Risk
11/14/2012
05:29 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Sophos Intros New UTM Exclusively For SMBs

Sophos UTM 100 with BasicGuard provides network, email, Web, and wireless protection

BOSTON, MA – November 12, 2012 – In response to increasing market demand for small business security solutions, and as part of its compete security strategy, Sophos today announced the release of a comprehensive new unified threat management appliance and software package exclusively for small businesses. The Sophos UTM 100 appliance with BasicGuard sets a new standard for feature-rich small business security solutions--offering network, email, web and wireless protection together.

According to a recent IDC[i] Report, "Small and medium-sized businesses have as much need for information technology as much larger companies. They also require security because they are a target of cybercriminals, but there are unique issues that prevent SMBs from just buying what large enterprises purchase."

Although companies of all sizes can fall victim to malware and security breaches, tight budgets and a lack of resources typically impact small businesses that are oftentimes obligated to deploy low-end security products that lack necessary security functions. And these functions don't necessarily scale as the business grows or their needs evolve. UTM 100 customers can easily upgrade their license to include more advanced security features and accommodate more employees.

BasicGuard includes many of the capabilities typically reserved for enterprise solutions, such as:

· Web Application Control features

· Network Firewall & IPS

· Remote Access and VPN

· Wireless Protection

· Web antivirus and URL filter

· Email antivirus and anti-spam capabilities

"Today's small businesses want a reliable set of core capabilities with full flexibility to expand features as their needs and budgets grow," said Chris Kraft, vice president, product management, Sophos. "Complete security shouldn't be out of reach for small businesses. We believe they shouldn't have to compromise between security and budgets, which is why we developed the UTM 100--enterprise features and the ability to upgrade, at an attractive price point."

Sophos was also recently named a winner in the Security category at CRN's 9th annual Tech Innovator awards ceremony--for Sophos UTM 9.

Additional information on Sophos' Unified solutions can be found here or at www.sophos.com/networksecurity.

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web