Sophos XG 115w rev.3 – Appliance Only
- Recommended for 26-35 User Network
- Threat Protection Throughput: 375 Mbps
- Site-to-Site VPN Tunnels: 500
- Concurrent Sessions: 6,000,000
- Revision Number: 3
- Appliance Only — Includes 90-Days of Firmware Updates
- Manufacturer Part #: XW1BT3HEK
XG Series hardware appliances are purpose-built with the latest multi-core Intel technology, generous RAM provisioning, and solid-state storage. Whether you’re protecting a small business or a large datacenter, you’re getting industry leading performance.
Security Heartbeat – Your firewall & your endpoints are finally talking
Sophos XG Firewall is the only network security solution that is able to fully identify the user and source of an infection on your network and automatically limit access to other network resources in response. This is made possible with our unique Sophos Security Heartbeat that shares telemetry and health status between Sophos endpoints and your firewall, and integrates endpoint health into firewall rules to control access and isolate compromised systems. The good news is, this all happens automatically, and is successfully helping numerous businesses and organizations to save time and money in protecting their environments today.
Synchronized Application Control
Using Security Heartbeat we can do much more than just see the health status of an endpoint. We also have a solution to one of the biggest problems most network administrators face today – lack of visibility into network traffic.
Synchronized Application Control automatically identifies, classifies and controls encrypted, custom, evasive, and generic HTTP or HTTPS applications which are currently going unidentified.
Lateral Movement Protection
Lateral Movement Protection automatically isolates compromised systems at every point in the network to stop attacks dead in their tracks. Healthy endpoints assist by ignoring all traffic from unhealthy endpoints, enabling complete isolation, even on the same network segment, to prevent threats and active adversaries from spreading or stealing data.