The Ultimate Security Package

Proven protection for your network – simpler, faster, better.

Get Pricing

Deep Learning Protection

Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence integrated into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that identifies both known and unknown malware without depending on signatures.

Sophos UTM 9.4 is one of the first Sophos products to offer our advanced next-generation cloud sandboxing technology.

Sandstorm provides a whole new level of ransomware and targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network. Sandstorm is:

  • Easy to try, deploy, and manage
  • Effective at blocking evasive threats
  • Simple and powerful cloud-based protection

And, it’s great value: enterprise-grade protection without the enterprise-grade price-tag or complexity.

Sandstorm Datasheet

We keep it simple

Sophos UTM's simple, intuitive user interface (UI) is tailored for you. It allows you to quickly protect your network and users. And it makes day-to-day management tasks easy.

Simple management

Sophos UTM is easy to use thanks to the configurable real-time dashboard, flexible modular licensing, and intuitive reusable network object definitions.

Network protection

Easily configure firewall rules that cover multiple destinations, sources, and services – as well as country blocking and intrusion prevention (IPS).

Web protection

Check out the web protection deployment options, policy settings, filter action wizard, policy test tool, and convenient built-in web reports.

App control

Easily control web applications proactively or in real time using the popular flow monitor where you can block, shape or throttle web application traffic on the fly.

Advanced Threat Protection

Advanced Threat Protection (ATP) features include multi-layered protection, selective sandboxing, and the capability to identify infected hosts on your network.

SD Red device

Connecting remote offices

Easily deploy and configure our unique SD-RED devices to securely connect remote offices to your primary network security appliance.

    All-in-One Protection

    We offer the latest next-gen firewall protection you need, along with features unavailable elsewhere – including mobile, web, endpoint email encryption, and DLP. No additional hardware. No additional charge. Simply select what you want to deploy.

     

    Network protection

    Network Protection

    All the protection you need to prevent sophisticated attacks and advanced threats while also ensuring secure network access for those you trust.

    Network Protection

    All the protection you need to prevent sophisticated attacks and advanced threats while also ensuring secure network access for those you trust.

    Features

    • Network Firewall
    • Intrusion Prevention System
    • Advanced Threat Protection
    • Secure VPN Access
    • Site-to-Site VPN
    • Self-Service User Portal

    Data Sheet More About Network Threats

    Wireless protection

    Wireless Protection

    Set up, manage, and secure wireless networks in just minutes with the UTM's built-in wireless controller that works with our full range of wireless access points.

    Wireless Protection

    Set up, manage, and secure wireless networks in just minutes with the UTM's built-in wireless controller that works with our full range of wireless access points.

    Features

    • Plug and Play Deployment
    • Multiple Wi-Fi Zones
    • Reliable High-Speed Wireless
    • Mobile NAC
    • Guest Wi-Fi Hotspots
    • Secure Encryption

    Compare Access Points More About Wireless Threats

    Web protection

    Web Protection

    Comprehensive protection from the latest web threats and powerful policy tools ensures your users are secure and productive online.

    Web Protection

    Comprehensive protection from the latest web threats and powerful policy tools ensures your users are secure and productive online.

    Features

    • Web Malware Protection
    • URL Filtering Policies
    • SafeSearch, YouTube, and Google Apps
    • HTTPS Scanning
    • Layer-7 Application Control
    • Web in Endpoint

    Data sheet More About Web Threats

    Sandstorm icon

    Sandstorm Sandboxing

    Sandstorm provides an entirely new level of targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network.

    Sandstorm Sandboxing Protection

    Sophos UTM 9.4 is one of the first Sophos products to offer our advanced next-generation cloud sandboxing technology.

    Sandstorm provides a completely new level of targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network. Sandstorm is:

    • Easy to try, deploy, and manage
    • Effective at blocking evasive threats
    • Simple and powerful cloud-based protection

    And, it’s great value: enterprise-grade protection without the enterprise-grade price-tag or complexity.

    Learn More

    Email protection

    Email Protection

    Full SMTP and POP message protection from spam, phishing, and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.

    Email Protection

    Full SMTP and POP message protection from spam, phishing, and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.

    Features

    • SPX Email Encryption
    • Standards-based Encryption
    • Data Loss Prevention
    • Live Anti-Spam
    • Self-Service Quarantine
    • Outlook Add-in

    Data Sheet More About Email Threats

    Web server icon

    Web Server Protection

    Secure your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users through reverse proxy authentication.

    Web Server Protection

    Secure your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users through reverse proxy authentication.

    Features

    • Web Application Firewall
    • Server Hardening
    • Reverse Proxy Authentication
    • Anti-virus Scanning
    • SSL Offloading

    Data sheet Looking for a TMG alternative?

    License our protection modules individually or choose one of our pre-packaged licences.

    Competitive ComparisonsView the licence options

    Logging & Reporting

    Our built-in reporting means you'll know precisely what's happening with your users. Fix problems quickly and shape your policies, ensuring your users are secure while enhancing network performance. And, you receive detailed reports as standard, stored locally without the need for any additional tools.

    • At-a-glance flow graphs display usage trends and web activity
    • Our daily summary executive report keeps you informed
    • Report anonymisation can hide user names where needed
    • Built-in Syslog support and automated log backup options

    Need More Reporting?

    Although you can have all your logging and reporting built into your box, sometimes you may need a little more. For that, you can add Sophos iView.

    Watch a VideoCheck out iView

    utm-9-product-shot

    Flexible Deployment

    Sophos UTM excels in its deployment flexibility: select from hardware, software, virtual or cloud options with straightforward choices for high availability, clustering, branch office connectivity, wireless, and centralised management and reporting. And unlike our competitors, we don't make you compromise on features or performance when you choose - every feature is available on every model and form factor.

    SG Series icon

    SG Series

    Our SG Series hardware appliances are purpose-built devices with the latest technology to provide the ultimate in performance.

    Software virtual icon

    Software & Virtual

    Install the UTM image on your own server hardware or your preferred virtual environment including VMware, Citrix, Microsoft Hyper-V and KVM.

    Cloud icon

    Cloud

    Sophos UTM is a market leader and the preferred solution for securing Amazon Web Services network infrastructure.

    What are you waiting for?

    How to BuyContact Sales