SlideShare a Scribd company logo
1
Barbara Hudson
Sr. Product Marketing Manager
Sophos Wireless
Protection
An Overview
2
Agenda
• The enterprise WLAN market
• Your needs
• Our wireless solutions
• Let’s talk
3
Global Enterprise WLAN Market
Source: IDC
Q1 2013 marked 13 consecutive quarters
of annual growth over 15%
2012
3.68
billion US$
2013 (estimate)
4.3
billion US$
4
Key driver for wireless market growth
BYOD
& the booming
enterprise mobility
market
5
Considerations for your secure Wi-Fi
Ease of use
Secure guest
access
Complete
coverage
Access for
BYOD users
Cost-
effectiveness
Scalability
6
WLAN solutions – an overview
Consumer home access points
+ Low cost
- Limited features
- Hard to manage
Low-end UTM appliances with integrated WLAN
+ Moderate investment
+ Integrated UTM
- Incomplete coverage
Cloud-based access point management
+ Moderate investment
+ Scalable
- Limited security
Enterprise controller-based solutions
+ Many WLAN features
- Very expensive
- Hard to manage
7
Why Sophos Wireless Protection?
+ Wireless access everywhere
+ Secure guest WLAN
+ Easy to use (plug 'n' play)
+ Integrated UTM security
8
AT HOME AND ON THE MOVE
HEADQUARTERS
REMOTE OFFICE
Sophos RED
UTM
Secure Wi-Fi
Secure Web Gateway
Wireless controller
Secure Email Gateway
Web Application Firewall
Secure Wi-Fi
Secure Guest Wi-Fi
Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification
UTM Manager
SOPHOS UTM
Management
Protection
Reporting
UTM Endpoint Protection
UTM Endpoint Protection
Full UTM Protection
UTM Endpoint Protection
Secure VPN Client
Sophos UTM: Securing wireless networks
Secure VPN Client
9
Wireless access everywhere – mesh
10
Secure guest WLAN and BYOD – hotspots
11
Easy to use (plug 'n' play)
12
Integrated UTM security
• Dual AV-engine (SophosLabs, Avira)
• Extensive web filtering capabilities
• Intrusion Prevention System
• …
• Wireless LAN in remote offices
13
What I really like about Sophos’ integrated wireless
protection approach is that it frees our administrators
from separately managing an expensive enterprise
wireless solution.
Jason Richards, CEO of Vineyard Networks
“
”
Don’t just take our word for it
14
Ask yourself…
Would you like to have a
wireless LAN solution that
offers strong wireless and
security functionality but is
easy to manage?
Would your organization benefit
if you were able to plug in the
access points anywhere in your
network for automatic and
instant installation?
How important is it for you
to extend your wireless
solution to cover every part
of the office?
How do you currently offer
wireless Internet access to
your visitors and guests?
How much time do you
spend managing wireless
networking and security
solutions independently
from one another?
15
What we can offer
• Access Points and Wireless Protection Subscription (wireless
controller) as an add-on to an existing Firewall or Security
Gateway
• The option to combine with RED for secure branch office
connectivity
• Our FullGuard license also provides Network and Web
Protection
• Or for smaller offices, try our BasicGuard license
• Add Endpoint Protection and Web in Endpoint, for consistent
protection wherever your users are
16
Let’s talk
17© Sophos Ltd. All rights reserved.

More Related Content

What's hot

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
Sophos
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
Pouria Ghatrenabi
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
Thomas Springer
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Prime Infoserv
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Andris Soroka
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
Endeavour Software Technologies
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 

What's hot (20)

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 

Similar to Sophos Wireless Protection Overview

Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Xirrus
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
Marketing Team
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
SACHIN SHARMA
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
sushil kumar
 
Wlan solu aag_brochure
Wlan solu aag_brochureWlan solu aag_brochure
Wlan solu aag_brochure
Advantec Distribution
 
L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2Neermal Doolub
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
Laird Connectivity
 
SmartOffice Business Broadband
SmartOffice Business BroadbandSmartOffice Business Broadband
SmartOffice Business Broadband
Tata Tele Business Services
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
Sophos Benelux
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
Amir Zmora
 
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter NetworkIntelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
QOS Networks
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
Nirad The cloud managed networking solution
Nirad The cloud managed networking solutionNirad The cloud managed networking solution
Nirad The cloud managed networking solution
Sagar Reddy
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
Ralph Santitoro
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: Awingu
Accel
 

Similar to Sophos Wireless Protection Overview (20)

Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
Wlan solu aag_brochure
Wlan solu aag_brochureWlan solu aag_brochure
Wlan solu aag_brochure
 
L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2
 
Wlan - Infraestrutura
Wlan - InfraestruturaWlan - Infraestrutura
Wlan - Infraestrutura
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
 
SmartOffice Business Broadband
SmartOffice Business BroadbandSmartOffice Business Broadband
SmartOffice Business Broadband
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
 
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter NetworkIntelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Nirad The cloud managed networking solution
Nirad The cloud managed networking solutionNirad The cloud managed networking solution
Nirad The cloud managed networking solution
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: Awingu
 

More from Sophos

Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Sophos
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
Sophos
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
Sophos
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Sophos
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
Sophos
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
Sophos
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
Sophos
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes MobileSophos
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
Sophos
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
Sophos
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Complete Security
Complete SecurityComplete Security
Complete Security
Sophos
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
Sophos
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
Sophos
 

More from Sophos (14)

Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Sophos Wireless Protection Overview

  • 1. 1 Barbara Hudson Sr. Product Marketing Manager Sophos Wireless Protection An Overview
  • 2. 2 Agenda • The enterprise WLAN market • Your needs • Our wireless solutions • Let’s talk
  • 3. 3 Global Enterprise WLAN Market Source: IDC Q1 2013 marked 13 consecutive quarters of annual growth over 15% 2012 3.68 billion US$ 2013 (estimate) 4.3 billion US$
  • 4. 4 Key driver for wireless market growth BYOD & the booming enterprise mobility market
  • 5. 5 Considerations for your secure Wi-Fi Ease of use Secure guest access Complete coverage Access for BYOD users Cost- effectiveness Scalability
  • 6. 6 WLAN solutions – an overview Consumer home access points + Low cost - Limited features - Hard to manage Low-end UTM appliances with integrated WLAN + Moderate investment + Integrated UTM - Incomplete coverage Cloud-based access point management + Moderate investment + Scalable - Limited security Enterprise controller-based solutions + Many WLAN features - Very expensive - Hard to manage
  • 7. 7 Why Sophos Wireless Protection? + Wireless access everywhere + Secure guest WLAN + Easy to use (plug 'n' play) + Integrated UTM security
  • 8. 8 AT HOME AND ON THE MOVE HEADQUARTERS REMOTE OFFICE Sophos RED UTM Secure Wi-Fi Secure Web Gateway Wireless controller Secure Email Gateway Web Application Firewall Secure Wi-Fi Secure Guest Wi-Fi Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification UTM Manager SOPHOS UTM Management Protection Reporting UTM Endpoint Protection UTM Endpoint Protection Full UTM Protection UTM Endpoint Protection Secure VPN Client Sophos UTM: Securing wireless networks Secure VPN Client
  • 10. 10 Secure guest WLAN and BYOD – hotspots
  • 11. 11 Easy to use (plug 'n' play)
  • 12. 12 Integrated UTM security • Dual AV-engine (SophosLabs, Avira) • Extensive web filtering capabilities • Intrusion Prevention System • … • Wireless LAN in remote offices
  • 13. 13 What I really like about Sophos’ integrated wireless protection approach is that it frees our administrators from separately managing an expensive enterprise wireless solution. Jason Richards, CEO of Vineyard Networks “ ” Don’t just take our word for it
  • 14. 14 Ask yourself… Would you like to have a wireless LAN solution that offers strong wireless and security functionality but is easy to manage? Would your organization benefit if you were able to plug in the access points anywhere in your network for automatic and instant installation? How important is it for you to extend your wireless solution to cover every part of the office? How do you currently offer wireless Internet access to your visitors and guests? How much time do you spend managing wireless networking and security solutions independently from one another?
  • 15. 15 What we can offer • Access Points and Wireless Protection Subscription (wireless controller) as an add-on to an existing Firewall or Security Gateway • The option to combine with RED for secure branch office connectivity • Our FullGuard license also provides Network and Web Protection • Or for smaller offices, try our BasicGuard license • Add Endpoint Protection and Web in Endpoint, for consistent protection wherever your users are
  • 17. 17© Sophos Ltd. All rights reserved.

Editor's Notes

  1. It will help you to:Understand the wireless networking marketLearn more about Sophos' wireless solutions addressAnd how those solutions can meet the needs you have today for secure wireless networking.
  2. The Enterprise wireless LAN market is growing fast. According to IDC, it had a value of 3.68 billion US$ in 2012 and is expected to reach almost 4.3 billion US$ by the end of 2013. Different analysts have different estimates but all expect continued strong growth.Cisco dominates the market with just over 50% market share.Q1 2013 marked the 13thconsecutive quarter of annual growth over 15%But what’s driving this growth?
  3. If you’re looking to purchaseWiFi for your business, you will probably have a number of things on your wish-list:Complete Coverage– To increase employee productivity, any wireless network will need to be available around the entire office, so that there are no restrictions in its use.Secure guest access– For guests and visitors who need temporary Internet access, you need a simple way to provide controlled access which can be revoked once it’s no longer needed.Ease-of-use –Your local IT staff will not necessarily be WiFi experts and have a number of other things to do. They need to understand, install, configure, and manage your wireless LAN set-up.Access for BYOD users– Employees, contractors and guests often want to use their own smartphones or tablets and so need WiFi access.Cost effectiveness – At the end of the day, price will always be a deciding factor – but that doesn’t just mean the cost of the hardware. There are also factors such as performance (as in the throughput, capacity and range), and price/performance ratio, as you’ll obviously be looking for good value for money.And Scalability – A solution needs to grow as and when required without disrupting your business. That could mean adding additional access points or advanced technologies if your requirements increase. Let's have a brief look at the most typical Wireless LAN solutions available to you today:
  4. First of all, there are consumer products, which youmay be tempted by as they’re inexpensive. But they have limited functionality and often lack typical business Wi-Fi features such as strong authentication, multiple zones or guest access. And theirsecurity features are consumer-grade, so there’ll be no content filtering, for example. They’re also designed for single stand-alone WiFi usage and have to be managed individually, which can become tiresome if you have to maintain a number of them.Then there are low-end UTM appliances with built-in Wi-Fi from companies such as WatchGuard and Fortinet. These appliances have the benefit of a moderate initial investment and they provide integrated UTM security, but they suffer from limited deployment capabilities, because more often than not, they’re kept in the server room and so can't provide coverage for your entire office. Enterprise wireless solutions from companies such as Cisco and Aruba are designed to do it all but at a higher price and they’re a lot of work to install. In addition, they still need to be complemented by a separate security solution for network protection.In the past years, we have seen the rise of companies like Meraki (who were acquired by Cisco) andAerohive who offer cloud-based access point management. Their advantage is the moderate initial investment if only a few access points are needed and the scalability if you have to extend your wireless network. But security is often limited.So what can Sophos offer you that is different?
  5. At the heart of our solution is the UTM appliance or appliances – be it hardware, software or virtual – that’s like having air traffic control centres to provide unified policies to ensure complete security, no matter how devices connect.Whether users are at home, or travelling. In a remote office connected using Sophos RED, the Remote Ethernet Device. Or working in the central office – the UTM provides consistent protection. Adding secure WiFi to any of these locations, is a simple task which can be done in no time.
  6. One advantage of deploying wireless access points rather than UTM appliances with built-in Wi-Fi, is that you have the flexibility to put them wherever you want. (click) So you can distribute them throughout your office to provide optimal coverage.(click) But there might also be places where you can’t install Ethernet cables to connect the Access Points to your LAN, so areas such as loading bays or additional buildings could end up without wireless Internet connectivity. That’s where our wireless mesh networking capabilities can help. With the wireless repeating/bridging functionality of the AP50(click), you can extend the reach of your wireless network (click) to reach areas and users (click) who would otherwise be cut off.
  7. Sophos UTM can provide three kinds of hotspots: terms-of-use-acceptance, password-of-the-day, and voucher-based which is usually the most complex kind of hotspot to set up. We’ve all been to hotels where you get a voucher with an individual password rather a general password which is open for all.So-called voucher definitions give you the flexibility to focus on different access parameters:(click)So the overall validity period of the voucherA time quota, for the actual time spent onlineAnd the data volumeIn addition, one voucher can be configured for use for various devices. The vouchers themselves are created in the End-user-portal of Sophos UTM, where they can be printed as a PDF (or exported as a CSV file). After they’re printed, they can be handed over to the guest. Each voucher can also be amended with a comment, which allows you to add the guest’s name, room number, or other information to personalize it (and in some cases, hotspot compliance regulations do require you to do so).
  8. OurPlug 'n' Play wireless access points automatically appear in WebAdmin console once plugged in to the network.(click)From there, they can be centrally managed and (click) all configuration, logging and troubleshooting is done within the UTM appliance.
  9. As Sophos Access Points forward wireless traffic to the UTM, your wireless clients get the same level of security as if they were physically connected to the LAN, that includes:The Dual Antivirus-engines (so SophosLabs and Avira)Extensive web filtering capabilities,And our Intrusion Prevention System, to name just a few. In addition, the combination of a Sophos wireless access point and a Sophos RED offers integrated wireless LAN for branch offices and other remote locations.
  10. But don’t just take our word for it. Jason Richards, the CEO of the Canadian company Vineyard Networks,wraps it up quite nicely:"What I really like about Sophos’ integrated wireless protection approach is that it frees our administrators from separately managing an expensive enterprise wireless solution."But you can see for yourself.
  11. Read questions….If you answered yes to these questions, or they struck a chord, we’d love to talk to you about how we can help to provide secure Wi-Fi and more for your business.
  12. To find out more, pleasecontactthesalesoffice in yourregion.