Intelligent CIO Middle East Issue 70 | Page 57

CASE STUDY that straddles both the network and endpoint security space . The IT team was cognisant of Sophos ’ sterling record being backed by security technologies that move in step with the evolution of cyberthreats . The IT team recognised Sophos being at the forefront of developing security technologies that safeguard organisation network and endpoints proactively from the latest known and unknown threats .
So , a move to Sophos and its powerful security products was a natural step and progression for BITUMAT as the manufacturer of waterproofing products wanted to work with a vendor that covered all aspects of network and endpoint security and that too , with a focus on top notch security performance .
Sophos empowered cybersecurity infrastructure
The Sophos XG Firewall delivers truly next-gen features in the form of extensive threat management , monitoring and providing visibility into applications , web traffic and user activity . At the same time , it offers in-depth analysis of all the encrypted traffic on BITUMAT ’ S network . One of the biggest benefits of XG Firewall is a streamlined user interface and easy firewall rule management for large rule sets with grouping with at-a-glance rule feature . This makes it easy for every small IT team to push security policies across the organisation . The firewall offers drill-down visibility into network traffic irrespective of whether it ’ s encrypted , evasive or elusive . It also offers more clarity into customer networked applications and instantly identifies suspicious or malicious threats on your network and initiate preventive action . It works in conjunction with Sophos Labs Intelligence powered by Deep Learning to identify brand new and zeroday threats before they have a chance to invade the BITUMAT network .
Deployment Results
The IT team at BITUMAT is extremely satisfied with Sophos ’ network and endpoint security products that use the best of modern and traditional techniques to reduce the attack surface and deliver top-class defence against even the most advanced malware . “ Sophos XG Firewall provides all-encompassing security to our organisation ’ s network and we especially love how easy it is to categorise and make specific rules to better protect certain user groups on the network ,” Quadri said .
What ’ s more , the IT team has benefitted from Sophos Central Management whose dashboard offers a single pane of glass into the network landscape .
“ We highly recommend Sophos XG Firewall and Sophos Intercept X Advanced for Endpoint and Server as they are configured for different types of network landscapes and endpoint deployments . Sophos has also taken into consideration the needs of small , medium and large organisations , which allowed us to pick security solutions as per our needs and requirements ,” he added . p
With Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server , BITUMAT benefits from a comprehensive approach to endpoint and server protection . Unknown threats are stopped right at the gates with Deep Learning AI in Intercept X that identifies unknown malware with signatureless threat detection by analysing file attributes from hundreds of millions of samples . Advanced anti-ransomware of Intercept X detects and blocks the malicious encryption process used in ransomware attacks , ensuring the organisation stays safe from ransomware attacks .
In addition , Sophos solutions work in sync with one another and share data to automatically isolate compromised devices , at the time of clean-up and restore network access after threat neutralisation and all this without human intervention .
BITUMAT SECURITY CHALLENGES
• No support for legacy firewall solution and a need to move to more advanced network security features
• Small IT team unable to proactively handle requests , which was impacting the overall IT security posture of the organisation
• Elevate existing security strategy to new and improved level of maturity wherein both network and endpoint security talk to each other and share actionable intelligence
• Protect data from constantly evolving attacks that emanate from a growing threat landscape and attack vectors
• Better visibility into user activity to identify risky behaviour and deploy security policies that prevent such behaviour and ensure quick remediation
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 57