It’s official: the highly anticipated public beta for the Sophos XG Firewall v16 is now underway, and we’d love for you to get involved. The product team has been working furiously for the last several months making this one of the most ambitious and exciting product releases ever. It’s loaded with tons of new features and enhancements that we think you’re going to love.
You may be wondering how SG UTM fits in with this new Synchronized Security era we’re entering. The answer is: very well! It’s already got some great Synchronized Security-like integration built-in, and it’s a great platform to start your Synchronized Security journey.
SG UTM, Endpoint and SMC integration
As you probably know, SG UTM has enjoyed tight integration with Sophos Endpoint and Mobile solutions for some time now. Customers have taken advantage of SG UTM’s integration with Sophos Endpoints for off-site web policy enforcement, and with Sophos Mobile Control for NAC-like features to keep non-compliant devices off the network. In fact, it’s these kinds of features which inspired the Synchronized Security strategy. Sophos UTM has been a leader in this area, and still offers some of the best integration between products available.
Back in March, I wrote about how cybercriminals are using previously-unknown malware to avoid detection from traditional security products.
While conventional anti-malware protection is vital as a first line of defense, organizations need additional ways to combat today’s targeted, unknown malware.
Unfortunately, many next-generation solutions designed to deal with these kinds of threats are too expensive and too complex for many businesses to consider.
Sophos Sandstorm can help
Sophos UTM has added to our collection of industry awards, after being recognized as the Best UTM Solution at the SC Magazine Awards 2016 Europe, held earlier this week in London.
As the editor-in-chief of SC Magazine points out, these awards are designed to recognize the leading players in the industry and to encourage and praise innovation.
It’s an honor to be considered, and the Sophos SG UTM has now swept this award three times in a row, repeating twice in London and also winning in North America recently.
The judges were impressed by Sophos SG UTM, and its many advantages over the other products considered in this category.
Today, I’d like to share a short Networking video that shows you how to configure an IPsec VPN on an iPhone on the XG Firewall side and on the iPhone side.
We begin within the XG Firewall Network Security Control Center. From the left navigation menu, select System, VPN and then Cisco VPN Client.
Miercom, a leading, independent test center, recently conducted a comparative test of UTM/Next-Gen Firewall appliances from leading network security vendors including Sophos, Fortinet, Check Point, Dell SonicWALL and WatchGuard.
Miercom ran an extensive set of tests, including raw firewall throughput at a variety of real-world packet sizes. We were pleased with the results, as our XG 135w outperformed similar competing models in all tests by a significant margin. (See comparison chart below)
Much like legitimate businesses, cybercriminal enterprises have to be dynamic – standing still means falling behind. A significant example of how cybercriminals are evolving is the growing trend of location-based targeting, through what we call “geo-malware” and regionalized email attacks.
Traditionally, we think of online threats in terms of highly targeted attacks on the one hand and opportunistic cash grabs on the other hand. Nation-state sponsored or advanced persistent threat (APT) attackers target specific individuals or organizations, and the more common, financially motivated digital thieves take an “infect them all” approach.
Our SophosLabs research shows that way of thinking is becoming outdated, as APT attackers and common cybercrooks learn and borrow techniques from one another.
Common online crooks have learned how to become more efficient and increase their yield per victim by targeting individuals based on their specific country, using a variety of methods. Here I will go into a few of them: geo IP lookups; traffic direction services; and email targeting. I will also explain how and why cybercrooks avoid certain countries.