16
Belsoft Infortix AG Hauptsitz Zweigstelle SG Zweigstelle SZ www.belsoft-infortix.ch Russenweg 26 CH-8008 Zürich T +41 44 388 13 31 Espenstrasse 139 Eichenstrasse 2 CH-9443 Widnau CH-8808 Pfäffikon T +41 71 727 75 75 T +41 55 410 55 50 Behind the Scenes - Sophos Copernicus Sophos Vorstellung

Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

Belsoft Infortix AG Hauptsitz Zweigstelle SG Zweigstelle SZ

www.belsoft-infortix.ch Russenweg 26

CH-8008 Zürich

T +41 44 388 13 31

Espenstrasse 139 Eichenstrasse 2

CH-9443 Widnau CH-8808 Pfäffikon

T +41 71 727 75 75 T +41 55 410 55 50

Behind the Scenes - Sophos Copernicus

Sophos Vorstellung

Page 2: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Founded 1985 in Oxford, UK

Appx. $400 million in FY13 billings

Appx. 2,200 employees

Over 220,000 customers

Over 100 million users

HQ in Oxford, UK and Boston, MA

Best in class renewal rates (90+%)

20,000+ channel partners

OEM Partners: Cisco, IBM, Juniper, Citrix, Lenovo, Rackspace

Key development centers: Abingdon, UK; Vancouver, BC; Karlsruhe, Germany; Linz, Austria; Budapest, Hungary; Ahmedabad, India

20+ additional offices worldwide Sophos in Oxford, UK

Page 3: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

1985

Founded in Abingdon (Oxford), UK

Peter Lammer

c.1985

Jan

Hruska

c.1985

Acquired ActiveStat

e

2003

Awarded 3 Queen’s Awards for Enterprise, Innovation and International Trade

Acquired Cyberoam

Acquired DIALOGS

Majority interest sold to ApaxPartners

Acquired Astaro

2011 2012 20142010

Acquired UtimacoSafewareAG

20081988

First checksum-

based antivirus software

1989

First signature-based antivirus software

1991

Supplied security software to UK forces in 1st Gulf War

1996

US HQ established in Boston

Voted best small/medium

sized company in UK

Page 4: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

San FranciscoBay Area

VancouverCanada

BostonMA

OxfordUK

BudapestHungary

Singapore

SydneyAustralia

ManilaPhilippines

TokyoJapan

LinzAustria

KarlsruheGermany

WiesbadenGermany

DortmundGermany

10

50

50

60

155

30

165

100

425

65

40

30

240

150

OthersThe World

2,200

Total Sophos Employees

ParisFrance

50

AachenGermany

95

MunichGermany

40AhmedabadIndia550

Page 5: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

“Complex solutions aren’t solutions. We make

security for the real world – for the pragmatic

enterprise. Simple security is better security.”

Kris Hagerman, CEO Sophos

Page 6: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Small and Midmarket Enterprises and “Pragmatic Enterprises” of Any Size

• Similar

security

threats as

large

enterprises

• Limited IT

security staff

• Need security

made simple

10,000 Companies WW17% of Sophos Billings

500,000 Companies WW58% of Sophos Billings

> 5,000 employees

100–5,000 employees

< 100 employees20 million Companies WW25% of Sophos Billings

Page 7: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Page 8: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Corporate

Owned and

BYOD

Protect My Data

Go Wireless

Users Are Everywhere

What About Securing My

Servers?

Can’t Control

Users via Brute

Force

Downtime Unacceptable

“Console Proliferation”

& “Agent Pollution”

Transition to the Cloud

Regulations & Compliance

Help Desk Queries

Page 9: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Every 2 Seconds Another New Malicious URL Appears

30,000malicious URLs seen

each day. This is

almost a new

malicious URL every

2 seconds

80%of malicious URLs

are actually

legitimate sites that

have been

compromised

Source: SophosLabs 2013

Page 10: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

.0

10000000.0

20000000.0

30000000.0

40000000.0

50000000.0

60000000.0

70000000.0

80000000.0

19

84

19

85

19

86

19

87

19

88

19

89

19

90

19

91

19

92

19

93

19

94

19

95

19

96

19

97

19

98

19

99

20

00

20

01

20

02

20

03

20

04

20

05

20

06

20

07

20

08

20

09

20

10

20

11

20

12

TotalMalware

250,000

previously unseen

files received each

day within

SophosLabs

Source: SophosLabs 2013

Page 11: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

“Monetization”: Bulk of Threats Are Automated, Coordinated & Professional

50% 75% 88%

Welcome to the Age of Personalized Malware

50% of our detections are based on only 19 malware identities.

75% of unique pieces of malware are targeted attacks (i.e., are not seen beyond the organization targeted).

88% of malware found in fewer than 10 other organizations.

Source: SophosLabs 2013

Page 12: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Complete Security…

Made Simple.

Network End Users and DevicesServers

Simple Deployment Simple Protection Simple Management

• On premise

• Virtual

• Cloud

• User self provision

• Active Protection – real-time

protection

• Live lookups via the Cloud

• Sophos experts tune the protection

so you don’t have to

Next GenFirewall

Anti-malware and IPS

URLFiltering

NetworkAccess Control

Wireless VPN Anti-Spam EmailEncryption

Anti-Malware

Mobile Encryption PatchAssessment

Application Control

Device Control

Encryption for Cloud

Endpoint WebProtection

Anti-Malware

Webserver Protection

Virtualization

Intuitive consoles: On Premise orFrom the Cloud

Backed by expert support

App Control

V-Shield

Page 13: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

AT HOME AND ON THE

MOVE

Mobile Control Endpoint SecuritySafeGuard Encryption

HEADQUARTE

RS

Endpoint SecuritySafeGuard Encryption

REMOTE OFFICE 1

NextGen Firewall

Secure Wi-

Fi

Endpoint SecuritySafeGuard Encryption

Secure Wi-

Fi

Secure VPN

Client

Mobile Control

Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification

Administratio

n

SOPHOS

CLOUD

Web Application Firewall

Secure Email

Gateway

Secure Web Gateway

Mobile Control

Network Storage AntivirusServer Security

Guest Wi-Fi

UTMNextGen Firewall

Secure Web GatewaySecure Email Gateway

Web Application Firewall

REMOTE OFFICE 2

Secure Wi-

Fi

Endpoint SecuritySafeGuard Encryption

Mobile Control

Secure VPN

RED

Page 14: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Page 15: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h

Better, Real-time Protection Made Simple

SophosLabsActive Protection

Malware Data

Website URL Database

HIPS Rules

Reputation Data

MaliciousURLs

Spam Campaigns

Sensitive Data Types

Application Categories

Device Data

Mobile Application Reputation

Anonymizing Proxies

Application Patches

Network Servers Devices

Web EmailNextGen FW

Web App FW

Wifi

Smartphone/Tablet

Workstation/Laptop

Data

Correlated Intelligence

Reputation Data

Content Classification

File

Web

Email

Page 16: Behind the Scenes - Sophos Copernicus · 2016-04-04 · Mobile Control Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification Administratio

© 2

015

Bel

soft

Info

rtix

AG

|

ww

w.b

elso

ft-in

fort

ix.c

h