Sophos Endpoint Protection is a proven agent-based security and data protection solution that runs on Windows, Unix, Linux, Macintosh, and virtualized platforms. It is backed by a cloud-based arsenal that consistently cross-references suspicious files against a massive database. All configuration and reporting may be achieved using a robust management console. Role-based administration allows administrators to distribute workload in larger, distributed, or shift-based organizations.
The Endpoint Protection agent provides multi-functional protection in the following areas:
Antivirus – This function supports a broad range of software and hardware platforms including Windows, Windows Mobile, Linux, Unix, Mac, virtualized platforms, Sharepoint, NetApp, EMC, and Sun. The agent quickly scans for viruses, worms, malware, trojans, adware, and other suspicious files. It identifies and isolates threats by cross-referencing the suspicious data against a large database. The agent then reports on the every incident. It may also be configured to prevent the distribution of sensitive content.
Web Security and Filtering – This function supports Internet Explorer, Chrome, Firefox, Safari, and Opera. It scans the network layer for threats and attempts to isolate and block them before they reach your browser. It also provides live monitoring and when necessary, filtering against potentially malicious sites. It may be configured to block or warn against the access of unauthorized sites such adult themed sites, criminal sites, violent sites, illegal sites, and sites that are potentially inappropriate in other ways.
Encryption – This function supports PCs and Macs. It provides fast encryption of entire disks including all operating system components, temp files, and hibernation. Restoration functions deliver a robust set of recovery and repair utilities. It also supports Opal self-encrypting drives.
Device Control – This function reduces the risk of data loss and the introduction of malware to your environment by monitoring and preventing the unauthorized attachment and use of removable devices such as infrared devices, portable drives, wireless devices and USB keys. It allows the administrator to determine the access control parameters regarding these devices, easily configure access policies to reflect these parameters, and produce reports on device usage.
Data Control – This function prevents the unauthorized transfer of sensitive data. The agent scans files for identifiable information and blocks the attempted transfer of these files. This assists in preventing the deliberate or accidental transfer of company sensitive or confidential information.
Application Control – This function serves as an installation access control list for applications. Policies are configured to allows or block the installation or access to thousands of applications. Its versatility allows administrators to determine access needs by location. For example, it can be configured to allow the enduser to utilize an application offsite while blocking the use of the same application for onsite endusers.
Patch Assessment – This function serves as a patch management system, thus reducing the likelihood of intrusion. Patches are prioritized according to threat-level. Overhead is low as a single scan is enough to locate all vulnerable, unpatched computers.
Client Firewall – This function supports Windows. It diligently acts in the role of sentry, providing a defense against internet-based attacks, impersonation, hijacking, and system access by unauthorized applications. Firewall policies are easy to configure and can be refined with the help of “monitor mode,” a live, low impact, traffic monitoring and collection view that allows you to analyze unknown traffic and update policies quickly.
Network Access Control (NAC) – This function verifies all systems accessing your network are not only free and clear of threats, but blocks access by systems that do not meet your organization’s security standards. The product may be configured to check OS service packs are up-to-date, antivirus applications are running, and firewalls are active.
Features and Benefits
- Scalable management/agent based architecture allows deployment to a multitude of environments, no matter the size.
- Functions are bundled together and accessible via one central console to eliminate duplicate efforts and overhead.
- A single agent deploys policies for all functions
- Live cloud-based database reference point for latest protection against threats
Download a free 30-day trial of Sophos Endpoint Protection
To evaluate Sophos Endpoint Protection in your own environment, download the free 30 day trial.
Contact us and we will be happy to assist you with your evaluation.
Sophos Endpoint Protection Licensing and Pricing
One per-user subscription-based license gives you not just today’s software but all future updates to protection, management and product upgrades, as well as technical support.
NSAi resells Sophos Endpoint Protection at a very reasonable price.
Security Management Services
NSAi also provides a full range of consulting, engineering, implementation, and maintenance services surrounding Sophos Endpoint Endpoint Protection.