utm - the complete security box

25
Sophos UTM: The Complete Security Box

Upload: sophos

Post on 14-May-2015

1.199 views

Category:

Technology


3 download

DESCRIPTION

This presentation focuses on the features of Sophos UTM that give you complete security, without complexity. UTM provides security solutions for every part of your business. Endpoint, Network, Data, Email, Web and Mobile. Find out more about Sophos UTM here: http://bit.ly/ULoBZV

TRANSCRIPT

Page 1: UTM - The Complete Security Box

Sophos UTM: The Complete Security Box

Page 2: UTM - The Complete Security Box

Threats changing,

still increasing

Data everywhere, regulations

growing

Users everywhere,

using everything

We’re focused on protecting you

Page 3: UTM - The Complete Security Box

IT security sprawl

Router FirewallIntrusion prevention SSL VPN Gateway

Spam filter Gateway antivirus

Web filterWAN link balancer Load balancer

Endpoint protection

Page 4: UTM - The Complete Security Box

Complete SecurityBecause you’ve got enough to worry about

4

Wherever the user is, what ever they use

Our unique approach for better protection you can actually deploy

Quicker to setup, maintain and solve problems

SecurityEverywhere

WithoutComplexity

Active Protection

Page 5: UTM - The Complete Security Box

5

Complete SecurityProtecting every part of your business

Page 6: UTM - The Complete Security Box

Network Firewall

Network Protection

WirelessProtection

EmailProtection

WebServerProtection

EndpointProtection

WebProtection

Sophos UTMThe Complete Security Box

Page 7: UTM - The Complete Security Box
Page 8: UTM - The Complete Security Box

A first line of defenseStarting with network security

• Any computer connected to the internet is at risk• A computer outside a firewall will be attacked within minutes• Hardware firewalls can be complex to configure

Page 9: UTM - The Complete Security Box

Network firewallFree Firewall for business use

• Easy management with object-based rules• Stateful packet inspection• Place anywhere on network• IPv6 Support• Amazon Virtual Private Cloud Connector• Easy tunnelling with Windows Remote Access

Page 10: UTM - The Complete Security Box

Optimize your network and stop threatsBusinesses need more than just a basic firewall

• Firewalls only deal in ports, addresses and protocols• Malicious network traffic can still come through allowed ports• You want to get the best from your web connection• You need a way to let remote workers and offices connect

Page 11: UTM - The Complete Security Box

Network protectionOptimize and secure your network

• Intrusion prevention system• Flood protection• VPN (Site-to-site and client)• HTML 5 VPN portal• WAN link balancing

Page 12: UTM - The Complete Security Box

WiFi should be easy and safeYou don’t have to “make do” when it comes to wireless networking

• Separate wireless management solutions can be expensive• Lots of built in wireless hardware doesn’t give complete coverage• Configuring wireless networks in remote offices can be a hassle

Page 13: UTM - The Complete Security Box

Wireless protectionEasy central configuration for secure WiFi

• Central management• Plug & play deployment• Connect access points anywhere• Easy hotspot configuration

Page 14: UTM - The Complete Security Box

Email traffic is still a riskOld methods with some original techniques

• Over 98% of all email is spam• Many spam emails combine links to infected websites• Phishing attacks are on the rise• Data protection is key concern for businesses

Page 15: UTM - The Complete Security Box

Email protectionStopping threats and protecting data at your gateway

• Filter spam and stop malware• Let users manage their own quarantined items• Detects phishing urls in emails• Supports S/MIME and OpenPGP for encryption

Page 16: UTM - The Complete Security Box

Endpoints are everywhereAnd so is your network

• The anywhere network• Accessing the web outside your protection• Malware carried on USB sticks• You need more than signature-based AV

Page 17: UTM - The Complete Security Box

Endpoint protectionStop threats wherever users are and however they connect

• Endpoint anti malware• Live protection• Device control• Manage anywhere through our LiveConnect service

Page 18: UTM - The Complete Security Box

Why worry about the web?A great tool and a potential risk

• Lack of control can impact productivity• 85% of all malware comes from the web• Web threats are invisible• Targeted and controlling computers and stealing data

Page 19: UTM - The Complete Security Box

Web protectionLayered protection for computers connected to the web

• Gateway anti malware• URL Filtering• Web application control• Interactive usage and user reporting

Page 20: UTM - The Complete Security Box

Vulnerable websites are a targetDon’t let your organization become another statistic

• More than 30,000 websites infected every day• 80% of infected websites are legitimate• Exploits will often redirect users to malicious sites

Page 21: UTM - The Complete Security Box

Webserver protectionLet us be your web security expert

• Web application firewall• Anti malware scanning • Form hardening• URL hardening• Cookie protection

Page 22: UTM - The Complete Security Box

Choose your deployment type

Software Appliance

Virtual Appliance

Hardware Appliance

Page 23: UTM - The Complete Security Box

Hardware optionsHardwareAppliance 110/120 220 320 425 525 625 Multiple

+ RED

Environment Small network

Medium network

Medium network

Large network

Large network

Large network

Large networks

+ branches

Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple

Max. recommended firewall users

10/80 300 800 1.500 3.500 5.000 10.000+

Max. recommended UTM users

10/35 75 200 600 1.300 2.000 5.000

Software Appliance * Runs on Intel-compatible PCs and servers

VirtualAppliance *

VMware Ready & Citrix Ready certified Runs in Hyper-V, KVM, and other virtual environments

Page 24: UTM - The Complete Security Box

Choose your modules

FullGuard

NetworkFirewall

Web Protection

WebserverProtection

NetworkProtection

WirelessProtection

EmailProtection

EndpointProtection

Page 25: UTM - The Complete Security Box

www.sophos.com/unified