New cyber threats emerge every day. While the firewall you’ve had since your business opened has kept your network protected, it may be time to bring the latest technology in to maintain that security. As Beyoncé says, “Let Me Upgrade U.” But where do you begin when searching for your next security appliance? Let the SonicWall Upgrade Matrix show you the way.
Enter the Upgrade Matrix
The matrix in this case is not an innovative Sci-Fi flick that spawned two progressively worse sequels. Rather it’s a chart that shows you which devices are eligible for special SonicWall upgrade pricing through the Customer Loyalty Program. That means you’ll save money on your new firewall and gain peace of mind that you won’t have to spend thousands to recover from a ransomware or malware attack that your older device couldn’t stop. Let’s take a closer look at the SonicWall Upgrade Matrix.
Your current device may be nearing or already past End of Support, meaning SonicWall is no longer able to provide support and updates to keep up with the latest threats. Your firewall may be incompatible with newer security solutions. It’s probably slower and shorter on memory than a new appliance. It may not have the capacity you need for your growing organization. Dive deeper into the top 5 reasons to upgrade your firewall with our video:
About That Savings
SonicWall estimates you’ll save up to 50% a year on your firewall plus security services when you upgrade through the Customer Loyalty Program. You’ll get this savings when you bundle a new firewall and a two- or three-year security services subscription like Advanced Gateway Security Suite, which, let’s face it, you needed anyway. Go to our SonicWall Upgrades page now to get the bundle that’s right for your network.
Each day, more and more business-critical assets move from on-premises deployments to the cloud. Maintaining visibility across platforms is vital to ensuring your organization’s sensitive information is secure. The new SaaS-based Sophos Cloud Optix does just that. Powered by artificial intelligence (but not Haley Joel Osment), Cloud Optix automatically and continuously discovers all your assets on Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) environments.
That visibility, combined with smart alerts about suspicious behavior, gives you the ability to see when risks emerge and respond to them in minutes instead of days or weeks – making the cloud anything but cloudy. You can also setup guardrails to prevent, detect, & remediate network configuration changes. Speaking of setup, Cloud Optix plays nice with all your organization’s existing tools, and you can have this agentless service up & running in minutes.
Why Cloud Optix?
Aren’t cloud platforms already pretty secure? Yes and no. These services do have built-in protections on their end. But in a recent report, Sophos found that cloud servers faced an average of 13 attempted attacks per minute, per honeypot. That means if just one setting is wrong on your end, your organization’s valuable data may be exposed. Cloud Optix ensures you have the full picture of your settings at all times, making it simple to see if there’s a problem and address it.
And what about compliance? The public cloud is always evolving, and compliance requirements often change with that evolution. Cloud Optix continuously monitors compliance with custom or out-of-the-box templates for standards like CIS, SOC2, HIPAA, ISO 27001, and PCI DSS. It also does the diagramming for you so you’ll be prepared for security audits – with reports ready to download in just a couple of clicks instead of the hours they used to take to put together manually.
Ready to See More?
Take a closer look at some features of Cloud Optix with this Sophos datasheet, then see it in action in this video:
Try It Yourself
You may be thinking that while the video demo is nice, you’d need to take it for a test drive yourself before buying in. Guess what? You can! Sophos is offering a free online demo of each and every feature. And if that’s not enough, you can get a 30-day free trial to test it with the tools your organization uses every day. And finally, once you’re ready to buy, we have the subscription option that’s right for your organization.
Whether for email, documents, storage, or something else, your business most likely needs (or will need) cloud applications to function on a daily basis. That means you need a reliable way to keep the apps, your users, and your business secure. Enter SonicWall Cloud App Security. SonicWall Cloud App Security delivers industry leading next-gen security for Software-as-a-Service (SaaS) applications, including Microsoft Office 365, Google G Suite, Dropbox, Salesforce, and more.
Embrace the Cloud Without Fear
It may be more comfortable to have all your software and data within your organization, but the cost of housing, maintaining, and securing the applications and storage on your own can be astronomical. The solution is SaaS, and to give yourself peace of mind, SonicWall’s Cloud App Security can make sure your business is safe in the cloud.
SonicWall Cloud App Security provides visibility, data security, advanced threat protection, and compliance. It stops targeted phishing, impersonation, and account takeover attacks. By analyzing real-time and historical events, it can identify breaches and security gaps – that means its ready for zero-day threats and ransomware. All of this protection comes with a second-to-none user experience as well.
Secure Email and File Sharing
Use G Suite or Office 365 for emails or document-sharing/storage? SonicWall Cloud App Security provides powerful anti-phishing, attachment sandboxing, and advanced URL protection. For inbound, outbound, and internal messages, you can count on each email being scanned for malware. If a malicious email does somehow get through, you can even turn back time and retract it from your users’ inboxes post-delivery. And when it comes to file-storage and sharing through Google Drive or OneDrive, Cloud App Security also prevents confidential file uploads and unauthorized file sharing.
It does all this with a low total cost of ownership, minimal overhead for deployment and management, and a user-friendly experience. See more about how your SaaS apps are protected:
Integrating with the Capture Web
SonicWall’s most advanced products and services integrate seamlessly together into what we’ve dubbed the SonicWall Capture Web–and SonicWall Cloud App Security is no exception. When deployed with a SonicWall TZ-Series or NSa-Series next-generation firewall appliance, Cloud App Security offers shadow IT visibility and control for cloud usage on the network. As a cloud-native service delivered and managed through SonicWall’s Capture Security Center, Cloud App Security consolidates Threat Intelligence from around the globe for peerless threat prevention, reporting, and analytics for organizations of any size. It also integrates seamlessly with Capture Advanced Threat Protection, harnessing the real-time intelligence of more than 1 million security sensors worldwide.
Learn more about how Cloud App Security joins together with SonicWall’s many integrated solutions to form a web of protection through the Capture Cloud Platform with our SonicWall Capture Web Infographic.
Get Started with Cloud App Security
You can take a deeper dive into the details of Cloud App Security by taking a look at SonicWall’s Cloud App Security datasheet. The next step? Find the option that fits your organization, whether you have 10 users or 10,000 users!
The U.S. Department of Homeland Security considers it to be among the most costly and destructive threats to U.S. businesses in 2019…
It constantly evolves, using adaptation and versatility to grow stronger with each new iteration…
It leverages several attack vectors against multiple targets, giving it plenty of opportunities to secure a victory…
The Feared, the Elusive, the Tenacious Malware: Emotet.
Emotet is a sophisticated cyber attack that uses its skills as a shapeshifter to spread itself far and wide across the Internet. The US Department of Homeland Security estimates that organizations in 2019 have shelled out as much as $1,000,000 per incident to recover from an Emotet attack. With big baddies from seasons past like WannaCry and Petya still fresh in the memory, businesses must now turn their attention to the security world’s 2019 season antagonist: Emotet.
What do Marvel’s Ultron and Emotet have in common?
You may defeat them now, but they always come back stronger, smarter form than before! Just like the comic villain Ultron, featured in Marvel’s 2015 “Avengers: Age of Ultron,” Emotet always finds a way to make itself more dangerous. This complicated malware has been constantly evolving since its humble origin story as an upstart banking trojan in 2014. In fact, Sophos Labs detected and identified over 4,500 different varieties of Emotet carrying unique payloads in January alone.
Emotet gives itself multiple chances to win. It spreads across networks, propagating itself through email spam and lateral movement, using your devices as remote zombies. Emotet collects contacts and browsing data. It can even act as a decoy for nastier attacks. Emotet isn’t picky; the malware can carry whatever malware is paying out top dollar at the time. Whether it’s TrickBot malware, QBot banking trojans, BitPayment ransomware, or something even more nefarious, Emotet is an ideal delivery system for payloads of all kinds. It’s flexible. It’s persistent. And it always comes back stronger!
The Emotet malware’s principal delivery method is through fake emails. One wrong click or careless attachment download lets Emotet get a foot in the door and from there, it begins its primary objective: spread to other devices on the network. Once infected, your inbox will start spitting out malicious emails to everyone in your contact list, providing Emotet with opportunities to infect far and wide. During this process, your email domain reputation plummets!
Once a system is infected, Emotet calls back home and initiates a malware download for whatever payload it’s been built to carry. In this call back step, Emotet may also take the opportunity to lift your contact lists and browser data to be sold off on the black market. With its versatility, constant evolution, and multiple victory conditions to meet, Emotet is a truly tricky foe.
Perhaps its most dangerous use, though, is as a smokescreen. Due to the fast-acting nature of Emotet, its rapid expansion sends network administrators into a frenzy to prevent further compromise. Some cyber attackers use this period of panic as a chance to initiate a targeted ransomware attack. By the time the initial Emotet chaos has been stabilized, ransomware like BitPaymer has already used the distraction to get a stranglehold on the organizations’ data.
Defeating Emotet
Call us old-school, but Firewalls.com believes the bad guys should always lose in the end. Most single solutions are ill-equipped to deal with Emotet. Between its versatility, speed, and ability to assault multiple targets, you’ll need a whole team to take it down. If you’re thinking the Avengers, think again. Sophos Synchronized Security with Sophos Heartbeat is just the band of network defending heroes to call if you want to send the baddies packing.
Sophos protects against Emotet at every point in the attack chain. Synchronized Security means that your endpoints and your firewall communicate with each other in real-time to provide comprehensive and instantaneous response to threats. This constant pulse of communication between endpoints and the network is called the Sophos Heartbeat. The moment an attack is detected, Sophos Heartbeat instantly relays details back to XG Firewall in order to isolate the machine, shut it off from the network, and begin remediation.
Sophos Email Protection blocks spam both inbound and outbound. Leveraging threat intelligence from SophosLabs, Sophos email protection identifies malicious emails like those that propagate Emotet and shuts threats down before they hit the inbox. Active threat protection, malicious attachment sandboxing, and time-of-click URL protection all come standard with Sophos Central Email Advanced, giving your inbox all the superpowers it needs to shut down Emotet at its point of entry.
If a single endpoint becomes infected, Sophos Intercept X springs into action, isolating the device before Emotet has a chance to spread across the network. Intercept X is super smart, harnessing deep learning capabilities to anticipate new threats and predict security threats before they happen. Intercept X cuts off the opportunity for lateral movement and gets to work cleaning up the infected systems. Sophos Intercept X Advanced consolidates protection and Endpoint Detection and Response (EDR) into a single solution with guided incident response.
XG Firewalls feature advanced cloud-based sandboxing to examine and detonate payloads in a quarantined environment. XG Firewall is the overwatch command center that communicates in real time with endpoints thanks to the Sophos Heartbeat. AI-powered behavioral monitoring lets XG Firewalls detect behaviors consistent with Emotet and pre-emptively block all currently known IP addresses with Emotet. With advanced protection guarding the point-of-entry, individual endpoints, and at the network level, your Sophos team makes short work of Emotet.
Since these programs were designed to work as one well-oiled machine, all of these layers of Sophos protection occur automatically. This provides a comprehensive, zero-touch response that addresses advanced threats at every step of the attack chain. This dream team of Sophos Email, Intercept X, and XG Firewalls ensures Emotet never sees the Endgame. That means your story always gets its happy conclusion. And automatic, real-time, zero touch response means your IT guy can go grab lunch.
SonicWall TZ series firewalls already offer integrated security solutions for SMBs and even home offices, and now, SonicWall has announced new additions to the family, the SonicWall SOHO 250 (and SOHO 250W – the W stands for Wireless), and the SonicWall TZ350 (and TZ 350W). These new firewalls protect more connected devices, have higher speeds, and offer simple deployment & management of SonicWall’s first-class protection for your network – all in a compact, desktop package. And for the first time ever, SonicWall is offering a SOHO firewall that supports the advanced threat protection capabilities of SonicWall Capture ATP! We take a closer look at these brand new devices in the video below:
Network Interface Ports: 5 x 1GbE, 1 USB, 1 Console
Maximum Connections: 100,000
Maximum Connections (DPI SSL): 25,000
Maximum Supported Wireless Access Points: 8
Hardware-Only MSRP: $595
Check Out Our Other Feature Review Videos
If you need something a little bigger or still aren’t sure which firewall is right for you, we’ve got plenty of resources available to help you decide. Take a look at our feature review videos of theSonicWall NSa 2650 and the Fortinet Fortigate 50E to see how they stack up! Check out our firewall buyer’s guide series and convenient comparison tables. We want you to be informed about all your options before entrusting a device with your network’s security.
Dive In to the SonicWall Catalog
Speaking of our Buyer’s Guide series, to get better acquainted with the security services subscriptions SonicWall offers, like the Advanced Gateway Security Suite (aka TotalSecure Advanced), or to see other SonicWall products for networks small to large, download our free SonicWall Buyer’s Guide.