SlideShare une entreprise Scribd logo
1  sur  13
Complete Security
We’re focused on protecting you
What’s the problem with IT security today?




                                                     Data
                            Threats              everywhere,
                         changing, still         regulations
                          increasing               growing



                                          Users
                                       everywhere,
                                          using
                                        everything
We do IT security
Because you’ve got enough to worry about




                        Complete             Without         Active
                        Security            Complexity     Protection


                      Wherever             Quicker to     Our unique
                      the user is,         setup,         approach for
                      what ever            maintain and   better
                      they use             solve          protection you
                                           problems       can actually
                                                          deploy




3
Complete security

                     Endpoint



           Network              Web




         Mobile                  Email




                      Data




4
Complete security

      Endpoint                      Web                       Email                 Data                         Mobile                 Network




Reduce attack surface                     Protect everywhere                 Stop attacks and breaches                    Keep people working




 URL Filtering    Web Application         Endpoint Web      Encryption           Data Control   Access control            Automation     WiFi security
                     Firewall              Protection        for cloud



   Anti-spam      Patch Manager           Mobile Control    Virtualization       Anti-malware   User education             Visibility   Local self-help




                    Application                              Mobile app                                                    Clean up        Technical
 Device Control                           Secure branch                           Intrusion        Firewall
                     Control                                  security                                                                      support
                                             offices                              prevention




   Encryption                             Live Protection                           Email
                                                                                  encryption
Active Protection
Our unique approach for better protection with less complexity




  Endpoint        Web           Email          Data         Mobile   Network
Complete but not complex
Defense in depth that you can actually deploy


                                                Reduce the attack
                                                surface




                                                 Protect everywhere




                                                Stop attacks and
                                                breaches




                                                Keep people working
Example: Fake antivirus
Delivering complete protection from a rampant threat



Endpoint



                       URL Filtering                   Endpoint Web
                                                        Protection
  Web

                      Web Application                  Live Protection
                         Firewall
                                        Complete
  Email
                                        Security
                         Visibility                    Anti-malware


  Data

                        Clean up                          Patch
                                                         Manager




 Mobile




 Network
Example: Data loss
Protecting personal information and sensitive data



Endpoint


                        Encryption                    Mobile Control

  Web
                                                       Encryption
                        Application                     for cloud
                         Control

                                         Complete
  Email
                                         Security

                       Local self-help                 Data Control

  Data

                        Automation                   User education




 Mobile




 Network
Completing the vision
Integrating Astaro Network Security


   Astaro Secure Gateway              Sophos Endpoint
   Active Protection                  Managed in Astaro Secure
   • Anti malware                     Gateway
   • Web reputation checking          • Application Control
   • Anti spam                        • Client Firewall
                                      • Full Disk Encryption
   Data features                      • Device and media Encryption
   • SPX Email Encryption             • Manage Sophos Endpoint clients
   • Data control for web and email   • Anti malware
                                      • Device Control
                                      • Web Protection
Complete Security
                                 Complete            Data              Web             Endpoint           UTM Fullguard +     Endpoint            Sophos
                                 Security         Protection        Protection        Protection –         UTM Endpoint      Protection -        Anti-Virus
                                   Suite            Suite              Suite           Advanced              (UTM 9)          Business           Business

     AV/HIP/Live Protection
                                                                                                                                             
     Client Firewall
                                                                                                                                              
     Application Control
                                                                                                                                              
     Device Control
                                                                                                                             
     Web Filtering in Endpoint
                                                                                                                              
     DLP, NAC, Patch
                                                                                          
     Web Gateway
                                                                        
     Email Gateway
                                                       
     Full-Disk Encryption
                                                       
     Mobile
                                      
     UTM FullGuard*
                                                                                                               
                                  SharePoint,       Exchange          Exchange           Exchange                             Exchange
     Groupware                     Exchange

                                 Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux,    Win, Mac, Linux,        Win          Win, Mac, Linux,
     Platforms                                                                                                                 VM, EMC         Win, Mac, VM,
                                 Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC             Unix, VM, EMC



11             *UTM FullGuard includes network, web, email, wireless and webserver protection
Why do more with Sophos?
You’ll get better threat and data protection more simply, and more cost effectively


• Complete security that works better together
• Defense in depth you can actually deploy

You’ll also see the benefits of consolidating your security vendors:

• Consolidated licensing costs
• One trusted partner for support



               Complete              Without                Active
               Security             Complexity            Protection
www.sophos.com

Contenu connexe

Tendances

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
VCW Security Ltd
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
Fedora Leo
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
Soap MacTavish
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
Baqar kazmi
 

Tendances (20)

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 

En vedette

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
Milan Petrásek
 

En vedette (8)

2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 

Similaire à Complete Security

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
Zeeshan Humayun
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Private Cloud
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
Webroot
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
Andris Soroka
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 

Similaire à Complete Security (20)

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Ds nsa series_4500
Ds nsa series_4500Ds nsa series_4500
Ds nsa series_4500
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Information Security
Information SecurityInformation Security
Information Security
 

Plus de Sophos

When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
Sophos
 

Plus de Sophos (6)

2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Complete Security

  • 2. We’re focused on protecting you What’s the problem with IT security today? Data Threats everywhere, changing, still regulations increasing growing Users everywhere, using everything
  • 3. We do IT security Because you’ve got enough to worry about Complete Without Active Security Complexity Protection Wherever Quicker to Our unique the user is, setup, approach for what ever maintain and better they use solve protection you problems can actually deploy 3
  • 4. Complete security Endpoint Network Web Mobile Email Data 4
  • 5. Complete security Endpoint Web Email Data Mobile Network Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working URL Filtering Web Application Endpoint Web Encryption Data Control Access control Automation WiFi security Firewall Protection for cloud Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help Application Mobile app Clean up Technical Device Control Secure branch Intrusion Firewall Control security support offices prevention Encryption Live Protection Email encryption
  • 6. Active Protection Our unique approach for better protection with less complexity Endpoint Web Email Data Mobile Network
  • 7. Complete but not complex Defense in depth that you can actually deploy Reduce the attack surface Protect everywhere Stop attacks and breaches Keep people working
  • 8. Example: Fake antivirus Delivering complete protection from a rampant threat Endpoint URL Filtering Endpoint Web Protection Web Web Application Live Protection Firewall Complete Email Security Visibility Anti-malware Data Clean up Patch Manager Mobile Network
  • 9. Example: Data loss Protecting personal information and sensitive data Endpoint Encryption Mobile Control Web Encryption Application for cloud Control Complete Email Security Local self-help Data Control Data Automation User education Mobile Network
  • 10. Completing the vision Integrating Astaro Network Security Astaro Secure Gateway Sophos Endpoint Active Protection Managed in Astaro Secure • Anti malware Gateway • Web reputation checking • Application Control • Anti spam • Client Firewall • Full Disk Encryption Data features • Device and media Encryption • SPX Email Encryption • Manage Sophos Endpoint clients • Data control for web and email • Anti malware • Device Control • Web Protection
  • 11. Complete Security Complete Data Web Endpoint UTM Fullguard + Endpoint Sophos Security Protection Protection Protection – UTM Endpoint Protection - Anti-Virus Suite Suite Suite Advanced (UTM 9) Business Business AV/HIP/Live Protection        Client Firewall       Application Control       Device Control       Web Filtering in Endpoint      DLP, NAC, Patch     Web Gateway   Email Gateway   Full-Disk Encryption   Mobile  UTM FullGuard*  SharePoint, Exchange Exchange Exchange Exchange Groupware Exchange Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux, Win Win, Mac, Linux, Platforms VM, EMC Win, Mac, VM, Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC 11 *UTM FullGuard includes network, web, email, wireless and webserver protection
  • 12. Why do more with Sophos? You’ll get better threat and data protection more simply, and more cost effectively • Complete security that works better together • Defense in depth you can actually deploy You’ll also see the benefits of consolidating your security vendors: • Consolidated licensing costs • One trusted partner for support Complete Without Active Security Complexity Protection

Notes de l'éditeur

  1. Hello, we’re Sophos. And we take a different approach to protecting your IT and data. We want to make sure you get complete security without having to work too hard.
  2. We see that there are three main problems making IT security more difficult today:Threats like fakeAV are still getting through defensesData is still getting lost on disks, laptops and via email. At the same time your IT infrastructure is getting more complex with users on mobile devices, using home computers, in satellite offices - all using data and services in the cloud, as well as behind your firewall.Too often the onus is put on the IT teamto address all these risks. This means you buy, configure and manage multiple security software and hardware solutions that let you deal with the aftermath of defenses being breached. You also have to solve new security problems as they emerge, often by buying and deploying even more new products. What you need is complete security from a vendor you trust.
  3. Stopping threats and protecting your data is what we do. And we believe our job is to do that comprehensively, without making your job more complicated. This is our mantra: Complete Security, Without Complexity, Active protection.What we do, How we do it, How we do it better.Complete security isabout taking care of yourprotection at every stagewithout it having to be complicated..
  4. That’s why we give you solutions for every part of your business. Endpoint, Network, Data, Email, Web and Mobile. We protect them all. So your users and data are protected wherever they are and whatever they use.
  5. Complete security means we don’t just detect threats, we:Reduce the attack surface – We address the things that bring risk like vulnerabilities and applications.Protect everywhere – We make sure your users are protected wherever they are and whatever device they’re using.Stop attacks and breaches – Of course we can detect and prevent threats and data loss. But we’ve moved beyond signatures with innovations like live protection, which means we can stop new threats instantly.Crucially, we Keep people working – Both your users and the IT team. We engineer our products to simplify the tasks that take too much time today, like cleaning up infections and recovering forgotten passwords. So, as the threat and the ways that we use IT for work evolve, so does your protection. We stay on top of them, to simply give you all you need to stay secure. We engineer our products to work better together. And we look for opportunities to unify endpoint agents, gateway defenses, security policies and intelligence so it’s even easier.Agents – for every device, combining security to maximise protection and performanceAt the Gateway – virtual or hardware appliances and software options that match your protection priorities and sizeThroughPolicies - We let you create a policy once, and apply it anywhere to give you consistent protection and user experienceFrom our Labs - our experts have visibility of all aspects of security threats and use that expertise to actively fine-tune your protection for you and deliver instantly from the cloud
  6. We don’t want using all this great technology to be difficult. That’s why we’re doing the hard work. A good example is our HIPs solution which gives you everything we know about how malicious files are constructed and behave and identifies them for you. You don’t have to construct a complex policy, you just tick a box to get it working. And our active protection is truly unified. Identifying and protecting against every type of threat and delivered to the engine that powers all of our products, whether at the endpoint, gateway or across the network.
  7. So what do you need to do? All of us at Sophos work hard to make sure that these features are easy to deploy. So you’re being protected straight away. Like a simple interface for filtering web access, with a single policy for endpoint and gateway.Our R.E.D, remote ethernet device means that even your smallest remote offices can be instantly secured, without having to send one of your engineers on site to set it up.Data control that lets you choose from a list of the most up to date content types, as well as sorting by regions or specific data regulationsAnd an easy user interface to make sure forgotten passwords aren’t your problem any more, users can help themselves.
  8. Let’s look at some examples. Fake antivirus is one of the most recognisable and widespread threats in the wild today. But this certainly doesn’t mean you should waste your time worrying about how it might affect users in your business. Our solutions are working together at every step to make sure they don’t get infected. Reduce the attack surfaceFirstly we want to make sure you don’t become another statistic. Lots of the websites that host fake antivirus are legitimate ones that haven’t been properly secured, so we reduce the attack surface on your servers with our web application firewall. And you can also secure browsing by filtering sites and content accessed through your web gateway. Protect EverywhereIf your users are mobile and not connected to your own internet gateway you still want to know they’re protected, we make sure by providing security in the cloud, checking any site they visit against a list of the ones we know are bad. And very soon all of the capabilities in our web gateway software will be unified with the endpoint, so wherever the user is you can guarantee they’re browsing safely. Stop attacks and breachesIf the website is only recently infected and users can still browse to it our intelligent anti malware engine can scan the scripts running inside the site and stop the threat from there too, before anything’s saved locally to the computer. And with our threat intelligent patch assessment feature instead of seeing a daunting list of the ones that are available, you’ll soon be able to know which you actually need to apply to stay protected. It’s patching for the real world.Keep people workingWe don’t pretend that we block 100% of all the threats out there. So if the worst happens we make sure that our products help you identify infected computers and deal with them quickly. Sometimes it’s the small things that make the difference so we make sure you can get from opening our console to finding infected endpoints in just one click. That means you spend less time reacting, and your users are productive again more quickly.
  9. Today there’s data everywhere. It might be your businesses own or even personal information about your customers and employees. Whatever it is, your people need to access it, work with it and share it. And you need to keep it safe.Reduce the attack surfaceAccording to research 86% of IT professionals say that their business has lost a laptop or hard disk carrying corporate data. Encrypting is the easiest way to make sure that if a device goes missing that data is still secure. We can also help you make sure that risky applications you haven’t approved aren’t being installed on machines. Protect EverywhereThe explosion in mobile working and superfast connections wherever we are mean that securing data at every point is a priority. That’s why we let you set security policies for the latest mobile devices and remote lock or wipe them if they go missing. And very soon we’ll be able to offer complete security for files uploaded and accessed from the cloud, whether from PCs or mobile devices. Stop attacks and breachesWe give you data control solutions that you can actually implement. These policies can be enforced from the endpoint and the email gateway, so you can easily make sure that data exiting your network is audited and controlled. And as a Sophos customer you also get easy access to our data protection expertise to help your users understand why it’s important. Keep people workingWe think that having effective data protection shouldn’t be at the expense of keeping your users working day to day. So we make accessing encrypted laptops easy and familiar for them. And if a user sends an email with confidential data in it you don’t always have to block it, we can seamlessly encrypt that email at the gateway. Delivering an easy password protected pdf at the other end.
  10. Our combination with Astaro means we’re now able bring complete security to Unified Threat Management too. We’re moving beyond a simple antivirus plugin to offer Active Protection inside a full range of web, email and network solutions. And we’re making threat management truly unified by letting you manage your Sophos Endpoint clients from inside the Astaro security gateway.
  11. We hope you can see how complete security helps you at every point in the the threat lifecycle. And is engineered so you can actually use it. But there are other advantages too, like multi product discounts and unrivalled technical support from a single point.
  12. To find out more about us visit www.sophos.com, thanks for listening.