SlideShare a Scribd company logo
1
Edward Dalbem Lüderitz
Sales Development Representative
Sophos XG Firewall
The Next Thing in Next-Gen
2
Introducing Sophos XG Firewall
3
IT Manager Survey on SpiceWorks
Top Complaints About Current Firewalls
Profit
Poor performance
Poor value
Not easy to manage
Insufficient security & control
Insufficient reporting & visibility
4
Introducing Sophos XG Firewall
A revolution in firewalls:
✓ Simple to use
✓ Lightning fast
✓ Unparalleled protection
✓ On-box reporting
✓ From a trusted industry leader
5
Introducing Tool Features
6
Management
MANAGEMENT Firewall
Management
Centralized
Management
Status & Alerts
Reporting &
Logging
What’s Key
All-new Control Center and user interface
Sophos Firewall Manager
iView reporting
Key Management Features
• All-new Control Center for immediate insights into issues
• Unified policy model with all policies on a single screen
• Policy templates for quick business app protection.
• Role-based Admin granular access control
• Centralized Management via Sophos Firewall Manager
• Centralized Consolidated Reporting with Sophos iView
• On-box Reporting on every appliance
• PSA/RMM XML-based API
7
User & App Control
What’s Key
Unified policy model
Patented Layer-8 User Identity
Full user-based app control
User Threat Quotient
Key User and App Control Features
• Unified Policy Model to manage all policies on a single screen
• Layer-8 User Identity patented technology for user-based firewall rules & visibility
• Flexible Authentication including directory services, client agents, and portal
• User based firewall policies any firewall rule can be user-based
• Per-policy app, web, QoS, and IPS control for ultimate ease and flexibility
• Customizable templates for apps, web, IPS and traffic shaping
• User Threat Quotient to identify risky users.
• Broad enforcement including HTTPS, Anonymizing proxies, and SafeSearch
• Web caching reducing bandwidth consumption – including Endpoint updates
USER & APP CONTROL User Identity Application Control Web Control Content Control
8
Network Protection
What’s Key
Next-Gen IPS
FastPath packet optimization
Security Heartbeat
Pharming protection
Key Network Protection Features
• Stateful firewall with deep packet inspection with zone based policies
• Perimeter defenses against DoS, reconaissance, spoofing, flood, and ICMP attacks
• Next-Gen IPS (NGIPS) protection from hacks and attacks that’s user and app aware
• FastPath packet optimization that provides up to 200% performance improvement
• Advanced protection from the latest viruses and web threats
• Security Heartbeat that links endpoints with the firewall
• Advanced Threat Protection from bot-nets and C&C traffic
• Pharming Protection to protect from overwritten hosts files (DNS lookups)
• Web Application Firewall for business applications like Exchange & SharePoint
• SSL decryption and inspection and certificate validation
NETWORK PROTECTION
Synchronized
Security
Advanced Threat
Protection
Business
Applications
Encrypted Traffic
Firewall IPS Anti-malware Web Protection
9
Email Protection
What’s Key
IMAP Filtering
What’s Unique
SPX Email Encryption
DLP Policies
with pre-packaged sensitive data types
Key Email Protection Features
• Anti-spam Protection from the latest spam campaigns
• New IMAP filtering for email services using this protocol
• SPX Email Encryption for simple push encryption without trust infrastructure
• DLP Policies with pre-packaged sensitive data types
• Self-help Quarantine Management through the user portal
EMAIL PROTECTION Anti-spam Email Encryption
Data Loss
Prevention
Quarantine
Management
10
Networking
What’s Key
Discover Mode
Zone Segmentation
Traffic Shaping per-policy
Key Networking Features
• Routing and Bridging supporting all the latest standards
• Zone segmentation with isolation/policy support for LAN, WAN, VPN, DMZ, etc.
• Discover Mode in bridge or TAP mode for easy PoCs and evaluations
• Traffic Shaping per-policy offering greater flexibility in prioritizing traffic
• Integrated Wireless Controller with plug-and-play Sophos WiFi Aps
• Wireless Hotspots with flexible authentication options
• High performance switching, scanning, and proxy engines
• Standard VPN Options including IPSec, SSL, PPTP, L2TP, Cisco, OpenVPN
• Clientless VPN for easy access to hosts or services via the user portal
• RED VPN for easy and secure networking to remote locations
• IPv6 support for future-proofing and deployment into IPv6 environments
NETWORKING
Routing & Bridging Zone Segmentation Traffic Shaping Wireless Controller
Performance VPN RED VPN iPv6
11
Simple to Use
12
XG Firewall: Simply Solving Common Problems
Difficult to mine data to
identify and prioritize issues
Interactive dashboard
instant data and drilldown
Firewalls full of jargon
and difficult to navigate
Complexity of policy creation
and management
Policy templates,
easy to understand
Self-documenting
interface and menus
Identifying risks
User Threat Quotient and
App Risk monitoring
13
All-new Control Center
•Surfaces important
information
• System status
• Traffic
• Security heartbeat
• Advanced threats
• UTQ
• VPNs
• Risky users, apps,
websites
• Policy activity
•Quick access to additional
information and tools
14
3-Clicks to Anywhere
Navigation
•Never more than 3-clicks
to anywhere
•Nav remembers your last
selected item
•Description identifies what
each menu items provides to
make discovery easy
•Main Nav Menu
• Control Center
• Reporting
• Policies
• Protection
• System
• Objects
15
Unified Policy
Management
•Don’t need to navigate
multiple modules, or tabs to
find polices
•All policies on one screen
•Users & Networking
•Business Applications
•Sort and Filter by
•Rule type
•Source Zone
•Destination Zone
•Status
16
Integrated Policies
•Everything on one screen
•Layer-8 User Identity
Polices
•Zone based policies
•Web and App Control per
policy
•IPS and Traffic Flow per
Policy
•Security Heartbeat Policy
•Limit access for Red
or Yellow Heartbeats
17
Business App Policy
Templates
•Templates simplify WAF protection
for common business applications
•Exchange
•Sharepoint
•Lync
•And Much More
•Templates can be customized
•Templates can be shared
18
SFM Dashboard – At-a-Glance Management
2
Top panel
3
Device overview
4Device Monitor
6
Model information
7System messages
5
System information about SFM
1 Menu for key work areasLet’s take a look…
19
Management Made Simple: Three Work Areas
Device
Configuration
• Manage config. or
policies
• For individual device
or group of devices
Template
Configuration
• Create and apply
reusable config.
templates
• Quickly set up new
branch offices /
customer sites
System
Management
• Device health and
settings (add device/
group, update
firmware, etc.)
• Change control
• Monitoring
20
Lightning Fast
21
• FastPath optimizes firewall connectivity and routing
• Once connection is deemed trusted, all related packets take the fast path
• It is NOT Stream scanning – which lightly scans packets as they pass for malware
• We properly scan all content in real-time or batch mode – we do not stream scan
Policy Engine
(Who are you? Where are you going?)
Malware Engine
(Are you carrying anything dangerous?)
FastPath Packet Optimization
(e.g. for approved traffic “travelling together”)
Stream scanning
(e.g. visual inspection only)
FastPath Packet Optimization
22
Unparalleled Protection
23
• Single-pane overview
• Unified policies
• Security Heartbeat
Essential
Firewall
• Find threats faster
• Simplify investigation
• Minimize threat impact
Security Heartbeat
Modular Security features
Network
Protection
• Intrusion Prevention (IPS)
• Client & Site-to-Site VPN
• Quality of Service (QoS)
• Advanced Threat Prot. (ATP)
• Wireless Controller for
Access Points
• Multi-Zone (SSID)
support
• Hotspot Support
Wireless
Protection
• Anti Spam & Phishing
• Dual Virus Protection
• DLP & Encryption
Mail
Protection• Reverse Proxy
• Web Application Firewall
• Antivirus
Web Server
Protection
• URL Filtering Policies
• Web Threat Protection
• Application Control
Web
Protection
24
Generations Of Security
Point Products
Anti-virus
IPS
Firewall
Sandbox
Layers
Bundles
Suites
UTM
EMM
Synchronized Security
Security Heartbeat™
25
Security Heartbeat™
Network and Endpoint working better together to revolutionize advanced threat protection
Endpoints
XG Firewall
Server
Internet
No Security
issues
Unwanted
Application
Compromised
Infected
Automatically isolate
systems with
Red Heartbeat
Set more restrictive
policies for systems with
Yellow Heartbeat
1. ATP detects and blocks suspect C&C connection
2. Context requested from Endpoint
3. Full information exchanged (user, process, etc.)
4. Admin notified about ATP event including context
Heartbeat in Network Policies
Advanced Threat Protection
Suspect
Endpoint
XG Firewall
•Accelerated Discovery
Endpoint and network protection
combine to identify unknown
threats faster.
•Active Identification
Reduces time taken to identify
infected or at risk device or host
by IP address alone.
•Automated Response
Compromised endpoints can be
automatically isolated or
restricted by firewall policies
based on Heartbeat™ status.
26
Security Heartbeat
& Advanced Threats
•Accelerated discovery
•Positive identification
•Automated response
•Instant insights into
compromised systems
• Hostname, IP
• User
• Time period
• Threat
• App/Process
• Incidents/Count
27
On-box Reporting
28
App Risk Meter
• Identifies overall risk level
• Application dashboard
identifies risky apps
and who’s using them
29
User Threat Quotient
•Identify risky users
before
they become a problem
•UTQ based on recent
web history and ATP
triggers
• Enables:
•Quick and easy policy
changes
•User education
•Targeted intervention
30
Centralized Reporting
Sophos iView Reporting
31
From a Trusted Industry Leader
32
Gartner Magic Quadrant
UNIFIED THREAT MANAGEMENT
Gartner Magic Quadrant
ENDPOINT PROTECTION
Only Vendor That Is a Gartner Leader in EP and UTM
Challengers Leaders
Niche players Visionaries
Completeness of vision
Abilitytoexecute
Source: Gartner (December 2014)
Microsoft
Eset
IBM Webroot
F-Secure
Bitdefender
Symantec
Kaspersky
Trend Micro
Panda Security
McAfee
Check Point
Lumension
Qihoo 360
ThreatTrack
Security
Landesk
Stormshield
Challengers Leaders
Niche players Visionaries
Completeness of vision
Abilitytoexecute
Source: Gartner (August 2015)
Cisco
Juniper Networks
Huawei
Check Point
Rohde & Schwarz
(gateprotect)
Fortinet
Dell
WatchGuard
Stormshield
Barracuda
Hillstone
Networks
Aker
Security
Solutions
33
Unique Balance Between Endpoint and Network
34
Summary
35
To Sum Up…
XG Firewall:
✓ Simple to use - easy to navigate
✓ Lightning fast - with FastPath packet optimization
✓ Unparalleled protection - featuring the industry first Security Heartbeat
✓ On-box reporting - over 300 reports included as standard
✓ Trusted industry leader - Gartner Leaders Quadrant for Endpoint and UTM
36
Competitive Chart Sophos
XG Firewall
Fortinet
FG 20-90
Dell SonicWALL
TZ Series
WatchGuard
XTM Series
Network Firewall/Protection
Advanced threat protection
Network and Endpoint Integration [Heartbeat]
Unified Policies
User Risk Visibility [User Threat Quotient]
FastPath Packet Optimization
Site to site and remote user VPN
Secure web gateway
Complete Email Protection [AV, AS, Enc., DLP]
Dual antivirus
Wi-Fi
Reverse proxy
Web application firewall
User portal
Full Reporting
Best TMG feature parity
Discover (TAP) Mode Deployment
$ $
$ $ $
$ $ $
$ = Another product required
New Differentiators
•New competitive differentiators
•Heartbeat
•Unified policy
•User Threat Quotient
•New comparative differentiators
•FastPath
•Discover Mode
•User-based Firewall Policies

More Related Content

What's hot

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
NCS Computech Ltd.
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
Fanky Christian
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
Virginia Fernandez
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
Iftikhar Ali Iqbal
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
Kangaroot
 
Presentation1.ppt
Presentation1.pptPresentation1.ppt
Presentation1.ppt
SalehMostafa15
 
The Elastic Stack as a SIEM
The Elastic Stack as a SIEMThe Elastic Stack as a SIEM
The Elastic Stack as a SIEM
John Hubbard
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
MarketingArrowECS_CZ
 
Siem ppt
Siem pptSiem ppt
Siem ppt
kmehul
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
Justin Henderson
 
Fortinet
FortinetFortinet
Fortinet
ABEP123
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
Anton Chuvakin
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
Precisely
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
Nishanth Kumar Pathi
 

What's hot (20)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
Presentation1.ppt
Presentation1.pptPresentation1.ppt
Presentation1.ppt
 
The Elastic Stack as a SIEM
The Elastic Stack as a SIEMThe Elastic Stack as a SIEM
The Elastic Stack as a SIEM
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
 
Fortinet
FortinetFortinet
Fortinet
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 

Similar to Sophos XG Firewall

Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
Sophos Benelux
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
Ali Kapucu
 
F5 BigIP v9.ppt
F5 BigIP v9.pptF5 BigIP v9.ppt
F5 BigIP v9.ppt
LuisCarlos663610
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
oneM2M
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
Manoj Kumar Mishra
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Artur Kane - DDoS? You shall not pass!PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PROIDEA
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
Dmitry Tikhovich
 
Fortinet Service specifications shortlist
Fortinet Service specifications shortlistFortinet Service specifications shortlist
Fortinet Service specifications shortlist
wxi95jb74
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
NetworkCollaborators
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
Secure IT 2014Secure IT 2014

Similar to Sophos XG Firewall (20)

Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
F5 BigIP v9.ppt
F5 BigIP v9.pptF5 BigIP v9.ppt
F5 BigIP v9.ppt
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Artur Kane - DDoS? You shall not pass!PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
Fortinet Service specifications shortlist
Fortinet Service specifications shortlistFortinet Service specifications shortlist
Fortinet Service specifications shortlist
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 

More from DeServ - Tecnologia e Servços

Apresentação - DeServ - Tecnologia e Serviços
Apresentação - DeServ - Tecnologia e ServiçosApresentação - DeServ - Tecnologia e Serviços
Apresentação - DeServ - Tecnologia e Serviços
DeServ - Tecnologia e Servços
 
O que é a Lei Geral de Proteção de Dados?
O que é a Lei Geral de Proteção de Dados?O que é a Lei Geral de Proteção de Dados?
O que é a Lei Geral de Proteção de Dados?
DeServ - Tecnologia e Servços
 
Arcserve UDP Cloud Direct - DeServ
Arcserve UDP Cloud Direct - DeServArcserve UDP Cloud Direct - DeServ
Arcserve UDP Cloud Direct - DeServ
DeServ - Tecnologia e Servços
 
Sophos XG Next-Gen Firewall
Sophos XG Next-Gen FirewallSophos XG Next-Gen Firewall
Sophos XG Next-Gen Firewall
DeServ - Tecnologia e Servços
 
Webinar Arcserve UDP - Deserv
Webinar Arcserve UDP - DeservWebinar Arcserve UDP - Deserv
Webinar Arcserve UDP - Deserv
DeServ - Tecnologia e Servços
 
Endpoint protection Advanced - Webinar Deserv
Endpoint protection Advanced - Webinar DeservEndpoint protection Advanced - Webinar Deserv
Endpoint protection Advanced - Webinar Deserv
DeServ - Tecnologia e Servços
 
Sophos central webinar
Sophos central webinarSophos central webinar
Sophos central webinar
DeServ - Tecnologia e Servços
 
Mozy by EMC - Isto é Mozy
Mozy by EMC - Isto é MozyMozy by EMC - Isto é Mozy
Mozy by EMC - Isto é Mozy
DeServ - Tecnologia e Servços
 
Sophos Central
Sophos CentralSophos Central
ArcServe - UDP
ArcServe - UDPArcServe - UDP
Apresentação - Deserv
Apresentação - DeservApresentação - Deserv
Apresentação - Deserv
DeServ - Tecnologia e Servços
 
Arcserve - Cloud Direct
Arcserve - Cloud DirectArcserve - Cloud Direct
Arcserve - Cloud Direct
DeServ - Tecnologia e Servços
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
DeServ - Tecnologia e Servços
 
Sophos End User Protection
Sophos End User ProtectionSophos End User Protection
Sophos End User Protection
DeServ - Tecnologia e Servços
 
Sophos Cloud Advanced
Sophos Cloud AdvancedSophos Cloud Advanced
Sophos Cloud Advanced
DeServ - Tecnologia e Servços
 
Sophos Cloud advanced
Sophos Cloud advancedSophos Cloud advanced
Sophos Cloud advanced
DeServ - Tecnologia e Servços
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
SG Séries
SG SériesSG Séries
ArcServe UDP
ArcServe UDPArcServe UDP
Apresentação da Empresa - DeServ/GVTech
Apresentação da Empresa - DeServ/GVTechApresentação da Empresa - DeServ/GVTech
Apresentação da Empresa - DeServ/GVTech
DeServ - Tecnologia e Servços
 

More from DeServ - Tecnologia e Servços (20)

Apresentação - DeServ - Tecnologia e Serviços
Apresentação - DeServ - Tecnologia e ServiçosApresentação - DeServ - Tecnologia e Serviços
Apresentação - DeServ - Tecnologia e Serviços
 
O que é a Lei Geral de Proteção de Dados?
O que é a Lei Geral de Proteção de Dados?O que é a Lei Geral de Proteção de Dados?
O que é a Lei Geral de Proteção de Dados?
 
Arcserve UDP Cloud Direct - DeServ
Arcserve UDP Cloud Direct - DeServArcserve UDP Cloud Direct - DeServ
Arcserve UDP Cloud Direct - DeServ
 
Sophos XG Next-Gen Firewall
Sophos XG Next-Gen FirewallSophos XG Next-Gen Firewall
Sophos XG Next-Gen Firewall
 
Webinar Arcserve UDP - Deserv
Webinar Arcserve UDP - DeservWebinar Arcserve UDP - Deserv
Webinar Arcserve UDP - Deserv
 
Endpoint protection Advanced - Webinar Deserv
Endpoint protection Advanced - Webinar DeservEndpoint protection Advanced - Webinar Deserv
Endpoint protection Advanced - Webinar Deserv
 
Sophos central webinar
Sophos central webinarSophos central webinar
Sophos central webinar
 
Mozy by EMC - Isto é Mozy
Mozy by EMC - Isto é MozyMozy by EMC - Isto é Mozy
Mozy by EMC - Isto é Mozy
 
Sophos Central
Sophos CentralSophos Central
Sophos Central
 
ArcServe - UDP
ArcServe - UDPArcServe - UDP
ArcServe - UDP
 
Apresentação - Deserv
Apresentação - DeservApresentação - Deserv
Apresentação - Deserv
 
Arcserve - Cloud Direct
Arcserve - Cloud DirectArcserve - Cloud Direct
Arcserve - Cloud Direct
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
 
Sophos End User Protection
Sophos End User ProtectionSophos End User Protection
Sophos End User Protection
 
Sophos Cloud Advanced
Sophos Cloud AdvancedSophos Cloud Advanced
Sophos Cloud Advanced
 
Sophos Cloud advanced
Sophos Cloud advancedSophos Cloud advanced
Sophos Cloud advanced
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
SG Séries
SG SériesSG Séries
SG Séries
 
ArcServe UDP
ArcServe UDPArcServe UDP
ArcServe UDP
 
Apresentação da Empresa - DeServ/GVTech
Apresentação da Empresa - DeServ/GVTechApresentação da Empresa - DeServ/GVTech
Apresentação da Empresa - DeServ/GVTech
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 

Sophos XG Firewall

  • 1. 1 Edward Dalbem Lüderitz Sales Development Representative Sophos XG Firewall The Next Thing in Next-Gen
  • 3. 3 IT Manager Survey on SpiceWorks Top Complaints About Current Firewalls Profit Poor performance Poor value Not easy to manage Insufficient security & control Insufficient reporting & visibility
  • 4. 4 Introducing Sophos XG Firewall A revolution in firewalls: ✓ Simple to use ✓ Lightning fast ✓ Unparalleled protection ✓ On-box reporting ✓ From a trusted industry leader
  • 6. 6 Management MANAGEMENT Firewall Management Centralized Management Status & Alerts Reporting & Logging What’s Key All-new Control Center and user interface Sophos Firewall Manager iView reporting Key Management Features • All-new Control Center for immediate insights into issues • Unified policy model with all policies on a single screen • Policy templates for quick business app protection. • Role-based Admin granular access control • Centralized Management via Sophos Firewall Manager • Centralized Consolidated Reporting with Sophos iView • On-box Reporting on every appliance • PSA/RMM XML-based API
  • 7. 7 User & App Control What’s Key Unified policy model Patented Layer-8 User Identity Full user-based app control User Threat Quotient Key User and App Control Features • Unified Policy Model to manage all policies on a single screen • Layer-8 User Identity patented technology for user-based firewall rules & visibility • Flexible Authentication including directory services, client agents, and portal • User based firewall policies any firewall rule can be user-based • Per-policy app, web, QoS, and IPS control for ultimate ease and flexibility • Customizable templates for apps, web, IPS and traffic shaping • User Threat Quotient to identify risky users. • Broad enforcement including HTTPS, Anonymizing proxies, and SafeSearch • Web caching reducing bandwidth consumption – including Endpoint updates USER & APP CONTROL User Identity Application Control Web Control Content Control
  • 8. 8 Network Protection What’s Key Next-Gen IPS FastPath packet optimization Security Heartbeat Pharming protection Key Network Protection Features • Stateful firewall with deep packet inspection with zone based policies • Perimeter defenses against DoS, reconaissance, spoofing, flood, and ICMP attacks • Next-Gen IPS (NGIPS) protection from hacks and attacks that’s user and app aware • FastPath packet optimization that provides up to 200% performance improvement • Advanced protection from the latest viruses and web threats • Security Heartbeat that links endpoints with the firewall • Advanced Threat Protection from bot-nets and C&C traffic • Pharming Protection to protect from overwritten hosts files (DNS lookups) • Web Application Firewall for business applications like Exchange & SharePoint • SSL decryption and inspection and certificate validation NETWORK PROTECTION Synchronized Security Advanced Threat Protection Business Applications Encrypted Traffic Firewall IPS Anti-malware Web Protection
  • 9. 9 Email Protection What’s Key IMAP Filtering What’s Unique SPX Email Encryption DLP Policies with pre-packaged sensitive data types Key Email Protection Features • Anti-spam Protection from the latest spam campaigns • New IMAP filtering for email services using this protocol • SPX Email Encryption for simple push encryption without trust infrastructure • DLP Policies with pre-packaged sensitive data types • Self-help Quarantine Management through the user portal EMAIL PROTECTION Anti-spam Email Encryption Data Loss Prevention Quarantine Management
  • 10. 10 Networking What’s Key Discover Mode Zone Segmentation Traffic Shaping per-policy Key Networking Features • Routing and Bridging supporting all the latest standards • Zone segmentation with isolation/policy support for LAN, WAN, VPN, DMZ, etc. • Discover Mode in bridge or TAP mode for easy PoCs and evaluations • Traffic Shaping per-policy offering greater flexibility in prioritizing traffic • Integrated Wireless Controller with plug-and-play Sophos WiFi Aps • Wireless Hotspots with flexible authentication options • High performance switching, scanning, and proxy engines • Standard VPN Options including IPSec, SSL, PPTP, L2TP, Cisco, OpenVPN • Clientless VPN for easy access to hosts or services via the user portal • RED VPN for easy and secure networking to remote locations • IPv6 support for future-proofing and deployment into IPv6 environments NETWORKING Routing & Bridging Zone Segmentation Traffic Shaping Wireless Controller Performance VPN RED VPN iPv6
  • 12. 12 XG Firewall: Simply Solving Common Problems Difficult to mine data to identify and prioritize issues Interactive dashboard instant data and drilldown Firewalls full of jargon and difficult to navigate Complexity of policy creation and management Policy templates, easy to understand Self-documenting interface and menus Identifying risks User Threat Quotient and App Risk monitoring
  • 13. 13 All-new Control Center •Surfaces important information • System status • Traffic • Security heartbeat • Advanced threats • UTQ • VPNs • Risky users, apps, websites • Policy activity •Quick access to additional information and tools
  • 14. 14 3-Clicks to Anywhere Navigation •Never more than 3-clicks to anywhere •Nav remembers your last selected item •Description identifies what each menu items provides to make discovery easy •Main Nav Menu • Control Center • Reporting • Policies • Protection • System • Objects
  • 15. 15 Unified Policy Management •Don’t need to navigate multiple modules, or tabs to find polices •All policies on one screen •Users & Networking •Business Applications •Sort and Filter by •Rule type •Source Zone •Destination Zone •Status
  • 16. 16 Integrated Policies •Everything on one screen •Layer-8 User Identity Polices •Zone based policies •Web and App Control per policy •IPS and Traffic Flow per Policy •Security Heartbeat Policy •Limit access for Red or Yellow Heartbeats
  • 17. 17 Business App Policy Templates •Templates simplify WAF protection for common business applications •Exchange •Sharepoint •Lync •And Much More •Templates can be customized •Templates can be shared
  • 18. 18 SFM Dashboard – At-a-Glance Management 2 Top panel 3 Device overview 4Device Monitor 6 Model information 7System messages 5 System information about SFM 1 Menu for key work areasLet’s take a look…
  • 19. 19 Management Made Simple: Three Work Areas Device Configuration • Manage config. or policies • For individual device or group of devices Template Configuration • Create and apply reusable config. templates • Quickly set up new branch offices / customer sites System Management • Device health and settings (add device/ group, update firmware, etc.) • Change control • Monitoring
  • 21. 21 • FastPath optimizes firewall connectivity and routing • Once connection is deemed trusted, all related packets take the fast path • It is NOT Stream scanning – which lightly scans packets as they pass for malware • We properly scan all content in real-time or batch mode – we do not stream scan Policy Engine (Who are you? Where are you going?) Malware Engine (Are you carrying anything dangerous?) FastPath Packet Optimization (e.g. for approved traffic “travelling together”) Stream scanning (e.g. visual inspection only) FastPath Packet Optimization
  • 23. 23 • Single-pane overview • Unified policies • Security Heartbeat Essential Firewall • Find threats faster • Simplify investigation • Minimize threat impact Security Heartbeat Modular Security features Network Protection • Intrusion Prevention (IPS) • Client & Site-to-Site VPN • Quality of Service (QoS) • Advanced Threat Prot. (ATP) • Wireless Controller for Access Points • Multi-Zone (SSID) support • Hotspot Support Wireless Protection • Anti Spam & Phishing • Dual Virus Protection • DLP & Encryption Mail Protection• Reverse Proxy • Web Application Firewall • Antivirus Web Server Protection • URL Filtering Policies • Web Threat Protection • Application Control Web Protection
  • 24. 24 Generations Of Security Point Products Anti-virus IPS Firewall Sandbox Layers Bundles Suites UTM EMM Synchronized Security Security Heartbeat™
  • 25. 25 Security Heartbeat™ Network and Endpoint working better together to revolutionize advanced threat protection Endpoints XG Firewall Server Internet No Security issues Unwanted Application Compromised Infected Automatically isolate systems with Red Heartbeat Set more restrictive policies for systems with Yellow Heartbeat 1. ATP detects and blocks suspect C&C connection 2. Context requested from Endpoint 3. Full information exchanged (user, process, etc.) 4. Admin notified about ATP event including context Heartbeat in Network Policies Advanced Threat Protection Suspect Endpoint XG Firewall •Accelerated Discovery Endpoint and network protection combine to identify unknown threats faster. •Active Identification Reduces time taken to identify infected or at risk device or host by IP address alone. •Automated Response Compromised endpoints can be automatically isolated or restricted by firewall policies based on Heartbeat™ status.
  • 26. 26 Security Heartbeat & Advanced Threats •Accelerated discovery •Positive identification •Automated response •Instant insights into compromised systems • Hostname, IP • User • Time period • Threat • App/Process • Incidents/Count
  • 28. 28 App Risk Meter • Identifies overall risk level • Application dashboard identifies risky apps and who’s using them
  • 29. 29 User Threat Quotient •Identify risky users before they become a problem •UTQ based on recent web history and ATP triggers • Enables: •Quick and easy policy changes •User education •Targeted intervention
  • 31. 31 From a Trusted Industry Leader
  • 32. 32 Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT Gartner Magic Quadrant ENDPOINT PROTECTION Only Vendor That Is a Gartner Leader in EP and UTM Challengers Leaders Niche players Visionaries Completeness of vision Abilitytoexecute Source: Gartner (December 2014) Microsoft Eset IBM Webroot F-Secure Bitdefender Symantec Kaspersky Trend Micro Panda Security McAfee Check Point Lumension Qihoo 360 ThreatTrack Security Landesk Stormshield Challengers Leaders Niche players Visionaries Completeness of vision Abilitytoexecute Source: Gartner (August 2015) Cisco Juniper Networks Huawei Check Point Rohde & Schwarz (gateprotect) Fortinet Dell WatchGuard Stormshield Barracuda Hillstone Networks Aker Security Solutions
  • 33. 33 Unique Balance Between Endpoint and Network
  • 35. 35 To Sum Up… XG Firewall: ✓ Simple to use - easy to navigate ✓ Lightning fast - with FastPath packet optimization ✓ Unparalleled protection - featuring the industry first Security Heartbeat ✓ On-box reporting - over 300 reports included as standard ✓ Trusted industry leader - Gartner Leaders Quadrant for Endpoint and UTM
  • 36. 36 Competitive Chart Sophos XG Firewall Fortinet FG 20-90 Dell SonicWALL TZ Series WatchGuard XTM Series Network Firewall/Protection Advanced threat protection Network and Endpoint Integration [Heartbeat] Unified Policies User Risk Visibility [User Threat Quotient] FastPath Packet Optimization Site to site and remote user VPN Secure web gateway Complete Email Protection [AV, AS, Enc., DLP] Dual antivirus Wi-Fi Reverse proxy Web application firewall User portal Full Reporting Best TMG feature parity Discover (TAP) Mode Deployment $ $ $ $ $ $ $ $ $ = Another product required New Differentiators •New competitive differentiators •Heartbeat •Unified policy •User Threat Quotient •New comparative differentiators •FastPath •Discover Mode •User-based Firewall Policies