Story image

Sophos synchronises network, endpoint security with Heartbeat

10 Nov 2015

Sophos has launched a new technology that synchronises real time threat information between endpoints and the network firewall or UTM to provide faster threat detection.

Security Heartbeat, which is part of Sophos’ new XG series of next generation firewall and UTM solutions, directly links the firewall or UTM with endpoint security, in what Sophos says is the first synchronised security protection in the market.

Kris Hagerman, Sophos chief executive, says companies of all sizes know they need endpoint security and network.

“But for too long, these two product segments simply didn’t communicate with each other – they were independent and isolated silos, which limited their effectiveness and their manageability,” Hagerman says.

“This is synchronised security that delivers both better protection – and better manageability – for organisations of any size,” he says of Sophos Security Heartbeat.

The Security Heartbeat pulses continuous, real-time information about suspicious behaviour or malicious activity between endpoints and the network firewall or UTM, enabling Heartbeat to instantly trigger a response to stop or help control a malware outbreak or data breach.

The Sophos XG Firewall uses data provided by Sophos endpoint protection to isolate and restrict access to and from the affected device, and in parallel, the endpoint protection can remediate the attack.

Sophos says the offering enables IT organisations to get advanced threat protection capabilities without requiring additoinal agents, layers of complex management tools, logging and analysis tools or expense.

“The Security Heartbeat is fully enabled and included as part of the Sophos XG Firewall and Sophos Cloud-managed endpoint protection,” Sophos says. 

Christian Christiansen, IDC vice president of security products, says no other company is close to delivering this type of synchronised and integrated communication between endpoint and network security products.

“For the midmarket, the time and resource savings will be very compelling as their ability to stay ahead of increasingly sophisticated threats with today’s products will only become more challenging,” Christiansen says.

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.