Sophos Endpoint Security and Data Protection: Reviewer’s guide
9SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEAt the click of a mouse, you can:• Filter the view to focus on those computers with ou
102 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEsmart views Targeted cleanupCleaning up a large network after an attack can be expensive and ti
11SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEactivepoliciesSimplified policy setting and enforcementUsing Sophos ActivePolicies™, yo
122 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEFigure 6: Configuring Anti-virus and HIPS policyAnti-virus and HIPS policies – virus, spyware, P
13SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEApplication control policiesApplications like VoIP, IM and P2P are increasingly the ca
142 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEDevice control policiesDevice control can help to significantly reduce your exposure to accident
15SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEYou can also significantly reduce the risk of network bridging between a corporate netw
162 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEThere are two types of data control rule:• file matching rule: specifies the action that is take
17SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEThere are a number of actions that can be taken when a data control rule is matched:•
182 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEYou can configure different location aware security policies to ensure that mobile computers are
1SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE
19SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE• Manage—provides components for editing and managing policies and managing computers
202 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEImportantTo fully evaluate the Sophos NAC functionality please download and install the NAC Man
21SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEReports can be output in table format as well as chart format, including pie charts an
222 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEThere are four pre-configured roles:1. System Administrator—A pre-configured role that has full
23SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEsophos endpoint security and data protection3 PROTECTING WINDOWS COMPUTERSSophos Endpo
243 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDEIntrusion preventionSophos Endpoint Security and Control for Windows includes complete intrusion pre
25SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEApplication ControlWhile some applications can provide efficiency gains, others can dis
263 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDESophosLabs also maintains a library of extensive library of global sensitive data definitions (Conten
27SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDESAFEGUARD DISK ENCRYPTION SafeGuard Disk Encryption is an easy to implement solution t
283 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDESOPHOS CLIENT FIREWALLSophos Client Firewall is integrated into the endpoint agent making deployment
2WELCOMEWelcome to this reviewer’s guide for Sophos Endpoint Security and Data Protection – Sophos’s fully integrated, scalable endpoint security solu
29SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEEnsuring protection with location awarenessSophos Client Firewall lets you configure d
304 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDEsophos anti-virus for mac os x, linux and unix4 PROTECTING NON-WINDOWS COMPUTERS THE NEED TO PRO
31SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEYou can also enable remote and mobile users to update from wherever they are via the n
324 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDEAutomatic updatesUpdates are automatically downloaded and distributed through Enterprise Console
33SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEappendix iEVALUATING ENDPOINT SECURITY AND DATA PROTECTIONWe want you to be absolutely
34SYSTEM REQUIREMENTSFor full details, visit www.sophos.com/products/all-sysreqs.htmlEnterprise Console system requirementsPlatforms supportedWindows
35SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDESophos Endpoint Security and Control for Windows system requirementsPlatforms supporte
36appendix iiTHE EICAR TEST “VIRUS”ABOUT THE EICAR TEST FILEThe EICAR* Standard Anti-virus Test File is safe to use for test purposes because it is no
37SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEappendix iiiOTHER SOPHOS PRODUCTS AND SERVICESSophos Security and Data ProtectionSopho
38Sophos Alert ServicesSophos ZombieAlert™ Service provides you with immediate warning if spammers have hijacked any of your organization’s computers
3SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDECONTENTS 1 COMPLETE PROTECTION FOR THE ENDPOINT 4 Overview of Sophos Endpoint Securi
39SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEFree toolsSophos provides a number of tools can be used to reduce vulnerabilities and
Boston, USA | Oxford, UK© Copyright 2009. Sophos. All rights reserved. All trademarks are the property of their respective owners.rg/091215
41 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDEsophos endpoint security and data protection1 COMPLETE PROTECTION FOR THE ENDPOINT OVERVIEW O
5SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEComprehensive data protectionThe combination of a number of different technologies ensu
61 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDETesting key featuresBefore you test, here are some items to consider and to compare to compet
7SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEsophos enterprise console2 SINGLE, CENTRAL AUTOMATED CONSOLE OVERVIEW OF SOPHOS ENTERPR
82 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEactive directory integration and synchronizationFaster deployment and automatic protection Sopho
Comments to this Manuals