SlideShare uma empresa Scribd logo
1 de 33
1
Lars Putteneers
Sales Engineer
Sophos Cloud
Breaking the stereotypes
22
Industry overview
3
Corporate Perimeter
VPN
Corporate Perimeter
Cloud
Services
Dissolving Corporate Perimeter
4
I hate to break it to you……
5
End user
 Endpoint protection
 Mobile security
 Web gateway
Advanced User Protection
Integrated User-based policy, management and reporting
66
Sophos Cloud
Overview
7
Sophos Cloud is…
Easy to use
• Easy to try
• Cloud-based
• No management
server required
• Works out of the box
IntegratedComprehensive
• Endpoint Security:
Windows, Mac,
Servers
• Mobile: iOS &
Android
• Secure Web Gateway
• Secure Mail Gateway
• Cloud managed WiFi
• Single user-based policy
for workstations, mobile
devices, and web gateway
• Only cloud-managed
security product that is
fully integrated
8
Sophos Cloud Products
Endpoint
Protection
Mobile
Control
Server
Protection
Web
Gateway
Email
Gateway
For Channel Partners
• Customer and License
Management
• Cross-customer security
incident management
Sophos Cloud
For Administrators
• Unified management and
reporting
• Simple to deploy – no
servers to manage
Sophos Cloud
Key Benefits:
• Easy Deployment
• Simple management
• Faster delivery of security
• Comprehensive & integrated - Enhanced deeper security and visibility
• Modular – simple add-on license activation
99
Endpoint/Enduser
protection
10
Remediation
Removes detected malware automatically; Security Heartbeat (Galileo)
enables a synchronized security response with Copernicus Firewall
Prevention
Correlates threat indicators to block web and application exploits,
dangerous URLs, potentially unwanted apps and malicious code
Detection
Analyzes software behavior and network traffic in real time, alerting
you to hidden threats that can be missed by traditional AV technology
Next Generation Endpoint Protection
11
What’s new in Sophos Cloud
Endpoint Protection
Application
control
Download reputation
Adware & PUA
detection for Mac
1212
Server Protection
13
Sophos Cloud Server Protection
Standard and Advanced
Simple
• One-Click lockdown
• Automatic trust rules
• Cloud-managed:
Instant deployment.
• Server-specific policy
• Automatic exclusion
Great
Protection
• Whitelisting integrated
with AV and HIPS
• Web Security
Fast
performance
• Fast scanning
• Low impact
• Won’t slow
down servers
unique unique
14
Positioning Server Protection
• Server Protection Standard
○ Server AV for Windows and Linux
○ Automatic Scanning exclusion for windows
○ Can be upgraded from free Linux AV
○ Agentless option for VMWare virtualization platform (vShield)
• Server Protection Advanced
○ Server Standard + Server lockdown
Sophos Server Protection offers
the best protection, performance and ease of use.
It’s the best choice for the mid-market.
15
Server Lockdown with One Click
16
What happens when you click “Lockdown”
Status
Server
Management
Receive
Rules from
Server Authority
Whitelisting
Check if it needs
to be whitelisted
Check if it is
maliscious
Create a profile/
fingerprint executable
Add to
whitelist
Applying Trust
Identify
trust rules
Apply
trust rules
Sophos Cloud
17
Sophos Cloud
https://cloud.sophos.com
1818
Sophos Cloud
Mobile Control &
Mobile Security
19
MDM: Sophos Cloud Mobile Control
Simple to Manage, Enhanced (IT) Productivity & Cost Savings
(50% Savings Compared to Competitors)
Manage Device
• Support BYOD
• OTA enrolment
and configuration
• One policy for iOS
and Android
Secure Device
• Enforce passcodes
& encryption
• Locate, Lock and
wipe
• Compliance
Protect Data
• Configure email
access
• Configure Wi-Fi
access
20
Sophos Cloud Mobile Security
Country Malware PUA
United States 4,49 14,28
Germany 4,84 9,71
Netherlands 6,65 17,64
UK 5,51 10,97
France 5,2 14,19
Canada 2,29 14,13
Australia 3,75 14,3
Singapore 11,82 28,89
% infected devices Jan-Jun/15
Protects Android devices from malware, risky apps and websites
SophosLabs 2015
Proven SMSec client can
be managed from Sophos
Cloud and integrated with
MDM
Launched October 2015
Differentiated protection,
scalable cloud managed,
user licenced, unbundled.
- Integrate with
Sophos MDM
- Extend End-User
protection
Global mobile malware
concerns (IDC, Germany)
Global Treat Trends
SophosLabs
21
Integrated in Sophos Cloud Dashboard
22
Sophos Mobile Control
https://smc-eval1.sophos.com/admin
2323
Sophos Cloud Web
Gateway
24
Supported Platforms
Mac & Windows Available Now, Other Platforms Coming Soon
Mac OS X 10.8.5+ Windows 7+
Android 4.0+ iOS 5.0+Chromebook
Coming in late Q3
25
Global Network Optimized for Mobile Workforce
Lightweight Endpoint Agent
• Proxies data traffic to a Sophos Gateway
• Dynamically chooses the best performing
gateway
• Knows what traffic not to proxy based on
policy
Globally distributed gateways
• Analyze each packet for threats
• Apply corporate policies
• Aggregate data for real-time analytics
Central Management
through Sophos Cloud
Globally Distributed Gateways
26
Sophos Cloud Web Gateway Security & Control
Advanced Protection and Granular Control
Security and Control
• Web filtering on 90+
categories
• App & URL filtering
• Anti-malware and anti-
phishing based on
Sophos Labs
• Lightweight DLP
(keyword content
scanning)
• SSL scanning – zero
touch SSL certificate
management
• Google SafeSearch
27
CWG Visibility & Reporting
Big Data Reporting and Analytics made Simple
Visibility and Reporting
• Org wide reporting
• Bandwidth, threats,
category, domain,
protocol
• Per user reporting
• Same reports as
org
• Network usage
• By app, user,
category, location,
device, domain,
protocol
• Malware & phishing
reporting
28
Differences Between Web Security Products
Cloud A/V
Web Controls
SWA UTM
Cloud Web
Gateway
Web filtering 54 categories 54 categories 54 categories 90 categories
Reporting Limited Great Good Good
SSL Scanning ✗ Admin must deploy
certificates
Admin must deploy
certificates
✔
Keyword filtering (DLP) ✗ ✗ ✗ ✔
Custom block pages ✗ ✔ ✔ ✔
User feedback to admin ✗ ✔ ✗ Q4
App controls ✗ ✔ ✔ Q4
User time quotas ✗ ✔ ✔ Q4
Safesearch / Youtube ✗ ✔ ✔ ✔
Real-time logging ✗ ✔ ✔ ✔
Syslog ✗ ✔ ✔ Q1
Sand-boxing ✗ Q4 Q1 Q1
2929
Sophos Cloud Email
Gateway
30
Sophos Cloud Email Gateway
Sophos Cloud simplicity – with cutting edge mail security
https://asp.reflexion.net/home
3131
Sophos Cloud
Licensing
32
Cloud protection
33© Sophos Ltd. All rights reserved.

Mais conteúdo relacionado

Mais procurados

Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Benelux
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XSophos Benelux
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XSophos Benelux
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectRobb Boyd
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 

Mais procurados (20)

XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 

Semelhante a Sophos Cloud - breaking the stereotypes

SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemInductive Automation
 
SnapComms Technical overview
SnapComms Technical overviewSnapComms Technical overview
SnapComms Technical overviewSnapComms
 

Semelhante a Sophos Cloud - breaking the stereotypes (20)

SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
SnapComms Technical overview
SnapComms Technical overviewSnapComms Technical overview
SnapComms Technical overview
 

Mais de Sophos Benelux

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos Benelux
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Benelux
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Benelux
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsSophos Benelux
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?Sophos Benelux
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control BoxSophos Benelux
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationSophos Benelux
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor USophos Benelux
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsSophos Benelux
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Sophos Benelux
 

Mais de Sophos Benelux (14)

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control Box
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor U
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day Netherlands
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 

Último

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Sophos Cloud - breaking the stereotypes

  • 1. 1 Lars Putteneers Sales Engineer Sophos Cloud Breaking the stereotypes
  • 4. 4 I hate to break it to you……
  • 5. 5 End user  Endpoint protection  Mobile security  Web gateway Advanced User Protection Integrated User-based policy, management and reporting
  • 7. 7 Sophos Cloud is… Easy to use • Easy to try • Cloud-based • No management server required • Works out of the box IntegratedComprehensive • Endpoint Security: Windows, Mac, Servers • Mobile: iOS & Android • Secure Web Gateway • Secure Mail Gateway • Cloud managed WiFi • Single user-based policy for workstations, mobile devices, and web gateway • Only cloud-managed security product that is fully integrated
  • 8. 8 Sophos Cloud Products Endpoint Protection Mobile Control Server Protection Web Gateway Email Gateway For Channel Partners • Customer and License Management • Cross-customer security incident management Sophos Cloud For Administrators • Unified management and reporting • Simple to deploy – no servers to manage Sophos Cloud Key Benefits: • Easy Deployment • Simple management • Faster delivery of security • Comprehensive & integrated - Enhanced deeper security and visibility • Modular – simple add-on license activation
  • 10. 10 Remediation Removes detected malware automatically; Security Heartbeat (Galileo) enables a synchronized security response with Copernicus Firewall Prevention Correlates threat indicators to block web and application exploits, dangerous URLs, potentially unwanted apps and malicious code Detection Analyzes software behavior and network traffic in real time, alerting you to hidden threats that can be missed by traditional AV technology Next Generation Endpoint Protection
  • 11. 11 What’s new in Sophos Cloud Endpoint Protection Application control Download reputation Adware & PUA detection for Mac
  • 13. 13 Sophos Cloud Server Protection Standard and Advanced Simple • One-Click lockdown • Automatic trust rules • Cloud-managed: Instant deployment. • Server-specific policy • Automatic exclusion Great Protection • Whitelisting integrated with AV and HIPS • Web Security Fast performance • Fast scanning • Low impact • Won’t slow down servers unique unique
  • 14. 14 Positioning Server Protection • Server Protection Standard ○ Server AV for Windows and Linux ○ Automatic Scanning exclusion for windows ○ Can be upgraded from free Linux AV ○ Agentless option for VMWare virtualization platform (vShield) • Server Protection Advanced ○ Server Standard + Server lockdown Sophos Server Protection offers the best protection, performance and ease of use. It’s the best choice for the mid-market.
  • 16. 16 What happens when you click “Lockdown” Status Server Management Receive Rules from Server Authority Whitelisting Check if it needs to be whitelisted Check if it is maliscious Create a profile/ fingerprint executable Add to whitelist Applying Trust Identify trust rules Apply trust rules Sophos Cloud
  • 18. 1818 Sophos Cloud Mobile Control & Mobile Security
  • 19. 19 MDM: Sophos Cloud Mobile Control Simple to Manage, Enhanced (IT) Productivity & Cost Savings (50% Savings Compared to Competitors) Manage Device • Support BYOD • OTA enrolment and configuration • One policy for iOS and Android Secure Device • Enforce passcodes & encryption • Locate, Lock and wipe • Compliance Protect Data • Configure email access • Configure Wi-Fi access
  • 20. 20 Sophos Cloud Mobile Security Country Malware PUA United States 4,49 14,28 Germany 4,84 9,71 Netherlands 6,65 17,64 UK 5,51 10,97 France 5,2 14,19 Canada 2,29 14,13 Australia 3,75 14,3 Singapore 11,82 28,89 % infected devices Jan-Jun/15 Protects Android devices from malware, risky apps and websites SophosLabs 2015 Proven SMSec client can be managed from Sophos Cloud and integrated with MDM Launched October 2015 Differentiated protection, scalable cloud managed, user licenced, unbundled. - Integrate with Sophos MDM - Extend End-User protection Global mobile malware concerns (IDC, Germany) Global Treat Trends SophosLabs
  • 21. 21 Integrated in Sophos Cloud Dashboard
  • 24. 24 Supported Platforms Mac & Windows Available Now, Other Platforms Coming Soon Mac OS X 10.8.5+ Windows 7+ Android 4.0+ iOS 5.0+Chromebook Coming in late Q3
  • 25. 25 Global Network Optimized for Mobile Workforce Lightweight Endpoint Agent • Proxies data traffic to a Sophos Gateway • Dynamically chooses the best performing gateway • Knows what traffic not to proxy based on policy Globally distributed gateways • Analyze each packet for threats • Apply corporate policies • Aggregate data for real-time analytics Central Management through Sophos Cloud Globally Distributed Gateways
  • 26. 26 Sophos Cloud Web Gateway Security & Control Advanced Protection and Granular Control Security and Control • Web filtering on 90+ categories • App & URL filtering • Anti-malware and anti- phishing based on Sophos Labs • Lightweight DLP (keyword content scanning) • SSL scanning – zero touch SSL certificate management • Google SafeSearch
  • 27. 27 CWG Visibility & Reporting Big Data Reporting and Analytics made Simple Visibility and Reporting • Org wide reporting • Bandwidth, threats, category, domain, protocol • Per user reporting • Same reports as org • Network usage • By app, user, category, location, device, domain, protocol • Malware & phishing reporting
  • 28. 28 Differences Between Web Security Products Cloud A/V Web Controls SWA UTM Cloud Web Gateway Web filtering 54 categories 54 categories 54 categories 90 categories Reporting Limited Great Good Good SSL Scanning ✗ Admin must deploy certificates Admin must deploy certificates ✔ Keyword filtering (DLP) ✗ ✗ ✗ ✔ Custom block pages ✗ ✔ ✔ ✔ User feedback to admin ✗ ✔ ✗ Q4 App controls ✗ ✔ ✔ Q4 User time quotas ✗ ✔ ✔ Q4 Safesearch / Youtube ✗ ✔ ✔ ✔ Real-time logging ✗ ✔ ✔ ✔ Syslog ✗ ✔ ✔ Q1 Sand-boxing ✗ Q4 Q1 Q1
  • 30. 30 Sophos Cloud Email Gateway Sophos Cloud simplicity – with cutting edge mail security https://asp.reflexion.net/home
  • 33. 33© Sophos Ltd. All rights reserved.

Notas do Editor

  1. This is how IT sees it Over the past several years, the endpoint has changed. Endpoints used to be primarily Windows PCs housed on site, within a firewalled perimeter. Now endpoints include employee- and employer-owned PCs, Macs, Androids, iPhones and iPads. They access corporate servers and cloud services inside and outside the perimeter.
  2. Why do we need advanced end user protection? Users are vulnerabiltiy and they are often the weakest link in an organization's secuirty
  3. Sophos Cloud is Simple: You can get started in 60 seconds or less and our single intuitive console manages everything You have clear visibility and control of all user devices —and servers The Sophos Cloud server policy adapts automatically to the customer’s environment Sophos Cloud is Complete: Covering Windows, Windows Server, Mac, iOS, Android and Web control Sophos Cloud is unique and powerful: It’s the only cloud-managed security product with single user-based policy for workstations, mobile devices, and web control It’s the only product to automatically identify server applications and continually adapt the policy And, it’s the only cloud-managed security product to offer protection designed specifically for servers
  4. This will be a good slide for transiting to all other Products Sophos Cloud is a complete solution and will be even more complete in the coming months. Our enduser protection has endpoint + mobile We have added server protection with server application whitelisting and lockdown Cloud based web gateway way provide a comprehensive web security and content filtering capabilities
  5. When we talk about next gen endpoint protection – we are focusing on prevention, detection and remediation.
  6. Sophos Cloud Server Protection is Server Anti-malware designed specifically for servers that automatically adapts to the customer’s server enviroments. It is easy to configure and manage because once user install the protection agent it automatically identify Server OS, and apply default server policy and automatically apply exclusion whenever appropriate. With other application, you might have to manually group all of your exchange servers, then manually set exclusion. And then move on to other type of servers. With Sophos, you can set one policy, and it will automatically adapt to various environment. When you update your server, the software will adapt to that change, making maintenance extremely easy. At Sophos, we make sure security doesn’t get in the way of performance. Our AV engine has consistently proven to be best in performance by 3rd party tests. Sophos Cloud Server protection is no exception. In summary, with Sophos Cloud Sever protection, you get the best protection, that doesn’t slow down your mission critical servers and we make this extremely easy so you don’t spend our precious time time reading manuals or touble shooting.
  7. So what are the benfits of SCWG
  8. Sophos Cloud is simple to manage, providing enhanced productivity & significant cost savings.
  9. So what are the benfits of SCWG
  10. There’s a Lightweight Endpoint Agent on each device that Proxies data traffic to a Sophos Gateway. It Dynamically chooses the best performing gateway and Knows what traffic not to proxy based on policy Globally distributed gateways where every packet is analysed for threats, corporate policies are applied and data is complied for real-time analytics All is managed through the simple, intuitive Sophos Cloud Management interface
  11. Visibility into all network traffic Zscaler only looks at HTTP traffic We look at all network traffic UDP, TCP, SMTP, IMAP, App Traffic, FTP Need info on polices User/Group based? Yes Time of day? Location based? No (later) Bandwidth Quota? Yes Site categories? 75? What URL database provider? Webroot – Move to our own solution SSL inspection? yes Man in the middle? Yes URL Filtering only? Yes Content based filtering… documents keyword enforcement… “confidential”, cc #s – DLP light weight Context based policies (in v1.1)??? Location, time of day
  12. Big-data reporting and analytics Alerts, warnings and anomaly notification Real-time log API
  13. Sophos has a great selection of web security products All of this information is available on an updtaed deskaid availbale on hub and PP Clarifies the features that are available in each deployment option, haven’t got the time to go through all of these today – but if you want to explain to your customer why they need CWG over the web controls, this is what you need to review
  14. So what are the benfits of SCWG