Synchronized Security

scawards-2019-europe-winner

Cybersecurity Evolved

83% of IT managers say malware threats are harder to stop compared to last year. Why? Because cybercriminals connect multiple techniques in their advanced attacks, but most security products still work in isolation. It’s time to evolve.

Synchronized Security is the world’s first – and best – cybersecurity system. Endpoint, network, mobile, Wi-Fi, email, and encryption products, all sharing information in real time and responding automatically to incidents:

  • Isolate infected endpoints, blocking lateral movement
  • Restrict Wi-Fi for non-compliant mobile devices
  • Scan endpoints on detection of compromised mailboxes
  • Revoke encryption keys if a threat is detected
  • Identify all apps on the network

And with everything controlled through the Sophos Central cloud-based security platform, management is a breeze.

Reduce cyber risk

Automated incident response minimizes exposure to security threats, while cross-product data sharing reveals previously hidden risks.

img-cyber-risk

Enhance cross-estate visibility

Get previously unseen insights into network traffic and users, while viewing and controlling all your security in one place.

img-cross-estate-visibility

Increase Return on Investment

Scale your security without scaling your resources by consolidating all your protection in a single cloud-based platform.

img-cloud-investment

Hear What Our Customers Say

“It's saved us a lot of time, a lot of money, and a lot of heartache.“

Kathy Wise, Washakie County School District 1

synchronized-security-loop-3-d

Zero Touch Response

See how Sophos products work together to slash your exposure to threats while freeing up IT. 

Identify all apps on the network

On average, 45% of network traffic can’t be identified. See how Sophos XG Firewall and Sophos Endpoint work together to identify all network traffic, revealing hidden risks and unknown threats.

Restrict Wi-Fi for non-compliant mobile devices

See how Sophos Mobile and Sophos Wireless work together to reduce risk from non-compliant devices, and how you can track it all in real time.

Isolate infected endpoints

See how Sophos Endpoint, Sophos XG Firewall, and Sophos Encryption systematically work together to stop a ransomware attack.

How to Get Synchronized Security

To enable Synchronized Security, all you need is two or more Sophos products that work together. At least one product must be managed through the Sophos Central management platform. And if you’re already a Sophos customer, you’re already halfway there.

You do not need any additional subscriptions to enable Synchronized Security

HOW THEY WORK TOGETHER
intercept-xxg-firewall
  • Automatically block compromised devices from accessing corporate data

  • Identify unclassified apps and processes that are using bandwidth

  • Block worm-like lateral movement, automatically isolating infected machines

  • Automatically generate RCAs for threats blocked at both the endpoint and the firewall (requires EDR)

  • Find the source (user, device) of bad traffic in the network

  • Identify what is causing malicious traffic from a device

  • Quickly classify and block all undesirable apps using up bandwidth

  • Rate-limit certain apps on the network

(includes all Central-managed endpoint protection subscriptions)

intercept-xxg-firewall
  • Block compromised devices from accessing corporate data with one click

  • Identify unclassified apps and processes that are using bandwidth

  • Block worm-like lateral movement, isolating infected machines with one click

  • Find the source (user, device) of bad traffic in the network

  • Quickly classify and block all undesirable apps using up bandwidth

  • Rate-limit certain apps on the network

  • Protect servers from other compromised machines on the network

  • Identify what is causing malicious traffic from a device

(includes all Central-managed server protection subscriptions)

intercept-xxg-firewall
  • Automaticaly check whether malware has been installed on devices with compromised mailboxes

(includes all Central-managed endpoint and email protection subscriptions)

intercept-xxg-firewall
  • Automatically block compromised devices from accessing corporate data

  • Prevent non-compliant devices connecting to corporate data

  • Block worm-like lateral movement, automatically isolating infected machines

  • Put IoTs on a separate SSID so they can't access corporate data

  • List out devices that shouldn't be connected to the SSID and disconnect them

  • Discover unmanaged Windows/ Mac/ Linux devices and get them to managed

(includes all Central-managed endpoint protection subscriptions and all APX access points)

intercept-xxg-firewall
  • Automatically block compromised devices from accessing corporate data

  • Put IoTs on a separate SSID so they can't access corporate data

  • Prevent non-compliant devices connecting to corporate data

  • List out devices that shouldn't be connected to the SSID and disconnect them

  • Discover unmanaged Windows/ Mac/ Linux devices and get them to managed

(includes all Central-managed mobile protection subscriptions and APX access points)

intercept-xxg-firewall
  • Enroll risky users in targeted user education training programs with one click

(includes all Central-managed email protection subscriptions)

safeguard encryption intercept-xxg-firewall
  • Automatically revoke encryption keys on infected devices when the health status of the endpoints changes

(includes all Central-managed endpoint protection subscriptions)

How to Buy

With Synchronized Security, you enjoy flexible implementation options, making it as easy as possible to get started.

icon-single-product-deployment

Start with one product,
add others later

You’ll get the benefits of Synchronized Security as soon as you add the additional products, and in the meantime will enjoy great protection from your first product.

icon-multiple-product-deployment

Deploy multiple products at
the same time

You can still add additional products at a later date to further extend your Synchronized Security system.

Try for Free

icon-new-to-sync-security

New to Synchronized Security

The easiest way to get started is to take a free trial of Sophos Central. You can try out multiple products as well as the Central management interface.

Start Free Trial
icon-current-sync-security-user

Already using a product in the Synchronized Security portfolio

Great – you’re already halfway there! Simply activate a free trial for another product that works with your existing solution and you’re off.

See Free Trials
icon-sync-security-connection

Connecting XG Firewall with Sophos Central

Read this Knowledge Base Article for a step-by-step guide.