SlideShare a Scribd company logo
1 of 2
Download to read offline
D A T A S H E E T
Security Health Check Plus
For Sophos Products
Sophos Endpoint – Email – Web – Encryption – NSG/UTM – Mobile Control
WHAT IS A FOURSYS
SECURITY
HEALTH CHECK?
A Foursys Security Health Check is a
detailed assessment of the Sophos
product used on the network. How it is
currently configured and how it could be
configured to optimise network security
with best practice recommendations; all
delivered using the experience of our
Sophos trained Security Consultants.
Time permitting, Foursys Security
Consultants will also assist with the
implementation of these recommendations
(including full product upgrades, if that
forms part of the recommendation), while
ensuring customer involvement throughout
the whole process.
Foursys will provide a detailed site visit
report following the Security Health Check
service, with an analysis of the present
situation, work undertaken and prioritised
recommendations.
All work is backed by our Professional
Services Guarantee (see over).
WHAT IS SECURITY
HEALTH CHECK PLUS?
Foursys will also provide priority technical
support for Sophos Endpoint (and Email
if needed) including Remote Support
using Webex when needed. Up to 12
support tickets are included per year at
no extra charge within Security Health
Check Plus.
WHY SHOULD YOU
HAVE A FOURSYS
SECURITY HEALTH
CHECK?
Because Anti-Virus is not enough to
prevent malware infection.
Today’s threats can spread through open
shares, unpatched workstations and
removable media. That means a Client
Firewall, Device Control and Application
Control are required to prevent modern
malware threats spreading through a
network. Some virus infections are not
stopped or even contained by an Anti-Virus
product alone.
Sophos produces an Endpoint Protection
Solution to protect against these very
threats and Foursys has the expertise to
help an organisation implement these
controls quickly and easily.
Below are some of the security and data
protection capabilities that can be
deployed either during or following a
Health Check. Note that some facilities are
not included in all Endpoint licences.
Contact Foursys if you are not sure or to
discuss an upgrade.
• HIPS – Updated pre-execution analysis
prevents files that have suspicious
behavioural characteristics from running.
Optionally enabled cloud-based lookups
further enhance accuracy and
detection rates.
• Application Control – Block
unauthorised applications from executing
on the network. Prevent P2P applications
downloading malware or Instant
Messaging bypassing email controls. All
application controls can be configured in
an initial monitor only mode.
• Device Control – Take control of
Removable media like USB sticks and
CDs. Prevent malware from reaching
desktops and data loss leaving them.
Monitor devices attached to any Sophos
protected desktop, then lock down their
use with flexible policies that can give
complete control (even down to the
serial number of the device attached).
• Client Firewall – Malware can spread
through network shares exploiting
weaknesses in the client configuration.
The Sophos Client Firewall gives control
over network shares and network
Tel: 01223 810 910
Fax: 01223 810 912
Email: enquiries@foursys.co.uk
Foursys Ltd, 2 Stow Court, Stow Road,
Quy, Cambridge CB25 9AS
© Foursys Limited 2011. All rights reserved.
www.foursys.co.uk
D A T A S H E E T
Security Health Check Plus For Sophos Products
programs/ports, allowing access to
required resources whilst securing
endpoints from attack.
• Web Browsing Security – Help
prevent users downloading viruses from
known malware sites by utilising Sophos
Live Protection which is now standard
within Endpoint. Additional web security
including policy control and reporting is
available using an optional Endpoint Web
Filter or the full Web Protection Licence,
and a virtual or physical appliance.
• Data Leakage – Over 50 content lists of
data types such as credit card numbers
are available to monitor and if you wish,
control data leaving your organisation
from the desktop through email, web, IM,
removable media etc). Simple but
effective data leakage and control.
• Exchange server – Endpoint licences
now include Sophos PureMessage for
Exchange to protect email servers from
malware and undesirable content.
• Full Disk Encryption – Protect data on
laptops or desktops with an easy to use
full disk encryption product.
• Tamper Protection – Prevent Endpoint
removal or configuration change through
password protected policies.
• Sophos Patch – Now included in
Endpoint this provides security
oriented patch assessment and in a
later release patch remediation.
Microsoft, Adobe and 13 other vendors
patches are prioritised based on security
risk with all management and reporting
available under the Sophos
Endpoint console.
You may want to use just some of these
facilities, but advice on which is most
suitable and how they could be
implemented will be a vital factor in
improving your security using
Foursys expertise.
WHY FOURSYS?
Foursys has over 900 Sophos customers
with over 1.3million licensed users, and has
been recognised as the top Sophos UK
partner for the last 9 years. All Foursys
services are covered by our “Professional
Services Guarantee” of complete
satisfaction with our work.
WHAT SECURITY
HEALTH CHECKS
ARE AVAILABLE?
• Sophos Endpoint - the most widely
used Health Check Service detailed here.
• Sophos Email/Web - An add-on to
the Endpoint Health Check for those
with Sophos PureMessage, Sophos
Email or Web.
• Sophos Encryption - Including Disk
Encryption, Removable Media and other
Encryption modules.
• Websense Web & Email Security –
Recommendations around deployment,
configuration, patching, alerting or
upgrading of Websense products in line
with security best practice.
All Security Health Checks can be ordered
as an annual service from 1 up to 5 years
so you can fix the costs of a Foursys
Health Check at current prices.
One day onsite (or longer if more products) 
Clear written report with prioritised recommendations 
Initial scoping and overview of how Sophos product is installed at
customer site(s)

Check status of server configuration (and client if applicable) 
Review version level, check rules/policies against best practice and directory
integration and discuss recommendations with customer

Priority Technical Support (9-5, Monday to Friday) – 10 tickets included per year 
Remote Technical Support included as well as Telephone/Email Support 
*Upgrade server (and client) to latest version 
*Investigate customer specific issues 
*Knowledge transfer on new features to enable their continued use 
*Note: depending on size and complexity of site this work may not be
completed on the day or require additional day(s) to be implemented 
by the customer and/or Foursys
Foursys Security Health Check Sophos
Endpoint– what is included
Foursys Professional
Services Guarantee
If you are not satisfied, or if
circumstances outside our control
prevent the services work being
completed, then a Foursys engineer
will return at no extra charge to
complete the work required or the
cost of the work will be refunded.
Foursys professional services and
training courses are provided by
certified engineers with practical
experience in the products involved.

More Related Content

What's hot

5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurityehsangha
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityF-Secure Corporation
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4MLG College of Learning, Inc
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 

What's hot (20)

5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
P3 m2
P3 m2P3 m2
P3 m2
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Idps technology starter v2.0
Idps technology starter v2.0Idps technology starter v2.0
Idps technology starter v2.0
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
 

Similar to Sophos products - Health CheckPlus

An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance softwarepftecsoft
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security EngineerMark Long
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?Mark Stokes
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneerMark Long
 
Job description of information officer
Job description of information officerJob description of information officer
Job description of information officerAli Khan
 
Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-WhitneyJohn Whitney
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139evaleng2
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 

Similar to Sophos products - Health CheckPlus (20)

APMS-datasheet
APMS-datasheetAPMS-datasheet
APMS-datasheet
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Network security
Network security Network security
Network security
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Sophos 2010
Sophos 2010 Sophos 2010
Sophos 2010
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneer
 
Job description of information officer
Job description of information officerJob description of information officer
Job description of information officer
 
Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-Whitney
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Sophos products - Health CheckPlus

  • 1. D A T A S H E E T Security Health Check Plus For Sophos Products Sophos Endpoint – Email – Web – Encryption – NSG/UTM – Mobile Control WHAT IS A FOURSYS SECURITY HEALTH CHECK? A Foursys Security Health Check is a detailed assessment of the Sophos product used on the network. How it is currently configured and how it could be configured to optimise network security with best practice recommendations; all delivered using the experience of our Sophos trained Security Consultants. Time permitting, Foursys Security Consultants will also assist with the implementation of these recommendations (including full product upgrades, if that forms part of the recommendation), while ensuring customer involvement throughout the whole process. Foursys will provide a detailed site visit report following the Security Health Check service, with an analysis of the present situation, work undertaken and prioritised recommendations. All work is backed by our Professional Services Guarantee (see over). WHAT IS SECURITY HEALTH CHECK PLUS? Foursys will also provide priority technical support for Sophos Endpoint (and Email if needed) including Remote Support using Webex when needed. Up to 12 support tickets are included per year at no extra charge within Security Health Check Plus. WHY SHOULD YOU HAVE A FOURSYS SECURITY HEALTH CHECK? Because Anti-Virus is not enough to prevent malware infection. Today’s threats can spread through open shares, unpatched workstations and removable media. That means a Client Firewall, Device Control and Application Control are required to prevent modern malware threats spreading through a network. Some virus infections are not stopped or even contained by an Anti-Virus product alone. Sophos produces an Endpoint Protection Solution to protect against these very threats and Foursys has the expertise to help an organisation implement these controls quickly and easily. Below are some of the security and data protection capabilities that can be deployed either during or following a Health Check. Note that some facilities are not included in all Endpoint licences. Contact Foursys if you are not sure or to discuss an upgrade. • HIPS – Updated pre-execution analysis prevents files that have suspicious behavioural characteristics from running. Optionally enabled cloud-based lookups further enhance accuracy and detection rates. • Application Control – Block unauthorised applications from executing on the network. Prevent P2P applications downloading malware or Instant Messaging bypassing email controls. All application controls can be configured in an initial monitor only mode. • Device Control – Take control of Removable media like USB sticks and CDs. Prevent malware from reaching desktops and data loss leaving them. Monitor devices attached to any Sophos protected desktop, then lock down their use with flexible policies that can give complete control (even down to the serial number of the device attached). • Client Firewall – Malware can spread through network shares exploiting weaknesses in the client configuration. The Sophos Client Firewall gives control over network shares and network
  • 2. Tel: 01223 810 910 Fax: 01223 810 912 Email: enquiries@foursys.co.uk Foursys Ltd, 2 Stow Court, Stow Road, Quy, Cambridge CB25 9AS © Foursys Limited 2011. All rights reserved. www.foursys.co.uk D A T A S H E E T Security Health Check Plus For Sophos Products programs/ports, allowing access to required resources whilst securing endpoints from attack. • Web Browsing Security – Help prevent users downloading viruses from known malware sites by utilising Sophos Live Protection which is now standard within Endpoint. Additional web security including policy control and reporting is available using an optional Endpoint Web Filter or the full Web Protection Licence, and a virtual or physical appliance. • Data Leakage – Over 50 content lists of data types such as credit card numbers are available to monitor and if you wish, control data leaving your organisation from the desktop through email, web, IM, removable media etc). Simple but effective data leakage and control. • Exchange server – Endpoint licences now include Sophos PureMessage for Exchange to protect email servers from malware and undesirable content. • Full Disk Encryption – Protect data on laptops or desktops with an easy to use full disk encryption product. • Tamper Protection – Prevent Endpoint removal or configuration change through password protected policies. • Sophos Patch – Now included in Endpoint this provides security oriented patch assessment and in a later release patch remediation. Microsoft, Adobe and 13 other vendors patches are prioritised based on security risk with all management and reporting available under the Sophos Endpoint console. You may want to use just some of these facilities, but advice on which is most suitable and how they could be implemented will be a vital factor in improving your security using Foursys expertise. WHY FOURSYS? Foursys has over 900 Sophos customers with over 1.3million licensed users, and has been recognised as the top Sophos UK partner for the last 9 years. All Foursys services are covered by our “Professional Services Guarantee” of complete satisfaction with our work. WHAT SECURITY HEALTH CHECKS ARE AVAILABLE? • Sophos Endpoint - the most widely used Health Check Service detailed here. • Sophos Email/Web - An add-on to the Endpoint Health Check for those with Sophos PureMessage, Sophos Email or Web. • Sophos Encryption - Including Disk Encryption, Removable Media and other Encryption modules. • Websense Web & Email Security – Recommendations around deployment, configuration, patching, alerting or upgrading of Websense products in line with security best practice. All Security Health Checks can be ordered as an annual service from 1 up to 5 years so you can fix the costs of a Foursys Health Check at current prices. One day onsite (or longer if more products) Clear written report with prioritised recommendations Initial scoping and overview of how Sophos product is installed at customer site(s) Check status of server configuration (and client if applicable) Review version level, check rules/policies against best practice and directory integration and discuss recommendations with customer Priority Technical Support (9-5, Monday to Friday) – 10 tickets included per year Remote Technical Support included as well as Telephone/Email Support *Upgrade server (and client) to latest version *Investigate customer specific issues *Knowledge transfer on new features to enable their continued use *Note: depending on size and complexity of site this work may not be completed on the day or require additional day(s) to be implemented by the customer and/or Foursys Foursys Security Health Check Sophos Endpoint– what is included Foursys Professional Services Guarantee If you are not satisfied, or if circumstances outside our control prevent the services work being completed, then a Foursys engineer will return at no extra charge to complete the work required or the cost of the work will be refunded. Foursys professional services and training courses are provided by certified engineers with practical experience in the products involved.