SlideShare a Scribd company logo
1 of 38
Sophos XG Firewall
The next thing in next-gen
Chris McCormack
NSG Product Marketing
November, 2016
What we’ll cover…
2
Today’s Top Problems with Existing Firewalls
Sophos XG Firewall
What’s New
Live Demo
What’s Next
Today’s top firewall problems
Compounded by trends in network security
Poor performance
Poor value
Too complex
Insufficient security & control
Insufficient visibility
Top complaints with existing Firewalls (2016*) Network Security Trends
Enormous amounts of data collected
More than any IT manager can consume
More sophisticated threats
Evasive, targeted, zero-day threats
Increasing number of solutions
Too many features, too many products
$
Spiralling costs of security
More solutions competing for similar budget
Unprecedented network demands
Cloud, IaaS, vanishing perimeter, BYOD
*Sophos commissioned a survey of mid-market IT managers on Spiceworks
Sophos XG Firewall
4
Solving today’s top problems with existing Firewalls
Central ManagementSimpler to manage Instant visibility Synchronized security Top performance
 Streamlined workflows
 Unified policies
 Policy templates
 Control center
 User & App Risk
 On-box reporting
 Linking firewall & EP
 Security Heartbeat™
 Dynamic app ID
 Industry-leading HW
 FastPath optimization
 High-performance proxy
 Full-featured & consistent
 Cloud or on-premise
 Free for partners
Complete protection
 Firewall & Wireless
 Web, Apps, APT
 Email and WAF
XG Firewall’s Unique Innovations
5
What makes XG Firewall Unique
6
Innovative features you just can’t get anywhere else
Synchronized Security
• Links Endpoints and Firewall to share telemetry and status
• Enables features like Security Heartbeat™ & Real-time App ID
Unified Firewall Rules and Policies
• All firewall rules on one screen with snap-in user-based policies
• Policy templates simplify protecting business applications
Enterprise-grade Secure Web Gateway
• Powerful top-down inheritance based web policy model
• Easy and intuitive to build sophisticated user and group based policies
User and Application Risk Assessment
• Automatically identifies high risk users and applications on the network
• Identifies potential issues before they become real problems
No-compromise Deployment and Central Management
• The most flexible deployment options without compromise: XG Series, software, virtual, IaaS (Azure)
• Comprehensive centralized management and reporting made simple
Synchronized Security
7
Admin
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Security Heartbeat™
RED Heartbeat
Firewall detects traffic from Endpoint
!
Synchronized Security
8
Admin
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Missing Heartbeat
MISSING Heartbeat
Firewall detects traffic from Endpoint
?
Synchronized Security
9
Admin
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Destination Heartbeat™
GREEN Heartbeat
!RED Heartbeat
Connections to/from the compromised system are blocked
Endpoint attempts to connect to compromised system
Synchronized Security
10
Admin
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Dynamic App Identification
GREEN Heartbeat
Firewall detects unknown traffic from Endpoint
Firewall requests context from endpoint
Application information is exchanged
Unified Firewall Rules and Policies
11
Making management easier
All firewall rules in one place
User, Network, Business Applications
Powerful filtering options
By rule type, zone, status or ID
At a glance indicators
Type, source, destination, users, service,
traffic status, heartbeat, QoS, and natural
language description
Policy Templates
12
Custom tailored templates enable easy & proper protection for common business apps
Enterprise-grade Secure Web Gateway
13
Powerful tools for building sophisticated user and group based web policies
Top-down inheritance policy model
Makes building sophisticated policies easy
and intuitive. The same kind of SWG usually
found only in dedicated enterprise products.
Pre-defined policy templates
Out-of-the-box policies for included for
workplace, CIPA compliance, and more
Powerful customization
Custom define users/groups, activities
(URLs, categories, file types), allowed action,
and time-of-day and day-of-week constraints
User Risk Assessment
14
Automatically identifying top risk users on the network
Automatically identifying top risk users
on the network – before they become a
problem
App Risk Assessment
15
Automatically identifying top application risks and overall app risk
Risk: Low
A few high risk applications and users are
operating on the network – continue to
monitor the situation carefully
Risk: High
Take action and setup an application
control policy before data loss, abuse, or
illegal activity become a real problem
Deployment flexibility without compromise
16
XG Series Hardware
Full range of hardware appliances with wireless AP and RED add-ons
Multi-core processors, solid-state storage, generous RAM
Industry-leading performance at all price points – Miercom tested
Virtual/Software
Vmware, Hyper-V, Citrix XEN, KVM
Flexibility regarding resource assignment and high availability
Compatible with all x86 hardware
IaaS
Available in Microsoft Azure Marketplace
Up and running in minutes with preconfigured VM
Pay-as-you-go or BYOL
Flexible deployment options optimized for today’s business
XG Firewall – How to buy
17
Deployment, Licensing and Pricing
Firewall & VPN Wireless
Network
Protection
Web & App
Protection
Email
Protection
Web Server
Protection
XG Series
Appliances
Software/
Virtual
IaaS
Base License
Total Bundle or À la carte
Deployment Choices
NGFW Bundle
XG Firewall
How XG does user policy better
18
Layer-8 User Identity and Awareness made simple
19
Covers all areas of the Firewall. Consolidated. Easy to Manage
IPS QoS Web Apps Routing
Powerful user/group policy enforcement made simple
20
Simply snap-in your sophisticated user and group based polices to a single firewall rule
Define your user/group web enforcement policy Snap-it-in to your desired firewall rule
Sophos Transparent Authentication Suite (STAS)
21
Making user identity transparent and reliable. Single-Sign-On (SSO) made easy
Microsoft
Active Directory
Server
STAS
Collector & Agent
No client required on devices for SSO!
XG Firewall
Authentication
Information
XG Firewall v16
22
23
HA support for dynamic WAN interfaces
Per-rule and Policy-based routing
Google Apps Control
Microsoft Azure SupportTwo-Factor Authentication
Support for 3rd party URL databases
New Navigation
New AP 15C and RED 15w support
Enhanced Anti-Spam
STAS GUI configuration
Synchronized Security
App Identification
Streamlined Firewall
Rule Screen
Firewall-to-firewall RED tunnels
Clone firewall and other rules
Log Viewer Enhancements
Enhanced Control Center
Email Per-Domain
Routing and MTA
SPX Email Encryption reply portal
Support for 3rd party URL databases
New User/Group Web Policy
Creative Commons SafeSearch
Image Enforcement
Enhanced Security Heartbeat
Firewall domain name
Missing Security
Heartbeat Detection
120!
Over…
New Features
XG Firewall v16: Key Focus Areas
User Experience
Creating a more intuitive experience
across all areas of the product from
navigation to policy to logging & more
New Features
Over 120 new features including the 35
most-wanted features from UTM 9
across web, email, 2FA & more
Synchronized Security
Adding new Synchronized Security
features to the arsenal to improve
protection, enforcement and visibility
Headline Enhancements
25
New (more familiar) Nav
Redesigned SWG-style Web Policy
Email Enhancements (MTA)
Logging and Troubleshooting
Two-factor authentication
Synchronized Security
Missing Heartbeat
Real-time app visibility
Destination Heartbeat
Microsoft Azure Support
Live Demo
26
What’s Next
27
SFM/CFM for v16
28
Entering beta soon
Full-Featured
Manage all firewall features
Monitoring, alerting, role-based admin
Easy Time Savers
Policy templates make enrollment quick
Firmware update management
Deployment Flexibility
On-Prem (Hardware, Software, Virtual)
Free in the cloud for Partners
Cloud coming for customers in v17
Sophos Sandstorm
29
Cloud-sandboxing – coming to XG Firewall in v16.5 (December)
Suspect Control Report
Sophos Sandstorm
Hash ?
Determine Behavior
How Effective is It?
30
10-20
One university that deployed Sandstorm blocked over 400 new macro variants in the
first few weeks. Very delighted with the simplicity and effectiveness of Sophos
Sandstorm.
Daily detonated files per customer
0.4-1.8Daily malware detected per customer
Sophos Central
Sophos Labs
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
| 24x7x365, multi-continent operation |
URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules
Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
In Cloud On Prem
Synchronized Security Coming in XG Firewall v17
31
Mobile
Server
Wireless
Email
Web
Encryption
Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Dynamic App Control
Dynamically identifying & controlling applications
Heartbeat in SFOS TAP Mode
Enhancing EP security and intelligence from the side
32
33
XG Firewall on Sophos Central
34
•Full-featured multi-device
•On-prem or cloud (partners)
•Single device and HA clusters
•Zero-touch and alerting
•Simple groups & multi-device
•API Support
Sophos Firewall
Manager
Sophos Central
Single Device
Sophos Central
Multi-Device
Q4Q1 Q2 Q3
CY 2017
Why Customers Choose Sophos
for their next firewall
35
Why customers are choosing Sophos
36
for their next firewall
1. Simpler to manage
We make advanced next-gen protection easier to manage than any other firewall product, making it easier to ensure
proper protection.
2. Instant insights
We include extensive rich on-box reporting at no extra charge and unique insights into risks and activity.
3. Complete protection
We provide more-in-one appliance than any other vendor.
4. Top Performance
Our firewall delivers industry leading performance at every price point.
5. Trusted industry leader
Sophos is among the top 3 vendors in the industry and has been a Gartner Magic Quadrant leader for the past 5 years.
A Leader in Unified Threat Management
37
• Sophos first entered into this MQ publication in March 2012,
positioned in the Leader quadrant – and has retained this position for
5 consecutive publications
• Sophos remains one of only three leaders after Dell and WatchGuard
were demoted last year
• Gartner’s perception of Sophos is even better than last year,
recognizing the strength of Synchronized Security, the breadth of our
security portfolio and that we are growing - taking market share from
our competitors
• In relative terms Sophos is edging closer on Fortinet and leaving
smaller vendors trailing further behind
This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's
research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its
original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.
Gartner Magic Quadrant
UNIFIED THREAT MANAGEMENT
Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils,
Rajpreet Kaur, 30 August 2016
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?

More Related Content

What's hot

What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XSophos Benelux
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Sophos Benelux
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 

What's hot (19)

What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Sandbox
SandboxSandbox
Sandbox
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 

Viewers also liked

Alphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, AdministrationAlphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, AdministrationAlphorm
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Benelux
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified EngineerFranklin Nsude
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domainNetProtocol Xpert
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation Mohit Kumar
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Benelux
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)welcometofacebook
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm
 

Viewers also liked (18)

Alphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, AdministrationAlphorm.com Formation SOPHOS XG FIREWALL, Administration
Alphorm.com Formation SOPHOS XG FIREWALL, Administration
 
CACHEBOX200 series
CACHEBOX200 seriesCACHEBOX200 series
CACHEBOX200 series
 
SG Séries
SG SériesSG Séries
SG Séries
 
Cachebox introduction is ps 0.2
Cachebox introduction is ps 0.2Cachebox introduction is ps 0.2
Cachebox introduction is ps 0.2
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified Engineer
 
Sophos End User Protection
Sophos End User ProtectionSophos End User Protection
Sophos End User Protection
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domain
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Structured cabling
Structured cablingStructured cabling
Structured cabling
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Structured Cabling Technologies
Structured Cabling TechnologiesStructured Cabling Technologies
Structured Cabling Technologies
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 

Similar to Sophos Day Belgium - What's cooking in Sophos' Network Security Group?

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 

Similar to Sophos Day Belgium - What's cooking in Sophos' Network Security Group? (20)

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 

More from Sophos Benelux

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos Benelux
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsSophos Benelux
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?Sophos Benelux
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control BoxSophos Benelux
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationSophos Benelux
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor USophos Benelux
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsSophos Benelux
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 

More from Sophos Benelux (11)

Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
Balabit - Shell Control Box
Balabit - Shell Control BoxBalabit - Shell Control Box
Balabit - Shell Control Box
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Case Study Diagnostiek voor U
Case Study Diagnostiek voor UCase Study Diagnostiek voor U
Case Study Diagnostiek voor U
 
Introduction Sophos Day Netherlands
Introduction Sophos Day NetherlandsIntroduction Sophos Day Netherlands
Introduction Sophos Day Netherlands
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Sophos Day Belgium - What's cooking in Sophos' Network Security Group?

  • 1. Sophos XG Firewall The next thing in next-gen Chris McCormack NSG Product Marketing November, 2016
  • 2. What we’ll cover… 2 Today’s Top Problems with Existing Firewalls Sophos XG Firewall What’s New Live Demo What’s Next
  • 3. Today’s top firewall problems Compounded by trends in network security Poor performance Poor value Too complex Insufficient security & control Insufficient visibility Top complaints with existing Firewalls (2016*) Network Security Trends Enormous amounts of data collected More than any IT manager can consume More sophisticated threats Evasive, targeted, zero-day threats Increasing number of solutions Too many features, too many products $ Spiralling costs of security More solutions competing for similar budget Unprecedented network demands Cloud, IaaS, vanishing perimeter, BYOD *Sophos commissioned a survey of mid-market IT managers on Spiceworks
  • 4. Sophos XG Firewall 4 Solving today’s top problems with existing Firewalls Central ManagementSimpler to manage Instant visibility Synchronized security Top performance  Streamlined workflows  Unified policies  Policy templates  Control center  User & App Risk  On-box reporting  Linking firewall & EP  Security Heartbeat™  Dynamic app ID  Industry-leading HW  FastPath optimization  High-performance proxy  Full-featured & consistent  Cloud or on-premise  Free for partners Complete protection  Firewall & Wireless  Web, Apps, APT  Email and WAF
  • 5. XG Firewall’s Unique Innovations 5
  • 6. What makes XG Firewall Unique 6 Innovative features you just can’t get anywhere else Synchronized Security • Links Endpoints and Firewall to share telemetry and status • Enables features like Security Heartbeat™ & Real-time App ID Unified Firewall Rules and Policies • All firewall rules on one screen with snap-in user-based policies • Policy templates simplify protecting business applications Enterprise-grade Secure Web Gateway • Powerful top-down inheritance based web policy model • Easy and intuitive to build sophisticated user and group based policies User and Application Risk Assessment • Automatically identifies high risk users and applications on the network • Identifies potential issues before they become real problems No-compromise Deployment and Central Management • The most flexible deployment options without compromise: XG Series, software, virtual, IaaS (Azure) • Comprehensive centralized management and reporting made simple
  • 7. Synchronized Security 7 Admin Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Security Heartbeat™ RED Heartbeat Firewall detects traffic from Endpoint !
  • 8. Synchronized Security 8 Admin Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Missing Heartbeat MISSING Heartbeat Firewall detects traffic from Endpoint ?
  • 9. Synchronized Security 9 Admin Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Destination Heartbeat™ GREEN Heartbeat !RED Heartbeat Connections to/from the compromised system are blocked Endpoint attempts to connect to compromised system
  • 10. Synchronized Security 10 Admin Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Dynamic App Identification GREEN Heartbeat Firewall detects unknown traffic from Endpoint Firewall requests context from endpoint Application information is exchanged
  • 11. Unified Firewall Rules and Policies 11 Making management easier All firewall rules in one place User, Network, Business Applications Powerful filtering options By rule type, zone, status or ID At a glance indicators Type, source, destination, users, service, traffic status, heartbeat, QoS, and natural language description
  • 12. Policy Templates 12 Custom tailored templates enable easy & proper protection for common business apps
  • 13. Enterprise-grade Secure Web Gateway 13 Powerful tools for building sophisticated user and group based web policies Top-down inheritance policy model Makes building sophisticated policies easy and intuitive. The same kind of SWG usually found only in dedicated enterprise products. Pre-defined policy templates Out-of-the-box policies for included for workplace, CIPA compliance, and more Powerful customization Custom define users/groups, activities (URLs, categories, file types), allowed action, and time-of-day and day-of-week constraints
  • 14. User Risk Assessment 14 Automatically identifying top risk users on the network Automatically identifying top risk users on the network – before they become a problem
  • 15. App Risk Assessment 15 Automatically identifying top application risks and overall app risk Risk: Low A few high risk applications and users are operating on the network – continue to monitor the situation carefully Risk: High Take action and setup an application control policy before data loss, abuse, or illegal activity become a real problem
  • 16. Deployment flexibility without compromise 16 XG Series Hardware Full range of hardware appliances with wireless AP and RED add-ons Multi-core processors, solid-state storage, generous RAM Industry-leading performance at all price points – Miercom tested Virtual/Software Vmware, Hyper-V, Citrix XEN, KVM Flexibility regarding resource assignment and high availability Compatible with all x86 hardware IaaS Available in Microsoft Azure Marketplace Up and running in minutes with preconfigured VM Pay-as-you-go or BYOL Flexible deployment options optimized for today’s business
  • 17. XG Firewall – How to buy 17 Deployment, Licensing and Pricing Firewall & VPN Wireless Network Protection Web & App Protection Email Protection Web Server Protection XG Series Appliances Software/ Virtual IaaS Base License Total Bundle or À la carte Deployment Choices NGFW Bundle
  • 18. XG Firewall How XG does user policy better 18
  • 19. Layer-8 User Identity and Awareness made simple 19 Covers all areas of the Firewall. Consolidated. Easy to Manage IPS QoS Web Apps Routing
  • 20. Powerful user/group policy enforcement made simple 20 Simply snap-in your sophisticated user and group based polices to a single firewall rule Define your user/group web enforcement policy Snap-it-in to your desired firewall rule
  • 21. Sophos Transparent Authentication Suite (STAS) 21 Making user identity transparent and reliable. Single-Sign-On (SSO) made easy Microsoft Active Directory Server STAS Collector & Agent No client required on devices for SSO! XG Firewall Authentication Information
  • 23. 23 HA support for dynamic WAN interfaces Per-rule and Policy-based routing Google Apps Control Microsoft Azure SupportTwo-Factor Authentication Support for 3rd party URL databases New Navigation New AP 15C and RED 15w support Enhanced Anti-Spam STAS GUI configuration Synchronized Security App Identification Streamlined Firewall Rule Screen Firewall-to-firewall RED tunnels Clone firewall and other rules Log Viewer Enhancements Enhanced Control Center Email Per-Domain Routing and MTA SPX Email Encryption reply portal Support for 3rd party URL databases New User/Group Web Policy Creative Commons SafeSearch Image Enforcement Enhanced Security Heartbeat Firewall domain name Missing Security Heartbeat Detection 120! Over… New Features
  • 24. XG Firewall v16: Key Focus Areas User Experience Creating a more intuitive experience across all areas of the product from navigation to policy to logging & more New Features Over 120 new features including the 35 most-wanted features from UTM 9 across web, email, 2FA & more Synchronized Security Adding new Synchronized Security features to the arsenal to improve protection, enforcement and visibility
  • 25. Headline Enhancements 25 New (more familiar) Nav Redesigned SWG-style Web Policy Email Enhancements (MTA) Logging and Troubleshooting Two-factor authentication Synchronized Security Missing Heartbeat Real-time app visibility Destination Heartbeat Microsoft Azure Support
  • 28. SFM/CFM for v16 28 Entering beta soon Full-Featured Manage all firewall features Monitoring, alerting, role-based admin Easy Time Savers Policy templates make enrollment quick Firmware update management Deployment Flexibility On-Prem (Hardware, Software, Virtual) Free in the cloud for Partners Cloud coming for customers in v17
  • 29. Sophos Sandstorm 29 Cloud-sandboxing – coming to XG Firewall in v16.5 (December) Suspect Control Report Sophos Sandstorm Hash ? Determine Behavior
  • 30. How Effective is It? 30 10-20 One university that deployed Sandstorm blocked over 400 new macro variants in the first few weeks. Very delighted with the simplicity and effectiveness of Sophos Sandstorm. Daily detonated files per customer 0.4-1.8Daily malware detected per customer
  • 31. Sophos Central Sophos Labs Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations In Cloud On Prem Synchronized Security Coming in XG Firewall v17 31 Mobile Server Wireless Email Web Encryption Endpoint/Next-Gen EndpointUTM/Next-Gen Firewall Dynamic App Control Dynamically identifying & controlling applications Heartbeat in SFOS TAP Mode Enhancing EP security and intelligence from the side
  • 32. 32
  • 33. 33
  • 34. XG Firewall on Sophos Central 34 •Full-featured multi-device •On-prem or cloud (partners) •Single device and HA clusters •Zero-touch and alerting •Simple groups & multi-device •API Support Sophos Firewall Manager Sophos Central Single Device Sophos Central Multi-Device Q4Q1 Q2 Q3 CY 2017
  • 35. Why Customers Choose Sophos for their next firewall 35
  • 36. Why customers are choosing Sophos 36 for their next firewall 1. Simpler to manage We make advanced next-gen protection easier to manage than any other firewall product, making it easier to ensure proper protection. 2. Instant insights We include extensive rich on-box reporting at no extra charge and unique insights into risks and activity. 3. Complete protection We provide more-in-one appliance than any other vendor. 4. Top Performance Our firewall delivers industry leading performance at every price point. 5. Trusted industry leader Sophos is among the top 3 vendors in the industry and has been a Gartner Magic Quadrant leader for the past 5 years.
  • 37. A Leader in Unified Threat Management 37 • Sophos first entered into this MQ publication in March 2012, positioned in the Leader quadrant – and has retained this position for 5 consecutive publications • Sophos remains one of only three leaders after Dell and WatchGuard were demoted last year • Gartner’s perception of Sophos is even better than last year, recognizing the strength of Synchronized Security, the breadth of our security portfolio and that we are growing - taking market share from our competitors • In relative terms Sophos is edging closer on Fortinet and leaving smaller vendors trailing further behind This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Rajpreet Kaur, 30 August 2016

Editor's Notes

  1. Hello, my name is chris McCormack, and I work in the Network Security Group at Sophos with our Firewall and UTM products. Today we’re going to talk about Sophos XG Firewall.
  2. I’m going to provide a…
  3. If you think about what your top issues are with existing firewalls today, or ask your customers what their top problems are, you’re likely to find something in common with this list. We actually surveyed IT Managers on Spiceworks and their top complaints with their firewall include… And there are a number of industry trends that are compounding these issues as I’m sure you’re well aware such as the enormous amounts of data being collected by Firewalls that is way more than any IT manager can ever consume… or the increasing sophistication of threats, the number of solutions and features and products required to provide an adequate defense in most cases, that is spiraling costs out of control… all combined with an unprecidented demand on network resources. There are serious problems with today’s network security solutions.
  4. Which is why we have XG Firewall. It really has been designed from the ground up to solve today’s top problems with existing firewalls…
  5. Unique – Synchronized Security Links Endpoints and Firewall to enable them to communicate and share information Enables unique features like Security Heartbeat™ and real-time application identification 2. Unique – Layer-8 User Identity and Awareness Provides user awareness and control across all areas of the firewall including IPS, web and app control, and traffic shaping Works with Sophos unique STAS (Sophos Transparent Authentication Suite) that integrates with Microsoft Active Directory service Unique – Policy Templates Makes securing common business applications like Exchange or SharePoint simple by offering pre-defined policy tempaltes Simply select the desired business application from a drop-down list and complete the pre-defined template Unique – User and Application Risk Automatically identifies high risk users and applications on the network Enables administrators to be proactive and take preventive measures before they become real problems Unique – Flexible No-compromise Deployment We offer the most flexible deployment options including hardware, software, virtual, or IaaS without compromise
  6. BRYAN TO PRESENT? UX New Left Nav Tabs for 2nd Level Nav (still a WIP) Enhanced Control Center Widgets Redesigned Web Policy Direct access to live log viewer from any screen (via magnifying glass) New network and device features Firewall Hostname Cloning of rules, objects, and policies Per-rule routing Policy routes Firewall-to-Firewall RED Tunnels Country filtering improvements Improved NAT Business Rule Creation New email features Per domain routing Full MTA – store and forward Enhanced anti-spam SPX Reply Portal New Sync Sec Missing Security Heartbeat Real-time App Visibility Destination-based Security Heartbeat
  7. How effective is it?...
  8. Joe’s notes on the synchronized security scenarios (for reference). • Heartbeat first (now) • Unknown AppID (soon) • Kepler – adding application and system integrity from EP (soon) • Shunning / lateral movement protection on endpoint/server (soon) • Phishing protection - reputation system, training, adaptive security based on assessment results (future) • Mobile devices as “continuous auth” solutions - using sensors for voice, image, fingerprinting, geolocation, gait measurement (way future)
  9. UTM MQ has been published with Sophos inclusion: March-2012, July-2013, Aug-2014, Aug-2015, Aug-2016 (each year as Leader)
  10. So that concludes this overview of XG Firewall v16, I hope you’re as excited as we are about this great new release… thanks for watching.