Synchronized Security

Similar documents
Security Made Simple by Sophos

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central

Synchronized Security

Symantec Ransomware Protection

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Cisco s Appliance-based Content Security: IronPort and Web Security

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

FIREWALL BEST PRACTICES TO BLOCK

Future-ready security for small and mid-size enterprises

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Endpoint web control overview guide

AT&T Endpoint Security

Content for Sophos- Theory and lab session

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Security Assessment Checklist

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Firewall XG / SFOS v16 Beta

JURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN

Symantec Endpoint Protection Family Feature Comparison

Synchronized Security In Action

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

SONICWALL SECURITY HEALTH CHECK PSO 2017

Training UNIFIED SECURITY. Signature based packet analysis

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Business Strategy Theatre

Australian Signals Directorate (ASD) Top 35 Reference Card

Enabling Office 365 Services (347)

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Security for the Cloud Era

Agile Security Solutions

Dynamic Datacenter Security Solidex, November 2009

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Comodo Korugan Software Version 1.8

RHM Presentation. Maas 360 Mobile device management

Lastline Breach Detection Platform

Simple and Powerful Security for PCI DSS

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Juniper Sky Advanced Threat Prevention

SONICWALL SECURITY HEALTH CHECK SERVICE

JUNIPER SKY ADVANCED THREAT PREVENTION

File Reputation Filtering and File Analysis

SONICWALL SECURITY HEALTH CHECK SERVICE

The Eight Components of a Strong Cyber Security Defense System

AccessEnforcer Version 4.0 Features List

Next-Generation Firewall Series Datasheet

INTRODUCING SOPHOS INTERCEPT X

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Venusense UTM Introduction

Copyright Huawei Technologies Co., Ltd All rights reserved. Trademark Notice General Disclaimer

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

USG310/210/110. Benefits. Always online. Protection and optimization. Next Generation Firewall (NGFW) for small and medium-sized businesses

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

SophosLabs 2019 Threat Report

PrecisionAccess Trusted Access Control

: Administration of Symantec Endpoint Protection 14 Exam

SEPARATING WORK AND PERSONAL

USG2110 Unified Security Gateways

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Security, Internet Access, and Communication Ports

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

exam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT

SONICWALL SECURITY HEALTH CHECK SERVICE

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Juniper Sky Advanced Threat Prevention

McAfee Advanced Threat Defense

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Cisco Security Enterprise License Agreement

PROTECTING YOUR NETWORK FROM THE INSIDE-OUT

Securing the Modern Data Center with Trend Micro Deep Security

Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Sophos Überblick. Stefan Jantzer Sales Executive

Seceon s Open Threat Management software

Juniper SRX Services Gateway Performance Testing

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

SonicOS Standard Release Notes SonicWALL, Inc. Software Release: June 4, 2009

Sophos Central Admin. help

McAfee NGFW Installation Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

Evaluation criteria for Next-Generation Firewalls

Huawei Cloud Fabric Data Center Security and Application Optimization Solution

For Businesses with more than 25 seats.

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Threat Detection and Response. Deployment Guide

N-Dimension n-platform 340S Unified Threat Management System

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget.

EN6200 Series Feature Sheet

Cisco Network Admission Control (NAC) Solution

Datacenter Security: Protection Beyond OS LifeCycle

Transcription:

Synchronized Security Revolutionizing Advanced Threat Protection Per Söderqvist Sales Engineer Nordics and Baltics 1

A Proven Market Leader Endpoint Encryption Leader UTM Unified Threat Management EPP Endpoint Protection Client Sec/ Endpoint Wave Leader SWG Secure Web Gateway MDP Mobile Data Protection Endpoint Encryption Champion SEG Secure Email Gateway EMM Enterprise Mobility Management Endpoint Anti- Malware Champion ENF Enterprise Network Firewall Next Generation Firewall Champion 2

350 000 Malware discovered every day for Windows 25 000 Malware discovered every day for Mac 2000 Malware discovered every day for Android 30 000 Number websites found every day that spreads Malware *Source: Sophos Labs 3

Where We Are Going What We Believe Security must be comprehensive The capabilities required to fully satisfy customer need ~ Project Galileo ~ Technology Integration that Enables Context-Aware Security Next Gen Network Security Security can be made simple Platform, deployment, licensing, user experience Cloud Managed Security is more effective as a system New possibilities through technology cooperation Next Gen Endpoint Next Gen Endpoint Every Endpoint is an Endpoint Advanced Threat Protection in EP Encryption Everywhere Project Galileo Network Security v10: user-based policy, web + app control Off-box reporting New network security MSP offering Heartbeat monitoring (Galileo) Server Lockdown Whitelisting File Reputation Application Reputation Project Galileo Sophos Cloud Encryption Server Freemium Project Galileo 4

Sophos Endpoint Protection 5

Endpoint in Cloud Updates, Upgrades and Reporting Sophos Cloud Sophos Cloud Management Update Caching Intranet Alternate Cache Server 6

Sophos Cloud Web Gateway SSL HTTP Proxy Raw TCP Proxy IPSec VPN Email ActiveSync, IMAP, SMTP 7

Cloud E-Mail Aquisition of Reflexion Will become Sophos Cloud E-Mail Security in the next months Only available through partners Email Encryption: Pre-defined Subject Matter Lexicons Completely Transparent to End- Users Ad hoc encryption and custom rules Email Continuity: 60-day Rolling Archive Send/Receive Email During Local Outage Recover Message(s) to Inbox Email Archiving: Compliance Archive ediscovery to Respond to Legal Requests Disaster Recovery/Email Continuity Email Security: AntiSpam and Anti Virus Automatic Spooling for 10-days Outbound Email Protection 8

Security 1. On-access scanning - Signatures 2. Web protection With Reputation Filtering 3. Live protection 4. HIPS Behavior analyst. 5. MTD - Malicious Traffic Detection 9

SophosLabs URL database Malware Identities Whitelist File look-up Genotypes Reputation HIPS rules MTD rules Apps SPAM Data Control Anon. proxies Patches/ Vulnerabilities Peripheral Types Malicious traffic detected App terminated Admin alerted i Compromise User System File 10

Sophos NGFW 11

Leading Threat Protection RED for Distributed Networks Secure Wi-Fi & Access Points Web Protection Technologies Next Gen Endpoint Unified Management Project Compromise Detection Copernicus and Response Heartbeat Layer 8 User Identity Policies Leading Application Control Accelerated Packet Filtering iview Logging & Reporting Next Gen Network Layer 8 User- Centric Policy Model Cloud console manageme nt /reporting Deep Application control, coverage and visibility Intelligent scanning to accelerate performanc e Runs on SG Series Hardware Unrivalled User Experience Architecture Platform Modular Open Source Flexible migration with tools Hardware, Virtual and Cloud Deployment 12

UI design that improves the daily workflow More friendly, inviting, and useful Fresh New User Experience A fresh ground-up design approach to user interface, navigation, and data presentation that s engaging and useful 13

User-centric firewall policy model Flexible user-centric approach from licensing to deployment 14

Sophos RED 15

Sophos RED Securely connect remote locations Completely configuration free Same protection for all offices Fully encrypted traffic Basically it s like having a really long ethernet cable Layer 2 tunnel like a leased line, but without the hassle 16

How RED works RED Provisioning Service: red.sophos.com 3. Deploy RED device 1. Configure RED device Remote Office Central Office Internet 7. Establish Layer 2 Tunnel RED 4. Receive local IP (DHCP) Internet Router UTM 17

Red operation modes Standard/Unified Standard/Split Transparent/Split 18

RED models RED15 RED50 5x 1 Gbit/s RJ45 Network Connectivity 5 x 1 Gbit/s RJ45 Failover configuration 2 nd UTM Hostname Failover configuration RJ45 Console Serial Console RJ45 Console 150 Mbit/s Throughput 360 Mbit/s 19

Security 1. IPS Intrusion Prevention system 2. Web protection Combined with Live Protection 3. ATP Advanced Threat protection 4. Email protection 5. Selective Sandboxing 20

Next Generation Threat Detection Sophos Cloud Application Control Application Tracking Reputation Web Protection IoC Collector Routing Email Security Web Filtering Intrusion Prevention System Firewall Threat Engine SOPHOS SYSTEM PROTECTOR Security Heartbeat heartbeat Security Heartbeat SOPHOS FIREWALL OPERATING SYSTEM Threat Engine Live Protection Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Proxy Selective Sandbox Application Control Data Loss Prevention ATP Detection Compromise User System File Isolate subnet and WAN access Block/remove malware Identify & clean other infected systems 21

Sophos Encryption 22

Forrester Wave 2015 23

Combining Threat & Data Protection Validate process trust when data/files are accessed Trusted = plain text data Untrusted = encrypted data Anti-virus evaluates running processes for trust Known virus/malware? Good reputation? Etc. Sophos Anti-virus Sophos Encryption 24

SophosLabs i Compromise User System File Sophos Cloud Admin alerted. Threat blocked, and can identify other compromised machines and block file Application Control Application Tracking Application Reputation Web Filtering Device Control DEVICE & FILE ENCRYPTION CONTEXT ENGINE INDICATOR OF COMPROMISE COLLECTOR INDICATOR OF NETWORK COMPROMISE DATA COMPROMISE DETECTION ANALYTICS Threat Engine Live Protection Emulator Runtime Protection APT Detection URL database Malware Identities Whitelist File look-up Genotypes Reputation HIPS rules APT rules Apps SPAM Data Control Annon. proxies Patches/ Vulnerabilities Peripheral Types 25

Partner Dashboard 26

27

28

SFM Multi-device monitor 29

STAC Sophos Threat Analytics Center 30