Top Recognition from Industry Experts

Unrivaled Security, Simplicity, and Insight

  • Blocks unknown threats with a comprehensive suite of advanced protection including IPS, ATP, Sandboxing, Dual AV, Web and App Control, Anti-phishing, a full-featured Web Application Firewall and more.
  • Automatically responds to incidents by instantly identifying and isolating infected systems until they can be cleaned up.
  • Exposes hidden risks on your network including unknown apps, top risk users, advanced threats, suspicious payloads and much more.

Expose Hidden Risks

Sophos XG Firewall provides unprecedented visibility into your network, users, and applications directly from the all-new control center. You also get rich on-box reporting and the option to add Sophos iView for centralized reporting across multiple firewalls.

Click the items on the control center for more information.

  • Security Heartbeat™

    The Sophos Security Heartbeat widget indicates the health status of all your Sophos Central-managed endpoints. If any systems are running unwanted applications or infected, they will show here as yellow or red.

    Clicking the widget reveals full details on the affected computer, including the user, hostname, IP address, and even the process responsible, enabling you to quickly take action. You can also use Security Heartbeat status in your policies to limit access to network resources for affected systems.

  • System Panel

    The system panel displays the real-time status of system performance, services, connections, and other system parameters. Green indicates everything is fine, orange indicates a warning, and red indicates something needs immediate attention.

    Each item is clickable to reveal additional details and graphs, as well as helpful system and network tools you can use for troubleshooting purposes such as ping, traceroute, packet capture, command-line access, and much more.

  • Traffic Insight

    This provides an overview of traffic processed in the last 24 hours, including web activity, allowed and blocked apps and web categories, as well as network attacks.

    You can quickly determine when your peak traffic periods are and how effective your policies have been at blocking unwanted activity and traffic.

  • Sandstorm and Advanced Threats

    The Sandstorm widget provides an indication of suspect payloads and the sandboxing analysis results. Clicking it provides detailed reporting insights into suspicious file downloads.

    The ATP widget provides an immediate indication of the presence of advanced threats on your network like botnets. Clicking it will reveal helpful details about the infected system, including the hostname, IP address, and source of the malicious traffic.

  • Top Risk Users

    Unique to Sophos, User Threat Quotient (UTQ) is an indication of a user’s risk level based on recent web and advanced threat activity. This widget is green when risk levels are low, and turns red when a threshold of risky activity is detected indicating the number of high-risk users.

    The score is analyzed over a seven day period, and clicking on it will take you directly to the detailed UTQ report.

  • Connections

    The connections widget shows the status of various connected devices and users, including Remote Ethernet Device (RED) VPN connections, pending and active wireless access points, remote SSL VPN connections, and the current live users count.

    Clicking the various components of this widget will take you directly to the respective setup or reporting screen.

  • Messages

    The messages panel displays important system notices, warnings, and alerts with blue, yellow, and red icons respectively. Examples include default password warnings, HTTPS and SSH WAN access warnings, registration notifications, license notifications, and firmware updates.

    Click any message to review the full details and take action.

  • Reports

    This panel displays the top five reports that may have data of interest or require action based on automatic background analysis. Examples include high-risk applications, objectionable websites, web users, intrusion attacks, web server attacks, and more.

    Clicking any of the listed reports will open the full report, or you can choose to download a PDF version.

  • Active Policies

    The Active Policies panel right on the control center indicates exactly how many policies you have of each type, how many are unused, disabled, changed, and recently added.

    Unused policies are a good indication of policies that may benefit from some housekeeping, as they can present potential openings or vulnerabilities in the network that are no longer required.

  • Navigation

    The menu items are logically organized, offering quick access to all areas of the system. In fact, you’re never more than two clicks from anywhere.

    The navigation provides immediate access to monitoring and analysis tools, all protection and policy settings, firewall configuration, and system settings.

  • Synchronized App Control

    This widget displays the number of previously unidentified apps that Sophos Synchronized App Control has discovered on your network including apps that are matched to known apps, new apps, and the total count of apps discovered.

    Click through to the Synchronized App Control screen where you can assign applications to categories and policies to get your network under control.

 

 

Keep Your Network Under Control

Synchronized App Control

Synchronized App Control, an XG Firewall exclusive, provides clarity and control over all the application traffic on your network

You can’t control what you can’t see

On average, 60% of application traffic is going unidentified. Static application signatures don’t work for custom, obscure, evasive, or any apps using generic HTTP or HTTPS.

A breakthrough in network visibility

Synchronized App Control automatically identifies all unknown applications enabling you to easily block the apps you don't want and prioritize the ones you do.

Automatic Incident Response

Sophos XG Firewall is the only network security solution that is able to fully identify the source of an infection on your network and automatically limit access to other network resources in response. This is made possible with our unique Sophos Security Heartbeat™ that shares telemetry and health status between Sophos endpoints and your firewall.

Monitor Network Health

XG Firewall not only monitors host network activity, but also receives health status directly from your endpoints so you have constant visibility into the health of your entire network.

Identify Infected Systems

XG Firewall instantly alerts you to compromised systems on your network with full details including the IP address, the user, and the process, so you're not left digging for information.

Automatically Isolate Infections

XG Firewall uniquely integrates the health of connected hosts into your firewall rules, enabling you to automatically limit access to sensitive network resources from any compromised system until it's cleaned up.

Comprehensive Next-Gen Protection

XG Firewall integrates all the advanced networking, protection, user, and app controls you need to stay secure and compliant.

MANAGEMENT

  • Firewall Management

    XG Firewall provides an elegant and effective web-based management console that offers quick access to all the features you need without unnecessary complexity.

    • Control center provides at-a-glance feeds of system performance, traffic patterns, alerts, and policies.

    • Unified policy model enables convenient management of all your user, network, NAT, and business app rules in one place with snap-in policies for apps, web, QoS, IPS, Security Heartbeat, and routing, which dramatically simplifies enforcement and reduces redundancy, and overall rule count.

    • Policy templates common business applications dramatically streamlines configuration.

    • Role-based admin provides flexible granular access control for different functional areas.

  • Centralized Management

    Sophos Firewall Manager provides centralized management, monitoring, and control of all your XG Firewalls from a single console using a common user-interface that makes it easy to learn and use.

    • Full-featured control and management of all firewall features centrally.

    • Reusable templates makes it easy to apply consistent policy and setup new devices or branch offices.

    • Flexible device grouping by region or model makes it easy to work with just the firewalls you want.

    • Real-time monitoring for at-a-glance status of device health, including unique NOC view with instant drill-down.

    • Role-based admin with change control tracking and audit logging makes it easy to identify past changes and roll back if necessary.

    • Firmware update management enables quick and easy updates to all your firewalls with just a few clicks.

  • Status & Alerts

    The all-new, carefully crafted control center analyzes extensive back-end data sources to surface just the information you need to respond quickly to changes in your network.

    • Instant insights at a glance for all your important system, security and network status indicators from the all-new control center

    • Automated report analysis highlights reports in the control center featuring data of interest or that may need attention, with one-click access to the full report.

    • Quick drill-down interaction with any control center widget to get more detailed information, access relevant tools, or quickly take action.

    • Email notifications are automatically sent for important system status events.

    • SNMP with a custom MIB and support for IPSec VPN tunnels to manage remote office firewall devices.

  • Reporting & Logging

    Take advantage of the XG Firewall’s extensive on-box reporting or utilize Sophos iView for comprehensive, centralized reporting across your all your firewall devices.

    • On-box reporting comes standard with every XG Firewall for all your local firewall reporting needs.

    • Centralized reporting aggregates log data across all your firewall devices (including XG Firewall, UTM 9, and Cyberoam devices) to provide comprehensive consolidated reporting from a single screen.

    • User and app risk analysis reports such as our unique User Threat Quotient or App Risk Score identify top risk users and applications respectively.

    • Live log viewer, accessible from any screen, provides a real-time view into activity in your firewall across all areas of the firewall with powerful search and filter options.

    • Change control and audit logging are provided to ensure compliance.

    • Syslog support enables safe backup, archival, and analysis of system logs.

USER AND APP CONTROL

  • User Identity

    User identity-based policies and unique user risk analysis give you the knowledge and power to regain control of your users before they become a serious threat to your network.

    • User identity powers all firewall polices and reporting, enabling unprecedented next-gen control over applications, web surfing, bandwidth quotas, and other network resources.

    • User Threat Quotient (UTQ) identifies the top risk users on your network based on their recent network behavior.

    • Flexible authentication options including directory services (AD, eDirectory, LDAP), NTLM, RADIUS, TACACS+, RSA, client agents, or captive portal.

    • Two-factor authentication (2FA) one-time password support for access to key system areas, including IPsec and SSL VPN, the user portal, and the web administration console.

  • Application Control

    Complete application visibility and control over all applications on your network with deep-packet scanning technology and Synchronized App Control that can identify all the applications that are currently going unidentified on your network.

    • Visibility and control over thousands of applications via customizable policy templates with granular controls and smart filter lists that enable you to build custom policies based on category, risk, technology, or other characteristics.

    • Synchronized App Control provides a breakthrough in network visibility by identifying all the applications that are unknown, unidentified, or generic on your network enabling you to classify and control them. Prioritize the apps you want and block the ones you don’t.

    • User-based application policies enables custom-tailored application control to be added to any user, group, or network policy with the option to also apply traffic shaping.

    • Traffic shaping (QoS) prioritizes bandwidth allocation to critical applications and limits bandwidth for non-business applications.

    • HTTPS scanning deep scans encrypted application traffic for browsers and related micro-apps to control chat, messaging, posts, file transfers, and other web and social media apps.

  • Web Control

    Full visibility and control over all your web traffic with flexible enforcement tools that work the way you need, with options for user and group enforcement of activity, quotas, schedules, and traffic shaping.

    • Enterprise Secure Web Gateway (SWG) policy model with hierarchical inheritance enables sophisticated group and user-based web filtering policies to be defined quickly and easily, dramatically reducing firewall rule count.

    • Template-driven activity control with predefined workplace and compliance policies utilize over 90 predefined website categories, covering billions of pages maintained by SophosLabs with the option to import custom URL lists.

    • Traffic shaping (QoS) prioritizes bandwidth allocation to critical web applications and limits bandwidth for non-business websites.

    • Comprehensive enforcement monitors HTTPS encrypted traffic, blocks anonymizing proxies, and can enforce Google Apps domains and SafeSearch to ensure your policies are always enforced.

  • Content Control

    Flexible, user-based monitoring and control of keyword content and downloadable content, including files types via FTP, HTTP, or HTTPS.

    • Web keyword monitoring can log and dynamically block content matching uploaded keyword libraries regardless of the site category to help identify problematic or risky behavior related to topics like self-harm, radicalization, bullying, and more.

    • File download filtering templates let you control hundreds of different files, executables, and dynamic content types simply as part of any user or network web control policy.

    • Outbound email DLP that's policy-based can automatically trigger encryption or block/notify based on the presence of sensitive data in emails leaving the organization.

    • Web caching reduces bandwidth consumption by caching supported web content and downloads, including Sophos Endpoint updates.

PROTECTION

  • Firewall and IPS

    Stateful and deep-packet inspection for all network traffic with top-performing IPS and dual-engine AV performance and effectiveness as rated by NSS labs.

    • Advanced next-gen IPS protection provides the ultimate network exploit prevention, protection and performance as proven by NSS Labs recent testing. It supports a uniform signature format backed by SophosLabs.

    • Dual-engine AV scanning offers the option of scanning traffic with the Sophos engine for excellent performance and protection, or adding a second engine scan for even more protection.

    • Perimeter defenses stops attacks on your network, including reconnaissance detection, spoofing, flood protection (DoS, DDoS), and packet-based attacks (ICMP).

    • FastPath packet optimization provides transparent (layer-2), single-scan performance with up to 200% better performance than conventional scanning technology, so IPS won’t slow you down.

    • Country-based policy blocks Geo IP ranges for entire countries or regions.

  • Cloud Sandbox

    Sophos Sandstorm uses next-gen cloud-sandbox technology with Machine Learning, providing your organization an essential layer of payload protection against the latest ransomware and targeted attacks coming in through phishing, spam, or web downloads.

    • Cloud delivery means Sandstorm is fully integrated with your XG Firewall and requires no additional hardware.

    • Identifies suspicious payloads such as PDFs, Office Docs, and executables entering the network via email or the web and sends those to the cloud sandbox for extensive machine learning based analysis and remote execution to convict zero-day payloads before they enter your network.

    • Great value, affording you all the benefits of enterprise-grade protection without the enterprise price tag.

    • Detailed threat reports for every incident so you know exactly what’s going on.

  • Anti-Malware

    Sophos' award-winning, high-performance anti-malware engine is backed by SophosLabs and a 30-year history of protecting enterprises from the latest threats.

    • Advanced malware protection that goes beyond signature-based detection to include advanced, proprietary techniques like code emulation and behavioral analysis to detect obfuscated or polymorphic threats.

    • Live Protection is exclusive to Sophos and closes the gap between regular updates through real-time cloud lookups.

    • Dual-engine scanning offers the option of scanning traffic with the Sophos engine for excellent performance and protection, or adding a second engine scan for even more protection.

    • SophosLabs 24/7 global threat research operation is one of few in the world with the breadth and depth necessary to stay ahead of the latest threats.

  • Web Protection

    Sophos' Web Protection engine is backed by SophosLabs and includes innovative technologies required to identify and block the latest web threats.

    • Advanced Web Protection combines advanced analysis capabilities such as JavaScript emulation, behavioral analysis, and origin reputation to protect against modern, multi-stage web attacks.

    • Pharming protection guards against phishing and pharming attacks by overriding corrupt host file or DNS lookups.

    • HTTPS scanning deep scans encrypted traffic for threats and compliance.

    • SophosLabs, the global, round-the-clock threat research operation, identifies thousands of newly infected websites and instances of web malware, ensuring you have the best malicious site database protecting your network and users.

  • Synchronized Security

    Our revolutionary Security Heartbeat links your Sophos managed endpoints with your firewall to deliver unparalleled protection from advanced threats while significantly reducing the time and complexity of responding to security incidents.

    • Security Heartbeat: XG Firewall monitors the Security Heartbeat status of all your Sophos Endpoints, enabling you to quickly identify compromised systems and automatically limit network access for these systems until they can be cleaned up.

    • Destination Heartbeat Protection, controls access to endpoints and servers based on the status of their Heartbeat – further bolstering protection from potentially compromised systems until they are completely safe.

    • Synchronized App Control a breakthrough in network visiblity, utilizes the Synchronized Security relationship to automatically identify, classify and control unknown applications on your network.

  • Advanced Threat Protection

    XG Firewall delivers advanced threat protection to instantly identify bots and other advanced threats while defending your network from today’s sophisticated attacks.

    • Security Heartbeat links your endpoints and your firewall, combining their intelligence to identify and isolate systems compromised by advanced and previously unknown threats.

    • Multi-layered, call-home protection combines analysis from DNS, IPS, web, and traffic filters to identify and block botnet and command-and-control (C&C) call-home attempts.

    • Intelligent firewall policies account for endpoint behavior to automatically isolate or limit access to infected systems that may be compromised by an advanced threat.

    • Traffic light style indicators provide immediate identification of systems at risk with deep drill down into the device, user, and process responsible.

  • Business Applications

    Combine next-gen firewall capabilities with our enterprise-class web application firewall to protect your critical business applications from hacks and attacks while still enabling authorized access.

    • Next-generation IPS provides advanced protection from hacks and attacks while maintaining top performance.

    • Web Application Firewall integrates seamlessly with your next-gen firewall, combining industrial-strength protection like URL and form hardening with the ease of template-driven policy configuration.

    • Granular, user-based protection with a rich set of configuration options and multiple authentication options, ensuring easy access for those you want and powerful protection from those you don't.

  • Email and Data

    Protect your email from spam, phishing, and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.

    • Full MTA store and forward support enables business continuity, allowing the firewall to store mail when target servers are unavailable.

    • Live anti-spam provides protection from the latest spam campaigns, phishing attacks, and malicious attachments.

    • SPX encryption is unique to Sophos, making it easy to send encrypted email to anyone, even those without any kind of trust infrastructure.

    • DLP that's policy-based can automatically trigger encryption or block/notify based on the presence of sensitive data in emails leaving the organization.

    • Self-serve quarantine gives employees direct control over their spam quarantine, saving you time and effort.

NETWORKING

  • Routing and Bridging

    Sophos XG Firewall offers the most advanced high-performance networking technology available.

    • Powerful object-based NAT rules enable multiple ports and services to be forwarded in a single rule with a number of pre-defined cloud service host objects making NAT rules easy and intuitive.

    • Access control criteria is based on user identity, source and destination zone, MAC or IP address, Service, etc.

    • Advanced routing uses Static, OSPF, BGP, and RIP with full 802.1Q VLAN support and multicast with support for per-rule routing and policy-based routes based on source, service, or destination.

    • WAN link balancing provides load balancing and high availability with weighting options and fail-over rules.

    • Flexible bridging options allow device ports to be bridged to share a common address space, and fail-open bypass ports allow bridged inline deployments with no disruption.

    • IPv6 Certified support throughout for interfaces, routing, and tunneling, including 6-in-4, 6-to-4, 4-in-6, IPv6 rapid deployment (6rd), and IPv6 through IPSec tunneling.

  • Segmentation

    Flexible and powerful segmentation options via zones and VLANs provide ways to separate levels of trust on your network while enabling added protection against lateral movement between different parts of your network. Zones rise above the traditional interface-based configuration model to provide a more intuitive, powerful, and simple way to secure and segment your network and create policy.

    • Zones rise above the traditional interface-based configuration model to provide a more intuitive, powerful, and simple way to secure and segment your network and create policy.

    • Default zones for LAN, WAN, DMZ, LOCAL, VPN, and Wi-Fi make it easy to get up and running quickly and easily with support for custom zones on the LAN or DMZ.

    • Full VLAN support provides powerful segmentation options by trust, traffic type, location, and other criteria across your physical network infrastructure.

    • Zone and VLAN isolation ensures zones are isolated until firewall rules are explicitly created to enable secure exchange of application, user, and network traffic to pass between them.

    • Zone-based policies enable simple but powerful firewall rules that anyone can immediately interpret and understand.

  • Traffic Shaping

    Flexible and powerful but easy-to-use traffic shaping (also known as quality of service or QoS) controls enable configuration by application, category, user, group, or policy rule.

    • Network or user-based traffic shaping prioritizes bandwidth allocation to critical applications and limits bandwidth for non-business applications on any network or user-based policy.

    • Web category traffic shaping prioritizes bandwidth allocation and/or limits based on website category.

    • Network traffic quotas allow unlimited customization for total or individual network traffic quotas.

    • Real-time VoIP optimization ensures real-time traffic for Voice over IP and other communications are given prioritization.

  • Wireless Controller

    Integrated wireless controllers in XG Firewalls enables easy secure wireless deployments managed from a single console.

    • Plug-and-play deployment enables quick installation and configuration with just a few clicks since the firewall automatically recognizes the Sophos Wireless Access Point as soon as it’s connected.

    • High performance with the latest 802.11ac and powerful radios, offering maximum coverage and throughput.

    • Flexible configuration with options for isolation, bridging, zones, hotspots, and multiple SSIDs per radio.

    • Secure encryption with support for all the latest standards including WPA2 personal and enterprise.

  • Performance

    Sophos XG Firewall offers among the highest price per protected Mbps of any firewall on the market as proven by NSS Labs recent testing. XG Firewall combines performance-optimized technologies at every point in the firewall processing chain that leverage Intel’s multi-core processing platform.

    • FastPath packet optimization improves firewall scanning performance by 200% or more by automatically putting secure traffic on the fast path after the initial content is identified, scanned, and determined to be safe and compliant.

    • High performance IPS with among the best security effectiveness.

    • High-performance proxy supporting thousands of simultaneous connections enforces web policy with millisecond latency.

    • High-speed interfaces and switches come with plenty of GigE ports on every appliance and optional FlexiPort expansion modules for 10GbE copper or fiber connectivity.

    • High availability with active-active load balancing or active-passive fail-over and WAN link balancing lets you easily double your performance when you need it.

  • VPN

    Select from a full range of VPN technologies for secure site-to-site and remote access.

    • Full standards-based VPN support includes IPSec (with IKEv2 support), SSL, PPTP, L2TP, Cisco VPN (iOS), and OpenVPN (iOS and Android).

    • Clientless portal using Sophos' unique encrypted HTML5 self-service portal provides support for RDP, HTTP, HTTPS, SSH, Telnet, and VNC for quick access to essential business applications.

    • RED VPN, a Sophos exclusive, uses an affordable Remote Ethernet Device (RED) at the remote site to easily establish a secure VPN connection.

    • Firewall-to-firewall RED tunnels offer a high-performance VPN alternative to connect your firewalls, exclusive to Sophos.

  • RED VPN

    Unique Sophos Remote Ethernet Devices (RED) make extending your secure network to other locations as easy as plugging in a box.

    • Plug-and-play VPN. Simply enter the RED ID into your firewall and ship it.

    • No technical skills required. As soon as it’s plugged in, the device will automatically establish the VPN connection with the firewall.

    • Traffic routing allows you to direct all network traffic from the remote location back to your firewall for complete protection, or to only route inter-office network traffic via RED.

    • Secure encryption. All traffic between the RED and your firewall is encrypted to provide a secure private connection

  • Encrypted Traffic

    Ensure encrypted traffic is not a blind spot in your network with fully transparent SSL scanning, enforcement, and protocol validation.

    • SSL decryption securely intercepts and decrypts SSL traffic to allow deep scanning for security, compliance, and policy checks with policy-driven opt-outs, allowing privacy for sensitive traffic.

    • SSL inspection ensures enforcement and compliance even without full man-in-the-middle decryption.

    • Certificate validation protects your network from malformed or spoofed certificates.

    • Protocol enforcement for encrypted traffic connections identifies and blocks unwanted traffic trying to bypass filtering or traffic shaping.

Close
MANAGEMENT
  • Firewall Management

    XG Firewall provides an elegant and effective web-based management console that offers quick access to all the features you need without unnecessary complexity.

    • Control center provides at-a-glance feeds of system performance, traffic patterns, alerts, and policies.

    • Unified policy model enables convenient management of all your user, network, NAT, and business app rules in one place with snap-in policies for apps, web, QoS, IPS, Security Heartbeat, and routing, which dramatically simplifies enforcement and reduces redundancy, and overall rule count.

    • Policy templates common business applications dramatically streamlines configuration.

    • Role-based admin provides flexible granular access control for different functional areas.

  • Centralized Management

    Sophos Firewall Manager provides centralized management, monitoring, and control of all your XG Firewalls from a single console using a common user-interface that makes it easy to learn and use.

    • Full-featured control and management of all firewall features centrally.

    • Reusable templates makes it easy to apply consistent policy and setup new devices or branch offices.

    • Flexible device grouping by region or model makes it easy to work with just the firewalls you want.

    • Real-time monitoring for at-a-glance status of device health, including unique NOC view with instant drill-down.

    • Role-based admin with change control tracking and audit logging makes it easy to identify past changes and roll back if necessary.

    • Firmware update management enables quick and easy updates to all your firewalls with just a few clicks.

  • Status and Alerts

    The all-new, carefully crafted control center analyzes extensive back-end data sources to surface just the information you need to respond quickly to changes in your network.

    • Instant insights at a glance for all your important system, security and network status indicators from the all-new control center

    • Automated report analysis highlights reports in the control center featuring data of interest or that may need attention, with one-click access to the full report.

    • Quick drill-down interaction with any control center widget to get more detailed information, access relevant tools, or quickly take action.

    • Email notifications are automatically sent for important system status events.

    • SNMP with a custom MIB and support for IPSec VPN tunnels to manage remote office firewall devices.

  • Reporting and Logging

    Take advantage of the XG Firewall’s extensive on-box reporting or utilize Sophos iView for comprehensive, centralized reporting across your all your firewall devices.

    • On-box reporting comes standard with every XG Firewall for all your local firewall reporting needs.

    • Centralized reporting aggregates log data across all your firewall devices (including XG Firewall, UTM 9, and Cyberoam devices) to provide comprehensive consolidated reporting from a single screen.

    • User and app risk analysis reports such as our unique User Threat Quotient or App Risk Score identify top risk users and applications respectively.

    • Live log viewer, accessible from any screen, provides a real-time view into activity in your firewall across all areas of the firewall with powerful search and filter options.

    • Change control and audit logging are provided to ensure compliance.

    • Syslog support enables safe backup, archival, and analysis of system logs.

 
Close
USER AND APP CONTROL
  • User Identity

    User identity-based policies and unique user risk analysis give you the knowledge and power to regain control of your users before they become a serious threat to your network.

    • User identity powers all firewall polices and reporting, enabling unprecedented next-gen control over applications, web surfing, bandwidth quotas, and other network resources.

    • User Threat Quotient (UTQ) identifies the top risk users on your network based on their recent network behavior.

    • Flexible authentication options including directory services (AD, eDirectory, LDAP), NTLM, RADIUS, TACACS+, RSA, client agents, or captive portal.

    • Two-factor authentication (2FA) one-time password support for access to key system areas, including IPsec and SSL VPN, the user portal, and the web administration console.

  • Application Control

    Complete application visibility and control over all applications on your network with deep-packet scanning technology and Synchronized App Control that can identify all the applications that are currently going unidentified on your network.

    • Visibility and control over thousands of applications via customizable policy templates with granular controls and smart filter lists that enable you to build custom policies based on category, risk, technology, or other characteristics.

    • Synchronized App Control provides a breakthrough in network visibility by identifying all the applications that are unknown, unidentified, or generic on your network enabling you to classify and control them. Prioritize the apps you want and block the ones you don’t.

    • User-based application policies enables custom-tailored application control to be added to any user, group, or network policy with the option to also apply traffic shaping.

    • Traffic shaping (QoS) prioritizes bandwidth allocation to critical applications and limits bandwidth for non-business applications.

    • HTTPS scanning deep scans encrypted application traffic for browsers and related micro-apps to control chat, messaging, posts, file transfers, and other web and social media apps.

  • Web Control

    Full visibility and control over all your web traffic with flexible enforcement tools that work the way you need, with options for user and group enforcement of activity, quotas, schedules, and traffic shaping.

    • Enterprise Secure Web Gateway (SWG) policy model with hierarchical inheritance enables sophisticated group and user-based web filtering policies to be defined quickly and easily, dramatically reducing firewall rule count.

    • Template-driven activity control with predefined workplace and compliance policies utilize over 90 predefined website categories, covering billions of pages maintained by SophosLabs with the option to import custom URL lists.

    • Traffic shaping (QoS) prioritizes bandwidth allocation to critical web applications and limits bandwidth for non-business websites.

    • Comprehensive enforcement monitors HTTPS encrypted traffic, blocks anonymizing proxies, and can enforce Google Apps domains and SafeSearch to ensure your policies are always enforced.

  • Content Control

    Flexible, user-based monitoring and control of keyword content and downloadable content, including files types via FTP, HTTP, or HTTPS.

    • Web keyword monitoring can log and dynamically block content matching uploaded keyword libraries regardless of the site category to help identify problematic or risky behavior related to topics like self-harm, radicalization, bullying, and more.

    • File download filtering templates let you control hundreds of different files, executables, and dynamic content types simply as part of any user or network web control policy.

    • Outbound email DLP that's policy-based can automatically trigger encryption or block/notify based on the presence of sensitive data in emails leaving the organization.

    • Web caching reduces bandwidth consumption by caching supported web content and downloads, including Sophos Endpoint updates.

 
Close
PROTECTION
 
  • Firewall

    Stateful and deep-packet inspection for all network traffic with top-performing IPS and dual-engine AV performance and effectiveness as rated by NSS labs.

    • Advanced next-gen IPS protection provides the ultimate network exploit prevention, protection and performance as proven by NSS Labs recent testing. It supports a uniform signature format backed by SophosLabs.

    • Dual-engine AV scanning offers the option of scanning traffic with the Sophos engine for excellent performance and protection, or adding a second engine scan for even more protection.

    • Perimeter defenses stops attacks on your network, including reconnaissance detection, spoofing, flood protection (DoS, DDoS), and packet-based attacks (ICMP).

    • FastPath packet optimization provides transparent (layer-2), single-scan performance with up to 200% better performance than conventional scanning technology, so IPS won’t slow you down.

    • Country-based policy blocks Geo IP ranges for entire countries or regions.

  • Sophos Sandstorm Cloud Sandbox

    Sophos Sandstorm uses next-gen cloud-sandbox technology with Machine Learning, providing your organization an essential layer of payload protection against the latest ransomware and targeted attacks coming in through phishing, spam, or web downloads.

    • Cloud delivery means Sandstorm is fully integrated with your XG Firewall and requires no additional hardware.

    • Identifies suspicious payloads such as PDFs, Office Docs, and executables entering the network via email or the web and sends those to the cloud sandbox for extensive machine learning based analysis and remote execution to convict zero-day payloads before they enter your network.

    • Great value, affording you all the benefits of enterprise-grade protection without the enterprise price tag.

    • Detailed threat reports for every incident so you know exactly what’s going on.

  • Anti-malware

    Sophos' award-winning, high-performance anti-malware engine is backed by SophosLabs and a 30-year history of protecting enterprises from the latest threats.

    • Advanced malware protection that goes beyond signature-based detection to include advanced, proprietary techniques like code emulation and behavioral analysis to detect obfuscated or polymorphic threats.

    • Live Protection is exclusive to Sophos and closes the gap between regular updates through real-time cloud lookups.

    • Dual-engine scanning offers the option of scanning traffic with the Sophos engine for excellent performance and protection, or adding a second engine scan for even more protection.

    • SophosLabs 24/7 global threat research operation is one of few in the world with the breadth and depth necessary to stay ahead of the latest threats.

  • Web Protection

    Sophos' Web Protection engine is backed by SophosLabs and includes innovative technologies required to identify and block the latest web threats.

    • Advanced Web Protection combines advanced analysis capabilities such as JavaScript emulation, behavioral analysis, and origin reputation to protect against modern, multi-stage web attacks.

    • Pharming protection guards against phishing and pharming attacks by overriding corrupt host file or DNS lookups.

    • HTTPS scanning deep scans encrypted traffic for threats and compliance.

    • SophosLabs, the global, round-the-clock threat research operation, identifies thousands of newly infected websites and instances of web malware, ensuring you have the best malicious site database protecting your network and users.

  • Synchronized Security

    Our revolutionary Security Heartbeat links your Sophos managed endpoints with your firewall to deliver unparalleled protection from advanced threats while significantly reducing the time and complexity of responding to security incidents.

    • Security Heartbeat: XG Firewall monitors the Security Heartbeat status of all your Sophos Endpoints, enabling you to quickly identify compromised systems and automatically limit network access for these systems until they can be cleaned up.

    • Destination Heartbeat Protection, controls access to endpoints and servers based on the status of their Heartbeat – further bolstering protection from potentially compromised systems until they are completely safe.

    • Synchronized App Control a breakthrough in network visiblity, utilizes the Synchronized Security relationship to automatically identify, classify and control unknown applications on your network.

  • Advanced Threat Protection

    XG Firewall delivers advanced threat protection to instantly identify bots and other advanced threats while defending your network from today’s sophisticated attacks.

    • Security Heartbeat links your endpoints and your firewall, combining their intelligence to identify and isolate systems compromised by advanced and previously unknown threats.

    • Multi-layered, call-home protection combines analysis from DNS, IPS, web, and traffic filters to identify and block botnet and command-and-control (C&C) call-home attempts.

    • Intelligent firewall policies account for endpoint behavior to automatically isolate or limit access to infected systems that may be compromised by an advanced threat.

    • Traffic light style indicators provide immediate identification of systems at risk with deep drill down into the device, user, and process responsible.

  • Business Applications

    Combine next-gen firewall capabilities with our enterprise-class web application firewall to protect your critical business applications from hacks and attacks while still enabling authorized access.

    • Next-generation IPS provides advanced protection from hacks and attacks while maintaining top performance.

    • Web Application Firewall integrates seamlessly with your next-gen firewall, combining industrial-strength protection like URL and form hardening with the ease of template-driven policy configuration.

    • Granular, user-based protection with a rich set of configuration options and multiple authentication options, ensuring easy access for those you want and powerful protection from those you don't.

  • Email and Data

    Protect your email from spam, phishing, and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.

    • Full MTA store and forward support enables business continuity, allowing the firewall to store mail when target servers are unavailable.

    • Live anti-spam provides protection from the latest spam campaigns, phishing attacks, and malicious attachments.

    • SPX encryption is unique to Sophos, making it easy to send encrypted email to anyone, even those without any kind of trust infrastructure.

    • DLP that's policy-based can automatically trigger encryption or block/notify based on the presence of sensitive data in emails leaving the organization.

    • Self-serve quarantine gives employees direct control over their spam quarantine, saving you time and effort.

 
Close
NETWORKING
 
  • Routing and Bridging

    Sophos XG Firewall offers the most advanced high-performance networking technology available.

    • Powerful object-based NAT rules enable multiple ports and services to be forwarded in a single rule with a number of pre-defined cloud service host objects making NAT rules easy and intuitive.

    • Access control criteria is based on user identity, source and destination zone, MAC or IP address, Service, etc.

    • Advanced routing uses Static, OSPF, BGP, and RIP with full 802.1Q VLAN support and multicast with support for per-rule routing and policy-based routes based on source, service, or destination.

    • WAN link balancing provides load balancing and high availability with weighting options and fail-over rules.

    • Flexible bridging options allow device ports to be bridged to share a common address space, and fail-open bypass ports allow bridged inline deployments with no disruption.

    • IPv6 Certified support throughout for interfaces, routing, and tunneling, including 6-in-4, 6-to-4, 4-in-6, IPv6 rapid deployment (6rd), and IPv6 through IPSec tunneling.

  • Segmentation

    Flexible and powerful segmentation options via zones and VLANs provide ways to separate levels of trust on your network while enabling added protection against lateral movement between different parts of your network. Zones rise above the traditional interface-based configuration model to provide a more intuitive, powerful, and simple way to secure and segment your network and create policy.

    • Zones rise above the traditional interface-based configuration model to provide a more intuitive, powerful, and simple way to secure and segment your network and create policy.

    • Default zones for LAN, WAN, DMZ, LOCAL, VPN, and Wi-Fi make it easy to get up and running quickly and easily with support for custom zones on the LAN or DMZ.

    • Full VLAN support provides powerful segmentation options by trust, traffic type, location, and other criteria across your physical network infrastructure.

    • Zone and VLAN isolation ensures zones are isolated until firewall rules are explicitly created to enable secure exchange of application, user, and network traffic to pass between them.

    • Zone-based policies enable simple but powerful firewall rules that anyone can immediately interpret and understand.

  • Traffic Shaping (QoS)

    Flexible and powerful but easy-to-use traffic shaping (also known as quality of service or QoS) controls enable configuration by application, category, user, group, or policy rule.

    • Network or user-based traffic shaping prioritizes bandwidth allocation to critical applications and limits bandwidth for non-business applications on any network or user-based policy.

    • Web category traffic shaping prioritizes bandwidth allocation and/or limits based on website category.

    • Network traffic quotas allow unlimited customization for total or individual network traffic quotas.

    • Real-time VoIP optimization ensures real-time traffic for Voice over IP and other communications are given prioritization.

  • Wireless Controller

    Integrated wireless controllers in XG Firewalls enables easy secure wireless deployments managed from a single console.

    • Plug-and-play deployment enables quick installation and configuration with just a few clicks since the firewall automatically recognizes the Sophos Wireless Access Point as soon as it’s connected.

    • High performance with the latest 802.11ac and powerful radios, offering maximum coverage and throughput.

    • Flexible configuration with options for isolation, bridging, zones, hotspots, and multiple SSIDs per radio.

    • Secure encryption with support for all the latest standards including WPA2 personal and enterprise.

  • Performance

    Sophos XG Firewall offers among the highest price per protected Mbps of any firewall on the market as proven by NSS Labs recent testing. XG Firewall combines performance-optimized technologies at every point in the firewall processing chain that leverage Intel’s multi-core processing platform.

    • FastPath packet optimization improves firewall scanning performance by 200% or more by automatically putting secure traffic on the fast path after the initial content is identified, scanned, and determined to be safe and compliant.

    • High performance IPS with among the best security effectiveness.

    • High-performance proxy supporting thousands of simultaneous connections enforces web policy with millisecond latency.

    • High-speed interfaces and switches come with plenty of GigE ports on every appliance and optional FlexiPort expansion modules for 10GbE copper or fiber connectivity.

    • High availability with active-active load balancing or active-passive fail-over and WAN link balancing lets you easily double your performance when you need it.

  • VPN

    Select from a full range of VPN technologies for secure site-to-site and remote access.

    • Full standards-based VPN support includes IPSec (with IKEv2 support), SSL, PPTP, L2TP, Cisco VPN (iOS), and OpenVPN (iOS and Android).

    • Clientless portal using Sophos' unique encrypted HTML5 self-service portal provides support for RDP, HTTP, HTTPS, SSH, Telnet, and VNC for quick access to essential business applications.

    • RED VPN, a Sophos exclusive, uses an affordable Remote Ethernet Device (RED) at the remote site to easily establish a secure VPN connection.

    • Firewall-to-firewall RED tunnels offer a high-performance VPN alternative to connect your firewalls, exclusive to Sophos.

  • RED VPN

    Unique Sophos Remote Ethernet Devices (RED) make extending your secure network to other locations as easy as plugging in a box.

    • Plug-and-play VPN. Simply enter the RED ID into your firewall and ship it.

    • No technical skills required. As soon as it’s plugged in, the device will automatically establish the VPN connection with the firewall.

    • Traffic routing allows you to direct all network traffic from the remote location back to your firewall for complete protection, or to only route inter-office network traffic via RED.

    • Secure encryption. All traffic between the RED and your firewall is encrypted to provide a secure private connection

  • Encrypted Traffic

    Ensure encrypted traffic is not a blind spot in your network with fully transparent SSL scanning, enforcement, and protocol validation.

    • SSL decryption securely intercepts and decrypts SSL traffic to allow deep scanning for security, compliance, and policy checks with policy-driven opt-outs, allowing privacy for sensitive traffic.

    • SSL inspection ensures enforcement and compliance even without full man-in-the-middle decryption.

    • Certificate validation protects your network from malformed or spoofed certificates.

    • Protocol enforcement for encrypted traffic connections identifies and blocks unwanted traffic trying to bypass filtering or traffic shaping.

 

A Firewall That Thinks Like You

So you don’t need to think like a firewall.

We’ve rethought the way policies are managed. Sophos XG offers an all-new unified policy model that enables you to see and manage all your user, application and network policies in a single place.

Most firewall products will have you setting up and managing security across multiple modules or screens. Not Sophos. We provide a powerful unified security model that allows you to easily establish and manage your security posture in one place.

Powerful Management and Scalability

Sophos XG Firewall provides unprecedented visibility into your network, users, and applications right from the all-new control center. You also get rich on-box reporting and the option to add Sophos iView for centralized reporting across multiple Firewalls.

Sophos Firewall Manager Centralized Management

Use Sophos Firewall Manager to monitor, configure, and administer all your firewalls conveniently from a single console.

Sophos iView Centralized Reporting

Provides full visibility across your entire estate of firewalls with consolidated reporting and off-box storage management for important log data.

Clustering and Redundancy

Active-active clustering and active-passive failover provide scalability and business continuity.

Flexible Deployment Options

Choose from a variety of different hardware appliance models, virtual environments, or even deploy it on your Intel server hardware platform of choice.

What are you waiting for?

For any additional questions visit our How to Buy page or give one of our Sales Agents a call.