Developers: | Sophos |
Last Release Date: | 2015/12/12 |
Technology: | VPN - Virtual private networks, cybersecurity - Antiviruses, cybersecurity - the Antispam, the Firewall, cybersecurity - Means of enciphering |
Sophos UTM is the complete solution of information security of the enterprise.
A system is focused on security and the organizations of network infrastructure. It integrates functions of routing, the firewall, NGFW, IDS/IPS, the organization of web access, DPI technology, the organization of VPN channels, WAF, protection against spam, security of jobs. Each of functional solution modules works in the uniform web interface and is connected depending on requirements. Sophos UTM supports hardware, program or virtual use.
As a part of the solution components:
- Protection against all types of the threats extending on network
- The web filter (protection against harmful content from the Internet and blocking of the harmful websites)
- Enciphering of e-mail and protection against leak of confidential information (DLP)
- Intrusion prevention system (IPS)
- Protection of corporate Web servers (reverse-proxy authentication), etc.
Properties
- Management of functions of protection of all complexes is available from any unrolled in Sophos UTM agrarian and industrial Complex network
- The organization of management by means of the free console
- The solution includes the reporting system providing as the current picture and the analysis of historical data in any cuts
Sophos UTM is the complete solution on network protection of servers and workstations, available of one point.
It can be used as a hardware-software complex, a software package, the virtual solution or the solution in a cloud The simplified system of licensing allowing how to license separately all necessary set of modules, and to purchase ready assemblies Turns on the centralized control system of all of Sophos UTM agrarian and industrial Complex from the Free UTM Manager single console
As a part of Sophos UTM the reporting system allowing to receive a picture of a situation and to make investigations of incidents of information security. Conducting investigations will allow to improve security policies, to increase their efficiency and to lower load of network resources. All reporting system is full-function and does not require installation of any modules of third-party producers.
- The ready system of desktops (dashboards) with the evident indicators of security defined in real time
- Ready templates of the most often used reports
- The special system of role access to reports allowing to conceal, for example, user names in reports if necessary
Endpoint Protection in Sophos UTM: The Complete Security Box, (2012)