SlideShare a Scribd company logo
1
Lars Putteneers
Sales Engineer
Sophos Cloud
Breaking the stereotypes
22
Industry overview
3
Corporate Perimeter
VPN
Corporate Perimeter
Cloud
Services
Dissolving Corporate Perimeter
4
I hate to break it to you……
5
End user
 Endpoint protection
 Mobile security
 Web gateway
Advanced User Protection
Integrated User-based policy, management and reporting
66
Sophos Cloud
Overview
7
Sophos Cloud is…
Easy to use
• Easy to try
• Cloud-based
• No management
server required
• Works out of the box
IntegratedComprehensive
• Endpoint Security:
Windows, Mac,
Servers
• Mobile: iOS &
Android
• Secure Web Gateway
• Secure Mail Gateway
• Cloud managed WiFi
• Single user-based policy
for workstations, mobile
devices, and web gateway
• Only cloud-managed
security product that is
fully integrated
8
Sophos Cloud Products
Endpoint
Protection
Mobile
Control
Server
Protection
Web
Gateway
Email
Gateway
For Channel Partners
• Customer and License
Management
• Cross-customer security
incident management
Sophos Cloud
For Administrators
• Unified management and
reporting
• Simple to deploy – no
servers to manage
Sophos Cloud
Key Benefits:
• Easy Deployment
• Simple management
• Faster delivery of security
• Comprehensive & integrated - Enhanced deeper security and visibility
• Modular – simple add-on license activation
99
Endpoint/Enduser
protection
10
Remediation
Removes detected malware automatically; Security Heartbeat (Galileo)
enables a synchronized security response with Copernicus Firewall
Prevention
Correlates threat indicators to block web and application exploits,
dangerous URLs, potentially unwanted apps and malicious code
Detection
Analyzes software behavior and network traffic in real time, alerting
you to hidden threats that can be missed by traditional AV technology
Next Generation Endpoint Protection
11
What’s new in Sophos Cloud
Endpoint Protection
Application
control
Download reputation
Adware & PUA
detection for Mac
1212
Server Protection
13
Sophos Cloud Server Protection
Standard and Advanced
Simple
• One-Click lockdown
• Automatic trust rules
• Cloud-managed:
Instant deployment.
• Server-specific policy
• Automatic exclusion
Great
Protection
• Whitelisting integrated
with AV and HIPS
• Web Security
Fast
performance
• Fast scanning
• Low impact
• Won’t slow
down servers
unique unique
14
Positioning Server Protection
• Server Protection Standard
○ Server AV for Windows and Linux
○ Automatic Scanning exclusion for windows
○ Can be upgraded from free Linux AV
○ Agentless option for VMWare virtualization platform (vShield)
• Server Protection Advanced
○ Server Standard + Server lockdown
Sophos Server Protection offers
the best protection, performance and ease of use.
It’s the best choice for the mid-market.
15
Server Lockdown with One Click
16
What happens when you click “Lockdown”
Status
Server
Management
Receive
Rules from
Server Authority
Whitelisting
Check if it needs
to be whitelisted
Check if it is
maliscious
Create a profile/
fingerprint executable
Add to
whitelist
Applying Trust
Identify
trust rules
Apply
trust rules
Sophos Cloud
17
Sophos Cloud
https://cloud.sophos.com
1818
Sophos Cloud
Mobile Control &
Mobile Security
19
MDM: Sophos Cloud Mobile Control
Simple to Manage, Enhanced (IT) Productivity & Cost Savings
(50% Savings Compared to Competitors)
Manage Device
• Support BYOD
• OTA enrolment
and configuration
• One policy for iOS
and Android
Secure Device
• Enforce passcodes
& encryption
• Locate, Lock and
wipe
• Compliance
Protect Data
• Configure email
access
• Configure Wi-Fi
access
20
Sophos Cloud Mobile Security
Country Malware PUA
United States 4,49 14,28
Germany 4,84 9,71
Netherlands 6,65 17,64
UK 5,51 10,97
France 5,2 14,19
Canada 2,29 14,13
Australia 3,75 14,3
Singapore 11,82 28,89
% infected devices Jan-Jun/15
Protects Android devices from malware, risky apps and websites
SophosLabs 2015
Proven SMSec client can
be managed from Sophos
Cloud and integrated with
MDM
Launched October 2015
Differentiated protection,
scalable cloud managed,
user licenced, unbundled.
- Integrate with
Sophos MDM
- Extend End-User
protection
Global mobile malware
concerns (IDC, Germany)
Global Treat Trends
SophosLabs
21
Integrated in Sophos Cloud Dashboard
22
Sophos Mobile Control
https://smc-eval1.sophos.com/admin
2323
Sophos Cloud Web
Gateway
24
Supported Platforms
Mac & Windows Available Now, Other Platforms Coming Soon
Mac OS X 10.8.5+ Windows 7+
Android 4.0+ iOS 5.0+Chromebook
Coming in late Q3
25
Global Network Optimized for Mobile Workforce
Lightweight Endpoint Agent
• Proxies data traffic to a Sophos Gateway
• Dynamically chooses the best performing
gateway
• Knows what traffic not to proxy based on
policy
Globally distributed gateways
• Analyze each packet for threats
• Apply corporate policies
• Aggregate data for real-time analytics
Central Management
through Sophos Cloud
Globally Distributed Gateways
26
Sophos Cloud Web Gateway Security & Control
Advanced Protection and Granular Control
Security and Control
• Web filtering on 90+
categories
• App & URL filtering
• Anti-malware and anti-
phishing based on
Sophos Labs
• Lightweight DLP
(keyword content
scanning)
• SSL scanning – zero
touch SSL certificate
management
• Google SafeSearch
27
CWG Visibility & Reporting
Big Data Reporting and Analytics made Simple
Visibility and Reporting
• Org wide reporting
• Bandwidth, threats,
category, domain,
protocol
• Per user reporting
• Same reports as
org
• Network usage
• By app, user,
category, location,
device, domain,
protocol
• Malware & phishing
reporting
28
Differences Between Web Security Products
Cloud A/V
Web Controls
SWA UTM
Cloud Web
Gateway
Web filtering 54 categories 54 categories 54 categories 90 categories
Reporting Limited Great Good Good
SSL Scanning ✗ Admin must deploy
certificates
Admin must deploy
certificates
✔
Keyword filtering (DLP) ✗ ✗ ✗ ✔
Custom block pages ✗ ✔ ✔ ✔
User feedback to admin ✗ ✔ ✗ Q4
App controls ✗ ✔ ✔ Q4
User time quotas ✗ ✔ ✔ Q4
Safesearch / Youtube ✗ ✔ ✔ ✔
Real-time logging ✗ ✔ ✔ ✔
Syslog ✗ ✔ ✔ Q1
Sand-boxing ✗ Q4 Q1 Q1
2929
Sophos Cloud Email
Gateway
30
Sophos Cloud Email Gateway
Sophos Cloud simplicity – with cutting edge mail security
https://asp.reflexion.net/home
3131
Sophos Cloud
Licensing
32
Cloud protection
33© Sophos Ltd. All rights reserved.

More Related Content

What's hot

Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
Giovanni Giovannelli
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Benelux
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
Sophos Benelux
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
Sophos
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
Sophos Benelux
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
Sophos
 
Kaspersky
KasperskyKaspersky
Kaspersky
Kappa Data
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
Iftikhar Ali Iqbal
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
Invincea, Inc.
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
F-Secure Corporation
 

What's hot (20)

XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 

Similar to Sophos Cloud - breaking the stereotypes

SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
JoseRamirez372702
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
Ricardo Resnik
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
xband
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
Abasse KPEGOUNI
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
Hentsū
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
ssusera76ea9
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
Amazon Web Services
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
Inductive Automation
 

Similar to Sophos Cloud - breaking the stereotypes (20)

SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 

More from Sophos Benelux

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
Sophos Benelux
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Benelux
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Benelux
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
Sophos Benelux
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
Sophos Benelux
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
Sophos Benelux
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control Box
Sophos Benelux
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
Sophos Benelux
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
Sophos Benelux
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor U
Sophos Benelux
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day Netherlands
Sophos Benelux
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
Sophos Benelux
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 

More from Sophos Benelux (14)

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control Box
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor U
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day Netherlands
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 

Recently uploaded

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Sophos Cloud - breaking the stereotypes

  • 1. 1 Lars Putteneers Sales Engineer Sophos Cloud Breaking the stereotypes
  • 4. 4 I hate to break it to you……
  • 5. 5 End user  Endpoint protection  Mobile security  Web gateway Advanced User Protection Integrated User-based policy, management and reporting
  • 7. 7 Sophos Cloud is… Easy to use • Easy to try • Cloud-based • No management server required • Works out of the box IntegratedComprehensive • Endpoint Security: Windows, Mac, Servers • Mobile: iOS & Android • Secure Web Gateway • Secure Mail Gateway • Cloud managed WiFi • Single user-based policy for workstations, mobile devices, and web gateway • Only cloud-managed security product that is fully integrated
  • 8. 8 Sophos Cloud Products Endpoint Protection Mobile Control Server Protection Web Gateway Email Gateway For Channel Partners • Customer and License Management • Cross-customer security incident management Sophos Cloud For Administrators • Unified management and reporting • Simple to deploy – no servers to manage Sophos Cloud Key Benefits: • Easy Deployment • Simple management • Faster delivery of security • Comprehensive & integrated - Enhanced deeper security and visibility • Modular – simple add-on license activation
  • 10. 10 Remediation Removes detected malware automatically; Security Heartbeat (Galileo) enables a synchronized security response with Copernicus Firewall Prevention Correlates threat indicators to block web and application exploits, dangerous URLs, potentially unwanted apps and malicious code Detection Analyzes software behavior and network traffic in real time, alerting you to hidden threats that can be missed by traditional AV technology Next Generation Endpoint Protection
  • 11. 11 What’s new in Sophos Cloud Endpoint Protection Application control Download reputation Adware & PUA detection for Mac
  • 13. 13 Sophos Cloud Server Protection Standard and Advanced Simple • One-Click lockdown • Automatic trust rules • Cloud-managed: Instant deployment. • Server-specific policy • Automatic exclusion Great Protection • Whitelisting integrated with AV and HIPS • Web Security Fast performance • Fast scanning • Low impact • Won’t slow down servers unique unique
  • 14. 14 Positioning Server Protection • Server Protection Standard ○ Server AV for Windows and Linux ○ Automatic Scanning exclusion for windows ○ Can be upgraded from free Linux AV ○ Agentless option for VMWare virtualization platform (vShield) • Server Protection Advanced ○ Server Standard + Server lockdown Sophos Server Protection offers the best protection, performance and ease of use. It’s the best choice for the mid-market.
  • 16. 16 What happens when you click “Lockdown” Status Server Management Receive Rules from Server Authority Whitelisting Check if it needs to be whitelisted Check if it is maliscious Create a profile/ fingerprint executable Add to whitelist Applying Trust Identify trust rules Apply trust rules Sophos Cloud
  • 18. 1818 Sophos Cloud Mobile Control & Mobile Security
  • 19. 19 MDM: Sophos Cloud Mobile Control Simple to Manage, Enhanced (IT) Productivity & Cost Savings (50% Savings Compared to Competitors) Manage Device • Support BYOD • OTA enrolment and configuration • One policy for iOS and Android Secure Device • Enforce passcodes & encryption • Locate, Lock and wipe • Compliance Protect Data • Configure email access • Configure Wi-Fi access
  • 20. 20 Sophos Cloud Mobile Security Country Malware PUA United States 4,49 14,28 Germany 4,84 9,71 Netherlands 6,65 17,64 UK 5,51 10,97 France 5,2 14,19 Canada 2,29 14,13 Australia 3,75 14,3 Singapore 11,82 28,89 % infected devices Jan-Jun/15 Protects Android devices from malware, risky apps and websites SophosLabs 2015 Proven SMSec client can be managed from Sophos Cloud and integrated with MDM Launched October 2015 Differentiated protection, scalable cloud managed, user licenced, unbundled. - Integrate with Sophos MDM - Extend End-User protection Global mobile malware concerns (IDC, Germany) Global Treat Trends SophosLabs
  • 21. 21 Integrated in Sophos Cloud Dashboard
  • 24. 24 Supported Platforms Mac & Windows Available Now, Other Platforms Coming Soon Mac OS X 10.8.5+ Windows 7+ Android 4.0+ iOS 5.0+Chromebook Coming in late Q3
  • 25. 25 Global Network Optimized for Mobile Workforce Lightweight Endpoint Agent • Proxies data traffic to a Sophos Gateway • Dynamically chooses the best performing gateway • Knows what traffic not to proxy based on policy Globally distributed gateways • Analyze each packet for threats • Apply corporate policies • Aggregate data for real-time analytics Central Management through Sophos Cloud Globally Distributed Gateways
  • 26. 26 Sophos Cloud Web Gateway Security & Control Advanced Protection and Granular Control Security and Control • Web filtering on 90+ categories • App & URL filtering • Anti-malware and anti- phishing based on Sophos Labs • Lightweight DLP (keyword content scanning) • SSL scanning – zero touch SSL certificate management • Google SafeSearch
  • 27. 27 CWG Visibility & Reporting Big Data Reporting and Analytics made Simple Visibility and Reporting • Org wide reporting • Bandwidth, threats, category, domain, protocol • Per user reporting • Same reports as org • Network usage • By app, user, category, location, device, domain, protocol • Malware & phishing reporting
  • 28. 28 Differences Between Web Security Products Cloud A/V Web Controls SWA UTM Cloud Web Gateway Web filtering 54 categories 54 categories 54 categories 90 categories Reporting Limited Great Good Good SSL Scanning ✗ Admin must deploy certificates Admin must deploy certificates ✔ Keyword filtering (DLP) ✗ ✗ ✗ ✔ Custom block pages ✗ ✔ ✔ ✔ User feedback to admin ✗ ✔ ✗ Q4 App controls ✗ ✔ ✔ Q4 User time quotas ✗ ✔ ✔ Q4 Safesearch / Youtube ✗ ✔ ✔ ✔ Real-time logging ✗ ✔ ✔ ✔ Syslog ✗ ✔ ✔ Q1 Sand-boxing ✗ Q4 Q1 Q1
  • 30. 30 Sophos Cloud Email Gateway Sophos Cloud simplicity – with cutting edge mail security https://asp.reflexion.net/home
  • 33. 33© Sophos Ltd. All rights reserved.

Editor's Notes

  1. This is how IT sees it Over the past several years, the endpoint has changed. Endpoints used to be primarily Windows PCs housed on site, within a firewalled perimeter. Now endpoints include employee- and employer-owned PCs, Macs, Androids, iPhones and iPads. They access corporate servers and cloud services inside and outside the perimeter.
  2. Why do we need advanced end user protection? Users are vulnerabiltiy and they are often the weakest link in an organization's secuirty
  3. Sophos Cloud is Simple: You can get started in 60 seconds or less and our single intuitive console manages everything You have clear visibility and control of all user devices —and servers The Sophos Cloud server policy adapts automatically to the customer’s environment Sophos Cloud is Complete: Covering Windows, Windows Server, Mac, iOS, Android and Web control Sophos Cloud is unique and powerful: It’s the only cloud-managed security product with single user-based policy for workstations, mobile devices, and web control It’s the only product to automatically identify server applications and continually adapt the policy And, it’s the only cloud-managed security product to offer protection designed specifically for servers
  4. This will be a good slide for transiting to all other Products Sophos Cloud is a complete solution and will be even more complete in the coming months. Our enduser protection has endpoint + mobile We have added server protection with server application whitelisting and lockdown Cloud based web gateway way provide a comprehensive web security and content filtering capabilities
  5. When we talk about next gen endpoint protection – we are focusing on prevention, detection and remediation.
  6. Sophos Cloud Server Protection is Server Anti-malware designed specifically for servers that automatically adapts to the customer’s server enviroments. It is easy to configure and manage because once user install the protection agent it automatically identify Server OS, and apply default server policy and automatically apply exclusion whenever appropriate. With other application, you might have to manually group all of your exchange servers, then manually set exclusion. And then move on to other type of servers. With Sophos, you can set one policy, and it will automatically adapt to various environment. When you update your server, the software will adapt to that change, making maintenance extremely easy. At Sophos, we make sure security doesn’t get in the way of performance. Our AV engine has consistently proven to be best in performance by 3rd party tests. Sophos Cloud Server protection is no exception. In summary, with Sophos Cloud Sever protection, you get the best protection, that doesn’t slow down your mission critical servers and we make this extremely easy so you don’t spend our precious time time reading manuals or touble shooting.
  7. So what are the benfits of SCWG
  8. Sophos Cloud is simple to manage, providing enhanced productivity & significant cost savings.
  9. So what are the benfits of SCWG
  10. There’s a Lightweight Endpoint Agent on each device that Proxies data traffic to a Sophos Gateway. It Dynamically chooses the best performing gateway and Knows what traffic not to proxy based on policy Globally distributed gateways where every packet is analysed for threats, corporate policies are applied and data is complied for real-time analytics All is managed through the simple, intuitive Sophos Cloud Management interface
  11. Visibility into all network traffic Zscaler only looks at HTTP traffic We look at all network traffic UDP, TCP, SMTP, IMAP, App Traffic, FTP Need info on polices User/Group based? Yes Time of day? Location based? No (later) Bandwidth Quota? Yes Site categories? 75? What URL database provider? Webroot – Move to our own solution SSL inspection? yes Man in the middle? Yes URL Filtering only? Yes Content based filtering… documents keyword enforcement… “confidential”, cc #s – DLP light weight Context based policies (in v1.1)??? Location, time of day
  12. Big-data reporting and analytics Alerts, warnings and anomaly notification Real-time log API
  13. Sophos has a great selection of web security products All of this information is available on an updtaed deskaid availbale on hub and PP Clarifies the features that are available in each deployment option, haven’t got the time to go through all of these today – but if you want to explain to your customer why they need CWG over the web controls, this is what you need to review
  14. So what are the benfits of SCWG