sb-as logo
Story image

Sophos XG Firewall adds lateral movement protection

03 Dec 2018

Sophos has added lateral movement protection capabilities to its XG Firewall offering. The new capabilities will help to prevent targeted, manual cyber attacks and exploits from further infiltrating a compromised network.

Cybercriminals often gain access through weak entry points and brute-force Remote Desktop Protocol passwords.

From there, they can cause severe damage to systems through lateral movement because they can move around, steal information, disable controls and backups, and more.

Examples like the SamSam ransomware, BitPaymer, Dharma and Ryuk all use similar lateral movement techniques to conduct attacks.

Sophos senior vice president and general manager of products, Dan Schiappa, explains:

“Many organisations are set up to protect against automatic bots, but not interactive, human-driven attacks. If active adversaries get into a system they can ‘think laterally’ to troubleshoot roadblocks, evade detection and move around. It’s hard to stop them unless the right security measures are in place.”

“Most lateral movements happen on the endpoint, which is why synchronizing security is important. Attackers will attempt to advance using non-malware techniques, such as exploits, Mimikatz and privilege escalation. The network needs to know to respond and automatically shut down or isolate infected machines before anyone or anything spreads further.”

He believes that lateral movements can be stopped by sharing intelligence from the firewall and endpoints. Isolation of infected systems is critical for businesses.

 “Unfortunately, many business environments could have blind spots on their network switches or LAN segments, and these can become secret launch pads for attacks.”

Sophos XG Firewall is now able to stop threats from spreading, even when it doesn’t have direct control over traffic.

It also works in conjunction with other Sophos offerings, including the Intercept X Advanced with Endpoint Detection and Response (EDR).

They both connect via a ‘Security Heartbeat’ in Sophos’ Synchronized Security technology that enables the automatic isolation of high-risk endpoints from other endpoints on the same broadcast domain or network segment. 

Additional new and enhanced features in Sophos XG Firewall include: •  Protection Enhancements - Deeper, broader IPS coverage with increased granularity in patterns - JavaScript cryptojacking protection •  Sandstorm Sandboxing Enhancements -   Intercept X integration to identify zero-day threats before they enter the network -  Deep behavioural, network and memory analysis with machine learning, CryptoGuard, and exploit detection •  Networking Enhancements -   New Sophos Connect IPSec VPN client with support for Synchronized Security •   Education Features -   Chromebook client authentication support for user-based policy and reporting -  User/group policy support for SafeSearch and YouTube restrictions

Sophos XG Firewall is available from registered Sophos partners worldwide.

Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More