Sophos ecosystem relaunched with Zero Trust technology

Share post

Zero Trust is the answer to modern cybercrime, and Sophos is putting that belief into action by incorporating its Zero Trust Network Access (ZTNA) solution into its Intercept X endpoint solution. This further simplifies and improves protection against ransomware and future threats on the cyber floor.

With Sophos ZTNA, Sophos presents its latest product in the fight against cyber threats. It is a zero trust network access module that fully integrates with the Intercept X endpoint solution, providing advanced endpoint protection plus zero trust network access with a single agent. Sophos ZTNA introduces a transparent and scalable security model for connecting users and devices to applications and data, enhancing and facilitating protection against ransomware and other modern threats to the cyber landscape.

ZTNA in Intercept X including XDR

The ability to integrate ZTNA into Intercept X, including XDR (Extended Detection and Response) and MTR (Managed Threat Response), removes much of the complexity associated with managing multiple vendors and agents and provides end-to-end protection for endpoints , users and their identities as well as applications and networks. As part of the Sophos Adaptive Cybersecurity Ecosystem, ZTNA shares real-time threat intelligence with other solutions and automatically responds to threats. Working together, the security modules can better identify active risks and more clearly assess device health, allowing compromised devices to be quickly isolated.

Protect connected ZTNA micro-segments

The ZTNA micro-segments network to protect against attacks, stealthy network activity and data theft. The module permanently authenticates user identities with multiple factors, validates the state of the devices, offers stricter user access controls and thus fewer points of attack for cybercriminals. Unlike VPNs, which provide broad network access, ZTNA eliminates this tacit trust and only grants the user access to specific applications and systems on the network. “Trust nobody, verify everything” – with this belief, ZTNA improves protection, simplifies administration for IT managers and offers employees a hassle-free working experience wherever they work.

Only encrypted remote access is too weak

Joe Levy, Chief Technology and Product Officer at Sophos, goes into more detail: “Many traditional remote access solutions such as remote desktop, IPsec or SSL VPN offer strong encryption, but little else protection against modern threats. We see attackers increasingly exploiting these limitations by injecting login credentials into RDPs and VPNs to gain network access. Once in, they roam freely, all too often resulting in costly data theft and ransomware incidents. People, applications, devices and data are no longer confined to the office space – they are everywhere and we need more ways to protect them. Zero trust is a very effective security principle and Sophos ZTNA embodies this in a viable and easy-to-use solution to ensure users have secure access to the resources they need.”

More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more