Complete Security with Sophos and Softchoice


Published on

With the proliferation of mobility, users everywhere are using everything. This leads to more threats, unmanaged data and complex security solutions that slow down users. Learn how Sophos Complete Security eliminates complexity by protecting endpoints, network, web, email and mobile devices – all in one license.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Today there’s data everywhere. It might be your businesses own or even personal information about your customers and employees. Whatever it is, your people need to access it, work with it and share it. And you need to keep it safe.Reduce the attack surfaceAccording to research 86% of IT professionals say that their business has lost a laptop or hard disk carrying corporate data. Encrypting is the easiest way to make sure that if a device goes missing that data is still secure. We can also help you make sure that risky applications you haven’t approved aren’t being installed on machines. Protect EverywhereThe explosion in mobile working and superfast connections wherever we are mean that securing data at every point is a priority. That’s why we let you set security policies for the latest mobile devices and remote lock or wipe them if they go missing. And very soon we’ll be able to offer complete security for files uploaded and accessed from the cloud, whether from PCs or mobile devices. Stop attacks and breachesWe give you data control solutions that you can actually implement. These policies can be enforced from the endpoint and the email gateway, so you can easily make sure that data exiting your network is audited and controlled. And as a Sophos customer you also get easy access to our data protection expertise to help your users understand why it’s important. Keep people workingWe think that having effective data protection shouldn’t be at the expense of keeping your users working day to day. So we make accessing encrypted laptops easy and familiar for them. And if a user sends an email with confidential data in it you don’t always have to block it, we can seamlessly encrypt that email at the gateway. Delivering an easy password protected pdf at the other end.
  • Our combination with Astaro means we’re now able bring complete security to Unified Threat Management too. We’re moving beyond a simple antivirus plugin to offer Active Protection inside a full range of web, email and network solutions. And we’re making threat management truly unified by letting you manage your Sophos Endpoint clients from inside the Astaro security gateway.
  • Complete Security with Sophos and Softchoice

    1. 1. Complete Security with
    2. 2. We’refocused on protecting youWhat’s the problem with IT security today? Data Threats everywhere, regu changing, still lations growing increasing Users everywhere, usin g everything
    3. 3. We do IT securityBecause you’ve got enough to worry about Complete Without Active Protection Security Complexity Wherever Quicker to Our unique the user is, setup, maintai approach for what ever n and solve better they use problems protection you can actually deploy
    4. 4. Complete security Endpoint Network Web Mobile Email Data
    5. 5. Complete security Endpoint Web Email Data Mobile Network Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working URL Filtering Web Application Endpoint Web Encryption Data Control Access control Automation WiFi security Firewall Protection for cloud Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help Application Mobile app Clean up Technical Device Control Secure branch Intrusion Firewall Control security support offices prevention Encryption Live Protection Email encryption
    6. 6. Active ProtectionOur unique approach for better protection with less complexity Endpoint Web Email Data Mobile Network
    7. 7. Complete but not complexDefence in depth that you can actually deploy Reduce the attack surface Protect everywhere Stop attacks and breaches Keep people working
    8. 8. Example: Fake antivirusDelivering complete protection from a rampant threat Endpoint URL Filtering Endpoint Web Protection Web Web Application Live Protection Firewall Email Complete Security Visibility Anti-malware Data Patch Clean up Manager Mobile Network
    9. 9. Example: Data lossProtecting personal information and sensitive data Endpoint Encryption Mobile Control Web Encryption Application for cloud Control Email Complete Security Local self-help Data Control Data Automation User education Mobile Network
    10. 10. Completing the visionIntegrating Astaro Network Security Astaro Secure Gateway Sophos Endpoint Active Protection Managed in Astaro Secure • Anti malware Gateway • Web reputation checking • Application Control • Anti spam • Client Firewall • Full Disk Encryption Data features • Device and media Encryption • SPX Email Encryption • Manage Sophos Endpoint clients • Data control for web and email • Anti malware • Device Control • Web Protection
    11. 11. Complete Security Data Web Endpoint UTM Fullguard + Endpoint Sophos Complete Protection Protection Protection – UTM Endpoint Protection - Anti-Virus Security Suite Suite Suite Advanced (UTM 9) Business Business AV/HIP/Live Protection        Client Firewall       Application Control       Device Control       Web Filtering in Endpoint      DLP, NAC, Patch     Web Gateway   Email Gateway   Full-Disk Encryption   Mobile  UTM FullGuard*  SharePoint, Ex Exchange Exchange Exchange Exchange Groupware change Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux, Win, Mac, Linux, Win Win, Mac, Linux, Platforms VM, EMC Win, Mac, VM, Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC Unix, VM, EMC *UTM FullGuard includes network, web, email, wireless and webserver protection
    12. 12. Why do more with Sophos?You’ll get better threat and data protection more simply, and more cost effectively Complete security that works better together Defense in depth you can actually deployYou’ll also see the benefits of consolidating your security vendors:– Consolidated licensing costs– One trusted partner for support Complete Without Active Protection Security Complexity
    13. 13. Start with a Softchoice Assessment  Softchoice Mobility Techcheck Assessment – determine how many mobile devices (iOS, Android, Windows Mobile) are accessing your corporate network – show the overall usage of these devices including the number of attachments they contain, email sent, and search patterns. • Catalog mobility devices using Softchoice’s Discovery proprietary discovery tools Analysis • Subject matter experts evaluate data sets Cloud Application • Review risks and remediation Discovery Consultation • Structured whiteboarding session to define and Report next steps
    14. 14. The Softchoice Team is Ready to Help  Softchoice has a team of Solution Architects that will work with your organization to map out the solutions that fit best in your environment  We have in-house Sophos technical architects that work with you to plan and manage your consolidation project – providing information on product, licensing and services  We offer professional services including implementations, consulting and training
    15. 15. To learn more