Risk
11/14/2012
05:29 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Sophos Intros New UTM Exclusively For SMBs

Sophos UTM 100 with BasicGuard provides network, email, Web, and wireless protection

BOSTON, MA – November 12, 2012 – In response to increasing market demand for small business security solutions, and as part of its compete security strategy, Sophos today announced the release of a comprehensive new unified threat management appliance and software package exclusively for small businesses. The Sophos UTM 100 appliance with BasicGuard sets a new standard for feature-rich small business security solutions--offering network, email, web and wireless protection together.

According to a recent IDC[i] Report, "Small and medium-sized businesses have as much need for information technology as much larger companies. They also require security because they are a target of cybercriminals, but there are unique issues that prevent SMBs from just buying what large enterprises purchase."

Although companies of all sizes can fall victim to malware and security breaches, tight budgets and a lack of resources typically impact small businesses that are oftentimes obligated to deploy low-end security products that lack necessary security functions. And these functions don't necessarily scale as the business grows or their needs evolve. UTM 100 customers can easily upgrade their license to include more advanced security features and accommodate more employees.

BasicGuard includes many of the capabilities typically reserved for enterprise solutions, such as:

· Web Application Control features

· Network Firewall & IPS

· Remote Access and VPN

· Wireless Protection

· Web antivirus and URL filter

· Email antivirus and anti-spam capabilities

"Today's small businesses want a reliable set of core capabilities with full flexibility to expand features as their needs and budgets grow," said Chris Kraft, vice president, product management, Sophos. "Complete security shouldn't be out of reach for small businesses. We believe they shouldn't have to compromise between security and budgets, which is why we developed the UTM 100--enterprise features and the ability to upgrade, at an attractive price point."

Sophos was also recently named a winner in the Security category at CRN's 9th annual Tech Innovator awards ceremony--for Sophos UTM 9.

Additional information on Sophos' Unified solutions can be found here or at www.sophos.com/networksecurity.

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web