Sophos SG UTM
The Ultimate Security Package
Essential next-gen firewall protection for your network, web, email, applications, and users.
We Keep it Simple
Sophos UTM's simple, intuitive user interface (UI) is designed for YOU. It lets you quickly protect your network and users. And it makes day-to-day management tasks easy.
Lightning Speed
We've engineered Sophos UTM to deliver outstanding performance. We built our UTM using Intel multi-core technology, solid-state drives, and accelerated in-memory content scanning. Potent, powerful ... fast
![]() |
|
All-in-One Protection
We offer the latest next-gen firewall protection you need plus features you can't get anywhere else - including mobile, web, endpoint email encryption and DLP. No extra hardware. No extra cost. Simply choose what you want to deploy.
Network Protection
All the protection you need to stop sophisticated attacks and advanced threats while providing secure network access to those you trust.
Wireless Protection
Set up, manage and secure wireless networks in just minutes with the UTM’s built-in wireless controller that works with our full range of wireless access points.
How it Works: |
Features
Plug & Play Deployment |
|
Plug & Play Deployment
You can set up multiple Sophos Wireless Access Points (APs) within minutes. They require no local configuration and will simply find the UTM, retrieve their IP address via DHCP, import the necessary configuration, and automatically appear in the UTM where you can activate them. Automatic periodic channel scanning ensures your access points are always operating at peak performance. |
![]() |
|
![]() |
Multiple Wi-Fi Zones
Sophos Access Points are ideal for creating multiple separate wireless zones. Configure a wireless network to provide employees access to internal network resources. On the same access point, you can offer wireless guests Internet access. Do it all without compromising the integrity of the internal network. |
|
Reliable High-Speed Wireless
Our range of access points support nearly any deployment model you need with support for the latest 802.11ac Wi-Fi standard. Mix and match multiple access points to ensure full coverage and take advantage of bridge and repeater functionality in our dual-band dual-radio AP 50 to extend coverage to hard-to-wire areas of your facility. |
![]() |
|
![]() |
Mobile NAC
Sophos UTM and Sophos Mobile Control (SMC) work better together to enable easy device configuration and Network Access Control (NAC) for non-compliant devices. The UTM automatically pushes select Wi-Fi and VPN settings to SMC while SMC provides device compliance status to the UTM which can use that information to deny network access to non-compliant devices. |
|
Guest Wi-Fi Hotspots
Full-featured guest hotspots for visitors or BYOD devices enable you to control access to company resources with bandwidth limits and inappropriate content filtering. Support for mobile device registration with SMS vouchers and a full range of customization options allow you to control the user experience and promote your company brand. |
![]() |
|
![]() |
Secure Encryption
Sophos UTM supports the latest strong encryption and authentication standards such as WPA-2 Enterprise and IEEE 802.1X (RADIUS authentication). Use your existing backend authentication, such as Active Directory, to allow quick and easy access for your users. |
Web Protection
Comprehensive protection from the latest web threats and powerful policy tools ensures your users are secure and productive online.
Sandstorm Sandboxing Protection
Email Protection
Full SMTP and POP message protection from spam, phishing and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.
How it Works:
|
Features:
SPX Email Encryption |
|
SPX Email Encryption
Our patent-pending SPX Encryption is unique to Sophos and makes it easy to send encrypted emails to anyone – even those without any kind of trust infrastructure. The password based solution doesn’t require any added software or certificates and the recipient can read and file their SPX messages in their preferred email client application just like their regular mail. |
![]() |
|
![]() |
Standards-based Encryption
In addition to our unique and easy push-based SPX Encryption, we also support standards-based encryption solutions as well including TLS, OpenPGP, and S/MIME certificate based encryption. |
|
Data Loss Prevention
We make DLP easy but effective by providing hundreds of pre-defined sensitive data types you can easily add to your policy checklist of data you wish to protect. The UTM automatically enforces your DLP policy and encrypts, blocks and/or notifies you in the event any message leaves the organization with this type of data. |
![]() |
|
![]() |
Live Anti-Spam
Provides protection from the latest identify theft, banking scams, phishing and other scams by intercepting all email, blocking known bad senders, spam, malware and viruses but also taking advantage of SophosLabs Live cloud-lookups to query suspicious looking message content to determine if it’s part of a new or emerging unwanted email campaign. |
|
Self-Serve Quarantine
You can give employees direct control over their spam quarantine, saving you time and effort. Employees can manage their own spam whitelist, review, release and delete spam, and find out what happened to messages that were deleted because of a virus or blacklisted. The user portal supports 15 different local languages. |
![]() |
|
![]() |
Allow users to flag their own messages for SPX Encryption right from within Outlook as they compose them or send spam samples from their inbox directly to SophosLabs with our simple Outlook Add-in. |
Web Server Protection
Harden your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users with reverse proxy authentication.
How it Works: |
Features:
Web Application Firewall |
|
Web Application Firewall
Protects your web servers from tampering and hacking attempts and provides load balancing across a multi-node farm. It secures your web applications against more than 350 attack patterns including SQL injection, cross-site scripting and much more. Also block clients with bad reputation outright. |
![]() |
|
![]() |
Server Hardening
Close the door on vulnerabilities in your websites without involving developers. Static URL hardening prevents hackers from manually constructing “deep-links” that lead to unauthorized access. Form hardening ensures malicious scripts and code cannot be entered to exploit your database, and cookie protection makes sure cookies are signed to prevent tampering. |
|
Reverse Proxy Authentication
Our reverse proxy-authentication offloading provides persistent basic or form-based authentication. It adds an extra layer of security to services like Outlook Web Access for Exchange by allowing users to authenticate against our exploit-free reverse proxy. It’s the perfect solution for replacing Microsoft’s discontinued Forefront TMG. |
![]() |
|
![]() |
Anti-virus Scanning
Setup scanning of all inbound and outbound files to your servers with our dual antivirus agents to keep infected content off your network and ensure you’re not distributing malicious or infected content. |
|
SSL Offloading
Relieve your web or application servers from the processing burden of encrypting and decrypting traffic sent via SSL with the UTM’s ability to offload SSL. Setup is easy – it’s as simple as uploading your SSL certificate to the UTM WAF. |
![]() |
License our protection modules individually or choose one of our pre-packaged licenses.
|
Logging & Reporting
Our built-in reporting means you'll know exactly what's happening with your users. Fix problems fast and shape your policies, keeping your users secure while boosting network performance. And, you get detailed reports as standard, stored locally with no separate tools required.
* At-a-glance flow graphs show usage trends and web activity
Need More Reporting?
Although you can have all your logging and reporting built in to your box, sometimes you may need a little more. For that, you can add Sophos iView. |
![]() |
Industry leader
As a Gartner Magic Quadrant Leader for UTM, Mobile Data Protection and Endpoint, we're at the forefront of the security industry.
What are you waiting for?
For any additional questions visit our How to Buy page or give one of our Sales Agents a call.