5 Reasons Customer are choosing Sophos for their next firewall
[list type=”check”]- All-in-One Protection (we mean ONE!)
- On-box Reporting
- We keep it Simple
- We make it Fast
- We’re a trusted industry leader
[divider]
We Keep it Simple
Sophos UTM’s simple, intuitive user interface (UI) is designed for YOU. It lets you quickly protect your network and users. And it makes day-to-day management tasks easy.
[accordion] [acc_item title=”Simple Management”]Sophos UTM is easy to use, thanks to the configurable real-time dashboard, flexible modular licensing, and intuitive reusable network object definitions.
Lightning Speed
We’ve engineered Sophos UTM to deliver outstanding performance. We built our UTM using Intel multi-core technology, solid-state drives, and accelerated in-memory content scanning. Potent, powerful … fast

All-in-One Protection
We offer the latest next-gen firewall protection you need plus features you can’t get anywhere else – including mobile, web, endpoint email encryption and DLP. No extra hardware. No extra cost. Simply choose what you want to deploy.
Network Protection
All the protection you need to stop sophisticated attacks and advanced threats while providing secure network access to those you trust.
[tab] [tab_item title=”How it Works”]Wireless Protection
Set up, manage and secure wireless networks in just minutes with the UTM’s built-in wireless controller that works with our full range of wireless access points.
[tab] [tab_item title=”How it Works”]
[/tab_item]
[tab_item title=”Multiple WiFi Zones”]Sophos Access Points are ideal for creating multiple separate wireless zones. Configure a wireless network to provide employees access to internal network resources. On the same access point, you can offer wireless guests Internet access. Do it all without compromising the integrity of the internal network.
[/tab_item]
[tab_item title=”Reliable High-Speed Wireless”]Our range of access points support nearly any deployment model you need with support for the latest 802.11ac Wi-Fi standard. Mix and match multiple access points to ensure full coverage and take advantage of bridge and repeater functionality in our dual-band dual-radio AP 50 to extend coverage to hard-to-wire areas of your facility.
[/tab_item]
[tab_item title=”Mobile NAC”]Sophos UTM and Sophos Mobile Control (SMC) work better together to enable easy device configuration and Network Access Control (NAC) for non-compliant devices. The UTM automatically pushes select Wi-Fi and VPN settings to SMC while SMC provides device compliance status to the UTM which can use that information to deny network access to non-compliant devices.
[/tab_item]
[tab_item title=”Guest WiFi Hotspots”]Full-featured guest hotspots for visitors or BYOD devices enable you to control access to company resources with bandwidth limits and inappropriate content filtering. Support for mobile device registration with SMS vouchers and a full range of customization options allow you to control the user experience and promote your company brand.
[/tab_item]
[tab_item title=”Secure Encryption”]Sophos UTM supports the latest strong encryption and authentication standards such as WPA-2 Enterprise and IEEE 802.1X (RADIUS authentication). Use your existing backend authentication, such as Active Directory, to allow quick and easy access for your users.
[/tab_item]
[/tab]
Web Protection
Comprehensive protection from the latest web threats and powerful policy tools ensures your users are secure and productive online.
[tab] [tab_item title=”How it Works”]
[/tab_item]
[tab_item title=”URL Filtering Policies”]Select from over 35 million sites in 96 categories to create safe web policies to minimize legal concerns around inappropriate content and maximize productivity. Set policies to block, warn or allow sites for individuals or groups, by quota time or time of day with limitless customization options all made intuitively simple.
[/tab_item]
[tab_item title=”SafeSearch, YouTube, and Google Apps”]We’ve got some features purpose-built for education environments like Safe Search for Google, Yahoo, and Bing, along with YouTube for schools support and anonymizing proxy blocking. We also offer the option to enforce allowed domains for Google Apps as part of any web policy.
[/tab_item]
[tab_item title=”HTTPS Scanning”]Get the ultimate in flexibility when it comes to scanning encrypted web traffic with options to scan all HTTPS traffic for maximum security, selectively scan HTTPS traffic for a great balance between security and privacy, or choose to only enforce policy (without decryption). And what’s more, HTTPS scanning works the same in explicit proxy mode or transparent mode.
[/tab_item]
[tab_item title=”Layer-7 Application Control”]Control application traffic on your network to effectively manage resource utilization and productivity. Our deep layer-7 inspection can identify over 1300 applications like Facebook, Youtube, IM clients, and much more. You can easily block, allow, or shape network traffic proactively, in real-time using our dynamic flow monitor, or based on reporting trends.
[/tab_item]
[/tab]
Endpoint Protection
Extend protection to your Windows desktops and laptops with anti-virus, device, and web control all managed from your UTM.
[tab] [tab_item title=”How it Works”]
[/tab_item]
[tab_item title=”Easy Deployment”]Preconfigured installation packages detect and remove your existing antivirus and deploy our self-updating agent. Endpoints automatically register in the UTM. You can also deploy protection via USB stick, email, Active Directory GPO and standard software deployment tools.
[/tab_item]
[tab_item title=”Anti-Virus and Malware Protection”]Get the latest protection from modern malware like cryptolockers, Trojans, rootkits, and potentially unwanted applications (PUAs). We stop new threats immediately using a built-in host intrusion prevention systems (HIPS) and Live Anti-Virus real-time lookups to SophosLabs’ reputation database.
[/tab_item]
[tab_item title=”Device Control”]Enables you to control use of removable storage devices, optical media drives and wireless networking protocols like Wi-Fi, Bluetooth and infrared. Granular controls with device types regularly updated from SophosLabs allows you to limit USB storage to specific users or groups or only allow certain types of encrypted devices.
[/tab_item]
[tab_item title=”Web in Endpoint”]URL policy enforcement, malicious site detection and web malware protection are built right into the Sophos Endpoint so users are fully protected online when they leave the network. Policy updates are pushed to your endpoints automatically and activity data is sent back to the UTM periodically so you can mange their web security and productivity no matter where they happen to be.
[/tab_item]
[/tab]
Email Protection
Full SMTP and POP message protection from spam, phishing and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.
[tab] [tab_item title=”How it Works”]
[/tab_item]
[tab_item title=”Standards-based Encryption”]In addition to our unique and easy push-based SPX Encryption, we also support standards-based encryption solutions as well including TLS, OpenPGP, and S/MIME certificate based encryption.
[/tab_item]
[tab_item title=”Data Loss Prevention”]We make DLP easy but effective by providing hundreds of pre-defined sensitive data types you can easily add to your policy checklist of data you wish to protect. The UTM automatically enforces your DLP policy and encrypts, blocks and/or notifies you in the event any message leaves the organization with this type of data.
[/tab_item]
[tab_item title=”Live Anti-Spam”]Provides protection from the latest identify theft, banking scams, phishing and other scams by intercepting all email, blocking known bad senders, spam, malware and viruses but also taking advantage of SophosLabs Live cloud-lookups to query suspicious looking message content to determine if it’s part of a new or emerging unwanted email campaign.
[/tab_item]
[tab_item title=”Self-Serve Quarantine”]You can give employees direct control over their spam quarantine, saving you time and effort. Employees can manage their own spam whitelist, review, release and delete spam, and find out what happened to messages that were deleted because of a virus or blacklisted. The user portal supports 15 different local languages.
[/tab_item]
[tab_item title=”Outlook Add-in”]Allow users to flag their own messages for SPX Encryption right from within Outlook as they compose them or send spam samples from their inbox directly to SophosLabs with our simple Outlook Add-in.
[/tab_item]
[/tab]
Web Server Protection
Harden your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users with reverse proxy authentication.
[tab] [tab_item title=”How it Works”]
[/tab_item]
[tab_item title=”Server Hardening”]Close the door on vulnerabilities in your websites without involving developers. Static URL hardening prevents hackers from manually constructing “deep-links” that lead to unauthorized access. Form hardening ensures malicious scripts and code cannot be entered to exploit your database, and cookie protection makes sure cookies are signed to prevent tampering.
[/tab_item]
[tab_item title=”Reverse Proxy Authentication”]Our reverse proxy-authentication offloading provides persistent basic or form-based authentication. It adds an extra layer of security to services like Outlook Web Access for Exchange by allowing users to authenticate against our exploit-free reverse proxy. It’s the perfect solution for replacing Microsoft’s discontinued Forefront TMG.
[/tab_item]
[tab_item title=”Anti-virus Scanning”]Setup scanning of all inbound and outbound files to your servers with our dual antivirus agents to keep infected content off your network and ensure you’re not distributing malicious or infected content.
[/tab_item]
[tab_item title=”SSL Offloading”]Relieve your web or application servers from the processing burden of encrypting and decrypting traffic sent via SSL with the UTM’s ability to offload SSL. Setup is easy – it’s as simple as uploading your SSL certificate to the UTM WAF.
[/tab_item]
[/tab]
[divider]
Logging & Reporting

Our built-in reporting means you’ll know exactly what’s happening with your users. Fix problems fast and shape your policies, keeping your users secure while boosting network performance. And, you get detailed reports as standard, stored locally with no separate tools required.
[list type=”check”]- At-a-glance flow graphs show usage trends and web activity
- Our daily summary executive report keeps you informed
- Report anonymization can hide user names where needed
- Built-in Syslog support and automated log backup options
[button color=”#ffffff” background=”#4489dd” size=”large” src=”https://player.vimeo.com/video/97575578?width=800&height=450&iframe=true&portrait=0″]Watch a video on Logging & Reporting[/button]

