This test site contains pages classified by SophosLabs for the propose of testing URL Filtering within the Web Protection features of Sophos UTM version 9.1 and above. Note that although some pages are classified as potentially offensive or dangerous, the actual content of these pages should be considered safe for viewing in all circumstances.
- Utm Web Protection Bypass
- Sophos Utm Web Protection
- Sophos Utm Web Protection Configuration
- Utm Web Protection
- Sophos Utm Web Protection Connection Refused
Our UTM has been the leading solution for protecting network infrastructure in Amazon Web Services (AWS) for years now. Over that time, we’ve added more and more purpose-built features and capabilities to Sophos UTM that continue to make it an ideal fit for securing your AWS cloud-based servers and networks. So it’s with great pleasure that today we’re announcing the availability of our new Outbound Gateway (OGW) protection for AWS. It provides unique visibility, policy enforcement, and elastic scalability to outbound web traffic from AWS.
One of the advantages of moving to the cloud is the ability to scale your infrastructure up and down based on current demand. However, this can pose real challenges to your security as many solutions are designed around traffic or CPU limitations. Our innovative new OGW solves this problem by deploying a patent pending technology that load balances outbound traffic and deploys multiple Sophos UTM Workers allowing customers to use our UTM Web Protection and UTM Web Server Protection regardless of the traffic demand.
- UTM is Unified Threat Management system which is characterised as a type of virtual appliance or an appliance in the form of network hardware or as a cloud service to deliver protection to businesses from security threats in a simplified way by incorporating various security techniques and methods.
- Created Date: 3:47:12 PM.
Securing Amazon Workspaces
Our new Outbound Gateway is specifically designed to help customers secure their Amazon WorkSpaces environment. WorkSpaces is a Virtual Desktop Infrastructure (VDI) that allows you to run remote desktop applications in the cloud. OGW provides an easy way to ensure that your users comply with web browsing policies and prevents malware from infecting remote desktops. It makes user-based policy enforcement simple and reliable since OGW works with multiple authentication mechanisms, including Active Directory and single sign-on (SSO) for your remote users.
Below is a diagram that shows how UTM handles increased inbound and outbound traffic as well as service integration in AWS making deployment and administration easy.
The best part about this feature is it is included as part of your UTM subscription on AWS.
If you’re already using Sophos UTM in AWS, you can check out our knowledge base article on how to configure OGW in your AWS environment. If you’d like to start using our UTM in AWS, check out our free 30 day trial of Sophos UTM from the AWS Marketplace.
Feedback
As usual, you can leave us any feedback on this release at our Sophos Community Forums for UTM.
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
Our Secure Web Gateway prevents malware infections and gives you control over your employees' web use. Spyware and viruses are stopped before they can enter the network. And, you can quickly create policies that set where and how employees spend time online
Highlights
- Prevent infection with dual, independent antivirus engines
- Enforce time-based web browsing policies
- Monitor web activity by users or department
- Maintain privacy with anonymity in reports
- Email scheduled reports directly to managers
- Hardware, virtualized, software or cloud- based appliance
Proven protection against web threats
We block the latest web threats using advanced techniques like javascript emmulation to detect malicious web code before it reaches the browser. It also prevents infected systems from calling home with sensitive data. Our engine inspects all HTTP, HTTPS, FTP, SMTP and POP3 traffic, including active content like Active X, Flash, cookies, VBScript, Java and JavaScript.
Utm Web Protection Bypass
Customizable URL Filtering boosts productivity
Our continuously updated database contains over 35 million sites in 96 categories. This lets you create safe web browsing policies, minimizing legal concerns around inappropriate content and maximize productivity. Set up policy by user or group using a variety of authentication options including IP Address, Active Directory SSO, eDirectory SSO and LDAP.
Control apps - block Facebook, accelerate Salesforce
You get complete control to block, allow, shape and prioritize web applications with Deep Layer-7 inspection (Next-Generation Firewall). It identifies over 900 applications, and you'll get feedback on unclassified applications too.
Dynamic reports provide unrivalled insight
You get detailed reports as standard, stored locally with no separate tools required. Predefined and customizable reports show key web activity like domains visited and bandwidth consumed. At-a-glance flow graphs show usage trends by IP address or user name. And report anonymization hides user names, requiring the four-eyes-principle to unhide them.
HTTPS scans stop hidden threats
Our HTTPS Scanner covers a common blind spot – encrypted web traffic. It uses transparent de-encryption and re-encryption via a trusted man-in-the-middle technique to block malicious content. It also blocks programs tunneling over HTTPS, like anonymizing proxies. It also automatically validates certificates, taking the decision about which sites to trust away from users.
Technical specifications
Choose a hardware, virtual or software UTM
UTM hardware options support between 10 and 4000 users from a single appliance. Software appliances run on Intel- compatible PCs and servers. Virtual appliances are certified as VMware Ready and Citrix Ready and also run in Microsoft Hyper-V and KVM environments.
Required subscriptions
UTM Web Protection. This is also included if you subscribe to our BasicGuard or FullGuard UTM license.
Extend your protection
- Add UTM Network Protection all the Next-Gen Firewall features you need
- Add UTM Endpoint Protection to Sync endpoint and gateway web policies
- Add UTM Wireless Protection to simplify and secure Wi-Fi
- Add UTM Web App Firewall to harden your web servers and web applications
Appliance | UTM 110 | UTM 120 | UTM 220 | UTM 320 | UTM 425 | UTM 525 | UTM 625 |
Recommended users | 10 | 40 | 140 | 330 | 1,100 | 2,300 | 3,800 |
Web proxy throughput | 220 Mbps | 220 Mbps | 625 Mbps | 1.25 Gbps | 2 Gbps | 1.8 Gbps | 1.95 Gbps |
Antivirus throughput | 50 Mbps | 75 Mbps | 235 Mbps | 375 Mbps | 1.3 Gbps | 1.7 Gbps | 3.6 Gbps |
Pricing Notes:
- Pricing and product availability subject to change without notice.
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
Sophos Utm Web Protection
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
Sophos Utm Web Protection Configuration
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Utm Web Protection
Special Pricing Requests Available. Please call or contact us!
List Price:
Add to Cart to see sale price!
Sophos Utm Web Protection Connection Refused
'Users' includes workstations, clients, servers, and devices that communicate through the firewall to reach the Internet. It also includes VPN connections from remote VPN clients ('road warriors') and from remote VPN gateways (each remote gateway counts as one user)