Documentos de Académico
Documentos de Profesional
Documentos de Cultura
More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and
data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and
use that deliver the industry's lowest total cost of ownership. Sophos offers award winning encryption, endpoint
security, web, email, mobile, server and network security backed by SophosLabsa global network of threat
intelligence centers.
Many state, provincial and municipal governments around the world turn to Sophos to provide them with highly
effective security solutions they can depend on. Sophos understands these needs are different from other
industries. Sophos products are simple & cost-effective, without sacrificing performance or functionality.
Sophos SafeGuard
Encryption
Sophos UTM
Essential next-generation firewall
protection for network, web, email,
applications, and users that is
unmatched in its deployment
flexibility: hardware, software, virtual
or cloud with options for highavailability, clustering, branch office
connectivity, wireless, and centralized
management and reporting.
Sophos Endpoint
Protection
Next-generation endpoint protection
integrates innovative technology with
real-time threat intelligence to secure
Windows, Mac and Linux systems
against malware and advanced
threats.
Sophos delivers:
005-3: Summary: The Sophos UTM provides network perimeter
005-5-R2-Part 2.2: The Sophos UTM provides IPSEC, SSL and RED
Sophos delivers:
007-3a-R2: The Sophos UTM provide a default deny all/log
007-3a-R4: The Sophos UTM uses Dual AV scan engines for Web
007-3a-R5: Account
Management - Enforce access
such as encrypting
Sophos delivers:
011-1.2 : The Sophos UTM keeps track of logging information for a
features of the UTM as well as system monitoring logs.
We can log what user access what resources such as
Websites, VPN remote access and Firewall logs.
The UTM itself is a hardened OS where you are able to
control access via role based administration so
that users in a specific groups only have the ability to view
logs but not make any changes to settings.
The UTM contains various logs of interest that can be
streamed to a syslog server over a secure encrypted tunnel.
Presented by: