S O L U T I O N S

Get Started. It's Free
or sign up with your email address
S O L U T I O N S by Mind Map: S O L U T I O N S

1. UNIFIED THREAT MANAGEMENT

1.1. HARDWARE

1.1.1. SOPHOS UTM

1.2. SOFTWARE

1.2.1. SOPHOS UTM

1.3. VIRUTAL

1.3.1. SOPHOS UTM

2. FIREWALLING

2.1. PERIMETER PROTECTION

2.1.1. VIRTUAL

2.1.2. PHYSICAL

2.1.2.1. SOPHOS UTM

2.1.3. SOFTWARE

2.1.3.1. SOPHOS UTM

2.2. ENDPOINT

2.2.1. CENTRALLY CONTROLLED

2.2.1.1. SOPHOS ENDUSER

3. VPN CAPABILITIES

3.1. ENABLING PHONES & TABLETS

3.1.1. AGENTLESS

3.1.1.1. HTML 5

3.1.1.1.1. SOPHOS UTM

3.1.1.2. PPT

3.1.1.2.1. SOPHOS UTM

3.1.1.3. L2TP

3.1.1.3.1. SOPHOS UTM

3.2. ENABLING ENDPOINTS

3.2.1. AGENT BASED

3.2.1.1. IPSEC

3.2.1.1.1. SOPHOS UTM

3.2.1.2. SSL CLIENT

3.2.1.2.1. SOPHOS UTM

3.2.1.3. CISCO CLIENT

3.2.1.3.1. SOPHOS UTM

3.2.2. AGENTLESS

3.2.2.1. HTML 5

3.2.2.1.1. SOPHOS UTM

3.2.2.2. PPT

3.2.2.2.1. SOPHOS UTM

3.2.2.3. L2TP

3.2.2.3.1. SOPHOS UTM

3.3. LINKING BRANCHES

3.3.1. UTM TO UTM

3.3.1.1. SOPHOS UTM

3.3.2. ALTERNATIVE

3.3.2.1. SOPHOS REMOTE ETHERNET DEVICE

4. WIRELESS

4.1. NETWORK CONNECTIVITY

4.1.1. SOPHOS ACCESS POINT

4.2. HOTSPOT / GUEST CONNECTIVITY

4.2.1. SOPHOS ACCESS POINT

4.3. SEGMENTATION

4.3.1. SOPHOS ACCESS POINT

5. VULNERABILITY MANAGEMENT

5.1. TRAFFIC INSPECTION

5.1.1. WEB TRAFFIC

5.1.1.1. SOPHOS WEB PROTECTION ADVANCED

5.1.2. ALL TRAFFIC

5.1.2.1. SOPHOS UTM

5.2. HOST INSPECTION

5.2.1. PATCH ASSESSMENT

5.2.1.1. SOPHOS ENDUSER

5.2.2. COMPLETE ASSESSMENT

5.2.2.1. BRITESMITH VULNERABILITY SCANNING

6. WEB

6.1. APPLICATION CONTROL

6.1.1. SOPHOS UTM

6.2. REVERSE PROXY

6.2.1. SOPHOS UTM

6.3. PROXY

6.3.1. SOPHOS UTM

6.3.2. SOPHOS WEB PROTECTION

6.4. ENDPOINT

6.4.1. SOPHOS ENDUSER

6.4.2. SOPHOS UTM

7. EMAIL

7.1. ARCHIVING

7.1.1. SOPHOS MAIL ARCHIVING

7.2. ENCRYPTION

7.2.1. B2B

7.2.2. B2C

7.3. MALWARE, SPAM & CONTENT

7.3.1. SOPHOS UTM

7.3.2. SOPHOS EMAIL PROTECTION ADVANCED

7.4. DATA LOSS PREVENTION

7.4.1. SOPHOS EMAIL PROTECTION ADVANCED

8. ENCRYPTION

8.1. DEVICE

8.1.1. REMOVABLE MEDIA

8.1.1.1. SAFEGUARD

8.1.2. LAPTOP & DESKTOP

8.1.2.1. SAFEGUARD

8.2. CLOUD STORAGE

8.2.1. SAFEGUARD

8.3. FILE & FOLDER

8.3.1. SAFEGUARD

8.4. EMAIL

8.4.1. B2B

8.4.1.1. SOPHOS UTM

8.4.1.2. SOPHOS EMAIL PROTECTION ADVANCED

8.4.2. B2C

8.4.2.1. SOPHOS EMAIL PROTECTION ADVANCED

8.5. 3RD PARTY CENTRAL MANAGEMENT

8.5.1. SAFEGUARD

9. DATA CONTROL

9.1. EMAIL

9.1.1. SOPHOS ENDUSER

9.1.2. SAFEGUARD

9.2. WEB

9.2.1. SOPHOS EMAIL PROTECTION ADVANCED

9.3. ENDPOINT

9.3.1. SOPHOS EMAIL PROTECTION ADVANCED

10. ANTI-VIRUS & THREAT PROTECTION

10.1. ENDPOINT

10.1.1. SOPHOS UTM

10.1.2. SOPHOS ENDUSER

10.2. SERVER

10.2.1. SOPHOS ENDUSER

10.3. WEB

10.3.1. SOPHOS UTM

10.3.2. SOPHOS ENDUSER

10.3.3. SOPHOS WEB PROTECTION ADVANCED

10.4. EMAIL

10.4.1. SOPHOS EMAIL PROTECTION ADVANCED

10.4.2. SOPHOS UTM

10.5. MOBILE

10.5.1. SOPHOS MOBILE SECURITY

10.6. SHAREPOINT

10.6.1. SOPHOS SHAREPOINT PROTECTION

10.7. NETWORK STORAGE

10.7.1. SOPHOS FOR NETWORK STORAGE

11. DATA LOSS PREVENTION

11.1. ENDPOINT

11.1.1. SOPHOS ENDUSER

11.1.2. SAFEGUARD

11.2. EMAIL

11.2.1. SOPHOS EMAIL PROTECTION ADVANCED

11.3. WEB

11.3.1. SOPHOS WEB PROTECTION ADVANCED

12. REMOVABLE MEDIA CONTROL

12.1. DATA TRANSFER

12.1.1. SAFEGUARD

12.1.2. SOPHOS ENDUSER

12.2. PHYSICAL

12.2.1. SAFEGUARD

12.2.2. SOPHOS ENDUSER

13. APPLICATION CONTROL

13.1. GATEWAY

13.1.1. SOPHOS UTM

13.2. ENDPOINT

13.2.1. SOPHOS ENDUSER

14. MOBILE

14.1. ON PREMISE

14.1.1. ANTI-VIRUS & THREAT PROTECTION

14.1.1.1. SOPHOS MOBILE SECURITY

14.1.2. CONTROL

14.1.2.1. APPLICATIONS

14.1.2.1.1. SOPHOS MOBILE CONTROL

14.1.2.2. DEVICE SETTINGS

14.1.2.2.1. SOPHOS MOBILE CONTROL

14.2. CLOUD

14.2.1. ANTI-VIRUS & THREAT PROTECTION

14.2.1.1. SOPHOS MOBILE SECURITY

14.2.2. CONTROL

14.2.2.1. DEVICE SETTINGS

14.2.2.1.1. SOPHOS MOBILE CONTROL

14.2.2.1.2. MAAS360 MOBILE DEVICE MANAGEMENT

14.2.2.2. APPLICATIONS

14.2.2.2.1. SOPHOS MOBILE CONTROL

14.2.2.2.2. MAAS360 MOBILE DEVICE MANAGEMENT

14.2.2.3. EXPENSES

14.2.2.3.1. MAAS360 MOBILE DEVICE MANAGEMENT

14.2.2.4. DOCUMENTS

14.2.2.4.1. MAAS360 MOBILE DEVICE MANAGEMENT

15. SERVICES

15.1. TELEPHONIC & EMAIL SUPPORT

15.2. DEPLOYMENT

15.2.1. SUPPORTED DEPLOYMENT

15.2.2. DIAGRAM & PLANNING

15.3. MAINTENANCE

15.4. WORKSHOPS

15.4.1. INTRODUCTION WORKSHOPS

15.4.2. MAINTENANCE WORKSHOPS

15.4.3. DEPLOYMENT WORKSHOPS

15.5. REPORTING

15.6. ONSITE CALLOUT