1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
The Most Analytical and Comprehensive Defense Network in a Box.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Security Observations & Ideas from the field
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
[Name / Title] [Date] Effective Threat Protection Strategies.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Dell Connected Security Solutions Simplify & unify.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
Network security Product Group 2 McAfee Network Security Platform.
Synchronized Security Revolutionizing Advanced Threat Protection
Building a Fully Trusted Authentication Environment
User and Device Management
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Palo Alto Networks - Next Generation Security Platform
1 CONFIDENTIAL – INTERNAL ONLY1 Fortinet Confidential June 23, 2016 Securing The Cloud & Data Center.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Next-Generation Endpoint Protection Enduser Protection
This Is Next-Gen Web Security. Agenda 2 Web Security Today Defining Next-Gen Web Security Introducing Sophos Secure Web Gateway o Web Security o Web Simplicity.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Sophos Central for partners and customers: overview and new features
A Virtual Tour of SophosLabs Building next-generation protection
Ilija Jovičić Sophos Consultant.
Synchronized Security
Ransomware today: How to protect against Locky and friends
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Customized Solutions to your needs
Active Cyber Security, OnDemand
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Threat Management Gateway
Matt G change over point ?
2018 Real Cisco Dumps IT-Dumps
Secure once, run anywhere Simplify your security with Sophos
Logicom Cloud Marketplace
Healthcare Cloud Security Stack for Microsoft Azure
(With Hybrid Network Support)
Per Söderqvist Per Söderqvist Sales Engineer
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager

2 Who is Sophos 1985 FOUNDED OXFORD, UK $450M IN FY15 BILLING (APPX.) 2,800 EMPLOYEES (APPX.) 200,000+ CUSTOMERS 100M+ USERS NA Locations Boston, MA Santa Clara, CA Vancouver, BC 90+% BEST IN CLASS RENEWAL RATES 2,000+ CHANNEL PARTNERS Powerful Unified Threat Management for your entire network High performance security for your most critical systems and data Endpoint, mobile and web security licensed per user, not device

3 A Proven Market Leader UTM Unified Threat Management SEG Secure Gateway EPP Endpoint Protection MDP Mobile Data Protection Client Sec/ Endpoint Wave “Leader” Endpoint Encryption “Champion” Endpoint Anti-Malware “Champion” Next Generation Firewall “Champion Forrester Wave™: Endpoint Encryption Market, Q “Sophos was the breakout star in this Forrester Wave evaluation, touting strong hardware-based encryption support, external media encryption policy flexibility, and file-level encryption functionality”

4 Recognized as an Industry Leader Channel, Corporate and Product Recognition 2015 Europe SC Awards, Best UTM Solution Mobility Management Solution Vendor of the Year Star A-List product rating for SG 115w Security Readers’ Choice Awards 2014: Encryption Products 2015 SC Awards Best Mobile Security Solution: Sophos Mobile Control Sophos is the first-ever winner in three security categories CRN Security Vendor of the Year November 2014 CRN Channel Champion 2014 ChannelPartner Preferred Vendor 2015 Redmond Third-Party Reader’s Choice Awards: Sophos Unified Threat Management CRN Crowns Sophos's Valentine Channel Madness Champion 6 Women in 2015 Women of the Channel

5 Leading Global Enterprises Trust Sophos

6 What we believe Security must be comprehensive The capabilities required to fully satisfy customer needs Security can be made simple Platform, deployment, licensing, user experience Security is more effective as a system New possibilities through technology cooperation

7 Complete Security… Made Simple. NetworkEnd Users and DevicesServers Simple DeploymentSimple ProtectionSimple Management On premise Virtual Cloud User self provision Active Protection – real-time protection powered by SophosLabs Live lookups via the Cloud SophosLabs experts tune the protection so you don’t have to Next Gen Firewall Anti-malware and IPS URL Filtering Network Access Control WirelessVPNAnti-Spam Encryption Anti- Malware MobileEncryption Patch Assessment Application Control Device Control Encryption for Cloud Endpoint Web Protection Anti-Malware Webserver Protection Virtualization Intuitive consoles: On Premise or From the Cloud Backed by expert support Sophos Delivers Complete Security App Control V-Shield SophosLabs URL database Malware identities HIPS rules Genotypes File look-up Reputation APT rulesAppsSPAM Data control Peripheral types Anon. proxies Patches/ Vulnerabilities Whitelist

8 SOPHOS SYSTEM PROTECTOR Sophos Cloud Synchronized Security: Next Generation Threat Detection heartbeat SOPHOS FIREWALL OPERATING SYSTEM Application Tracking Threat Engine Application Control Reputation Emulator HIPS/ Runtime Protection Device Control Malicious Traffic Detection Web Protection IoC Collector Live Protection Security Heartbeat Web Filtering Intrusion Prevention System Routing Security Heartbeat Selective Sandbox Application Control Data Loss Prevention ATP Detection Proxy Threat Engine Isolate subnet and WAN access Block/remove malware Identify & clean other infected systems User | System | File Compromise Firewall

9 9 Thank you!