XG Firewall

XG Firewall

• Full protection suite of network, wireless, IPS, VPN, web, app, email, and web application firewall technology
• Automatically identify and isolate infected systems on your network until they can be cleaned up
• Unprecedented visibility, including user and application risk, with traffic-light style indicators and rich reporting
• Unified policy management that makes powerful policies and rule sets easy and intuitive
• Industry-leading performance at every price point with XG Series hardware appliances utilizing Fast Path

System Panel

• The system panel displays the real-time status of system performance, services, connections, and other system parameters. Green indicates everything is fine, orange indicates a warning, and red indicates something needs immediate attention.
• Each item is clickable to reveal additional details and graphs, as well as helpful system and network tools you can use for troubleshooting purposes such as ping, traceroute, packet capture, command-line access, and much more.



dashboard

Intercept X




dashboard

Stop Ransomware Before It Takes Your Files Hostage

Ransomware is the number one malware attack affecting organizations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to businessproductivity.
Sophos Intercept X features CryptoGuard, which prevents the malicious spontaneous encryption of data by ransomware—even trusted files or processes that have been hijacked. And once ransomware gets intercepted, CryptoGuard reverts your files back to their safe states.

Exploit Prevention Stops Modern Threats

The unique technologies of Sophos Intercept X are designed to stop attackers before they have a chance to throw their first punch.
Rather than examining hundreds of millions of known malware samples, Intercept instead focuses on the relatively small collection of techniques used to spread malware. This way, we can ward off zero-day attacks without having even seen them first.
Along with Intercept X we provide a powerful virus cleaner. While most traditional virus cleaners simply remove offending malware files, Sophos Clean goes the extra mile by eradicating the malicious code and registry keys created by malware as well. It’ll be like your machine was never infected in the first place.

Endpoint Protection

Next-Gen Protection

We’re taking a new approach to protection. Sophos Endpoint blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit.
Sophos Endpoint doesn’t rely on signatures to catch malware, which means it catches zero-day threats without adversely affecting the performance of your device. So you get protection before those exploits even arrive.

De-cloaking Malware

Sophos Endpoint works on the device and in conjunction with the firewall to detect and isolate compromised devices. Synchronized Security gives you additional context providing information from the network.
1. Behavioral Analytics
2. Traffic Detection
3. Integrated Endpoint and Network

Complete Control

Enforce your web, application, device, and data policies with ease, thanks to seamless integration within the endpoint agent and the management console.
• Web Control Category-based web filtering enforced both on and off the corporate network
• Application Control Point-and-click blocking of applications by category or by name
• Device Control Managed access to removable media and mobile devices
• Data Control Data-loss prevention (DLP) using prebuilt or custom rules


dashboard

Safeguard Encryption




dashboard

Full Disk Encryption

Provides centrally-managed, full disk encryption using Windows BitLocker
and Mac FileVault, taking advantage of the technology built into the operating systems.
Seamlessly manage keys and recovery functions from the SafeGuard Management Center.
To further simplify your workflow, you can now manage Windows and macOS full disk encryption in Sophos Central.

Prevent Data Loss

Intelligently protect your data against theft, hacking malware, and accidental data loss.
It automatically encrypts your content, and the content stays encrypted even with
it’s shared or uploaded to a cloud-based, file-sharing system.

Real-Time Protection

SafeGuard offers synchronized encryption by connecting to Sophos
Endpoint Protection and Sophos Mobile Control. The SafeGuard local agent listens to an endpoint’s Security
Heartbeat and enables automated, proactive protection.

Manage Full Disk Encryption with Sophos Central

The easiest way to manage Windows BitLocker and macOS FileVault full disk encryption is with Sophos Central Device Encryption. It offers a three-click policy setup, no key management servers to install, compliance and reporting features, and self-service key recovery for your users. Installation and setup done is done in minutes using the intuitive, web-based, management interface of Sophos Central.

Server Protection

Powerful, Server-specific Protection

Protect the applications and data at the core of your organization; whether that data is on physical servers or virtual servers in the cloud or on premises. Sophos Server Protection integrates anti-ransomware, application whitelisting, along with our advanced anti-malware and HIPS providing easy, centralized management of the security of all servers.

Easy to Deploy and Manage

You can choose to manage Sophos Server Protection in the cloud or on premises. Sophos Server Protection is simple to set up and is just as easy to manage and maintain, whether you need to manage Windows, Linux or UNIX servers and whether those servers are physical or virtual, on premises or in the cloud

CryptoGuard Stops Ransomware

Even if ransomware sneaks past your initial layers of protection, CryptoGuard protects against the unsolicited encryption of server data, whether that ransomware is running on the server or on connected endpoints. Beyond stopping the ransomware and restoring the encrypted files back to their previous state with no loss of data, Sophos can also accelerate threat discovery, investigation, and response with Synchronized Security, reducing incident response times exponentially.



dashboard

One-click Server Lockdown

Get powerful protection with our lockdown capabilities that let you whitelist your applications and lockdown your servers simply by clicking a button
1. Whitelist trusted applications and default deny for all other executables
2. Sophos automatically establishes and manages changes from trusted update processesr
3. Simplifies management by automatically recognizing your server applications that can run, and creating trust rules to allow them to be updated

Complete Control

Enforce your web, application, device, and data policies with ease, thanks to seamless integration within the endpoint agent and the management console.
• Web Control Category-based web filtering enforced both on and off the corporate network
• Application Control Point-and-click blocking of applications by category or by name
• Device Control Managed access to removable media and mobile devices
• Data Control Data-loss prevention (DLP) using prebuilt or custom rules

Secure WI-FI




dashboard

Central Management and Simple Deployment

Deploy your access points (APs) in three simple steps. We’ll guide you through the creation of your networks, registering your APs, and setting up one or more sites.
When managed with Sophos Central, you'll be amazed how easy it is to use Sophos Wireless either as a standalone product or as part of your portfolio of cloud-managed solutions.

Hotspots And Guest Access

Provide controlled internet access for visitors, contractors, and other guests on your network. Using a daily password or time-based voucher, you can customize guest access to display the hotspot portal with your own terms of service and branding. Use enterprise-grade backend authentication for a seamless user experience.

Rogue AP Detection

Classify trusted and untrusted APs on or close to your network. Our Rogue AP Detection helps you detect threats from impersonation attacks, such as ‘evil twins,’ which try to fool your users into connecting to an unsafe network.

Built to Perform

You get great wireless performance with our range of wireless access points. We have models for indoor and outdoor use, with form factors suiting a range of deployment scenarios and budgets.

Contact Us

Onix Computer Services
View Park Towers, Monrovia Street,
P. O. Box 78356-00507 Nairobi, Kenya
 +254 735 223 000
  +254 20 3104667
 www.onix.co.ke
 info@onix.co.ke
Send us mail

Or follow us on social platform

© 2017 Onix Computer Services ™