Sophos

Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs, their cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques.

They began producing antivirus and encryption products nearly 30 years ago. Today their products help secure the networks used by 100 million people in 150 countries and 100,000 businesses./p>

Sophos Next-Generation Firewalls

The world’s best visibility, protection,and response.

Firewalls with synchronized security built in

Application Visibility and Control

Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network. Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure. Automatic threat response instantly identifies and isolates compromised systems on your network and stops threats from spreading.

Products

Sophos XG Firewall

XG Firewall

XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information and how they work with other security systems around them.

Expose Hidden Risks – This firewall has superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network. Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure.
Automatic threat response instantly identifies and isolates compromised systems on your network to stop threats from spreading.

UTM & Next-Gen Firewall

The UTM is unmatched in its deployment flexibility: choose from hardware, software, virtual or cloud with simple options for high-availability, clustering, branch office connectivity, wireless, and centralized management and reporting.

Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures.

UTM 9.4 is one of the first products to offer their advanced next-gen cloud sandboxing technology.

Sandstorm provides a whole new level of ransomware and targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network. Sandstorm is:

  • Easy to try, deploy, and manage
  • Effective at blocking evasive threats
  • Simple and powerful cloud-based protection

Secure Web Gateway

The purpose-built secure web gateway appliance makes web protection simple. It provides advanced protection from today’s sophisticated web malware with lightning performance that won’t slow users down.

The Web Appliance works seamlessly with your Sophos Secured Windows Endpoints to provide complete web protection for offsite users. When they leave the local network, the Sophos Endpoint takes over, providing full enforcement and protection everywhere they go. Policy updates and browsing activity are automatically synchronized. It all just works better together

Secure Email Gateway

Secure your email from spam, phishing and data loss. The purpose-built secure email gateway is an all-in-one solution for email encryption, DLP, anti-spam and threat protection.

Today’s email threats move fast, and growing businesses need predictive email security – defeating today’s threats with an eye on tomorrow.

The same technology as award-winning Intercept X, Sophos Email sandboxing is a deep learning neural network, able to block zero-day malware and unwanted applications.

Trust your inbox again with Sophos Email. Sophos has made it simple to block phishing imposters and protect employees from attacks using fraudulent email addresses that impersonate trusted contacts.

The smarter way to simple, secure Wi-Fi

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions
Installs fast with automatic setup and configuration

You can set up multiple wireless Access Points (APs) within minutes. They require no local configuration and will simply find the controller, retrieve their IP address via DHCP, and import the configuration. Devices automatically appear in the UTM/firewall interface where you can manually activate them.

Creates reliable networks for all areas

Sophos Wireless Access Point

Our access points support a variety of deployment scenarios. They include models for desktop/wall mounting such as the entry-level AP 15 and the enterprise-grade AP 55 and AP 100. The AP 15C, 55C and 100C are smoke-detector style ceiling-mount and the AP 100X is suitable for outdoor use.

“What I really like about Sophos’ integrated wireless protection approach is that it frees our administrators from separately managing an expensive enterprise wireless solution.”
Jason Richards, CEO, Vineyard Networks

Sophos Wireless combines the power of the Sophos Central platform and Sophos’ unique Security Heartbeat functionality. It monitors and acts upon the health status of connected endpoint and mobile clients to reduce the risk to your trusted Wi-Fi networks.

  • Integrates with your Sophos Endpoint and/or Sophos Mobile when managed in Sophos Central
  • Provides superior visibility to discover threats at the earliest possible moment
  • Prevents lateral movement by automatically restricting web access for unhealthy clients

Intercept X

End-to-end Endpoint Protection

Sophos Intercept X employs a comprehensive defense-in-depth approach to endpoint protection, rather than simply relying on one primary security technique to block even previously unseen security threats like ransomware and other malware. Using a combination of leading foundational (traditional) and modern (next-gen) techniques, Intercept X keeps malware at bay, integrating the industry’s top-rated malware detection, exploit, and endpoint detection and response (EDR).

Sophos Intercept X Endpoint Protection

Modern attackers don’t just focus on desktops and laptops, and neither does Intercept X. This is why the same technology that drives Intercept X endpoint protection is also available for servers and mobile devices.

Intelligent endpoint detection and response (EDR)

Built-in expertise helps you answer the tough questions about security incidents.

Sophos Intercept X employs a comprehensive defense-in-depth approach to endpoint protection, rather than simply relying on one primary security technique to block even previously unseen security threats like ransomware and other malware. Using a combination of leading foundational (traditional) and modern (next-gen) techniques, Intercept X keeps malware at bay, integrating the industry’s top-rated malware detection, exploit, and endpoint detection and response (EDR).

Managed Threat Response

24/7 threat hunting, detection, and response delivered by an expert team as a fully-managed service

Threat Notification Isn’t the Solution – It’s a Starting Point

Few organizations have the right tools, people, and processes in-house to effectively manage their security program around-the-clock while proactively defending against new and emerging threats. Going beyond simply notifying you of attacks or suspicious behaviors, the Sophos MTR team takes targeted actions on your behalf to neutralize even the most sophisticated and complex threats.

With Sophos MTR, your organization is armed with a 24/7 team of threat hunters and response experts who will:

  • Proactively hunt for and validate potential threats and incidents
  • Use all available information to determine the scope and severity of threats
  • Apply the appropriate business context for valid threats
  • Initiate actions to remotely disrupt, contain, and neutralize threats
  • Provide actional advice for addressing the root cause of recurring incidents

Activity Reporting

Summaries of case activities enable prioritization and communication so your team knows what threats were detected and what response actions were taken within each reporting period.

Adversarial Detections

Most successful attacks rely on the execution of a process that can appear legitimate to monitoring tools. Using proprietary investigation techniques, our team determines the difference between legitimate behavior and the tactics, techniques, and procedures (TTPs) used by attackers.

24/7 Leadless Threat Hunting

Applying data science, threat intelligence, and the intuition of veteran threat hunters, we combine your company profile, high-value assets, and high-risk users to anticipate attacker behavior and identify new Indicators of Attack (IoA).

Enhanced Telemetry

Threat investigations are supplemented with telemetry from other Sophos Central products extending beyond the endpoint to provide a full picture of adversary activities.

Proactive Posture Improvement

Proactively improve your security posture and harden your defenses with prescriptive guidance for addressing configuration and architecture weaknesses that diminish your overall security capabilities.

Public Cloud Visibility and Threat Response

Cloud Optix agentless, SaaS-based service works perfectly with your existing business tools to automate cloud security monitoring, governance, risk, and compliance and DevSecOps processes.

Stop Unauthorized Access

It takes as little as 52 seconds for an attacker to identify public cloud workloads as a target. Cloud Optix AI-powered monitoring instantly identifies suspicious console login events, API calls and assumed-role API calls that suggest shared or stolen user credentials are being used by an attacker remotely.

Audit-ready Reports

Continuously monitor compliance with custom or out-of-the box templates and audit-ready reports for standards such as CIS, SOC2, HIPAA, ISO 27001, and PCI DSS.

Reduce Audit Costs

Cloud Optix allows you to define which inventory items within your cloud account are subject to certain compliance standards, reducing the hours associated with your audit.

Works With Existing Tools

Save weeks of effort by mapping the Control ID from your existing overarching compliance tools such as RSA Archer or MetricStream to Cloud Optix.