Sophos Makes Unified Threat Management Complete By Adding Endpoint SecuritySophos Makes Unified Threat Management Complete By Adding Endpoint Security
Sophos UTM 9 integrates gateway security and endpoint security in a single hardware or virtual box
July 17, 2012
BOSTON, MA – July 16, 2012 – Sophos today announced the availability of Sophos UTM 9, the first UTM specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. Organizations and IT teams no longer have to spend considerable time and resources on configuring multiple point solutions to protect their entire IT infrastructures. Sophos UTM 9 provides complete security protection, regardless of location; it combines the company’s award-winning endpoint protection and unified threat management solutions into a single management console.
"When I first identified the UTM market, my vision was it would eventually encompass everything that a company would need to protect against threats." said Charles Kolodgy, research vice president, IDC. "Endpoint security management was neglected and/or relegated to separate products. Recognizing that mobile devices severely complicate endpoint management, Sophos is incorporating policy management for all endpoint devices, regardless of type and network, into their UTM solutions."
As the complexities of securing all networks have grown, so have the struggles for businesses to get the best out of the many point security solutions they have purchased. UTMs have been an increasingly popular way to address this problem, but until now, they haven’t been complete. By adding the ability to deploy and manage endpoint security, Sophos finally makes it easier for IT teams to get all the protection they need.
According to the International Data Corporation (IDC) Worldwide Quarterly Security Appliance Tracker, in the first quarter of 2012 (1Q12), the UTM market represented 28.5 percent of security appliance revenues due to 12.2 percent year-over-year growth. This trajectory presents tremendous opportunities for VARs that partner with vendors offering these kinds of solutions.
“Our customers are looking for solutions that can simplify their IT management. With the new Sophos UTM solution, time-strapped IT managers can keep their organization’s endpoints, network and data safe from threats, wherever their people work, whatever devices they use—in a matter of minutes,” said Todd O’Bert, president, Productive Corporation. “Sophos is able to provide an integrated level of protection unmatched in the industry, which is a tremendous value proposition for any solution provider or reseller.”
Sophos UTM: New Features
Proven Endpoint Protection
Protects everywhere, using the cloud to secure and monitor staff wherever they are, and extend security gateways to deploy and manage endpoint protection as well as device control. Sophos’ innovative approach to endpoint protection uses its LiveConnect cloud service—users can always manage all of their endpoints, no matter where they are or how they’re connected. Computers are kept up-to-date with antivirus protection and new policies that can be rolled out at any time.
HMTL5 VPN: Device-independent secure access for users wherever they are
Enables secure remote application access without installing any software on the desktop. HTML5 VPN portal lets users connect to internal resources wherever they are, no matter the device they use. Sophos’ browser-based portal uses HTML5, giving access through applications like VNC, remote desktop, SSH and more.
Wireless Hotspot Support
Manages internet access for guests and visitors with customizable wireless hotspots. With the advent of bring your own device (BYOD), organizations struggle to provide simple and secure guest wireless access. Sophos’ wireless security provides this, while extending security policies to all guests and enabling businesses to set up guest access quotas by time and/or bandwidth.
Integrated Sophos Anti-Virus Engine
Scans email and web traffic with Sophos’ award-winning antivirus technology as well as a second commercial engine (from Avira). Sophos scans viruses, spyware, worms, Trojans, and adware in single scan, and protects against zero-day-attacks.
“UTM 9 marks a milestone not only for Sophos, but for organizations worldwide. In the year since we acquired Astaro, we’ve been able to bring to market an integrated industry-first solution that’s game-changing for Sophos partners and easy-to-use for customers,” said John Shaw, vice president, product management, Sophos. “This solution was conceived not only by our great integrated development team, but also by our passionate and active users who provided countless feature recommendations in our forums. And thanks to our users, we’re excited about our roadmap.”
“With Sophos UTM, our IT managers can securely connect employees from anywhere or any device without having to worry about compatibility issues, without having to worry about “connect anywhere” issues,” said Craig Tait, senior consultant, third-i international limited. “By integrating endpoint into the gateway and keeping it simple, we can keep our network hacker-free and our employees productive.”
Additional information on Sophos’ Unified solutions can be found here or at www.sophos.com/networksecurity.
More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.
Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023