With the proliferation of mobility, users everywhere are using everything. This leads to more threats, unmanaged data and complex security solutions that slow down users. Learn how Sophos Complete Security eliminates complexity by protecting endpoints, network, web, email and mobile devices – all in one license.
2. We’refocused on protecting you
What’s the problem with IT security today?
Data
Threats everywhere, regu
changing, still lations growing
increasing
Users
everywhere, usin
g everything
3. We do IT security
Because you’ve got enough to worry about
Complete Without
Active Protection
Security Complexity
Wherever Quicker to Our unique
the user is, setup, maintai approach for
what ever n and solve better
they use problems protection you
can actually
deploy
5. Complete security
Endpoint Web Email Data Mobile Network
Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working
URL Filtering Web Application Endpoint Web Encryption Data Control Access control Automation WiFi security
Firewall Protection for cloud
Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help
Application Mobile app Clean up Technical
Device Control Secure branch Intrusion Firewall
Control security support
offices prevention
Encryption Live Protection Email
encryption
6. Active Protection
Our unique approach for better protection with less complexity
Endpoint Web Email Data Mobile Network
7. Complete but not complex
Defence in depth that you can actually deploy
Reduce the attack
surface
Protect everywhere
Stop attacks and
breaches
Keep people working
8. Example: Fake antivirus
Delivering complete protection from a rampant threat
Endpoint
URL Filtering Endpoint Web
Protection
Web
Web Application Live Protection
Firewall
Email
Complete
Security
Visibility Anti-malware
Data
Patch
Clean up
Manager
Mobile
Network
9. Example: Data loss
Protecting personal information and sensitive data
Endpoint
Encryption Mobile Control
Web
Encryption
Application for cloud
Control
Email
Complete
Security
Local self-help Data Control
Data
Automation User education
Mobile
Network
10. Completing the vision
Integrating Astaro Network Security
Astaro Secure Gateway Sophos Endpoint
Active Protection Managed in Astaro Secure
• Anti malware Gateway
• Web reputation checking • Application Control
• Anti spam • Client Firewall
• Full Disk Encryption
Data features • Device and media Encryption
• SPX Email Encryption • Manage Sophos Endpoint clients
• Data control for web and email • Anti malware
• Device Control
• Web Protection
11. Complete Security
Data Web Endpoint UTM Fullguard + Endpoint Sophos
Complete
Protection Protection Protection – UTM Endpoint Protection - Anti-Virus
Security Suite
Suite Suite Advanced (UTM 9) Business Business
AV/HIP/Live Protection
Client Firewall
Application Control
Device Control
Web Filtering in Endpoint
DLP, NAC, Patch
Web Gateway
Email Gateway
Full-Disk Encryption
Mobile
UTM FullGuard*
SharePoint, Ex Exchange Exchange Exchange Exchange
Groupware change
Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux, Win Win, Mac, Linux,
Platforms VM, EMC Win, Mac, VM,
Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC
*UTM FullGuard includes network, web, email, wireless and webserver protection
12. Why do more with Sophos?
You’ll get better threat and data protection more simply, and more cost effectively
Complete security that works better together
Defense in depth you can actually deploy
You’ll also see the benefits of consolidating your security vendors:
– Consolidated licensing costs
– One trusted partner for support
Complete Without
Active Protection
Security Complexity
13. Start with a Softchoice Assessment
Softchoice Mobility Techcheck Assessment
– determine how many mobile devices (iOS, Android, Windows Mobile)
are accessing your corporate network
– show the overall usage of these devices including the number of
attachments they contain, email sent, and search patterns.
• Catalog mobility devices using Softchoice’s
Discovery proprietary discovery tools
Analysis • Subject matter experts evaluate data sets
Cloud
Application • Review risks and remediation
Discovery
Consultation • Structured whiteboarding session to define
and Report next steps
14. The Softchoice Team is Ready to Help
Softchoice has a team of Solution Architects that will work
with your organization to map out the solutions that fit best
in your environment
We have in-house Sophos technical architects that work
with you to plan and manage your consolidation project –
providing information on product, licensing and services
We offer professional services including implementations,
consulting and training
15. To learn more visit
www.softchoice.com/brands/sophos/
Notes de l'éditeur
Today there’s data everywhere. It might be your businesses own or even personal information about your customers and employees. Whatever it is, your people need to access it, work with it and share it. And you need to keep it safe.Reduce the attack surfaceAccording to research 86% of IT professionals say that their business has lost a laptop or hard disk carrying corporate data. Encrypting is the easiest way to make sure that if a device goes missing that data is still secure. We can also help you make sure that risky applications you haven’t approved aren’t being installed on machines. Protect EverywhereThe explosion in mobile working and superfast connections wherever we are mean that securing data at every point is a priority. That’s why we let you set security policies for the latest mobile devices and remote lock or wipe them if they go missing. And very soon we’ll be able to offer complete security for files uploaded and accessed from the cloud, whether from PCs or mobile devices. Stop attacks and breachesWe give you data control solutions that you can actually implement. These policies can be enforced from the endpoint and the email gateway, so you can easily make sure that data exiting your network is audited and controlled. And as a Sophos customer you also get easy access to our data protection expertise to help your users understand why it’s important. Keep people workingWe think that having effective data protection shouldn’t be at the expense of keeping your users working day to day. So we make accessing encrypted laptops easy and familiar for them. And if a user sends an email with confidential data in it you don’t always have to block it, we can seamlessly encrypt that email at the gateway. Delivering an easy password protected pdf at the other end.
Our combination with Astaro means we’re now able bring complete security to Unified Threat Management too. We’re moving beyond a simple antivirus plugin to offer Active Protection inside a full range of web, email and network solutions. And we’re making threat management truly unified by letting you manage your Sophos Endpoint clients from inside the Astaro security gateway.