SlideShare a Scribd company logo
1
Vincent Vanbiervliet
Product Manager
Synchronized Security
Revolutionizing Advanced Threat Protection
2
What we’re going to cover
• What’s the problem?
• It’s time for a security revolution
• How it works
• Synchronized Security 2015-2016
• Your path to synchronized Security
33
What’s the problem?
4
Threat Landscape
5
Increasing attacks, increasing sophistication
Attack surface
exponentially larger
Laptops/Desktops
Phones/Tablets
Virtual servers/desktops
Cloud servers/storage
Threats more
sophisticated
Attacks are more
coordinated than defenses
6
Security industry 2D view
77
It’s time for a security
revolution
8
Generations of security
Point Products
Anti-virus
IPS
Firewall
Sandbox
Layers
Bundles
Suites
UTM
EMM
Synchronized Security
Security
Heartbeat™
9
Comprehensive protection
• Prevent Malware
• Detect Compromises
• Remediate Threats
• Investigate Issues
• Encrypt Data
MAC
ANDROID
WINDOWS
iOS
CORPORATE
DATA
WINDOWS
PHONE
LINUX
Synchronized Security
10
Integration at a different level
Synchronized Security Alternative
• System-level intelligence
• Automated correlation
• Faster decision-making
• Accelerated Threat Discovery
• Automated Incident Response
• Simple unified management
• Resource intensive
• Manual correlation
• Dependent upon human analysis
• Manual Threat/Incident response
• Extra products
• Endpoint/Network unaware of
each other
Management
Enduser Network
SIEM
Endpoint
Mgmt
NW Mgmt
Endpoint Network
11
Synchronized Security
Security must be comprehensive
The capabilities required to fully satisfy customer need
Security can be made simple
Platform, deployment, licensing, user experience
Security is more effective as a system
New possibilities through technology cooperation
Synchronized Security
Integrated, context-aware security where Enduser
and Network technology share meaningful
information to deliver better protection.
SOPHOS LABS
Sophos Cloud
Next Gen
Network Security
Next Gen
Enduser Security
heartbeat
1212
How it works
13
3 pillars of advanced threat protection
By device identification reduces
time taken to manually identify
infected or at risk device or host
by IP address alone
Compromised endpoints are
isolated by the firewall
automatically, while the
endpoint terminates and
removes malicious software.
Endpoint and network
protection combine to identify
unknown threats faster. Sophos
Security Heartbeat™ pulses real-
time information on suspicious
behaviors
Security Heartbeat™
Accelerated Threat
Discovery
Active Source
Identification
Automated Incident
Response
Faster, better decisions Quicker, easier
investigation Reduced threat impact
14
System Initialization
Registration
NGEP & NGFW register with Sophos Cloud which sends
certificate/sec info to both
Connection
Endpoints initiate connection to the trusted Firewall
Validation
Firewall and Endpoints check sec info sent to them by Cloud
to verify they are valid
SOPHOS LABS
Sophos Cloud
Next Gen
Network Security
Next Gen
Enduser Security
heartbeat
Support of multiple locations
Endpoints can establish connection to Firewalls
at any customer’s location as the Sophos Cloud registry
can be shared among all Galileo-enabled Firewalls
15
Accelerated Threat Discovery
Security Heartbeat
A few bytes of information are shared every 15
seconds from Endpoint to Network
Events
Upon discovery, security information like Malware,
PUA is shared between Endpoints and Network
Health
Endpoint sends Red, Yellow, Green health status to
Network
SOPHOS LABS
Sophos Cloud
Next Gen
Network Security
Next Gen
Enduser Security
heartbeat
VPN support
Galileo supports endpoints connected within the local
network as well as those connected via VPN as long as
they are connecting to the Firewall.
16
Active Source Identification
Security Heartbeat
Positively identifying the machine. Associating the IP
address with a particular Endpoint
Advanced Attack
If Network Firewall detects an advanced attack but
can’t determine source, it requests details from
endpoints
Source Identification
Endpoint sends details of machine name, user, process, and
IP address
SOPHOS LABS
Sophos Cloud
Next Gen
Network Security
Next Gen
Enduser Security
heartbeat
17
Automated Incident Response
Green
Endpoints have full access to internal applications and
data as well as internet
Yellow
Affected endpoints can be isolated from
internal/sensitive applications and data while
maintaining access to internet
Red
Affected endpoints are isolated from the network and have
no access to internal systems or external internet
SOPHOS LABS
Sophos Cloud
Next Gen
Network Security
Next Gen
Enduser Security
heartbeat
Defaults and customization
There are no default policies based on health status so
admins can customize responses as needed. We are
developing a best practices guide to assist customers in
recommended policy setup.
1818
Synchronized
Security 2015
19
Comprehensive Next-Gen Endpoint
SOPHOS SYSTEM
PROTECTOR
Application
Tracking
Threat
Engine
Application
Control
Reputation
Emulator
HIPS/
Runtime
Protection
Device
Control
Malicious
Traffic
Detection
Web
Protection
IoC
Collector
Live
Protection
Security
Heartbeat™
20
Comprehensive Next-Gen Network
SOPHOS FIREWALL
OPERATING SYSTEM
Web
Filtering
Intrusion
Prevention
System
Routing
Email
Security
Security
Heartbeat™
Selective
Sandbox
Application
Control
Data Loss
Prevention
ATP
Detection
Proxy
Threat
Engine
Firewall
21
SOPHOS SYSTEM
PROTECTOR
Sophos Cloud
Next Generation Threat Detection
heartbeat
SOPHOS FIREWALL
OPERATING SYSTEM
Application
Tracking
Threat
Engine
Application
Control
Reputation
Emulator
HIPS/
Runtime
Protection
Device
Control
Malicious
Traffic
Detection
Web
Protection
IoC
Collector
Live
Protection
Security
Heartbeat™
Web
Filtering
Intrusion
Prevention
System
Routing
Email
Security
Security
Heartbeat™
Selective
Sandbox
Application
Control
Data Loss
Prevention
ATP
Detection
Proxy
Threat
Engine
Isolate subnet and WAN access
Block/remove malware
Identify & clean other infected systems
User | System | File
Compromise
Firewall
2222
Synchronized
Security 2016
23
SOPHOS SYSTEM
PROTECTOR
Sophos Cloud
Improved Threat Detection
heartbeat
SOPHOS FIREWALL
OPERATING SYSTEM
Application
Tracking
Threat
Engine
Application
Control
Reputation
Emulator
HIPS/
Runtime
Protection
Device
Control
Malicious
Traffic
Detection
Web
Protection
IoC
Collector
Live
Protection
Security
Heartbeat™
Web
Filtering
Intrusion
Prevention
System
Routing
Email
Security
Security
Heartbeat™
Selective
Sandbox
Application
Control
Data Loss
Prevention
ATP
Detection
Proxy
Threat
Engine
Lockdown local network access
Remove file encryption keys
Terminate/remove malware
Identify & clean other infected
systems
User | System | File
Compromise
Firewall
24
SOPHOS SYSTEM
PROTECTOR
Sophos Cloud
Automated Protection of Endpoints
heartbeat
SOPHOS FIREWALL
OPERATING SYSTEM
Application
Tracking
Threat
Engine
Application
Control
Reputation
Emulator
HIPS/
Runtime
Protection
Device
Control
Malicious
Traffic
Detection
Web
Protection
IoC
Collector
Live
Protection
Security
Heartbeat™
Web
Filtering
Intrusion
Prevention
System
Routing
Email
Security
Security
Heartbeat™
Selective
Sandbox
Application
Control
Data Loss
Prevention
ATP
Detection
Proxy
Threat
Engine
Discover unmanaged Endpoints
Could it be managed?
Self-service portal setup
User authentication
Distribute security profile
Win | Mac | Mobile
Endpoint
Firewall
25
SOPHOS SYSTEM
PROTECTOR
Sophos Cloud
Detect and Remediate Compromises
heartbeat
SOPHOS FIREWALL
OPERATING SYSTEM
Application
Tracking
Threat
Engine
Application
Control
Reputation
Emulator
HIPS/
Runtime
Protection
Device
Control
Malicious
Traffic
Detection
Web
Protection
IoC
Collector
Live
Protection
Security
Heartbeat™
Web
Filtering
Intrusion
Prevention
System
Routing
Email
Security
Security
Heartbeat™
Selective
Sandbox
Application
Control
Data Loss
Prevention
ATP
Detection
Proxy
Threat
Engine
Identify compromise
Detect source
Assess impact
Block/remove malware
Identify & clean other infected
systems
User | System | File
Compromise
Firewall
2626
Your path to
Synchronized
Security
27
NEXT-GEN
ENDUSER SECURITY
NEXT-GEN
NETWORK SECURITY
SOPHOS UTM
• NETWORK PROTECTION
MODULE
SOPHOS CLOUD ENDPOINT
• CLOUD ENDUSER
PROTECTION
• CLOUD ENDPOINT
ADVANCED
Endpoint and Network working together
• FULLGUARD LICENSE
• TOTALPROTECT BUNDLE
NEXT-GEN FIREWALL
• NETWORK PROTECTION
MODULE
• NEXT-GENGUARD
LICENSE
• NEXT-GENPROTECT
BUNDLE
28
Already using Sophos
* Cloud Endpoint requires Sophos Cloud Endpoint Protection Advanced or Sophos Cloud Enduser Protection subscriptions
3030
Conclusion
31
The Synchronized Security difference
Sophos Competition
Synchronized Security Point Products
Simple Complex
Comprehensive Incomplete
Prevention, Detection, Investigation,
Remediation, Encryption
Prevention
Enduser, Network, Server, Mobile,
Web, Email, Encryption
Endpoint or Network
Automated Manual
Block the known, unknown,
advanced, coordinated attacks
Partial Prevention
32
Revolutionizing advanced threat protection
Synchronized Security
Accelerated Threat
Discovery
Positive Source
Identification
Automated Incident
Response
Faster, better decisions
Quicker, easier
investigation
Reduced threat impact
33© Sophos Ltd. All rights reserved.

More Related Content

PPTX
The next generation of IT security
PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Discover Synchronized Security - Sophos Day Netherlands
PPTX
Sophos Next-Generation Enduser Protection
PPTX
Consider Sophos - Security Made Simple
PPTX
UTM - The Complete Security Box
PPT
Sophos Utm Presentation 2016
PPTX
This is Next-Gen IT Security - Introducing Intercept X
The next generation of IT security
Security: more important than ever - Sophos Day Belux 2014
Discover Synchronized Security - Sophos Day Netherlands
Sophos Next-Generation Enduser Protection
Consider Sophos - Security Made Simple
UTM - The Complete Security Box
Sophos Utm Presentation 2016
This is Next-Gen IT Security - Introducing Intercept X

What's hot (18)

PPTX
Endpoint Security Evasion
PPTX
2013 Security Threat Report Presentation
PPTX
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
PPTX
Sophos Security Day Belgium - The Hidden Gems of Sophos
PPTX
Sophos utm-roadshow-south africa-2012
PDF
Preparing Your School for BYOD with Sophos UTM Wireless Protection
PPT
4 Steps to Optimal Endpoint Settings
PDF
Complete Endpoint protection
PPTX
Securing with Sophos - Sophos Day Belux 2014
PPTX
Sophos Cloud - breaking the stereotypes
PDF
Panda Security - Endpoint Protection
PPTX
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
PDF
Symantec Endpoint Protection 12
PPT
FireEye
PDF
Data Center Server security
PDF
FireEye - Breaches are inevitable, but the outcome is not
PPTX
FireEye Engineering
Endpoint Security Evasion
2013 Security Threat Report Presentation
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos utm-roadshow-south africa-2012
Preparing Your School for BYOD with Sophos UTM Wireless Protection
4 Steps to Optimal Endpoint Settings
Complete Endpoint protection
Securing with Sophos - Sophos Day Belux 2014
Sophos Cloud - breaking the stereotypes
Panda Security - Endpoint Protection
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
Symantec Endpoint Protection 12
FireEye
Data Center Server security
FireEye - Breaches are inevitable, but the outcome is not
FireEye Engineering
Ad

Viewers also liked (19)

PPTX
Sophos EndUser Protection
PPTX
Intercept X - Sophos Endpoint
PPTX
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
PPTX
Sophos Wireless Protection Overview
PDF
shah-meet-cloud-certified-engineer[6] copy
PPTX
Sophos Cloud advanced
PDF
Manual Sophos
PPTX
Taking the battle to Ransomware with Sophos Intercept X
PDF
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
PPTX
Sophos End User Protection
PPTX
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
PPTX
Kaspersky
PDF
Sophos 2010
PPTX
Kaspersky endpoint security business presentation
PPT
Benefits of web application firewalls
PPTX
Endpoint Protection
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PPTX
Security Technology Vision 2016
PDF
Digital Trust - Tech Vision 2016 Trend 5
Sophos EndUser Protection
Intercept X - Sophos Endpoint
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Wireless Protection Overview
shah-meet-cloud-certified-engineer[6] copy
Sophos Cloud advanced
Manual Sophos
Taking the battle to Ransomware with Sophos Intercept X
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Sophos End User Protection
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Kaspersky
Sophos 2010
Kaspersky endpoint security business presentation
Benefits of web application firewalls
Endpoint Protection
Anatomy of an Attack - Sophos Day Belux 2014
Security Technology Vision 2016
Digital Trust - Tech Vision 2016 Trend 5
Ad

Similar to What's cooking at Sophos - an introduction to Synchronized Security (20)

PPTX
Synchronized Security Presentation
PPTX
Sophos synchronized security in action @Netpluz CS Event Nov 2017
PPTX
Synchronized security
PDF
Sophos XG Firewall
PPTX
Sophos security heartbeat presentation
PPTX
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
PDF
sophos-xgs-series-firewall-datasheet.pdf
PPTX
This is Next-Gen
PDF
Security - sophos-nist-compliance-card.pdf
PDF
sophos-intercept-x-license-guide.pdf
PPTX
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
PPTX
Sophos
PPTX
technical overview - endpoint protection 10.3.3
PDF
Bescherm jezelf tegen ransomware
PDF
Trusted Network Security Service Providers for Small Businesses
PDF
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
PPTX
Defending the Endpoint with Next-Gen Security
PPTX
LSI Spring Agent Open House 2014
PDF
SOLUCIONES CHECKPOINT - Redes y Comunicaciones
PPT
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Synchronized Security Presentation
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Synchronized security
Sophos XG Firewall
Sophos security heartbeat presentation
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
sophos-xgs-series-firewall-datasheet.pdf
This is Next-Gen
Security - sophos-nist-compliance-card.pdf
sophos-intercept-x-license-guide.pdf
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
Sophos
technical overview - endpoint protection 10.3.3
Bescherm jezelf tegen ransomware
Trusted Network Security Service Providers for Small Businesses
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
Defending the Endpoint with Next-Gen Security
LSI Spring Agent Open House 2014
SOLUCIONES CHECKPOINT - Redes y Comunicaciones
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...

More from Sophos Benelux (12)

PPTX
Sophos introduces the Threat Landscape
PDF
Sophos Day Belgium - The IT Threat Landscape and what to look out for
PDF
IT Security landscape and the latest threats and trends
PPTX
How to stay protected against ransomware
PPTX
Hacking Mobile Apps
PPTX
SDN - a new security paradigm?
PPTX
Balabit - Shell Control Box
PPTX
The EU Data Protection Regulation and what it means for your organization
PPTX
Prevent million dollar fines - preparing for the EU General Data Regulation
PPTX
Case Study Diagnostiek voor U
PPTX
Introduction Sophos Day Netherlands
PPTX
The EU Data Protection Regulation - what you need to know
Sophos introduces the Threat Landscape
Sophos Day Belgium - The IT Threat Landscape and what to look out for
IT Security landscape and the latest threats and trends
How to stay protected against ransomware
Hacking Mobile Apps
SDN - a new security paradigm?
Balabit - Shell Control Box
The EU Data Protection Regulation and what it means for your organization
Prevent million dollar fines - preparing for the EU General Data Regulation
Case Study Diagnostiek voor U
Introduction Sophos Day Netherlands
The EU Data Protection Regulation - what you need to know

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
Classroom Observation Tools for Teachers
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Pre independence Education in Inndia.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
01-Introduction-to-Information-Management.pdf
Institutional Correction lecture only . . .
Classroom Observation Tools for Teachers
STATICS OF THE RIGID BODIES Hibbelers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Types and Its function , kingdom of life
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
Pre independence Education in Inndia.pdf
Week 4 Term 3 Study Techniques revisited.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
01-Introduction-to-Information-Management.pdf

What's cooking at Sophos - an introduction to Synchronized Security

  • 1. 1 Vincent Vanbiervliet Product Manager Synchronized Security Revolutionizing Advanced Threat Protection
  • 2. 2 What we’re going to cover • What’s the problem? • It’s time for a security revolution • How it works • Synchronized Security 2015-2016 • Your path to synchronized Security
  • 5. 5 Increasing attacks, increasing sophistication Attack surface exponentially larger Laptops/Desktops Phones/Tablets Virtual servers/desktops Cloud servers/storage Threats more sophisticated Attacks are more coordinated than defenses
  • 7. 77 It’s time for a security revolution
  • 8. 8 Generations of security Point Products Anti-virus IPS Firewall Sandbox Layers Bundles Suites UTM EMM Synchronized Security Security Heartbeat™
  • 9. 9 Comprehensive protection • Prevent Malware • Detect Compromises • Remediate Threats • Investigate Issues • Encrypt Data MAC ANDROID WINDOWS iOS CORPORATE DATA WINDOWS PHONE LINUX Synchronized Security
  • 10. 10 Integration at a different level Synchronized Security Alternative • System-level intelligence • Automated correlation • Faster decision-making • Accelerated Threat Discovery • Automated Incident Response • Simple unified management • Resource intensive • Manual correlation • Dependent upon human analysis • Manual Threat/Incident response • Extra products • Endpoint/Network unaware of each other Management Enduser Network SIEM Endpoint Mgmt NW Mgmt Endpoint Network
  • 11. 11 Synchronized Security Security must be comprehensive The capabilities required to fully satisfy customer need Security can be made simple Platform, deployment, licensing, user experience Security is more effective as a system New possibilities through technology cooperation Synchronized Security Integrated, context-aware security where Enduser and Network technology share meaningful information to deliver better protection. SOPHOS LABS Sophos Cloud Next Gen Network Security Next Gen Enduser Security heartbeat
  • 13. 13 3 pillars of advanced threat protection By device identification reduces time taken to manually identify infected or at risk device or host by IP address alone Compromised endpoints are isolated by the firewall automatically, while the endpoint terminates and removes malicious software. Endpoint and network protection combine to identify unknown threats faster. Sophos Security Heartbeat™ pulses real- time information on suspicious behaviors Security Heartbeat™ Accelerated Threat Discovery Active Source Identification Automated Incident Response Faster, better decisions Quicker, easier investigation Reduced threat impact
  • 14. 14 System Initialization Registration NGEP & NGFW register with Sophos Cloud which sends certificate/sec info to both Connection Endpoints initiate connection to the trusted Firewall Validation Firewall and Endpoints check sec info sent to them by Cloud to verify they are valid SOPHOS LABS Sophos Cloud Next Gen Network Security Next Gen Enduser Security heartbeat Support of multiple locations Endpoints can establish connection to Firewalls at any customer’s location as the Sophos Cloud registry can be shared among all Galileo-enabled Firewalls
  • 15. 15 Accelerated Threat Discovery Security Heartbeat A few bytes of information are shared every 15 seconds from Endpoint to Network Events Upon discovery, security information like Malware, PUA is shared between Endpoints and Network Health Endpoint sends Red, Yellow, Green health status to Network SOPHOS LABS Sophos Cloud Next Gen Network Security Next Gen Enduser Security heartbeat VPN support Galileo supports endpoints connected within the local network as well as those connected via VPN as long as they are connecting to the Firewall.
  • 16. 16 Active Source Identification Security Heartbeat Positively identifying the machine. Associating the IP address with a particular Endpoint Advanced Attack If Network Firewall detects an advanced attack but can’t determine source, it requests details from endpoints Source Identification Endpoint sends details of machine name, user, process, and IP address SOPHOS LABS Sophos Cloud Next Gen Network Security Next Gen Enduser Security heartbeat
  • 17. 17 Automated Incident Response Green Endpoints have full access to internal applications and data as well as internet Yellow Affected endpoints can be isolated from internal/sensitive applications and data while maintaining access to internet Red Affected endpoints are isolated from the network and have no access to internal systems or external internet SOPHOS LABS Sophos Cloud Next Gen Network Security Next Gen Enduser Security heartbeat Defaults and customization There are no default policies based on health status so admins can customize responses as needed. We are developing a best practices guide to assist customers in recommended policy setup.
  • 19. 19 Comprehensive Next-Gen Endpoint SOPHOS SYSTEM PROTECTOR Application Tracking Threat Engine Application Control Reputation Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Web Protection IoC Collector Live Protection Security Heartbeat™
  • 20. 20 Comprehensive Next-Gen Network SOPHOS FIREWALL OPERATING SYSTEM Web Filtering Intrusion Prevention System Routing Email Security Security Heartbeat™ Selective Sandbox Application Control Data Loss Prevention ATP Detection Proxy Threat Engine Firewall
  • 21. 21 SOPHOS SYSTEM PROTECTOR Sophos Cloud Next Generation Threat Detection heartbeat SOPHOS FIREWALL OPERATING SYSTEM Application Tracking Threat Engine Application Control Reputation Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Web Protection IoC Collector Live Protection Security Heartbeat™ Web Filtering Intrusion Prevention System Routing Email Security Security Heartbeat™ Selective Sandbox Application Control Data Loss Prevention ATP Detection Proxy Threat Engine Isolate subnet and WAN access Block/remove malware Identify & clean other infected systems User | System | File Compromise Firewall
  • 23. 23 SOPHOS SYSTEM PROTECTOR Sophos Cloud Improved Threat Detection heartbeat SOPHOS FIREWALL OPERATING SYSTEM Application Tracking Threat Engine Application Control Reputation Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Web Protection IoC Collector Live Protection Security Heartbeat™ Web Filtering Intrusion Prevention System Routing Email Security Security Heartbeat™ Selective Sandbox Application Control Data Loss Prevention ATP Detection Proxy Threat Engine Lockdown local network access Remove file encryption keys Terminate/remove malware Identify & clean other infected systems User | System | File Compromise Firewall
  • 24. 24 SOPHOS SYSTEM PROTECTOR Sophos Cloud Automated Protection of Endpoints heartbeat SOPHOS FIREWALL OPERATING SYSTEM Application Tracking Threat Engine Application Control Reputation Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Web Protection IoC Collector Live Protection Security Heartbeat™ Web Filtering Intrusion Prevention System Routing Email Security Security Heartbeat™ Selective Sandbox Application Control Data Loss Prevention ATP Detection Proxy Threat Engine Discover unmanaged Endpoints Could it be managed? Self-service portal setup User authentication Distribute security profile Win | Mac | Mobile Endpoint Firewall
  • 25. 25 SOPHOS SYSTEM PROTECTOR Sophos Cloud Detect and Remediate Compromises heartbeat SOPHOS FIREWALL OPERATING SYSTEM Application Tracking Threat Engine Application Control Reputation Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Web Protection IoC Collector Live Protection Security Heartbeat™ Web Filtering Intrusion Prevention System Routing Email Security Security Heartbeat™ Selective Sandbox Application Control Data Loss Prevention ATP Detection Proxy Threat Engine Identify compromise Detect source Assess impact Block/remove malware Identify & clean other infected systems User | System | File Compromise Firewall
  • 27. 27 NEXT-GEN ENDUSER SECURITY NEXT-GEN NETWORK SECURITY SOPHOS UTM • NETWORK PROTECTION MODULE SOPHOS CLOUD ENDPOINT • CLOUD ENDUSER PROTECTION • CLOUD ENDPOINT ADVANCED Endpoint and Network working together • FULLGUARD LICENSE • TOTALPROTECT BUNDLE NEXT-GEN FIREWALL • NETWORK PROTECTION MODULE • NEXT-GENGUARD LICENSE • NEXT-GENPROTECT BUNDLE
  • 28. 28 Already using Sophos * Cloud Endpoint requires Sophos Cloud Endpoint Protection Advanced or Sophos Cloud Enduser Protection subscriptions
  • 30. 31 The Synchronized Security difference Sophos Competition Synchronized Security Point Products Simple Complex Comprehensive Incomplete Prevention, Detection, Investigation, Remediation, Encryption Prevention Enduser, Network, Server, Mobile, Web, Email, Encryption Endpoint or Network Automated Manual Block the known, unknown, advanced, coordinated attacks Partial Prevention
  • 31. 32 Revolutionizing advanced threat protection Synchronized Security Accelerated Threat Discovery Positive Source Identification Automated Incident Response Faster, better decisions Quicker, easier investigation Reduced threat impact
  • 32. 33© Sophos Ltd. All rights reserved.

Editor's Notes

  • #7: Each product FW, AV, Dev control, App Control, Mobile – has a unique way of looking at the network. You are looking at it from a sideview, not a top-down 3D view. This is just the nature of the beast. FW just looks at the network. If it’s designed to let port 80 through, I craft my malware to use port 80. We’re left with competent products, but only a 2D view (un-integrated).
  • #10: Endpoint security used to be about stopping malware from infecting Windows PCs on the network. Now it has to evolve to not only prevent malware, but also detect machines that are already compromised and help remediate detected threats on a variety of workstation and mobile platforms. Endpoint security also has to include a focus on the data, ensuring it is encrypted and accessible only to authorized users regardless of where the data lives.
  • #25: NGFW notes if EP is sending Heartbeat (if it is, it is definitely managed) If not, NGFW characterizes EP by inspecting traffic (e.g. is it a Windows, MAC, printer, IP phone, mobile device etc) NGFW queries Cloud EP management to ask two questions   1) Could it be managed (true for Windows, MAC, mobile; false for printer, IP phone etc) ?   2) Is it managed already (to cover the case we don't support Heartbeat on that platform yet) ? If the device is one which could be managed but isn't, NGFW redirects device to a Self Service portal defined by Administrator to become managed NGFW restricts network traffic from that device to that portal to protect customer network. Also an incentive for device owner to make device compliant. Portal authenticates user (username / password) Portal will present device dependent information e.g. will contain installers for Cloud EP (Windows, MAC), registration page for mobiles etc. Portal can also contain security profile information for that customer e.g. certificates to be installed to access customers WiFi and network resources
  • #30: Alternative slide option to slide 28 in case you prefer this version.