Complete Security
Threats changing, still
increasing
Data everywhere, regulations
growing
Users everywhere,
using everything
We’re focused on protecting youWhat’s the problem with IT security today?
We do IT securityBecause you’ve got enough to worry about
3
Wherever the user is, what ever they use
Our unique approach for better protection you can actually deploy
Quicker to setup, maintain and solve problems
Complete Security
WithoutComplexity
Active Protection
4
Data
Endpoint
Mobile
Web Network
Complete security
Complete securityEmail Data Endpoint Mobile Web Network
Clean up
Automation
Visibility Local self-help
WiFi security
Keep people working
Technical support
Access control
Intrusion prevention
Anti-malware User education
Data Control
Stop attacks and breaches
Firewall
Email encryption
Virtualization
Endpoint Web Protection
Mobile Control
Secure branch offices
Encryption for cloud
Live Protection
Mobile app security
Protect everywhere
Web ApplicationFirewall
URL Filtering
Anti-spam Patch Manager
ApplicationControl
Encryption
Device Control
Reduce attack surface
Active ProtectionOur unique approach for better protection with less complexity
Email Data Endpoint Mobile Web Network
Complete but not complex Defense in depth that you can actually deploy
Reduce the attack surface
Protect everywhere
Stop attacks and breaches
Keep people working
Example: Fake antivirus
CompleteSecurity
Delivering complete protection from a rampant threat
Web ApplicationFirewall
URL Filtering Endpoint Web Protection
Live Protection
Clean up
Visibility Anti-malware
Patch Manager
Data
Endpoint
Mobile
Web
Network
Example: Data loss Protecting personal information and sensitive data
CompleteSecurity
ApplicationControl
Encryption Mobile Control
Encryption for cloud
Automation
Local self-help
User education
Data Control
Data
Endpoint
Mobile
Web
Network
Completing the visionIntegrating Astaro Network Security
Astaro Secure GatewayActive Protection• Anti malware• Web reputation checking• Anti spam
Data features• SPX Email Encryption• Data control for web and email
Sophos EndpointManaged in Astaro SecureGateway• Application Control• Client Firewall• Full Disk Encryption• Device and media Encryption• Manage Sophos Endpoint clients • Anti malware• Device Control • Web Protection
Complete Security
11
Complete Security
SuiteEndUser
Data SuiteEndUser
Web SuiteEndUser
ProtectionUTM Fullguard + UTM Endpoint
(UTM 9)
Endpoint Protection -
Business
Sophos Anti-VirusBusiness
AV/HIP/Live Protection
Client Firewall
Application Control
Device Control
Web Filtering in Endpoint
DLP, NAC, Patch
Web Gateway
Email Gateway
Full-Disk Encryption
Mobile
UTM FullGuard*
Groupware
Platforms
SharePoint, Exchange
Win, Mac, Linux, Unix, VM, EMC
Exchange
Win, Mac, Linux, Unix, VM, EMC
Exchange
Win, Mac, Linux, Unix, VM, EMC
Exchange
Win, Mac, Linux, Unix, VM, EMC
Win
Exchange
Win, Mac, Linux,
VM, EMC
Win, Mac, VM,
*UTM FullGuard includes network, web, email, wireless and webserver protection
Why do more with Sophos?• Complete security that works better together• Defense in depth you can actually deploy
You’ll also see the benefits of consolidating your security vendors:
• Consolidated licensing costs• One trusted partner for support
You’ll get better threat and data protection more simply, and more cost effectively
Complete Security
WithoutComplexity
Active Protection
www.sophos.com
Top Related