Sophos XG Firewall. IP Partners ICT Systems & Services.
|
|
- Adrian Glenn
- 5 years ago
- Views:
Transcription
1 Sophos XG Firewall IP Partners ICT Systems & Services
2 XG Firewall Overview
3 Today s top firewall problems What IT managers say about their existing firewall Firewall Satisfaction Survey (Spiceworks 2017) Top Concerns My Firewall makes it difficult to find information does not isolate infected systems makes it difficult to configure is missing features doesn't alert me to threats Visibility Protection Complexity doesn't identify risky users or apps
4 Sophos XG Firewall Unrivalled Security, Simplicity, and Insight Complete Protection Synchronized security Simpler to Manage Instant Insights Firewall & Wireless Web, Apps, APT and WAF Security Heartbeat Identify & Isolate APTs Dynamic app ID Streamlined workflows Unified policies Policy templates Control center User & App Risk On-box reporting 4
5 XG Firewall Unrivalled Security, Simplicity, and Insight 1. Complete Protection More-in-one protection than any other firewall Advanced Threat Protection from the latest botnets and APTs Next-generation Network, IPS, wireless, web, and app control Optional anti-spam, DLP, encryption and full-featured WAF 2. Synchronized Security Automated threat protection and response Industry-first synchronizing IT security products to share telemetry Security Heartbeat can automatically respond and isolate compromised systems Unknown App Identification enables the firewall to identify unknown traffic 3. Simpler to Manage XG Firewall makes managing advanced protection simple Unified policy and rule management brings everything together in one place Enterprise-grade web policy is powerful, flexible and easy Business application templates simplify setup & guide best-practices 4. Instant Insights Unprecedented insights into user and network activity Control center surfaces critical information using traffic-light style indicators User and application risk indicators identify issues before they become problems Extensive on-box reporting included at no-extra charge provides even deeper insights 5
6 XG Firewall Ecosystem Sophos Firewall OS (SF-OS) New Firewall Operating System and Software Platform (available on Azure) XG Series Appliances Identical to SG Series except come preloaded with SF-OS Synchronized Security Integration with Sophos Endpoints for enhanced protection & response Migration Tools Enabling an easy migration from UTM 9 to SF-OS Sophos Firewall Manager (SFM) Full-featured on-premise Centralized Management Sophos Central Firewall Manager (CFM) Centralized Firewall Management in the Cloud (for partners only initially coming to Central soon!) Sophos iview Reporting Updated on-premise Centralized Reporting
7 XG Firewall s Unique Innovations 7
8 What makes XG Firewall Unique Innovative features you just can t get anywhere else Synchronized Security Links Endpoints and Firewall to share telemetry and status Enables features like Security Heartbeat & Real-time App ID Unified Firewall Rules and Policies All firewall rules on one screen with snap-in user-based policies Policy templates simplify protecting business applications Enterprise-grade Secure Web Gateway Powerful top-down inheritance based web policy model Easy and intuitive to build sophisticated user and group based policies User and Application Risk Assessment Automatically identifies high risk users and applications on the network Identifies potential issues before they become real problems No-compromise Deployment and Central Management The most flexible deployment options without compromise: XG Series, software, virtual, IaaS (Azure) Comprehensive centralized management and reporting made simple 8
9 Synchronized Security Admin UTM/Next-Gen Firewall Security Heartbeat Endpoint/Next-Gen Endpoint RED Heartbeat Firewall detects traffic from Endpoint! 9
10 Unified Firewall Rules and Policies Making management easier All firewall rules in one place User, Network, Business Applications Powerful filtering options By rule type, zone, status or ID At a glance indicators Type, source, destination, users, service, traffic status, heartbeat, QoS, and natural language description 10
11 Policy Templates Custom tailored templates enable easy & proper protection for common business apps 11
12 Enterprise-grade Secure Web Gateway Powerful tools for building sophisticated user and group based web policies Top-down inheritance policy model Makes building sophisticated policies easy and intuitive. The same kind of SWG usually found only in dedicated enterprise products. Pre-defined policy templates Out-of-the-box policies for included for workplace, CIPA compliance, and more Powerful customization Custom define users/groups, activities (URLs, categories, file types), allowed action, and time-of-day and day-of-week constraints 12
13 User Risk Assessment Automatically identifying top risk users on the network Automatically identifying top risk users on the network before they become a problem 13
14 App Risk Assessment Automatically identifying top application risks and overall app risk Risk: Low A few high risk applications and users are operating on the network continue to monitor the situation carefully Risk: High Take action and setup an application control policy before data loss, abuse, or illegal activity become a real problem 14
15 Deployment flexibility without compromise Flexible deployment options optimized for today s business XG Series Hardware Full range of hardware appliances with wireless AP and RED add-ons Multi-core processors, solid-state storage, generous RAM Industry-leading performance at all price points Miercom tested Virtual/Software Vmware, Hyper-V, Citrix XEN, KVM Flexibility regarding resource assignment and high availability Compatible with all x86 hardware IaaS Available in Microsoft Azure Marketplace Up and running in minutes with preconfigured VM Pay-as-you-go or BYOL 15
16 XG Firewall How XG does user policy better 16
17 Layer-8 User Identity and Awareness made simple Covers all areas of the Firewall. Consolidated. Easy to Manage IPS QoS Web Apps Routing 17
18 Powerful user/group policy enforcement made simple Simply snap-in your sophisticated user and group based polices to a single firewall rule Define your user/group web enforcement policy Snap-it-in to your desired firewall rule 18
19 Sophos Transparent Authentication Suite (STAS) Making user identity transparent and reliable. Single-Sign-On (SSO) made easy XG Firewall Authentication Information Microsoft Active Directory Server STAS Collector & Agent No client required on devices for SSO! 19
20 What s New XG Firewall v16 & v
21 Per-rule and Policy-based routing Enhanced Anti-Spam STAS GUI configuration Log Viewer Enhancements New Navigation New AP 15C and RED 15w support Synchronized Security App Identification Firewall-to-firewall RED tunnels Streamlined Firewall Rule Screen Support for 3rd party URL databases Two-Factor Authentication Google Apps Control 120! Over New Features SPX Encryption reply portal Per-Domain Routing and MTA Microsoft Azure Support Enhanced Control Center New User/Group Web Policy Support for 3rd party URL databases Enhanced Security Heartbeat Creative Commons SafeSearch Image Enforcement Missing Security Heartbeat Detection Clone firewall and other rules HA support for dynamic WAN interfaces Firewall domain name 21
22 XG Firewall v16 Continuing to build on the story Simplified User Experience Creating a more intuitive experience across all areas of the product from navigation to policy to logging & more New Protection Features Over 120 new features improving protection and flexibility across all areas of the firewall Added Synchronized Security Adding new Synchronized Security features to the arsenal to improve protection, enforcement and visibility
23 Simplified User Experience New in XG Firewall v16: Easier Navigation Enhanced Control Center Widgets Streamlined Policy Setup Improved Logging and Troubleshooting Tools 23
24 Complete Protection New in XG Firewall v16: New Enterprise-Grade Secure Web Gateway Two-factor Authentication Enhancements (Routing, Policy Tools, MTA) Microsoft Azure Support 24
25 Synchronized Security New in XG Firewall v16 UTM/Next-Gen Firewall Missing Heartbeat Detection Identifying & isolating compromised endpoints Endpoint/Next-Gen Endpoint Destination Heartbeat Block access to compromised servers and endpoints Cloud Intelligence Unknown App Identification Insights and control over unknown app traffic 25
26 Synchronized Security Admin UTM/Next-Gen Firewall Unknown App Identification Endpoint/Next-Gen Endpoint GREEN Heartbeat Firewall detects unknown traffic from Endpoint Firewall requests context from endpoint Application information is exchanged 26
27 The adoption of cloud infrastructure and services is accelerating IaaS spending to grow 38.4% in 2016 Cloud is the fastest growing business at Microsoft (Azure, Office 365, CRM) All driven by immense benefits in pay-for-whatyou-use, convenience, flexibility, reliability and scalability
28 XG Firewall on Azure Consistent Experience Same easy user experience Familiar and consistent Primary Use-cases NGFW, WAF, IPS, SWG, VPN Easy deployment and simple licensing Deploy virtual machine in minutes from the Microsoft Azure Marketplace BYOL or Pay-as-you-go (hourly) licensing 28
29 XG Firewall Advanced Threat Protection 29
30 $ Evasion Techniques Delivery Methods Crippling Impact Financially Motivated Obfuscation Polymorphism Delayed Activity MS Office Files with Macros and PDF Documents via and web IoT devices being Hacked Potential loss of all data with encryption Devastating DDoS attacks Ransoming access to your data or devices for significant sums of money
31 How advanced threats work Cyber Criminal 1. Infiltrate Hack systems remotely Attachments Compromised websites USB devices 2. Call Home Register Success Get Instructions or Encryption Key C & C Servers Your Network Target 4. Steal Data Upload sensitive or valuable data 5. Bot Attack Scan DDoS DNS Amplification Bruteforce Spam 3. Ransom Encrypt data and ransom access 31
32 Need Defense in Depth Complete Protection Gartner, Sophos and other experts agree Need Network Traffic Analysis o o o App, Web and Protection Advanced Threat Protection Malicious traffic detection and call-home Need Payload Analysis o Sandboxing Need Endpoint Behavior Analysis o Next-Gen Endpoint with Anti-exploit Need To Know Where to Look o Synchronized Security dramatically increases visibility Need Forensics o Root-cause analysis 32
33 Advanced Threat Protection in XG Firewall A full suite of technologies to protect against the latest zero-day threats Advanced Threat Protection Security Heartbeat Cloud Sand- Boxing Enterprise Web & Mail Protection Fullfeatured WAF Utilizing a multi-layer approach of DNS, IPS & URL filtering Providing immediate insight and automatic response to threats Identifying the latest zero-day threats like bots and ransomware With sophisticated policy tools and protection engines Able to provide reverse-proxy, auth offloading and server hardening
34 Sophos Sandstorm One of our fastest growing products Now Available on XG Firewall
35 Sophos Sandstorm Cloud-sandboxing available now Sophos Sandstorm Determine Behavior Hash? Suspect Control Report 35
36 Intercept X and XG Firewall provide a powerful defense To block advanced threats like ransomware and botnets! and together Intercept X and XG Firewall can automatically respond to threats for you saving you time and preventing further incidents 36
37 Sophos Sandstorm Visibility
38 Sophos Sandstorm Detailed Historical Reporting 38
39 Synchronized Security Admin UTM/Next-Gen Firewall Security Heartbeat Endpoint/Next-Gen Endpoint RED Heartbeat Firewall detects traffic from Endpoint! 39
40 Synchronized Security Admin UTM/Next-Gen Firewall Missing Heartbeat Endpoint/Next-Gen Endpoint MISSING Heartbeat Firewall detects traffic from Endpoint? 40
41 Synchronized Security Admin UTM/Next-Gen Firewall Destination Heartbeat Endpoint/Next-Gen Endpoint RED Heartbeat Connections to/from the compromised system are blocked! GREEN Heartbeat Endpoint attempts to connect to compromised system 41
42 How XG Firewall and Intercept X can protect Cyber Criminal 1. Infiltrate Hack systems remotely Attachments Compromised websites USB devices 2. Call Home Register Success Get Instructions or Encryption Key C & C Servers Your Network Target 4. Steal Data Upload sensitive or valuable data 5. Bot Attack Scan DDoS DNS Amplification Bruteforce Spam XG Firewall Protects devices and servers from being hacked & infiltrated Blocks compromised websites Catches spam and phishing Sandboxes suspicious files (to catch bots and ransomware) 3. Ransom Encrypt data and ransom access Intercept X Detects and stops ransomware & exploits XG Firewall Detects bots and ransomware attempting to call home Automatically responds and isolates infected systems Prevents data exfiltration Prevents bots and threats moving laterally across network segments 42
43 Central Management made Simple 43
44 Central Management: Sophos Firewall Manager Full-featured centralized management for multiple firewalls Multiple monitoring views Instant visibility into network status Flexible grouping and organization Policy templates make deploying new firewalls fast and simple Push, pull, replicate policies Ensures consistent protection Configure individual devices Consistent UI/workflow with on-box Deployment options 3 hardware models Virtual/Software
45 Central Reporting: Sophos iview Reporting Consolidated centralized reporting Consolidated reporting across devices Support for SF-OS, UTM9, CyberoamOS Flexible grouping and organization Compliance reporting HIPPA, PCI-DSS, GLBA, SOX, Backup and long-term data storage Deployment options Virtual/Software
46 Why Customers Choose Sophos for their next firewall 46
47 Why customers are choosing Sophos for their next firewall 1. Complete protection We provide more-in-one appliance than any other vendor with synchronized security that automates response to incidents. 2. Simpler to manage We make enterprise-grade protection easier to manage than any other firewall product, saving time and ensuring proper protection. 3. Instant insights We surface just what s important with unique insights into user and app risk as well as rich on-box reporting at no extra charge 4. Top Performance Our firewall delivers industry leading performance at every price point. 5. Trusted industry leader Sophos is among the top 3 vendors in the industry and has been a Gartner Magic Quadrant leader for the past 5 years. 47
48 The XG Firewall Advantage Sophos XG Firewall CheckPoint NGFW WatchGuard Firebox Fortinet FortiGate FastPath Packet Optimization Dual AV Engines SonicWALL NSA Intrusion Prevention System Cisco Meraki Next-Gen Firewall and ATP Synchronized Security UTM & Deployment Application Control (partial) Web Protection and Control + User and App Risk Assessment & Visibility (partial) HTTPS Filtering Advanced Threat Protection Sandboxing Identify Compromised Host, User, & Process Compromised System Isolation Unknown Application Identification Full-Featured Web Application Firewall +1Box +1Box AV, AS, Encryption & DLP +1Box +1Box +1Box +1Box +1Box Full Historical Reporting +1Box +1Box +1Box +1Box Plug-and-Play Remote Office Security (RED) Flexible Deployment (HW, SW, VM, IaaS) No SW/IaaS No SW No SW/IaaS HW only
49 A Leader in Unified Threat Management Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT Sophos first entered into this MQ publication in March 2012, positioned in the Leader quadrant and has retained this position for 5 consecutive publications Sophos remains one of only three leaders after Dell and WatchGuard were demoted last year Gartner s perception of Sophos is even better than last year, recognizing the strength of Synchronized Security, the breadth of our security portfolio and that we are growing - taking market share from our competitors In relative terms Sophos is edging closer on Fortinet and leaving smaller vendors trailing further behind Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Rajpreet Kaur, 30 August 2016 This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. 49
50 Only Vendor Positioned as Leader in Endpoint Protection and UTM Gartner Magic Quadrant ENDPOINT PROTECTION Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT Source: Gartner (February 2016) Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Eric Ouellet, 1 February 2016 Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Rajpreet Kaur, 30 August 2016 These graphics are published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner documents are available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.
51 XG Firewall How to buy Deployment, Licensing and Optional Add-ons Deployment Choices Base License Options XG Series Appliances Software/ Virtual Firewall & VPN Wireless TotalProtect Plus EnterpriseProtect (NGFW) Sophos Firewall Manager & iview RED Devices Network Protection Web & App Protection IaaS Wireless APs Protection Sandstorm Protection Web Server Protection 51
52
Synchronized Security
Synchronized Security 2 Endpoint Firewall Synchronized Security Platform and Strategy Admin Manage All Sophos Products Self Service User Customizable Alerts Partner Management of Customer Installations
More informationFIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?
WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take
More informationSophos. Allan Widell Channel Account Executive. 24. August 2017
Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security
More informationNext-Gen Firewall Buyers Guide
Next-Gen Firewall Buyers Guide In a recent survey, we asked IT network managers to name their top issues with their existing firewall. Here are problems they cited: Visibility into application traffic,
More informationSecurity Made Simple by Sophos
Security Made Simple by Sophos Indian businesses in the radar of cyber-threats Frequency of cyber-attacks Most targeted systems / IT assets -- KPMG Cybercrime Survey Report 2015 3 ON AN AVERAGE, HOW MUCH
More informationSynchronized Security In Action
Synchronized Security In Action 99% Reduction in incident response time Firewall Web Wireless Email Sophos Central Server Encryption Mobile Endpoint ~5K Firewalls w/ Security Heartbeat 2 Avg. firewalls
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationSynchronized Security
Synchronized Security Revolutionizing Advanced Threat Protection Per Söderqvist Sales Engineer Nordics and Baltics 1 A Proven Market Leader Endpoint Encryption Leader UTM Unified Threat Management EPP
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationAgenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options
Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationSynchronized Security: Outsmart Hackers by Coordinating Your Defenses
Synchronized Security: Outsmart Hackers by Coordinating Your Defenses Seth Geftic Endpoint Security Group November 2 nd, 2017 What could you do in two hours? What could an attacker do in two hours? Attacks
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationProtect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com
Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering
More informationXG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget.
XG Firewall What s New in v17 Setup, Control Center and Navigation Initial Setup Wizard Introduced in a Maintenance Release, a new initial setup wizard enables quick and easy out-of-the-box setup. In addition
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationSONICWALL GLOBAL MANAGEMENT SYSTEM
SONICWALL GLOBAL MANAGEMENT SYSTEM Comprehensive security management, monitoring, reporting and analytics A winning security management strategy demands deep understanding of the security environment to
More informationWatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.
WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution. Total Security. A stateful packet firewall, while essential, simply isn t enough anymore. The reality is that
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationSOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.
SOLUTION OVERVIEW Enterprise-grade security management solution providing visibility, management and reporting across all OSes. What is an endpoint security management console? ESET Security Management
More informationSandstorm: Frequently asked questions. May August 2016 Page 1 of 7
Sandstorm: Frequently asked questions May 2017 August 2016 Page 1 of 7 Licensing 1. What licenses do customers need to use Sophos Sandstorm functionality? Product and Competitive 2. Can we compare Sophos
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationSolution Brief: XG Firewall
Solution Brief: XG Firewall There s an evolution in firewalls currently underway that s very different from any previous generation. The threat landscape has shifted radically and as a result, the complexity
More informationMcAfee Advanced Threat Defense
Advanced Threat Defense Detect advanced malware Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationZero Trust in Healthcare Centrify Corporations. All Rights Reserved.
Zero Trust in Healthcare 1 CYBER OFFENSE REDEFINED: TRANSFORM YOUR SECURITY POSTURE WITH ZERO TRUST 2 What Keeps CIOs Up at Night? How exposed are we, anyway? Who can access what? Can we trust our partners?
More informationIBM Cloud Internet Services: Optimizing security to protect your web applications
WHITE PAPER IBM Cloud Internet Services: Optimizing security to protect your web applications Secure Internet applications and APIs against denialof-service attacks, customer data compromise, and abusive
More informationNew methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall
New methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall Claudiu Onisoru, Senior Network Specialist Cisco Connect - 15 May 2014 1 Agenda Frontal Communication: Who
More informationFIREWALL BEST PRACTICES TO BLOCK
Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting
More informationEnhanced Threat Detection, Investigation, and Response
Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationAvanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.
Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7
More informationComprehensive datacenter protection
Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack
More informationCisco Ransomware Defense The Ransomware Threat Is Real
Cisco Ransomware Defense The Ransomware Threat Is Real Seguridad Integrada Abril 2018 Ransomware B Malicious Software Encrypts Critical Data Demands Payment Permanent Data Loss Business Impacts Ramifications
More informationWhat can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco
What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco Increasing Digital Traffic Creates a Greater Attack Surface Global IP Traffic
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationTop 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)
ESG Lab Review Sophos Security Heartbeat Date: January 2016 Author: Tony Palmer, Sr. ESG Lab Analyst; and Jack Poller, ESG Lab Analyst Abstract: This report examines the key attributes of Sophos synchronized
More informationSONICWALL GLOBAL MANAGEMENT SYSTEM Comprehensive security management, monitoring, reporting and analytics
SONICWALL GLOBAL MANAGEMENT SYSTEM Comprehensive security management, monitoring, reporting and analytics A winning security management strategy demands deep understanding of the security environment to
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service is designed to provide customers
More informationMultilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.
SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. What is a mobile protection product? A mobile protection
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationFirewall Buyers Guide
Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider
More informationWatchGuard Technologies
1 WatchGuard Technologies Andrés A. Buendía Ucrós Master Sales Engineer Caribbean & LatinAmerica 2 About WatchGuard Who We Are Mission: To bring widely deployable, enterprise-grade security to small and
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationSONICWALL SECURITY HEALTH CHECK PSO 2017
SONICWALL SECURITY HEALTH CHECK PSO 2017 Get help in fully utilizing your investment to protect your network Overview SonicWALL Security Health Check provides a customer with a comprehensive review of
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.
More informationFirewall XG / SFOS v16 Beta
Firewall XG / SFOS v16 Beta Partner Beta Program Name: Company: Table of Content Welcome... 3 Look & Feel... 4 Base: SFOS migration and performance... 5 Base: HA with dynamic link... 6 Network: Policy
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationMcAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks
McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic
More informationPanda Security. Corporate Presentation. Gianluca Busco Arré Country Manager
Panda Security Corporate Presentation Gianluca Busco Arré Country Manager Great minds and Global Presence From 1990, Panda Security has become the leading European multinational developing advanced cybersecurity
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationQualys Cloud Platform
Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new
More informationServices solutions for Managed Service Providers (MSPs)
McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive
More informationMODERN DESKTOP SECURITY
MODERN DESKTOP SECURITY I M GOING TO BE HONEST. WE RE IN THE FIGHT OF OUR DIGITAL LIVES, AND WE ARE NOT WINNING! M I C H A E L M C C A U L, C H A I R M A N, U S H O M E L A N D S E C U R I T Y C O M M
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking
More informationMultilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.
SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. What is a mobile protection product? A mobile protection
More informationProtecting organisations from the ever evolving Cyber Threat
Protecting organisations from the ever evolving Cyber Threat Who we are .At a glance 16+ Up to 190B 2B+ Dell SecureWorks is one of the most promising MSSPs in the GCC region MSS Market Report on GCC, Frost
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationYou Can See Everything From Our Windows
You Can See Everything From Our Windows Be more aware. A holistic integrated solution for total security management. SONICWALL CAPTURE SECURITY CENTER IS EASY With true Single-Sign-On (SSO) and Single-Pane-of-Glass
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More information3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017
3 Ways to Prevent and Protect Your Clients from a Cyber-Attack George Anderson Product Marketing Director Business October 31 st 2017 Agenda One ounce of prevention is worth a pound of protection 01 Aiming
More informationSecurity Gaps from the Field
Security Gaps from the Field Reconnaissance, Theft, and Looking Them in the Eye Helping you grow your business with scalable IT services & solutions Bruce Ward, CISM, Vice President for today s challenges
More informationWhat is an Endpoint Protection Platform?
SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together in dynamic equilibrium provided by the #1 global endpoint security partner from the European Union What
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationOUR SECURITY DELIVERED YOUR WAY
M200 OUR SECURITY DELIVERED YOUR WAY U.S. Sales: 1.800.734.9905 International Sales: 1.206.613.0895 Web: www.watchguard.com WatchGuard Technologies, Inc. Partner with WatchGuard It s Just Easy Everything
More informationWhat is a mobile protection product?
What is a mobile protection product? A mobile protection product can be separated into two distinct categories: security and management. The security features range includes antimalware, anti-phishing,
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationRansomware & Modern DR: Risky Business
Ransomware & Modern DR: Risky Business Matt Tyrer: Manager, Solutions Marketing - Americas 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. Agenda New-ish Risks New Answers to Old-ish Problems Old Problems
More informationPT Unified Application Security Enforcement. ptsecurity.com
PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationAruba ridefinisce il futuro del Mobile, Cloud e IoT
Reimagine 2018 Aruba ridefinisce il futuro del Mobile, Cloud e IoT Alessandro Ercoli Team Leader Systems Engineer HPE Aruba Italy 24 maggio 2018 DIGITAL WORKPLACE EXPERIENCES POWERED BY ARUBA MOBILE FIRST
More informationCisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationWHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES?
WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? Timothy P. McAliley CISA, CISM, CISSP, ITIL V3, MCSA, MCSE, MCT, PMP Microsoft Account Technology Strategist Try It Yourself! Two TechNet Virtual Labs
More informationGladiator Incident Alert
Gladiator Incident Alert Allen Eaves Sabastian Fazzino FINANCIAL PERFORMANCE RETAIL DELIVERY IMAGING PAYMENT SOLUTIONS INFORMATION SECURITY & RISK MANAGEMENT ONLINE & MOBILE 1 2016 Jack Henry & Associates,
More informationCloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection
Cloud Email Security & Advance Threat Protection Cloud Email Security & Advance Threat Protection Overview Over the years Cyber criminals have become more inventive in their attack methods to infiltrate
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationIntelligent Protection
Intelligent Protection Question: Have you or your customers business experienced advanced threats such as Ransomware in the last 12 months? Don t forget what you are being paid to do. Align the goals of
More informationAutomated Response in Cyber Security SOC with Actionable Threat Intelligence
Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent
More information