Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users...

download Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting

of 13

  • date post

    20-Jan-2016
  • Category

    Documents

  • view

    215
  • download

    0

Embed Size (px)

Transcript of Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users...

Sales Deck - Sophos Mobile Control

Complete SecurityHello, were Sophos. And we take a different approach to protecting your IT and data. We want to make sure you get complete security without having to work too hard.1

Threats changing, still increasingData everywhere, regulations growingUsers everywhere, using everythingSecurity takes too much time and impacts usersWere focused on protecting youWhats the problem with IT security today?We see that there are three main problems making IT security more difficult today:

Threats like fakeAV are still getting through defensesData is still getting lost on disks, laptops and via email. At the same time your IT infrastructure is getting more complex with users on mobile devices, using home computers, in satellite offices - all using data and services in the cloud, as well as behind your firewall.

Too often the onus is put on the IT team to address all these risks. This means you buy, configure and manage multiple security software and hardware solutions that let you deal with the aftermath of defenses being breached. You also have to solve new security problems as they emerge, often by buying and deploying even more new products. What you need is complete security from a vendor you trust.

Notes Master heading hereEnter Date hereEnter Footer text here2

We do IT securityBecause youve got enough to worry about3Wherever the user is, what ever they useOur unique approach for better protection you can actually deployQuicker to setup, maintain and solve problemsComplete SecurityWithoutComplexityActive ProtectionStopping threats and protecting your data is what we do. And we believe our job is to do that comprehensively, without making your job more complicated. This is our mantra:

Complete Security, Without Complexity, Active protection.

What we do, How we do it, How we do it better.

Complete security is about taking care of your protection at every stage without it having to be complicated..

34

Email

Data

Endpoint

Mobile

Web

NetworkComplete securityThats why we give you solutions for every part of your business. Endpoint, Network, Data, Email, Web and Mobile. We protect them all. So your users and data are protected wherever they are and whatever they use. 4Complete security

Email

Data

Endpoint

Mobile

Web

NetworkClean up

Automation

Visibility

Local self-help

WiFi security

Keep people working

Technical supportAccess control

Intrusion prevention

Anti-malware

User education

Data Control

Stop attacks and breaches

Firewall

Email encryption

VirtualizationEndpoint Web Protection

Mobile Control

Secure branch officesEncryption for cloud

Live Protection

Mobile app security

Protect everywhereWeb ApplicationFirewall

URL Filtering

Anti-spamPatch Manager

ApplicationControlEncryption

Device ControlReduce attack surface

Complete security means we dont just detect threats, we:

Reduce the attack surface We address the things that bring risk like vulnerabilities and applications.

Protect everywhere We make sure your users are protected wherever they are and whatever device theyre using.

Stop attacks and breaches Of course we can detect and prevent threats and data loss. But weve moved beyond signatures with innovations like live protection, which means we can stop new threats instantly.

Crucially, we Keep people working Both your users and the IT team. We engineer our products to simplify the tasks that take too much time today, like cleaning up infections and recovering forgotten passwords.

So, as the threat and the ways that we use IT for work evolve, so does your protection. We stay on top of them, to simply give you all you need to stay secure. We engineer our products to work better together. And we look for opportunities to unify endpoint agents, gateway defenses, security policies and intelligence so its even easier.

Agents for every device, combining security to maximise protection and performance

At the Gateway virtual or hardware appliances and software options that match your protection priorities and size

Through Policies - We let you create a policy once, and apply it anywhere to give you consistent protection and user experience

From our Labs - our experts have visibility of all aspects of security threats and use that expertise to actively fine-tune your protection for you and deliver instantly from the cloud

5Active ProtectionOur unique approach for better protection with less complexity

Email

Data

Endpoint

Mobile

Web

NetworkWe dont want using all this great technology to be difficult. Thats why were doing the hard work. A good example is our HIPs solution which gives you everything we know about how malicious files are constructed and behave and identifies them for you. You dont have to construct a complex policy, you just tick a box to get it working. And our active protection is truly unified. Identifying and protecting against every type of threat and delivered to the engine that powers all of our products, whether at the endpoint, gateway or across the network. 6

Complete but not complex Defense in depth that you can actually deployReduce the attack surfaceProtect everywhereStop attacks and breachesKeep people workingSo what do you need to do? All of us at Sophos work hard to make sure that these features are easy to deploy. So youre being protected straight away.

Like a simple interface for filtering web access, with a single policy for endpoint and gateway.

Our R.E.D, remote ethernet device means that even your smallest remote offices can be instantly secured, without having to send one of your engineers on site to set it up.

Data control that lets you choose from a list of the most up to date content types, as well as sorting by regions or specific data regulations

And an easy user interface to make sure forgotten passwords arent your problem any more, users can help themselves.

7

Example: Fake antivirusCompleteSecurityDelivering complete protection from a rampant threatWeb ApplicationFirewall

URL FilteringEndpoint Web Protection

Live Protection

Clean up

Visibility

Anti-malware

Patch Manager

Email

Data

Endpoint

Mobile

Web

NetworkLets look at some examples. Fake antivirus is one of the most recognisable and widespread threats in the wild today. But this certainly doesnt mean you should waste your time worrying about how it might affect users in your business. Our solutions are working together at every step to make sure they dont get infected.

Reduce the attack surfaceFirstly we want to make sure you dont become another statistic. Lots of the websites that host fake antivirus are legitimate ones that havent been properly secured, so we reduce the attack surface on your servers with our web application firewall. And you can also secure browsing by filtering sites and content accessed through your web gateway.

Protect EverywhereIf your users are mobile and not connected to your own internet gateway you still want to know theyre protected, we make sure by providing security in the cloud, checking any site they visit against a list of the ones we know are bad. And very soon all of the capabilities in our web gateway software will be unified with the endpoint, so wherever the user is you can guarantee theyre browsing safely.

Stop attacks and breachesIf the website is only recently infected and users can still browse to it our intelligent anti malware engine can scan the scripts running inside the site and stop the threat from there too, before anythings saved locally to the computer. And with our threat intelligent patch assessment feature instead of seeing a daunting list of the ones that are available, youll soon be able to know which you actually need to apply to stay protected. Its patching for the real world.

Keep people workingWe dont pretend that we block 100% of all the threats out there. So if the worst happens we make sure that our products help you identify infected computers and deal with them quickly. Sometimes its the small things that make the difference so we make sure you can get from opening our console to finding infected endpoints in just one click. That means you spend less time reacting, and your users are productive again more quickly.Notes Master heading hereEnter Date hereEnter Footer text here8

Example: Data loss Protecting personal information and sensitive dataCompleteSecurity

ApplicationControl

EncryptionMobile Control

Encryption for cloud

Automation

Local self-help

User education

Data Control

Email

Data

Endpoint

Mobile

Web

NetworkToday theres data everywhere. It might be your businesses own or even personal information about your customers and employees. Whatever it is, your people need to access it, work with it and share it. And you need to keep it safe.

Reduce the attack surfaceAccording to research 86% of IT professionals say that their business has lost a laptop or hard disk carrying corporate data. Encrypting is the easiest way to make sure that if a device goes missing that data is still secure. We can also help you make sure that risky applications you havent approved arent being installed on machines.

Protect EverywhereThe explosion in mobi