Analytics
2/12/2013
01:08 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Sophos Extends UTM To The Enterprise

Sophos RED 50 centrally manages UTM for midsize branch offices

BOSTON, MA – February 12, 2013 – Sophos has strengthened its network security offerings with two enhanced high-end Unified Threat Management (UTM) appliances, Sophos UTM 525 and 625, and the new Sophos RED 50 (Remote Ethernet Device), the first security solution to offer complete and centrally managed Unified Threat Management for medium-sized branch offices. With these updates and additions, Sophos extends UTM, Next Generation Firewall, and branch office security to the enterprise by improving throughput speeds and performance as well as offering additional flexible deployment options.

UTM For the Enterprise

To accommodate the needs of larger organizations, Sophos has included significant performance and flexibility enhancements in its new enterprise appliances. The new appliances can see a 300% increase in firewall throughput speeds to 40 Gbps, as well as the option of field-replaceable LAN (local access network) modules, which extend the UTM appliances allowing organizations to configure the Sophos UTM devices and Next Generation Firewall features to scale their deployments for use in any size organization - even where multiple 10Gbps-Ethernet connections are required.

Protecting Larger Branch Offices

The company has also released a larger RED model, which improves upon its revolutionary branch office security technology. The new model offers increased performance, enhanced connectivity capabilities and new operational functions. The Sophos RED 50 appliance has throughput speeds of more than 300 Mbps, ten-times faster than RED 10 devices – ideal for organizations that need to send larger files, run daily data backups or protect large branch office networks.

Sophos RED 50 also comes with a 4-port gigabit switch and two gigabit wide area network interfaces. These ports can be connected to two Internet connections at once, allowing for the bandwidth load balancing or failover capabilities many larger branch offices require.

"IT departments at larger organizations are beginning to recognize the benefit of protecting their networks with Unified Threat Management and Next Generation Firewall solutions. However, enterprises require a higher level of performance than SMBs, due to network size," said Martin Becker, product manager, network security, Sophos. "Our new hardware models make it possible for enterprises to reap the benefits of protecting a network with a UTM device without sacrificing performance and security."

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.