View

Sorting

Products found: 3

logo
Offer a reference bonus
1.40

Sophos Email Appliance

The Sophos Email Appliance is an email security gateway product. It closely examines email messages to determine if they contain any suspicious content, such as spam, malware and phishing attempts. If any such content is detected, the Sophos Email Appliance blocks it so that it cannot reach its destination and potentially cause a data breach or other compromise. Because such a large percentage of threats today are email-borne, having a robust email security gateway protecting an organization has generally become a necessity.

Sophos Email Appliance is an all-in-one solution for email encryption, DLP, anti-spam and threat protection. It provides advanced protection from today’s sophisticated spear phishing attacks and gives you full control over data leaving your organization via email.

Highlights:

  • Block targeted spear phishing attacks;
  • Protect users from new zero-day threats;
  • Advanced multi-layer spam detection;
  • Support for SPF and DKIM anti-spoofing;
  • Easily create DLP policies;
  • Unique SPX Encryption is easy and transparent.

Advanced threat protection

Sophos Time-of-Click protection blocks malicious email URLs, protecting your users from stealthy, delayed, spear phishing attacks. Every URL, in every email, is secured. Every time an email link is clicked, on any device, its reputation is checked against our cloud-hosted Sophos SXL database. No client software is required, speeding implementation and reducing user disruption. Our new Sophos Sandstorm* enhances targeted attack protection, visibility, and analysis. Sandstorm complements our advanced antivirus scanning engine to quickly and accurately detect, block, and respond to evasive threats using powerful cloud-based, next-generation sandbox technology.

Quick and easy data protection compliance

Our wizard-based DLP rules and policy-based encryption makes email data protection simple— preventing costly data-loss incidents. Using our built-in lexicon of hundreds of sensitive data types, you can quickly and easily build DLP policies for users or groups. Protect your information by blocking messages containing sensitive data or by encrypting them before they leave the network gateway.

SPX Encryption—encryption you can use

Our patent-pending simple SPX Encryption is transparent, simple and requires no changes to user workflow. It doesn’t require clumsy and expensive key management or additional software. SPX Encryption simply encapsulates the email content and attachments into a secure encrypted PDF that can’t be hacked or cracked. But it allows users to view their encrypted email anywhere: in their preferred email client, in their webmail or on their mobile device.

Stamp out snowshoe spam and suspicious email content

Our sophisticated email filtering protects users from the latest snowshoe spam, identity theft, password scams and more by looking for suspicious content, attachments or URLs. Support for Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) ensures spam and phishing attacks attempting to spoof legitimate sender domains are blocked. You can also block unwanted content and be sure our proven antivirus scanning is catching the latest threats.

Simplify mail management

Reduce your workload with our streamlined management console and managed appliances that offer the best of an on-premise appliance with a managed service. You get automated updates and we monitor your appliances remotely to ensure everything’s running as it should.

Flexible deployment options

Choose from a variety of hardware appliance options or our popular VMware Ready virtual appliance. Our simple integration with Microsoft Active Directory and eDirectory will have you up and running with just a few clicks.

Easy centralized management

If you need multiple appliances for added performance or high availability, you can easily cluster hardware and virtual appliances with just a few clicks. Everything else is automatic and you can manage the entire cluster from a single console.

Extend protection to your Internal mail servers

Add Sophos PureMessage for Exchange to your mail servers to prevent the propagation of malware, viruses, spam or other unwanted content.

Additional hardware information

Installation: 1U rackmount Regulatory/safety certification: UL, CE, FCC, VCCI, C-Tick, TUV-GS, SABS, RoHS Hardware warranty: Up to three-year advance replacement (subject to valid software licensing)

... Learn more
-
ROI-
-
11
14
logo
Offer a reference bonus
1.40

Sophos Endpoint Protection

So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. Isolate Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When necessary, we’ll even isolate compromised devices until we can be sure they’re safe. Threat Removal If we find something malicious, we’ll go ahead and remove it for you. It’s the least we could do. We make it simple and automatic. Synchronized Security By automating threat discovery, investigation, and response, Synchronized Security revolutionizes threat detection. Incident response times are reduced exponentially and tactical resources can be refocused on strategic analysis. Next-Gen Protection We’re taking a new approach to protection. Sophos Endpoint blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit. Sophos Endpoint doesn’t rely on signatures to catch malware, which means it catches zero-day threats without adversely affecting the performance of your device. So you get protection before those exploits even arrive. By correlating threat indicators, Sophos Endpoint can block web and application exploits, dangerous URLs, potentially unwanted apps, and malicious code from ever touching your endpoints. Decloaking Malware Sophos Endpoint works on the device and in conjunction with the firewall to detect and isolate compromised devices. Synchronized Security gives you additional context providing information from the network. Behavioral Analytics Determines suspicious behaviors, allowing for the detection of malware specifically designed to evade traditional solutions. Traffic Detection Pre-filters all HTTP traffic and tracks suspicious traffic as well as the file path of the process sending malicious traffic. Integrated Endpoint and Network Instant and automatic communication between the Endpoint and Network alerts the suspected system of exactly what the firewall is detecting, allowing the endpoint protection agent immediate use of that information to discover the process behind the threat. Complete Control Enforce your web, application, device, and data policies with ease, thanks to seamless integration within the endpoint agent and the management console.
  • Web Control Category-based web filtering enforced both on and off the corporate network
  • Application Control Point-and-click blocking of applications by category or by name
  • Device Control Managed access to removable media and mobile devices
  • Data Control Data-loss prevention (DLP) using prebuilt or custom rules
Sophisticated Simplicity Like your favorite smartphone or web application, Sophos Endpoint Protection delivers sophisticated functionality coupled with a simple, intuitive user experience.
  • Quick and easy deployment from the cloud or on-premises
  • Default policies configured to balance protection, usability, and performance
  • Automatic removal of third-party endpoint security products
  • Point-and-click configuration of advanced features like HIPS and device control, made possible by continually updated data from SophosLabs
... Learn more
-
ROI-
-
17
16
logo
Offer a reference bonus
1.40

Sophos UTM

Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection. Highlights Ì Every feature available  on every appliance Ì Firewall, VPN, ATP, IPS, email, web filtering and app control Ì Hardware, virtualized, software or cloudbased appliance Ì Intuitive browserbased interface Ì Built-in reporting on all models Ì Two-factor authentication with one-time password (OTP) in many areas Ì Integrated wireless controller Consolidated network security platform—no compromise Protect your network using multi-layered proven protection technologies including Advanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the industry’s simplest admin interface. We’ve engineered our software and hardware to give you the throughput speeds you need. And, you can choose the level of protection you need with modular subscriptions as every feature is available on every appliance. All the Next-Gen Firewall features you need We’ll give you complete control to block, allow, shape and prioritize applications. Our Deep Layer-7 inspection (Next-Generation Firewall) ensures true application identification and has regular automatic updates. And you’ll get feedback on unclassified applications too. Intuitive management and detailed reporting You’ll know what’s happening with your users and you’ll have complete control over all the features you need, with none of the complexity. Easily build policies while getting detailed real-time and historical data with our on-box reporting, helping you to fix problems fast. And our Free Sophos UTM Manager lets you centrally administer several appliances through a single login. Connect remote offices with easy VPN and Wi-Fi Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It’s the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security. Sophos UTM also works as a wireless controller; access points are automatically set up and receive complete UTM protection.
... Learn more
-
ROI-
-
6
2

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.