SG Series

The ultimate network security package.

An essential network firewall, plus protection for web and email gateways, laptops and mobile devices.

Free Trial Get Pricing Demo

New SG Series Appliances

Unleash the full potential of your network.

Our latest SG Series appliances are built to provide optimal performance, versatility and efficiency to meet all your security needs. 

  1. Compare Models
  2. Download SG Series Datasheet
UTM 9.2

What’s New in UTM Accelerated (9.2)

The new Sophos UTM Accelerated (9.2) offers enterprise-grade protection in a single box. No compromise. Better performance.

  • Advanced Threat Protection
  • Smarter Secure Web Gateway in a unified product
  • Simpler email encryption and DLP
  • Faster IPS, optimized for the best performance
  • Safer Web Servers with reverse-proxy authentication

Of course, there are many more features for you to explore - such as our two-factor authentication, or web filtering for Sophos Enterprise Console managed endpoints.

  1. What's New in UTM Accelerated (9.2)

Flexible Deployment

Sophos UTM gives you complete security—from the network firewall to endpoint antivirus—in a single modular appliance.

  • Install as hardware, software or a virtual appliance or even in the cloud
  • License our protection modules individually. Or, you can choose one of our pre-packaged licenses
  • Centrally manage multiple appliances through IPsec VPN tunnels with our Free UTM Manager

Usable Threat Management

At Sophos, simplicity is our mantra. You’ll have complete control over all the security features you need all in one place, with none of the complexity.

  • Every feature is available on every appliance
  • Manage multiple UTMs with our free Sophos UTM Manager
  • Includes on-box reporting for real-time and historical data

And because it's so simple, you're never more than a couple clicks from completing your tasks.

  1. UTM Feature List

Complete On-Box Reporting

Our built-in reporting means you’ll know exactly what's happening with your users. Fix problems fast and shape your policies, keeping your users secure while boosting network performance. And, you get detailed reports as standard, stored locally with no separate tools required.

  • At-a-glance flow graphs show usage trends with predefined and customizable reports, providing key web activity
  • Report anonymization hides user names, requiring the four-eyes principle to unhide them

Lightning Performance

Our hardware appliances are purpose built, high-performance devices. They integrate our security applications with a hardened operating system (OS) on optimized Intel-compatible server systems.

  • Flexible and scalable hardware and software tailored to your needs
  • Optimized for best performance in real-life usage scenarios
  • Best performance, no matter which deployment method you choose

  1. Independent performance review

Centralized UTM Management

Whether you have a few UTMs or a few hundred, we make it easy to centrally manage and monitor your entire estate with a single pane of glass.

  • Easily manage multiple UTM installations from a single console
  • Configure web, email and network filtering policies across multiple sites or customers
  • View threat, network and hardware resource status across all your UTMs at a glance
  • Aggregate reporting across all your UTMs or view just a single installation

  1. UTM Manager Datasheet

Two-Factor Authentication

Add an additional level of security to access many key areas of the UTM. Our one-time password solution requires no infrastructure and gives you secure access to the WebAdmin, User Portal, SSL VPN, IPSec VPN, Wi-Fi Hotspots and SSH login.

  • Compatible with all OATH authentication systems plus YubiKey
  • Supports soft tokens, hardware keys and mobile applications
  • Mobile users just scan the QR-code to get their one-time password

Self-Service User Portal

Our self-service user portal helps users help themselves, reducing the workload on your help desk. It provides personalized email and remote access services to authorized users—and it’s simple to use.

  • Access and manage email quarantine to release messages inadvertently marked as spam
  • Create email sender whitelists to stop legitimate mail being quarantined, and create POP3 accounts too
  • Download remote access client software and configuration files.(SSL, PPTP, L2TP, IPsec Road Warrior)
  • Change user preferences such as the portal password

Advanced Threat Protection

Our Advanced Threat Protection (ATP) combines multiple technologies to add an additional layer of defense against targeted attacks on your network.

  • Uses layered protection to effectively prevent APTs, command and control traffic and targeted attacks
  • Performance-optimized Intrusion Prevention System (IPS) identifies and blocks attacks through deep-packet inspection
  • When combined with Web, selective analysis of unidentified traffic in a cloud sandbox helps to constantly improve the threat data provided by SophosLabs

  1. Network Protection Datasheet
  2. Learn more about network threats

Customizable Web Filtering

Select from over 35 million sites in 96 categories to create safe web browsing policies—so you can minimize legal concerns around inappropriate content and maximize productivity.

You can set policy by users and time, using a variety of authentication options including IP or Mac Address, Active Directory SSO, eDirectory SSO and LDAP. And, it syncs with UTM Endpoint Protection and the Sophos Enterprise Console, providing a single web security policy for users everywhere.

  1. Web Protection Datasheet

Web Malware Protection

You get the most advanced web threat protection:

  • Our high-performance web malware engine inspects all web traffic in real-time
  • Advanced techniques like JavaScript emulation block the latest web threats before they reach the browser
  • SophosLabs continuously updates our threat intelligence via the cloud, keeping you ahead of new and emerging threats

  1. Web Protection Datasheet

Complete Email Protection

Block spam and viruses while keeping your sensitive data safe.

  • Let users manage their spam quarantine and search a personalized mail log
  • Antivirus scanning keeps infected emails out of your mailbox
  • Protect your confidential emails and sensitive data from unauthorized access with our unique email encryption and DLP

  1. Email Protection Datasheet

Powerful Webserver Protection

You can quickly harden your web servers and apps against common attacks and ensure regulatory compliance with our web application firewall. Get instant protection without changing your web server code and no training required for admins or web developers.

You get a full-featured reverse proxy with SSL offloading and a variety of authentication options to add an extra layer of security to Exchange - it’s the perfect replacement for TMG.

  1. Webserver Protection Datasheet
  2. Learn more about replacing TMG

Built-in Wi-Fi

You can set up, manage and secure wireless networks in just minutes with the UTM’s built-in wireless controller. Use the voucher-based system or backend authentication to control access and usage.

  • Set up wireless hotspots and guest access with a simple, customizable voucher-based system
  • Access Points need no manual configuration and are instantly protected by the UTM
  • Repeating and bridging functionality extends Wi-Fi to harder to cable areas

  1. Secure Wi-Fi Datasheet

Easy Site-to-Site VPN

Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It's the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security.

Our Secure SSL or IPsec VPN clients provide mobile and home workers with secure remote access from any location at any time. And our unique UserPortal means users can install VPN Clients and manage their spam too.

  1. VPN Clients Datasheet
  2. Remote Ethernet Device (RED) Datasheet

Proven Endpoint Antivirus

Extend protection to your desktops and laptops with antivirus, device and web control in one.

  • Scans files, webpages and devices blocking or cleaning threats
  • Device control reduces the risk of data loss and malware by managing removable devices
  • Built-in URL filtering makes sure users get the same level of web protection outside of the office as they do inside

  1. UTM Endpoint Protection Datasheet

Dynamic App Control

In a couple clicks you can protect your employees from web threats and control their time online.

  • A graphical flowmonitor and dynamic reports let you check on the fly to see if your policy is working and make instant adjustments
  • Block, allow, shape and prioritize web applications like file sharing, IM clients, streaming media and games
  • Deep Layer-7 inspection identifies over 900 applications, and it gives feedback on unclassified applications too

  1. Web Protection Datasheet

Product Certifications


VMware Ready
Recognizes solutions that are interoperable and optimized for VMware platforms.


ICSA Labs Firewall Certification
Security industry's central authority for research, intelligence, and certification testing of products.


Common Criteria - EAL 4+
First Unified Threat Management appliance to receive the coveted Common Criteria certification.


TOLLY Up-to-Spec Certified
Certificated by an independent test lab.


IPv6 Ready
Certificated by an independent test lab.

Free Trial Get Pricing