Sophos Endpoint Security & Data Protection Specifications Page 1

Browse online or download Specifications for Antivirus security software Sophos Endpoint Security & Data Protection. Sophos Endpoint Security & Data Protection [en] [es] [fr] [nl] User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - Protection: Reviewer’s guide

Sophos Endpoint Security and Data Protection: Reviewer’s guide

Page 2

9SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEAt the click of a mouse, you can:• Filter the view to focus on those computers with ou

Page 3

102 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEsmart views Targeted cleanupCleaning up a large network after an attack can be expensive and ti

Page 4 - CONTENTS

11SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEactivepoliciesSimplified policy setting and enforcementUsing Sophos ActivePolicies™, yo

Page 5 - Simplified, automated console

122 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEFigure 6: Configuring Anti-virus and HIPS policyAnti-virus and HIPS policies – virus, spyware, P

Page 6 - Endpoint compliance

13SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEApplication control policiesApplications like VoIP, IM and P2P are increasingly the ca

Page 7 - Testing key features

142 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEDevice control policiesDevice control can help to significantly reduce your exposure to accident

Page 8 - deployment

15SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEYou can also significantly reduce the risk of network bridging between a corporate netw

Page 9 - dashboard

162 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEThere are two types of data control rule:• file matching rule: specifies the action that is take

Page 10 - At-a-glance dashboard

17SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEThere are a number of actions that can be taken when a data control rule is matched:•

Page 11 - update manager

182 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEYou can configure different location aware security policies to ensure that mobile computers are

Page 12 - Figure 5: ActivePolicies

1SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE

Page 13

19SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE• Manage—provides components for editing and managing policies and managing computers

Page 14 - Controllable applications

202 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEImportantTo fully evaluate the Sophos NAC functionality please download and install the NAC Man

Page 15

21SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEReports can be output in table format as well as chart format, including pie charts an

Page 16

222 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEThere are four pre-configured roles:1. System Administrator—A pre-configured role that has full

Page 17

23SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEsophos endpoint security and data protection3 PROTECTING WINDOWS COMPUTERSSophos Endpo

Page 18

243 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDEIntrusion preventionSophos Endpoint Security and Control for Windows includes complete intrusion pre

Page 19 - Important

25SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEApplication ControlWhile some applications can provide efficiency gains, others can dis

Page 20

263 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDESophosLabs also maintains a library of extensive library of global sensitive data definitions (Conten

Page 21 - Significant scalability

27SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDESAFEGUARD DISK ENCRYPTION SafeGuard Disk Encryption is an easy to implement solution t

Page 22 - -based administration

283 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDESOPHOS CLIENT FIREWALLSophos Client Firewall is integrated into the endpoint agent making deployment

Page 23 - information storage

2WELCOMEWelcome to this reviewer’s guide for Sophos Endpoint Security and Data Protection – Sophos’s fully integrated, scalable endpoint security solu

Page 24

29SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEEnsuring protection with location awarenessSophos Client Firewall lets you configure d

Page 25 - Quarantine Manager

304 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDEsophos anti-virus for mac os x, linux and unix4 PROTECTING NON-WINDOWS COMPUTERS THE NEED TO PRO

Page 26 - Data Control

31SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEYou can also enable remote and mobile users to update from wherever they are via the n

Page 27 - SOPHOS NAC

324 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDEAutomatic updatesUpdates are automatically downloaded and distributed through Enterprise Console

Page 28 - Resetting forgotten passwords

33SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEappendix iEVALUATING ENDPOINT SECURITY AND DATA PROTECTIONWe want you to be absolutely

Page 29 - Proactive lockdown

34SYSTEM REQUIREMENTSFor full details, visit www.sophos.com/products/all-sysreqs.htmlEnterprise Console system requirementsPlatforms supportedWindows

Page 30

35SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDESophos Endpoint Security and Control for Windows system requirementsPlatforms supporte

Page 31

36appendix iiTHE EICAR TEST “VIRUS”ABOUT THE EICAR TEST FILEThe EICAR* Standard Anti-virus Test File is safe to use for test purposes because it is no

Page 32

37SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEappendix iiiOTHER SOPHOS PRODUCTS AND SERVICESSophos Security and Data ProtectionSopho

Page 33

38Sophos Alert ServicesSophos ZombieAlert™ Service provides you with immediate warning if spammers have hijacked any of your organization’s computers

Page 34 - PROTECTION

3SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDECONTENTS 1 COMPLETE PROTECTION FOR THE ENDPOINT 4 Overview of Sophos Endpoint Securi

Page 35 - SYSTEM REQUIREMENTS

39SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEFree toolsSophos provides a number of tools can be used to reduce vulnerabilities and

Page 36

Boston, USA | Oxford, UK© Copyright 2009. Sophos. All rights reserved. All trademarks are the property of their respective owners.rg/091215

Page 37 - THE EICAR TEST “VIRUS”

41 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDEsophos endpoint security and data protection1 COMPLETE PROTECTION FOR THE ENDPOINT OVERVIEW O

Page 38

5SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEComprehensive data protectionThe combination of a number of different technologies ensu

Page 39 - Technical training

61 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDETesting key featuresBefore you test, here are some items to consider and to compare to compet

Page 40 - Free tools

7SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEsophos enterprise console2 SINGLE, CENTRAL AUTOMATED CONSOLE OVERVIEW OF SOPHOS ENTERPR

Page 41 - Oxford, UK

82 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEactive directory integration and synchronizationFaster deployment and automatic protection Sopho

Comments to this Manuals

No comments