Sophos RED 50

Sophos RED makes extending your secure network to other locations easy and requires no technical skills at the remote site.
Manufacturer: Sophos

$645.00 (USD)

We Accept Visa, Mastercard, American Express Cards

Turn any location into a secure location with Remote Ethernet Devices (RED)

Securely connects branch offices without local setup

If you have branch offices, retail locations, remote outposts or otherwise need to extend your secure network easily and affordably beyond your main facility, Sophos Remote Ethernet devices are the ideal solution. Uniquely simple and imminently affordable, RED provides an elegant solution to building a secure distributed network.

Sophos RED 50 Appliance, 1-Year Warranty, with US Power Supply

  • Unrestricted Maximum users
  • 360 Mbps Maximum throughput
  • 4 x 10/100/1000 Base-TX
  • Desktop/wall/rack (optional) Mount
  • 216 x 44 x 189 mm, 1.1 kg / 2.43 lbs


  • Sophos RED 50 Appliance, 1-Year Warranty, with US Power Supply
  • Easily extend your secure network anywhere
  • Two models suiting any type of deployment: RED 15 and RED 50
  • The strongest AES - 256 bit encryption
  • Work seamlessly with Sophos Wireless Access Points
  • Apply the same protection to all locations or customize it to meet your needs
  • Easy maintenance with no licenses and automated updates

Plug-and-protect deployment

Sophos RED makes extending your secure network to other locations easy. It requires no technical skills at the remote site; simply enter the RED device ID into your UTM and ship it. As soon as it’s plugged in and connected to the Internet, it will contact your UTM and establish a secure dedicated VPN tunnel. It’s that easy.

Flexible configuration

Set up your RED devices to tunnel all traffic from the remote location back to the UTM, controlling DHCP and other network elements of the remote network. Or you may choose to only route inter-office network traffic via RED, while enabling direct Internet access from the remote location.

Sophos RED

Secure encrypted tunnel

All data between the RED and your UTM is encrypted to the strongest AES-256 levels ensuring a tamper- and hack-proof, secure connection. And with our latest SG Series UTM appliances, encryption performance makes this level of protection completely transparent.

Easy centralized management

Since RED is effectively a virtual Ethernet cable connecting your remote locations, centralized management of your distributed network is as easy as managing a single location. You can choose to apply the same firewall, web and other security policies across both local and remote traffic. Or you can create custom policies by location, all from your UTM management console.