sb-as logo
Story image

Gartner names Sophos leader in Unified Threat Management

24 Sep 2018

Network and endpoint security company Sophos has announced that it has been positioned as a leader in Gartner’s September Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls).

Sophos is positioned furthest for completeness of vision and ability to execute.

Sophos has been consistently positioned as a leader by Gartner in both the January 2018 Magic Quadrant for Endpoint Protection Platforms and the Magic Quadrant for Unified Threat Management.

Sophos Products senior vice president and general manager Dan Schiappa says, “Introducing technologies such as deep learning in the sandbox and synchronised security helps us stay ahead of the evolving threat landscape.”

“We develop our cybersecurity products to work together as a system, enabling our defenses to be as coordinated as attacks such as the persistent SamSam ransomware.”

One of the advantages of network and endpoint synchronised security is the visibility it can provide for network traffic.

In a recent survey from Sophos, The Dirty Secrets of Network Firewalls, IT managers admitted that they could not identify about 45% of the traffic on their network, which presents a serious security concern.

By enabling the firewall to receive information directly from the endpoint, XG Firewall can positively identify all applications – even obscure or custom applications.

In an average network, XG Firewall Sync App Control is able to identify 100-200 previously unknown apps, revealing hidden risks to network security.

Sophos’ portfolio of network protection includes the next-generation XG Firewall series and the SG UTM series.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact.

Story image
Voice phishing attacks on the rise, remote workers vulnerable
There is an increase in voice phishing attacks, where hackers use existing employee names in attempt to trick victims into sharing login credentials and data by phone.More
Story image
Vectra expands NDR capabilities across all network environments
Vectra’s network threat detection and response (NDR) solution is designed to use cloud identities that track and link attacker activities and progression across all networks.More
Story image
Palo Alto Networks and PwC deliver MDR services to Hong Kong enterprises
“Together, PwC and Palo Alto Networks offer a service designed to address and solve customer cybersecurity pain points particularly as the market demands new ways to detect and respond to threats.”More
Story image
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.More
Story image
Frost & Sullivan: Firewalls to drive network security market
Enterprises’ heightened threats from criminal entities and state-sponsored actors are strongly encouraging them to adopt network security solutions.More
Story image
Video: 10 Minute IT Jams - SonicWall VP on the benefits of Boundless Cybersecurity
Today's interviewee will discuss the ins and outs of the company's Boundless Cybersecurity solution and how it can help APAC organisations adjust to the new normal, as well as explaining the 'cybersecurity business gap'.More