The world's best
visibility, protection, and response.


See it. Stop it. Secure it.


Expose Hidden Risks

Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network.


Stop Unknown Threats

Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure.


Isolate Infected Systems

Automatic threat response instantly identifies and isolates compromised systems on your network to stop threats from spreading.

Secure Remote Workers

XG Firewall makes it easy to extend your secure network to employees anywhere.

Free, Easy-to-Use VPN Client

Sophos Connect provides an intuitive VPN connection client that’s easy to deploy and configure. Give your remote workers secure access to resources on the corporate network from Windows and macOS devices.

SOHO Protection with XG 86 or SD-RED

Our small, ultra-affordable XG 86(w) and SD-RED devices provide the ultimate in SOHO protection with always-on dedicated or split-tunnel VPN that’s easy to deploy and manage with a variety of flexible options.

Mobile VPN

Mobile devices can utilize built-in or app-based VPN options including IPSec and SSL VPN for secure connectivity to your XG Firewall protected network.

See How it Works


Take it for a Test Drive.

Demo all XG Firewall’s features – no install, no commitment.


XG Firewall’s all-new Xstream architecture delivers extreme levels of visibility, protection, and performance.

XG Firewall Xstream TLS Inspection

Industry-leading performance and visibility into all the encrypted traffic on your network with support for TLS 1.3

XG Firewall Xstream DPI Engine

High-performance deep packet protection in a single streaming engine for stopping all known and unknown threats

XG Firewall Xstream Network Flow FastPath

Accelerate trusted and important cloud, SaaS, and VoIP application traffic for optimal performance

XG Series Appliances

The ultimate in performance, flexibility, and connectivity.


Our XG Series hardware appliances are purpose-built with the latest multi-core processors, generous RAM provisioning, solid-state storage, and flexible connectivity options.

Whether you’re protecting a small business or a large datacenter, you’re getting industry-leading price: performance, and the ultimate in flexibility, connectivity, and reliability in every form factor.

Synchronize Your Firewall and Endpoint Security

XG Firewall is part of the world’s best cybersecurity system, integrating in real time with Intercept X.


100% Application Visibility

Identify all unknown applications on the network.


Monitor Health and Threats

Instantly identify compromised hosts.


Automatic Threat Isolation

Stop breaches and isolate infected endpoints instantly, blocking lateral movement.

Central Cloud Management

One Console to Manage It All

Easily make a change to one firewall and push it out to others with just a few clicks using the new Group Firewall Management tools in Sophos Central.

Reporting in the Cloud

Sophos Central now includes flexible reporting tools that enable you to visualize your network activity and security over time. You get several built-in reports as well as easy tools to create your own custom reports.

Zero-Touch Deployment

Easily deploy new XG Firewall devices from Sophos Central without having to touch them.


Complete Next-Gen Protection

All the advanced networking, protection, user, and app controls you need to stay secure and compliant.

XG Firewall provides an elegant and effective web-based management console that offers quick access to all the features you need without unnecessary complexity.

  • Sophos Central provides the ultimate cloud management platform for all your Sophos products including XG firewall

  • XG Firewall’s Control center provides at-a-glance feeds of system performance, traffic patterns, alerts, and policies.

  • Unified policy model enables convenient management of all your user, network, NAT, and business app rules in one place with snap-in policies for apps, web, QoS, IPS, Security Heartbeat, and routing, which dramatically simplifies enforcement and reduces redundancy, and overall rule count.

  • Policy templates offer common business applications to dramatically streamline configuration.

  • Role-based admin provides flexible granular access control for different functional areas.

Sophos Central provides powerful centralized management, reporting, and zero-touch deployment for all your XG Firewalls and other Sophos products from a single console.

  • Sophos Central is the ultimate cloud-management platform - for all your Sophos products. It makes day-to-day setup, management, and reporting for all your XG Firewalls easy. It is free of charge for all XG Firewall customers.

  • Sophos Central Firewall Management includes powerful cloud-based group firewall management, backup management, one-click firmware updates and rapid zero-touch provisioning of new firewalls.

  • Sophos Central Firewall Reporting provides flexible reporting in the cloud for all your XG Firewalls with easy tools to create your own custom reports.

The all-new, carefully crafted control center analyzes extensive back-end data sources to surface just the information you need to respond quickly to changes in your network.

  • Instant insights at a glance for all your important system, security and network status indicators from the all-new control center

  • Automated report analysis highlights reports in the control center featuring data of interest or that may need attention, with one-click access to the full report.

  • Quick drill-down interaction with any control center widget to get more detailed information, access relevant tools, or quickly take action.

  • Email notifications are automatically sent for important system status events.

  • SNMP with a custom MIB and support for IPSec VPN tunnels to manage remote office firewall devices.

Take advantage of the XG Firewall’s extensive on-box reporting or utilize Sophos iView for comprehensive, centralized reporting across your all your firewall devices.

  • On-box reporting comes standard with every XG Firewall for all your local firewall reporting needs.

  • Central Firewall Reporting provides flexible reporting in the cloud for all your XG Firewalls with easy tools to create your own custom reports.

  • User and app risk analysis reports such as our unique User Threat Quotient or App Risk Score identify top risk users and applications respectively.

  • Live log viewer, accessible from any screen, provides a real-time view into activity in your firewall across all areas of the firewall with powerful search and filter options.

  • Change control and audit logging are provided to ensure compliance.

  • Syslog support enables safe backup, archival, and analysis of system logs.

User identity-based policies and unique user risk analysis give you the knowledge and power to regain control of your users before they become a serious threat to your network.

  • User identity powers all firewall polices and reporting, enabling unprecedented next-gen control over applications, web surfing, bandwidth quotas, and other network resources.

  • User Threat Quotient (UTQ) identifies the top risk users on your network based on their recent network behavior.

  • Synchronized User ID – a unique Sophos Synchronized Security feature eliminates the need for client or server authentication agents by sharing user identity between the endpoint and the firewall through Security Heartbeat™.

  • Flexible authentication options including directory services (AD, eDirectory, LDAP), Kerberos, NTLM, RADIUS, TACACS+, RSA, client agents (including Chromebook support), or captive portal.

  • Two-factor authentication (2FA) one-time password support for access to key system areas, including IPsec and SSL VPN, the user portal, and the web administration console.

Complete application visibility and control over all applications on your network with deep-packet scanning technology and Synchronized App Control that can identify all the applications that are currently going unidentified on your network.

  • Visibility and control over thousands of applications via customizable policy templates with granular controls and smart filter lists that enable you to build custom policies based on category, risk, technology, or other characteristics.

  • CASB cloud app visibility identifies all browser applications and cloud services to identify Shadow IT and data at risk to get it under control quickly and easily.

  • Synchronized App Control provides a breakthrough in network visibility by identifying all the applications that are unknown, unidentified, or generic on your network enabling you to classify and control them. Prioritize the apps you want and block the ones you don’t.

  • User-based application policies enables custom-tailored application control to be added to any user, group, or network policy with the option to also apply traffic shaping.

  • Traffic shaping (QoS) prioritizes bandwidth allocation to critical applications and limits bandwidth for non-business applications.

Full visibility and control over all your web traffic with flexible enforcement tools that work the way you need, with options for user and group enforcement of activity, quotas, schedules, and traffic shaping.

  • Enterprise Secure Web Gateway (SWG) policy model with hierarchical inheritance enables sophisticated group and user-based web filtering policies to be defined quickly and easily, dramatically reducing firewall rule count.

  • Template-driven activity control with predefined workplace and compliance policies utilize over 90 predefined website categories, covering billions of pages maintained by SophosLabs with the option to import custom URL lists.

  • Education features like YouTube restrictions and SafeSearch as well as temporary web policy overrides controlled by teachers provides flexible, powerful, but easy to use compliance controls.

  • Comprehensive enforcement monitors HTTPS encrypted traffic, blocks anonymizing proxies, and can enforce Google Apps domains ensure your policies are always enforced.

  • Traffic shaping (QoS) prioritizes bandwidth allocation to critical web applications and limits bandwidth for non-business websites.

Flexible, user-based monitoring and control of keyword content and downloadable content, including files types via FTP, HTTP, or HTTPS.

  • Web keyword monitoring can log and dynamically block content matching uploaded keyword libraries regardless of the site category to help identify problematic or risky behavior related to topics like self-harm, radicalization, bullying, and more.

  • File download filtering templates let you control hundreds of different files, executables, and dynamic content types simply as part of any user or network web control policy.

  • Outbound email DLP that's policy-based can automatically trigger encryption or block/notify based on the presence of sensitive data in emails leaving the organization.

  • Web caching reduces bandwidth consumption by caching supported web content and downloads, including Sophos Endpoint updates.

Stateful and deep-packet inspection for all network traffic with top-performing IPS and dual-engine AV performance and effectiveness.

  • Advanced next-gen IPS protection provides the ultimate network exploit prevention, protection and performance. It supports a uniform signature format backed by SophosLabs.

  • Dual-engine AV scanning offers the option of scanning traffic with the Sophos engine for excellent performance and protection, or adding a second engine scan for even more protection.

  • Perimeter defenses stop attacks on your network, including reconnaissance detection, spoofing, flood protection (DoS, DDoS), and packet-based attacks (ICMP).

  • Country-based policy blocks Geo IP ranges for entire countries or regions.

Sophos Sandstorm uses next-gen cloud-sandbox technology with the best technology from Intercept X, providing your organization with the best protection against zero-day threats like the latest ransomware and targeted attacks coming in through phishing, spam, or web downloads.

  • Cloud delivery means Sandstorm is fully integrated with your XG Firewall and requires no additional hardware.

  • Identifies suspicious payloads such as PDFs, Office Docs, and executables entering the network via email or the web and sends those to the cloud sandbox for extensive machine learning based analysis and remote execution to convict zero-day payloads before they enter your network.

  • Powered by deep learning and other technologies from our leading Intercept X next-gen endpoint product, including exploit detection and CryptoGuard protection, stops zero-day threats before they get on your network.

  • Great value, affording you all the benefits of enterprise-grade protection without the enterprise price tag.

  • Detailed threat reports for every incident so you know exactly what’s going on.

Sophos' award-winning, high-performance anti-malware engine is backed by SophosLabs and a 30-year history of protecting enterprises from the latest threats.

  • Advanced malware protection that goes beyond signature-based detection to include advanced, proprietary techniques like code emulation and behavioral analysis to detect obfuscated or polymorphic threats.

  • Live Protection is exclusive to Sophos and closes the gap between regular updates through real-time cloud lookups.

  • Dual-engine scanning offers the option of scanning traffic with the Sophos engine for excellent performance and protection, or adding a second engine scan for even more protection.

  • SophosLabs 24/7 global threat research operation is one of few in the world with the breadth and depth necessary to stay ahead of the latest threats.

Sophos' Web Protection engine is backed by SophosLabs and includes innovative technologies required to identify and block the latest web threats.

  • Advanced Web Protection combines advanced analysis capabilities such as JavaScript emulation, behavioral analysis, and origin reputation to protect against modern, multi-stage web attacks.

  • Pharming protection guards against phishing and pharming attacks by overriding corrupt host file or DNS lookups.

  • HTTPS scanning deep scans encrypted traffic for threats and compliance.

  • Potentially unwanted app control protects your network from cryptomining and cryptojacking embedded in websites as well as a variety of other unwanted web borne applications.

  • SophosLabs, the global, round-the-clock threat research operation, identifies thousands of newly infected websites and instances of web malware, ensuring you have the best malicious site database protecting your network and users.

Our revolutionary Security Heartbeat links your Sophos managed endpoints with your firewall to deliver unparalleled protection from advanced threats while significantly reducing the time and complexity of responding to security incidents.

  • Security Heartbeat: XG Firewall monitors the Security Heartbeat status of all your Sophos endpoints, enabling you to quickly identify compromised systems and automatically limit network access for these systems until they can be cleaned up.

  • Destination Heartbeat Protection controls access to endpoints and servers based on the status of their Heartbeat – further bolstering protection from potentially compromised systems until they are completely safe.

  • Synchronized App Control a breakthrough in network visiblity, utilizes the Synchronized Security relationship to automatically identify, classify and control unknown applications on your network.

  • Lateral Movement Protection automatically isolates compromised systems at every point in the network to stop attacks dead in their tracks. Healthy endpoints assist by ignoring all traffic from unhealthy endpoints, enabling complete isolation, even on the same network segment, to prevent threats and active adversaries from spreading or stealing data.

  • Synchronized User ID eliminates the need for client or server authentication agents by sharing user identity between the endpoint and the firewall through Security Heartbeat™

XG Firewall delivers advanced threat protection to instantly identify bots and other advanced threats while defending your network from today’s sophisticated attacks.

  • Security Heartbeat links your endpoints and your firewall, combining their intelligence to identify and isolate systems compromised by advanced and previously unknown threats.

  • Multi-layered, call-home protection combines analysis from DNS, IPS, web, and traffic filters to identify and block botnet and command-and-control (C&C) call-home attempts.

  • Intelligent firewall policies account for endpoint behavior to automatically isolate or limit access to infected systems that may be compromised by an advanced threat.

  • Traffic light style indicators provide immediate identification of systems at risk with deep drill down into the device, user, and process responsible.

Combine next-gen firewall capabilities with our enterprise-class web application firewall to protect your critical business applications from hacks and attacks while still enabling authorized access.

  • Next-generation IPS provides advanced protection from hacks and attacks while maintaining top performance.

  • Web Application Firewall integrates seamlessly with your next-gen firewall, combining industrial-strength protection like URL and form hardening with the ease of template-driven policy configuration.

  • Granular, user-based protection with a rich set of configuration options and multiple authentication options, ensuring easy access for those you want and powerful protection from those you don't.

Protect your email from spam, phishing, and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.

  • Full MTA store and forward support enables business continuity, allowing the firewall to store mail when target servers are unavailable.

  • Live anti-spam provides protection from the latest spam campaigns, phishing attacks, and malicious attachments.

  • SPX encryption is unique to Sophos, making it easy to send encrypted email to anyone, even those without any kind of trust infrastructure.

  • DLP that's policy-based can automatically trigger encryption or block/notify based on the presence of sensitive data in emails leaving the organization.

  • Self-serve user portal gives employees direct control over their spam quarantine and block/allow lists, saving you time and effort.

Sophos XG Firewall offers the most advanced high-performance networking technology available.

  • Powerful object-based NAT rules enable multiple ports and services to be forwarded in a single rule with a number of pre-defined cloud service host objects making NAT rules easy and intuitive.

  • Access control criteria is based on user identity, source and destination zone, MAC or IP address, service, etc.

  • Advanced routing uses Static, OSPF, BGP, and RIP with full 802.1Q VLAN support and multicast with support for per-rule routing and policy-based routes based on source, service, or destination.

  • WAN link balancing provides load balancing and high availability with weighting options and fail-over rules.

  • Flexible bridging options allow device ports to be bridged to share a common address space, and fail-open bypass ports allow bridged inline deployments with no disruption.

  • IPv6 Certified support throughout for interfaces, routing, and tunneling, including 6-in-4, 6-to-4, 4-in-6, IPv6 rapid deployment (6rd), and IPv6 through IPSec tunneling.

Flexible and powerful segmentation options via zones and VLANs provide ways to separate levels of trust on your network while enabling added protection against lateral movement between different parts of your network.

  • Zones rise above the traditional interface-based configuration model to provide a more intuitive, powerful, and simple way to secure and segment your network and create policy.

  • Default zones for LAN, WAN, DMZ, LOCAL, VPN, and Wi-Fi make it easy to get up and running quickly and easily with support for custom zones on the LAN or DMZ.

  • Full VLAN support provides powerful segmentation options by trust, traffic type, location, and other criteria across your physical network infrastructure.

  • Zone and VLAN isolation ensures zones are isolated until firewall rules are explicitly created to enable secure exchange of application, user, and network traffic to pass between them.

  • Zone-based policies enable simple but powerful firewall rules that anyone can immediately interpret and understand.

Flexible and powerful but easy-to-use traffic shaping (also known as quality of service or QoS) controls enable configuration by application, category, user, group, or policy rule.

  • Network or user-based traffic shaping prioritizes bandwidth allocation to critical applications and limits bandwidth for non-business applications on any network or user-based policy.

  • Web category traffic shaping prioritizes bandwidth allocation and/or limits based on website category.

  • Network traffic quotas allow unlimited customization for total or individual network traffic quotas.

  • Real-time VoIP optimization ensures real-time traffic for Voice over IP and other communications are given prioritization.

Integrated wireless controllers in XG Firewalls enables easy secure wireless deployments managed from a single console.

  • Plug-and-play deployment enables quick installation and configuration with just a few clicks since the firewall automatically recognizes the Sophos Wireless Access Point as soon as it’s connected.

  • High performance with the latest 802.11ac, Wave 2 wireless standard, and powerful radios, offering maximum coverage and throughput.

  • Flexible configuration with options for isolation, bridging, zones, hotspots, channel width, and multiple SSIDs per radio.

  • Secure encryption with support for all the latest standards including WPA2 personal and enterprise.

Sophos XG Firewall offers among the highest price per protected Mbps of any firewall on the market as proven by NSS Labs recent testing. XG Firewall combines performance-optimized technologies at every point in the firewall processing chain that leverage Intel’s multi-core processing platform.

  • High performance IPS with among the best security effectiveness.

  • High-performance proxy supporting thousands of simultaneous connections enforces web policy with millisecond latency.

  • High-speed interfaces and switches come with plenty of GigE ports on every appliance and optional FlexiPort expansion modules for 10GbE copper or fiber connectivity.

  • High availability with active-active load balancing or active-passive fail-over and WAN link balancing lets you easily double your performance when you need it.

Select from a full range of VPN technologies for secure site-to-site and remote access.

  • Full standards-based VPN support includes IPSec (with IKEv2 support), SSL, PPTP, L2TP, Cisco VPN (iOS), and OpenVPN (iOS and Android).

  • Clientless portal using Sophos' unique encrypted HTML5 self-service portal provides support for RDP, HTTP, HTTPS, SSH, Telnet, and VNC for quick access to essential business applications.

  • RED VPN, a Sophos exclusive, uses an affordable Remote Ethernet Device (RED) at the remote site to easily establish a secure VPN connection.

  • Firewall-to-firewall RED tunnels offer a high-performance VPN alternative to connect your firewalls, exclusive to Sophos.

Unique Sophos Remote Ethernet Devices (SD-RED) make extending your secure network to other locations as easy as plugging in a box.

  • Plug-and-play VPN. Simply enter the SD-RED ID into your firewall and ship it.

  • No technical skills required. As soon as it’s plugged in, the device will automatically establish the VPN connection with the firewall.

  • Traffic routing allows you to direct all network traffic from the remote location back to your firewall for complete protection, or to only route inter-office network traffic via SD-RED.

  • Secure encryption. All traffic between the SD-RED and your firewall is encrypted to provide a secure private connection.

Ensure encrypted traffic is not a blind spot in your network with fully transparent SSL scanning, enforcement, and protocol validation.

  • SSL decryption securely intercepts and decrypts SSL traffic to allow deep scanning for security, compliance, and policy checks with policy-driven opt-outs, allowing privacy for sensitive traffic.

  • SSL inspection ensures enforcement and compliance even without full man-in-the-middle decryption.

  • Certificate validation protects your network from malformed or spoofed certificates.

  • Protocol enforcement for encrypted traffic connections identifies and blocks unwanted traffic trying to bypass filtering or traffic shaping.

Start evolving now.

Start your no-obligation free trial now or contact us for more questions.