     •   <7 Watt power consumption
     •   Unrestricted users
     •   No buttons, no GUI




23
Wireless Protection
Secure wireless networks for businesses
Wireless networks – challenges
Businesses need an easy-to-use, secure and reliable possibility to integrate
wireless devices into their business networks.




25
Available solutions

              Access points for private users




              Low-end UTM appliances with integrated Wi-Fi




              Enterprise wireless solutions




26
Deployment scenarios
Sophos Wireless Protection




27
Easy installation



                                           Guest

                    Sophos UTM




                                 Finance
                    Internet




28
Hotspot aka Captive Portal
Secure Internet access for guests in companies, hotels & other typical hotspot areas

• Wireless and wired
• Operating-Modes
  • Disclaimer-Page
  • Password of the Day
  • Vouchers with time/data quota
  • Guest-Registration within the
    Enduser-Portal
• Customization of the Portal-Site
• Part of the Wireless Subscription

      #2 Feature Request on
      http://feature.astaro.com


                                                   29
Sophos Access Points
     AP 10                     AP 30
     • Up to 10 users          • Up to 30 users
     • 150 Mbit/s throughput   • 300 Mbit/s throughput
     • 1 x 10/100 Base TX      • 1 x 10/100 Base TX
     • IEEE 802.11 b/g/n       • IEEE 802.11 b/g/n
                               • Power over Ethernet (IEEE 802.3af)
     AP 50
     • Up to 50 users          AP 5
     • Dual-band/dual-radio    • Up to 7 users
     • 2.4Ghz and 5GHz         • USB Access Point
     • IEEE 802.11 a/b/g/n     • Wifi extension for RED10 rev.2/3
     • 300 Mbit/s throughput
     • PoE+ (IEEE 802.3at)


30
Additional Feature Examples
Always State-of-The-Art
Application Control aka Next Generation Firewall




               • Patterns for ~600 relevant applications
               • Deep Layer-7 inspection for true application
                 identification (Next Generation Firewall)
               • Unclassified application feedback
               • Complete control to block, allow, shape, and prioritize
               • Detailed real-time reporting and forensic history
               • Graphical flow-monitor shows everything as it happens
Clientless SSL VPN
HTML 5 VPN Portal

• Browser based VPN without additional
  software
• IE > v10, Firefox > v6, Google Chrome
• No Java / ActiveX or Flash!
• Applications:
     • Remote Desktop
     • VNC
     • Telnet
     • SSH
     • Webapp (HTTP / HTTPS)




           #1 Feature Request on http://feature.astaro.com
Endpoint Protection
Complete Security – Better Together!
UTM Endpoint Protection
Always connected and up-to-date – everywhere

      UTM 9.1
                                         Live Connect          Policies, Events,
                                            Service                 Updates


                                                                                   Branch Office
     Mobile User     Policies, Events,
                          Updates                   Policies
                                         Internet




      Roadwarrior




                                                          Central Office



                                                                 35
Endpoint Management




36
Sophos UTM 9 - Roadmap
2012                                                                         2013
Jan   Feb   Mar   Apr   May   Jun     Jul   Aug   Sep   Oct   Nov   Dec      Jan   Feb   Mar   Apr   May   Jun



                              UTM 9.0                          UTM 9.1                           UTM 9.2


UTM 9.0                             UTM 9.1                                   UTM 9.2

GUI in Sophos Design                Extended Endpoint Protection              Extended Endpoint Protection
SAV Integration                      • Web Filtering (policy sync.)            • App.Ctrl (client/UTM comm.)
UTM Endpoint Protection              • Client Firewall (policy sync.)          • Device & Media Encryption
 • Device Control                    • DLP                                     • VPN client
 • AV & HIPS                         • Full Disk Encryption
Clientless SSL VPN                   • MAC OS support                         TBA
Hotspot support                                                                • …
 • “Captive Portal”                 Extended Wireless Protection               .
                                     • Repeater, Wireless IDS,
                                       Rogue AP detection

                                    UTM Mobile Control
                                     • Remote Lock & Wipe
                                     • Central App. Mgmt.
                                     • Email Access Mgmt
                                                                        37
Conclusion
Sophos UTM v9


     Complete Security
       • UTM with the most comprehensive feature set on the market
       • UTM meets endpoint – full integration of endpoint security


     Without Complexity
       • Single intuitive GUI for all functionalities
       • Unique plug`n`play Wifi and VPN technology


     Let s cut the costs
       • All-In-One vs. bunch of point solutions
       • Tailor made subscription plan
       • “Keep things simple”

38
Thank you very much!
Questions?
Sophos UTM       Contact: dupreezvw@netxactics.co.za

Contenu connexe

Tendances

8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcommTien Hoang
 

Tendances (20)

8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 

En vedette

Todos juntos transformamos nuestro medio natural
Todos juntos transformamos nuestro medio naturalTodos juntos transformamos nuestro medio natural
Todos juntos transformamos nuestro medio naturaldec-admin
 
261. el tráfico y sus repercusiones ambientales
261. el tráfico y sus repercusiones ambientales261. el tráfico y sus repercusiones ambientales
261. el tráfico y sus repercusiones ambientalesdec-admin
 
291. el lugar que soñe
291. el lugar que soñe291. el lugar que soñe
291. el lugar que soñedec-admin
 
157. colegio independencia en acción
157. colegio independencia en acción157. colegio independencia en acción
157. colegio independencia en accióndec-admin
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Mi jardín de colores
Mi jardín de coloresMi jardín de colores
Mi jardín de coloresdec-admin
 
481. ecología
481. ecología481. ecología
481. ecologíadec-admin
 
апк контроль
апк контрольапк контроль
апк контрольswatchel
 
Stimulation of recreational consumers to visit downtown shopping centers
Stimulation of recreational consumers to visit downtown shopping centersStimulation of recreational consumers to visit downtown shopping centers
Stimulation of recreational consumers to visit downtown shopping centersPeter Raijmakers
 
422. las hormigas tambien diseñan el cambio
422. las hormigas tambien diseñan el cambio422. las hormigas tambien diseñan el cambio
422. las hormigas tambien diseñan el cambiodec-admin
 
52. mermeladas divertidas
52. mermeladas divertidas52. mermeladas divertidas
52. mermeladas divertidasdec-admin
 
Music class organization and management from mb2music
Music class organization and management from mb2musicMusic class organization and management from mb2music
Music class organization and management from mb2musicmb2music
 
Case film about the social advertising campaign
Case film about the social advertising campaignCase film about the social advertising campaign
Case film about the social advertising campaignsocreklama
 
Reciclando para mejorar el aspecto de nuestra escuela
Reciclando para mejorar el aspecto de nuestra escuelaReciclando para mejorar el aspecto de nuestra escuela
Reciclando para mejorar el aspecto de nuestra escueladec-admin
 
iPads in ASC at CCHS
iPads in ASC at CCHSiPads in ASC at CCHS
iPads in ASC at CCHSmaryottenwess
 
Off to Mumbai!
Off to Mumbai!Off to Mumbai!
Off to Mumbai!mb2music
 
As juegos para la escuela
As juegos para la escuelaAs juegos para la escuela
As juegos para la escueladec-admin
 

En vedette (20)

Anm booklet for vitamin a
Anm booklet for vitamin aAnm booklet for vitamin a
Anm booklet for vitamin a
 
Todos juntos transformamos nuestro medio natural
Todos juntos transformamos nuestro medio naturalTodos juntos transformamos nuestro medio natural
Todos juntos transformamos nuestro medio natural
 
261. el tráfico y sus repercusiones ambientales
261. el tráfico y sus repercusiones ambientales261. el tráfico y sus repercusiones ambientales
261. el tráfico y sus repercusiones ambientales
 
291. el lugar que soñe
291. el lugar que soñe291. el lugar que soñe
291. el lugar que soñe
 
157. colegio independencia en acción
157. colegio independencia en acción157. colegio independencia en acción
157. colegio independencia en acción
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Mi jardín de colores
Mi jardín de coloresMi jardín de colores
Mi jardín de colores
 
481. ecología
481. ecología481. ecología
481. ecología
 
Sección 2. unidad 8 corregida
Sección 2. unidad 8 corregidaSección 2. unidad 8 corregida
Sección 2. unidad 8 corregida
 
апк контроль
апк контрольапк контроль
апк контроль
 
Stimulation of recreational consumers to visit downtown shopping centers
Stimulation of recreational consumers to visit downtown shopping centersStimulation of recreational consumers to visit downtown shopping centers
Stimulation of recreational consumers to visit downtown shopping centers
 
422. las hormigas tambien diseñan el cambio
422. las hormigas tambien diseñan el cambio422. las hormigas tambien diseñan el cambio
422. las hormigas tambien diseñan el cambio
 
52. mermeladas divertidas
52. mermeladas divertidas52. mermeladas divertidas
52. mermeladas divertidas
 
Music class organization and management from mb2music
Music class organization and management from mb2musicMusic class organization and management from mb2music
Music class organization and management from mb2music
 
Case film about the social advertising campaign
Case film about the social advertising campaignCase film about the social advertising campaign
Case film about the social advertising campaign
 
Reciclando para mejorar el aspecto de nuestra escuela
Reciclando para mejorar el aspecto de nuestra escuelaReciclando para mejorar el aspecto de nuestra escuela
Reciclando para mejorar el aspecto de nuestra escuela
 
iPads in ASC at CCHS
iPads in ASC at CCHSiPads in ASC at CCHS
iPads in ASC at CCHS
 
249. ecolim
249. ecolim249. ecolim
249. ecolim
 
Off to Mumbai!
Off to Mumbai!Off to Mumbai!
Off to Mumbai!
 
As juegos para la escuela
As juegos para la escuelaAs juegos para la escuela
As juegos para la escuela
 

Similaire à Sophos utm-roadshow-south africa-2012

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edgeitnewsafrica
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowNetFlow Analyzer
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)subtitle
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 

Similaire à Sophos utm-roadshow-south africa-2012 (20)

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Mcafee ips nsp-2011
Mcafee ips  nsp-2011Mcafee ips  nsp-2011
Mcafee ips nsp-2011
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
S series presentation
S series presentationS series presentation
S series presentation
 
1. introduzione a TMG
1. introduzione a TMG1. introduzione a TMG
1. introduzione a TMG
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 

Sophos utm-roadshow-south africa-2012

  • 1. UTM meets Endpoint Du Preez van Wyk NetXactics – Sales Consultant
  • 2.
  • 3. At a glance: Network Security Group The Network Security Group of Sophos (formerly Astaro) is Europe’s market leader for Unified Threat Management (UTM). • The Astaro business was founded in 2000 and is since 2011 part of Sophos • Constantly gaining market share • Common Criteria and ICSA certified products • Received more than 120 product awards • Approximately 65.000 installations • Design and engineering made in Germany 3
  • 5. Internet threats on the increase Crackers Botnets Spam Phishing Scam Hoax Viruses Spyware Gray ware Intrusions Denial of Service Distributed Denial of Service Ping floods Eavesdropper Script Kiddies Espionage Malware Root kits Adware P2P File sharing Trojans Spit Bots Backdoors Buffer Overflows Hackers Malcode Bugs Key loggers Crime ware Pharming Competitors Exploits Identity theft DNS poisoning Snarf attacks Spam bots Spy bots Trap doors War driving Ransomware ASCII bombs Bluesnarfing Worms Decrypting Reverse engineering Phreaking Port Scanning 8
  • 6. Network security solutions today Cost Time Investment Router Firewall IPS SSL VPN Gateway Email/Spam Filter Anti Virus Filter Web Filter WAN Link Balancer Load Balancer Total: 9
  • 7. Modern IT-Security challenges (1) Protect internet communication with office computers and servers Branch office Internet VPN VPN Roadwarrior Central office 10
  • 8. Modern IT-security challenges (2) Protect communication with endpoints and endpoints itself Branch office Mobile user Internet Roadwarrior Central office 11
  • 9. Sophos UTM v9 Unified threat management appliances
  • 10. Our all-in-one approach Complete protection for your network Endpoint Security & Mobile Control Integration of Networking features complete email, web for high availability & network protection and load balancing Flexible Deployment VPN & wireless Software Appliance Central, browser-based extensions management & reporting of all applications Virtual Appliance 13
  • 11. Security features Enterprise-class security for small and mid-size businesses Endpoint Protection  Device Control  AntiVirus Wireless Network Protection optional Protection • Wireless Controller for Essential • IPS incl. MAPP Astaro Access Points Firewall • IPSec/SSL/RED VPN • Multi-Zone (SSID) • WAN Link Balancing support • Stateful Firewall • SSL Portal (HTML5) • Captive Portal/Voucher • Network Address Translation • PPTP/L2TP Remote Access Web Server Web Protection Protection optional • Reverse Proxy • URL Filter • Web Application Firewall Mail • Antivirus & Antispyware • Antivirus Protection • Application Control • Anti Spam & Phishing • Dual Virus Protection • E-Mail Encryption 14
  • 12. Management made easy Intuitive Dashboard Individual UserPortal Comprehensive Reporting 15
  • 13. Sophos UTM Hardware Multiple 110/120 220 320 425 525 625 Appliance + RED Small Medium Medium Large Large Large Large networks Environment network network network network network network + branches Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple Max. recommended 10/80 300 800 1.500 3.500 5.000 10.000+ firewall users Max. recommended 10/35 75 200 600 1.300 2.000 5.000 UTM users Software Appliance * Runs on Intel-compatible PCs and servers Virtual VMware Ready & Citrix Ready certified Appliance * Runs in Hyper-V, KVM, and other virtual environments *Pricing based #IPs/Users 16
  • 14. Branch Office Security Securely connect branch offices
  • 15. Branch Office Security - challenges Businesses with many small branch offices need an easy and affordable way to connect them back to the headquarter location and keep their Internet access secure. 18
  • 16. Available solutions Routers for private users Low-end UTM appliances MPLS and managed VPN services 19
  • 17. Sophos RED The easiest and most economic way to secure your branch offices in a few minutes – without the need for technical personnel at the remote site! 20
  • 18. Deployment scenario Sophos Branch Office Security 21
  • 19. Sophos Provisioning Service 3. Connect RED Device 1. Enter RED name & ID Remote Office Central Office 5. Establish Tunnel RED Internet Router Sophos UTM Ship the RED without configuration
  • 20. Sophos RED 10 Technical information • Solid steel chassis • No moving parts • 1 WAN port • 4-Port LAN switch • 1 USB 3G/UMTS modem port • 30 Mbit/s VPN-throughput • <7 Watt power consumption • Unrestricted users • No buttons, no GUI 23
  • 21. Wireless Protection Secure wireless networks for businesses
  • 22. Wireless networks – challenges Businesses need an easy-to-use, secure and reliable possibility to integrate wireless devices into their business networks. 25
  • 23. Available solutions Access points for private users Low-end UTM appliances with integrated Wi-Fi Enterprise wireless solutions 26
  • 25. Easy installation Guest Sophos UTM Finance Internet 28
  • 26. Hotspot aka Captive Portal Secure Internet access for guests in companies, hotels & other typical hotspot areas • Wireless and wired • Operating-Modes • Disclaimer-Page • Password of the Day • Vouchers with time/data quota • Guest-Registration within the Enduser-Portal • Customization of the Portal-Site • Part of the Wireless Subscription #2 Feature Request on http://feature.astaro.com 29
  • 27. Sophos Access Points AP 10 AP 30 • Up to 10 users • Up to 30 users • 150 Mbit/s throughput • 300 Mbit/s throughput • 1 x 10/100 Base TX • 1 x 10/100 Base TX • IEEE 802.11 b/g/n • IEEE 802.11 b/g/n • Power over Ethernet (IEEE 802.3af) AP 50 • Up to 50 users AP 5 • Dual-band/dual-radio • Up to 7 users • 2.4Ghz and 5GHz • USB Access Point • IEEE 802.11 a/b/g/n • Wifi extension for RED10 rev.2/3 • 300 Mbit/s throughput • PoE+ (IEEE 802.3at) 30
  • 29. Application Control aka Next Generation Firewall • Patterns for ~600 relevant applications • Deep Layer-7 inspection for true application identification (Next Generation Firewall) • Unclassified application feedback • Complete control to block, allow, shape, and prioritize • Detailed real-time reporting and forensic history • Graphical flow-monitor shows everything as it happens
  • 30. Clientless SSL VPN HTML 5 VPN Portal • Browser based VPN without additional software • IE > v10, Firefox > v6, Google Chrome • No Java / ActiveX or Flash! • Applications: • Remote Desktop • VNC • Telnet • SSH • Webapp (HTTP / HTTPS) #1 Feature Request on http://feature.astaro.com
  • 32. UTM Endpoint Protection Always connected and up-to-date – everywhere UTM 9.1 Live Connect Policies, Events, Service Updates Branch Office Mobile User Policies, Events, Updates Policies Internet Roadwarrior Central Office 35
  • 34. Sophos UTM 9 - Roadmap 2012 2013 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun UTM 9.0 UTM 9.1 UTM 9.2 UTM 9.0 UTM 9.1 UTM 9.2 GUI in Sophos Design Extended Endpoint Protection Extended Endpoint Protection SAV Integration • Web Filtering (policy sync.) • App.Ctrl (client/UTM comm.) UTM Endpoint Protection • Client Firewall (policy sync.) • Device & Media Encryption • Device Control • DLP • VPN client • AV & HIPS • Full Disk Encryption Clientless SSL VPN • MAC OS support TBA Hotspot support • … • “Captive Portal” Extended Wireless Protection . • Repeater, Wireless IDS, Rogue AP detection UTM Mobile Control • Remote Lock & Wipe • Central App. Mgmt. • Email Access Mgmt 37
  • 35. Conclusion Sophos UTM v9 Complete Security • UTM with the most comprehensive feature set on the market • UTM meets endpoint – full integration of endpoint security Without Complexity • Single intuitive GUI for all functionalities • Unique plug`n`play Wifi and VPN technology Let s cut the costs • All-In-One vs. bunch of point solutions • Tailor made subscription plan • “Keep things simple” 38
  • 36. Thank you very much! Questions? Sophos UTM Contact: dupreezvw@netxactics.co.za

Notes de l'éditeur

  1. Letsstartwithsome quick overviewabou Sophos:
  2. As you can see different businesses trust the protection of Astaro. You find global brands as well as thousands of mid size companies
  3. The ASG product line covers models for small networks and remote locations with up to 10 users to large networks with up to 5000 users.As opposed to other UTM solutions, Astaro software can be also installed on your own servers.The same set of security applications, including features such as Active/Active Clustering, WAN Uplink Balancing or Active Directory Integration, is available on all Astaro Security Gateway models - no matter if the hardware, software or virtual appliance is deployed.Furthermore, every hardware appliance contains an integrated hard drive for local spam quarantine and log/reporting information. Therefore, even the smallest remote office can get the same protection as a company&apos;s central office - without compromise.The ASG 525 and 625 models offer the highest availability through a redundant hard drive and power supply.
  4. Astaro Wireless Security is a new approach, which serves to simplify the secure and reliable availability of WLAN environments. The integrated wireless controller in the ASG ensures that the affordable Access Points do not require any manual configuration. Astaro Access Points can be positioned anywhere in the office and offer a strong WLAN signal all over the office - the placement behind an Astaro RED is also possible, WLAN access for guests is also available in minutes and many clients can also be protected through the UTM security of the central ASG.
  5. 9.2 SynchronisationderApplicationControl zwischen V9 und Endpoint -- gibt es heute noch nicht -&gt; V9 fragt beim Client nach, welche App einen bestimmten netflow erzeugt -- Zusammenarbeit mit Sophos Labs eröffnet unerahnte MöglichkeitenVPN client im Endpoint Client enthaltenMobile Control: iOS und Android
  6. Summary