UTM - The Complete Security Box
-
Upload
sophos -
Category
Technology
-
view
1.210 -
download
3
description
Transcript of UTM - The Complete Security Box
![Page 1: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/1.jpg)
Sophos UTM: The Complete Security Box
![Page 2: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/2.jpg)
Threats changing,
still increasing
Data everywhere, regulations
growing
Users everywhere,
using everything
We’re focused on protecting you
![Page 3: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/3.jpg)
IT security sprawl
Router FirewallIntrusion prevention SSL VPN Gateway
Spam filter Gateway antivirus
Web filterWAN link balancer Load balancer
Endpoint protection
![Page 4: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/4.jpg)
Complete SecurityBecause you’ve got enough to worry about
4
Wherever the user is, what ever they use
Our unique approach for better protection you can actually deploy
Quicker to setup, maintain and solve problems
SecurityEverywhere
WithoutComplexity
Active Protection
![Page 5: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/5.jpg)
5
Complete SecurityProtecting every part of your business
![Page 6: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/6.jpg)
Network Firewall
Network Protection
WirelessProtection
EmailProtection
WebServerProtection
EndpointProtection
WebProtection
Sophos UTMThe Complete Security Box
![Page 7: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/7.jpg)
![Page 8: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/8.jpg)
A first line of defenseStarting with network security
• Any computer connected to the internet is at risk• A computer outside a firewall will be attacked within minutes• Hardware firewalls can be complex to configure
![Page 9: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/9.jpg)
Network firewallFree Firewall for business use
• Easy management with object-based rules• Stateful packet inspection• Place anywhere on network• IPv6 Support• Amazon Virtual Private Cloud Connector• Easy tunnelling with Windows Remote Access
![Page 10: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/10.jpg)
Optimize your network and stop threatsBusinesses need more than just a basic firewall
• Firewalls only deal in ports, addresses and protocols• Malicious network traffic can still come through allowed ports• You want to get the best from your web connection• You need a way to let remote workers and offices connect
![Page 11: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/11.jpg)
Network protectionOptimize and secure your network
• Intrusion prevention system• Flood protection• VPN (Site-to-site and client)• HTML 5 VPN portal• WAN link balancing
![Page 12: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/12.jpg)
WiFi should be easy and safeYou don’t have to “make do” when it comes to wireless networking
• Separate wireless management solutions can be expensive• Lots of built in wireless hardware doesn’t give complete coverage• Configuring wireless networks in remote offices can be a hassle
![Page 13: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/13.jpg)
Wireless protectionEasy central configuration for secure WiFi
• Central management• Plug & play deployment• Connect access points anywhere• Easy hotspot configuration
![Page 14: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/14.jpg)
Email traffic is still a riskOld methods with some original techniques
• Over 98% of all email is spam• Many spam emails combine links to infected websites• Phishing attacks are on the rise• Data protection is key concern for businesses
![Page 15: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/15.jpg)
Email protectionStopping threats and protecting data at your gateway
• Filter spam and stop malware• Let users manage their own quarantined items• Detects phishing urls in emails• Supports S/MIME and OpenPGP for encryption
![Page 16: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/16.jpg)
Endpoints are everywhereAnd so is your network
• The anywhere network• Accessing the web outside your protection• Malware carried on USB sticks• You need more than signature-based AV
![Page 17: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/17.jpg)
Endpoint protectionStop threats wherever users are and however they connect
• Endpoint anti malware• Live protection• Device control• Manage anywhere through our LiveConnect service
![Page 18: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/18.jpg)
Why worry about the web?A great tool and a potential risk
• Lack of control can impact productivity• 85% of all malware comes from the web• Web threats are invisible• Targeted and controlling computers and stealing data
![Page 19: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/19.jpg)
Web protectionLayered protection for computers connected to the web
• Gateway anti malware• URL Filtering• Web application control• Interactive usage and user reporting
![Page 20: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/20.jpg)
Vulnerable websites are a targetDon’t let your organization become another statistic
• More than 30,000 websites infected every day• 80% of infected websites are legitimate• Exploits will often redirect users to malicious sites
![Page 21: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/21.jpg)
Webserver protectionLet us be your web security expert
• Web application firewall• Anti malware scanning • Form hardening• URL hardening• Cookie protection
![Page 22: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/22.jpg)
Choose your deployment type
Software Appliance
Virtual Appliance
Hardware Appliance
![Page 23: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/23.jpg)
Hardware optionsHardwareAppliance 110/120 220 320 425 525 625 Multiple
+ RED
Environment Small network
Medium network
Medium network
Large network
Large network
Large network
Large networks
+ branches
Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple
Max. recommended firewall users
10/80 300 800 1.500 3.500 5.000 10.000+
Max. recommended UTM users
10/35 75 200 600 1.300 2.000 5.000
Software Appliance * Runs on Intel-compatible PCs and servers
VirtualAppliance *
VMware Ready & Citrix Ready certified Runs in Hyper-V, KVM, and other virtual environments
![Page 24: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/24.jpg)
Choose your modules
FullGuard
NetworkFirewall
Web Protection
WebserverProtection
NetworkProtection
WirelessProtection
EmailProtection
EndpointProtection
![Page 25: UTM - The Complete Security Box](https://reader036.fdocuments.net/reader036/viewer/2022062319/555420bdb4c90572068b4a22/html5/thumbnails/25.jpg)
www.sophos.com/unified