sb-nz logo
Story image

Sophos XG Firewall adds lateral movement protection

03 Dec 2018

Sophos has added lateral movement protection capabilities to its XG Firewall offering. The new capabilities will help to prevent targeted, manual cyber attacks and exploits from further infiltrating a compromised network.

Cybercriminals often gain access through weak entry points and brute-force Remote Desktop Protocol passwords.

From there, they can cause severe damage to systems through lateral movement because they can move around, steal information, disable controls and backups, and more.

Examples like the SamSam ransomware, BitPaymer, Dharma and Ryuk all use similar lateral movement techniques to conduct attacks.

Sophos senior vice president and general manager of products, Dan Schiappa, explains:

“Many organisations are set up to protect against automatic bots, but not interactive, human-driven attacks. If active adversaries get into a system they can ‘think laterally’ to troubleshoot roadblocks, evade detection and move around. It’s hard to stop them unless the right security measures are in place.”

“Most lateral movements happen on the endpoint, which is why synchronizing security is important. Attackers will attempt to advance using non-malware techniques, such as exploits, Mimikatz and privilege escalation. The network needs to know to respond and automatically shut down or isolate infected machines before anyone or anything spreads further.”

He believes that lateral movements can be stopped by sharing intelligence from the firewall and endpoints. Isolation of infected systems is critical for businesses.

 “Unfortunately, many business environments could have blind spots on their network switches or LAN segments, and these can become secret launch pads for attacks.”

Sophos XG Firewall is now able to stop threats from spreading, even when it doesn’t have direct control over traffic.

It also works in conjunction with other Sophos offerings, including the Intercept X Advanced with Endpoint Detection and Response (EDR).

They both connect via a ‘Security Heartbeat’ in Sophos’ Synchronized Security technology that enables the automatic isolation of high-risk endpoints from other endpoints on the same broadcast domain or network segment. 

Additional new and enhanced features in Sophos XG Firewall include: •  Protection Enhancements - Deeper, broader IPS coverage with increased granularity in patterns - JavaScript cryptojacking protection •  Sandstorm Sandboxing Enhancements -   Intercept X integration to identify zero-day threats before they enter the network -  Deep behavioural, network and memory analysis with machine learning, CryptoGuard, and exploit detection •  Networking Enhancements -   New Sophos Connect IPSec VPN client with support for Synchronized Security •   Education Features -   Chromebook client authentication support for user-based policy and reporting -  User/group policy support for SafeSearch and YouTube restrictions

Sophos XG Firewall is available from registered Sophos partners worldwide.

Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
Kiwis dont care enough about cybersecurity
New Zealanders are not adjusting their behaviours around cybersecurity fast enough.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More