40
EndUser Protection Security gets… personal

Sophos EndUser Protection

  • Upload
    sophos

  • View
    1.106

  • Download
    3

Embed Size (px)

DESCRIPTION

With Sophos EndUser Protection you get endpoint security, mobile device management, web protection, protection for your data and email, and more—all in a single license. For more on Sophos EndUser Protection, visit: http://www.sophos.com/en-us/why-sophos/endpoint.aspx

Citation preview

Page 1: Sophos EndUser Protection

EndUser ProtectionSecurity gets… personal

Page 2: Sophos EndUser Protection

Threats changing,

still increasing

Data everywhere, regulations

growing

Users everywhere,

using everything

We are focused on protecting you

2

Page 3: Sophos EndUser Protection

We do IT securityBecause you’ve got enough to worry about

3

Wherever the user is, what ever they use

Our unique approach for better protection you can actually deploy

Quicker to setup, maintain and solve problems

SecurityEverywhere

WithoutComplexity

Active Protection

Page 4: Sophos EndUser Protection

Security everywhereProtecting every part of your business

Email

Data

Endpoint

Mobile

Web Network

Page 5: Sophos EndUser Protection

Active ProtectionOur unique approach for better protection with less complexity

Email Data Endpoint Mobile Web Network

Page 6: Sophos EndUser Protection

Business today…Increasingly sophisticated threats, mobile workforce, BYOD

Dr. SmartphoneMr. Mac Ms. Virtual Mr. BYOD

I need email access on my

iPhoneI need a Mac to

do my job

I’ve got several virtual desktops on my computer

I want to use my iPad at work

Page 7: Sophos EndUser Protection

Data Protection Suite

Introducing EndUser Protection

Complete Security Suite

Web Protection Suite

Endpoint Protection - Business

Anti-virus - Business

Endpoint Protection - AdvancedEndUser Protection

EndUser Data SuiteEndUser Web Suite

Now with Sophos Mobile Control

Page 8: Sophos EndUser Protection

8

Security gets…

•Every device they use

•Everywhere they go

•Everything they need

•Sensible protection that covers all devices

•Sensible licensing per-user

•Sensible services with updates and support included

•Easy BYOD

•Easy admin

•Easy support from a single vendor

Personal Easier Sensible

Page 9: Sophos EndUser Protection

Endpoint product line

9

Complete Security

Suite

EndUser Data Suite

EndUser Web Suite

EndUser Protection

UTM Fullguard + UTM Endpoint

(UTM 9)

Endpoint Protection -

Business

Sophos Anti-VirusBusiness

AV/HIP/Live Protection

Client Firewall

Application Control

Device Control

Web Filtering in Endpoint

DLP, NAC, Patch

Web Gateway

Email Gateway

Full-Disk Encryption

Mobile

UTM FullGuard*

Groupware

Platforms

SharePoint, Exchange

Win, Mac, Linux, Unix, VM, EMC

Exchange

Win, Mac, Linux, Unix, VM, EMC

Exchange

Win, Mac, Linux, Unix, VM, EMC

Exchange

Win, Mac, Linux, Unix, VM, EMC

Win

Exchange

Win, Mac, Linux,

VM, EMC

Win, Mac, VM,

*UTM FullGuard includes network, web, email, wireless and webserver protection

Page 10: Sophos EndUser Protection

EndUser Protection at a glance

Access control

Firewall

Virtualization

ApplicationControl

Device Control

Encryption

Anti-malware

Mobile Control

Data Control

Patch assessment

Web Protection

ExchangeServer Protection

Page 11: Sophos EndUser Protection

Securing mobile devices

The situation:

Smartphone and tablet adoption is growing rapidly

Employees are using their own devices

They need secure access to company email and data

The challenge:

113 devices are lost every minute in the US

Android is today’s largest malware target

… Thousands of rogue apps

Page 12: Sophos EndUser Protection

Mobile Device Management

Unified policy and management for all devices

iOS, Android, BlackBerry, and Windows Mobile

Secure access to corporate email via proxy

Policy controls:• Passcode and auto lock enforcement• Compliance enforcement (jailbreaking/rooting)• Encryption enforcement

Loss/theft protection:• Remote lock/wipe• Auto wipe after failed login attempts• Locate lost devices

Page 13: Sophos EndUser Protection

Enterprise App Store

Control apps on mobile devices

Publish in-house, required, recommended apps

Block unwanted apps

Page 14: Sophos EndUser Protection

Mobile Security

Scans Android apps for malware before they are installed

Active Protection cloud technology:• Live real-time cloud lookups• Up-to-the-minute app intelligence

Fast and low impact scanning

Privacy advisor detects apps accessingyour personal data

Page 15: Sophos EndUser Protection

Today’s threats

Mainly come from the web

Target data, identities and cash

Exploit vulnerabilities

Often execute silently

In families of malware

Are produced on a massive scale

Page 16: Sophos EndUser Protection

Anti-malware

A single engine to protect from all malware

Genotyping technology

Active Protection cloud technologies:• Live url filter: Stops urls we know are bad instantly• Live anti-virus: Checks in seconds to see if a suspicious file might be a real

threat

Fast and low impact scanning

Small updates, frequently applied

Page 17: Sophos EndUser Protection

Intrusion Prevention

Behavioral detection

Suspicious file detection

Suspicious behavior detection

Buffer overflow detection

Rules created by Sophos via Active Protection

So reliable it’s on by default

Page 18: Sophos EndUser Protection

Applications wrongly applied

Users trying to install and run unauthorized apps

Some apps are risky

Unwanted apps might use bandwidth

Version control isn’t easy

Page 19: Sophos EndUser Protection

Application Control

Applications created and updated via Active Protection

Over 40 categories including:• Online storage• Browsers• P2P File sharing• Instant messaging• Virtualization tools• Remote access• USB program launchers

Page 20: Sophos EndUser Protection

Plugging the device gap

Devices can carry malware

They take data everywhere

If they’re lost can you be sure they’re secure?

People will plug them in anywhere

Page 21: Sophos EndUser Protection

Device Control

Control devices connected to computers

Granular control of:• Storage devices:

• Removable storage - USB keys, removable hard disks• Optical / disk drives - CD / DVD / HD-DVD / Blu-ray

Network devices:• Wi-Fi / Modems• Bluetooth• Infra-red

Page 22: Sophos EndUser Protection

Securing virtual environments

Virtualization saves money

Is security on the agenda?

Don’t compromise on performance

Page 23: Sophos EndUser Protection

Virtualization

We protect virtual environments. At no extra cost

Our lighter-weight agent is better than other traditional Endpoint security solutions

Stagger scanning for virtual machines

No compromise on protection

Citrix Reciever plugin

Developing Vmware vShield scanner

Page 24: Sophos EndUser Protection

The web: where malware is atA threat network

• The number one source of infection• Legitimate sites are regularly infected• Productivity filtering isn’t enough• Many applications accessing the web

How people do web protection today• Large scale deployments that focus on the gateway• Backhauling traffic to appliances• None or limited protection for users not connecting to the gateway

Page 25: Sophos EndUser Protection

Web protectionBasic Endpoint

• Active Protection from malware and bad sites

• Works in any browser

Web Filtering in Endpoint• Low-cost add-on integrated into the Endpoint/SEC• Reduce surface area of attack from risky parts of the web (porn,

hate, p2p, etc.)• Essential compliance and liability coverage for inappropriate sites

Web Protection Suite• Complete protection everywhere users go with LiveConnect• Full coverage of threats, compliance, productivity, liability, and

visibility• Reduce investment & complexity in backhauling/VPN/Gateway HW

Page 26: Sophos EndUser Protection

Inside LiveConnectwith Web Protection SuiteEnables full visibility and control

Policy and reporting synchronization

Immediate and automatic

Secure end-to-end encryption

Page 27: Sophos EndUser Protection

Encryption

Industrial strength full disk encryption

Deployed and managed from your endpoint console

Fast initial encryption

Full password recovery options

Page 28: Sophos EndUser Protection

Data ControlFully integrated endpoint DLP solution

Designed to prevent accidental data loss

Monitor and enforce on all common data exit points

Train staff through use of desktop prompts

Data types provided from Sophos via Active Protection

Integrated with email protection

Page 29: Sophos EndUser Protection

The problem with patching

No visibility of exposure level• Have users installed vulnerable applications?• Have users disabled automatic updates?• Is Microsoft WSUS/SCCM working correctly?• Don’t know which patches to worry about!

Compliance audits become a real headache

Machines get compromised• Gartner: 90% of situations where machines got compromised, a patch or

configuration change existed that could have prevented it!

Page 30: Sophos EndUser Protection

Patch Assessment1. We assess all the key exploited applications

• Checking for patches from 11 vendors

2. We accurately assess each endpoint• Local scans on every managed endpoint• Complex fingerprinting ensures patches accurately detected• Centralized reporting of relevant missing patches• Simple: no end-user interaction or messaging

3. We prioritize patches to make life easier• Sophos rates patch criticality via Active Protection• Sophos shows any malware associated with patches• Creates a focus on the patches that really matter!

Page 31: Sophos EndUser Protection

Spam, spam, spam and malware

Spam emails contain weblinks to malware

They might also carry viruses in them

Over 90% of the worlds email is spam

Nasty emails might be stored on your local exchange servers too

Page 32: Sophos EndUser Protection

Exchange Server protection

• Stop viruses and other threats in inbound, outbound and items inside Microsoft Exchange

• Unique real-time Behavioral Genotype malware engine• Live anti-spam via Active Protection stops 99%• Gives instant visibility of status, email throughput, quarantine databases and

all policy rules from a single console• Generate graphical management reports showing trends in email

throughput, protection level and issues needing action

Page 33: Sophos EndUser Protection

Where’s the fire?

Open ports on PCs and Laptops are open doors to hackers

A computer without a firewall and connected to the internet is a target

Worms often target particular ports and protocols

Laptops can connect anywhere, you need different rules when they’re outside your network

Page 34: Sophos EndUser Protection

Client firewall

Location aware policies

Identifies apps by checksum

Rollout invisible to users

Interactive management alerts to create rules

Stealth mode prevents unauthorized network access by hackers

Page 35: Sophos EndUser Protection

Who’s on my LAN?

Do your computers have all the right software installed?

You don’t know when guests are connecting computers and if they’re secure

If guests don’t use the same software you do then you don’t know if they’re OK to connect

Page 36: Sophos EndUser Protection

Access Control

Prevent security issues by assessing managed and unmanaged computers.

Detect and fix managed endpoint vulnerabilities

Ensure that any guest computers match your security requirements before they access your network

Updated database of over 600 security applications

Prevent unauthorized computers from accessing the network

Page 37: Sophos EndUser Protection

Complexity

Users may complain about PC performance

Does implementing a new feature mean a whole new rollout?

Can you see every platform you’ve deployed to?

How easy is it to perform common tasks or cleanup threats?

Page 38: Sophos EndUser Protection

Deploy and manage

A single deployment wizard for all endpoint features

Single agent for:• Anti malware• HIPS• Device Control• Data Control• Web protection

Widest platform support

Console built for usability

Mobile Device Management• Over-the-air policy updates• Self-serve user portal for registration reduces help desk burden

Page 39: Sophos EndUser Protection

39

US and Canada 1-866-866-2802

[email protected]

UK and Worldwide + 44 1235 55 9933

[email protected]

nakedsecurity.sophos.com

Staying ahead of the curveStaying ahead of the curve

facebook.com/securitybysophos

twitter.com/Sophos_News

Sophos on Google+

linkedin.com/company/sophos

Page 40: Sophos EndUser Protection

www.sophos.com/endpoint