Rent Sophos IT security solutions instead of buying them
Simply rent your Sophos Mobil Control from a certified Sophos Managed Service Provider and respond to the individual needs of your company. Benefit from the latest Sophos technology through the flexible rental model and receive a coordinated complete IT security solution for your company, which can be expanded as required.
- Can be cancelled on a monthly basis (at no extra cost - only each month or part thereof of an individual license is paid for)
- Thus flexible running times
- Pay as you grow - only pay for the licenses you really needLatest Sophos technology
- No investment costs
- You can expand your IT infrastructure as you wish with rental licenses (e.g. for computers or other servers)
- Hosted in Germany
- Sophos support included
General information about Sophos rental licenses
You will receive a Sophos Central (Sophos Cloud) account from us, which you can use to download the required client software. After installing the client software, it will be displayed in your Sophos Central dashboard. This gives you an overview of your used licenses at any time.
The licenses will be invoiced monthly in arrears as soon as you have logged on to the Sophos Central server at least once in the current calendar month. This means that you will receive an invoice from us for the following month with the number of licenses used for the respective previous calendar month. You can uninstall or install and thus reduce or increase the number of licenses you have purchased at any time. The cancellation period requires a written cancellation in the current calendar month. Only each "broken" calendar month will be charged.
Please note that you can purchase all Sophos Cloud products from the dashboard. You can find the current prices here in our shop.
Sophos Central Server Protection does more than defend against known malware based on signatures, and also protects your Windows and Linux servers from modern threats. Based on real-time threat data from SophosLabs, the solution correlates suspicious behavior and activity: from malicious URLs to web exploit code and unexpected system changes to command-and-control traffic. This keeps your servers and data reliably protected.
Cloud Optix is designed to inventory cloud services and assets.
Combine the power of AI and automation to simplify securing your cloud.
Sophos agentless Cloud Optix service designed for SaaS applications combines Deep Learning with autonomous intelligence. This provides cloud security and monitoring delivery. With the help of analytics and compliance automation via a user-friendly interface, you get efficient process design.Highlights
- Agentless, SaaS-based setup within minutes
- Data management across multiple cloud providers
- Overview of the entire network and the traffic within it
- AI-based user and traffic monitoring and checking for anomalies>/li>
- Continuous control of compliance policy
- Overarching and broader compliance policies
- Alarm correlation for faster network problem resolution
- Detection of errors in critical configurations
- Continuous scanning of infrastructure for malicious or spy codes
See everything, Secure Everything
Automatically discover your organisation's assets in Amazon Web Service (AWS), Microsoft Azure (MA) and Google Cloud Platform (GCP) for up to 100 assets so your staff can counter attacks and remediate vulnerabilities in minutes. With continuous asset monitoring and full network topology and traffic visualisation, with inbound, outbound and internal traffic displayed.
Proactive Cloud Compliance
When workflows move to the cloud, it is important to keep track of the applications of each compliance process - no matter how they are implemented - this can be very difficult and confusing. Cloud Optix reduces their cost and complexity of compliance governance and risk with its out-of-the-box policies, custom rules and easy collaboration tools.
Accelerate compliance processes
By continuously monitoring custom and pre-built policies with CIS, GDPR, SOC2, HIPAA, ISO 27001 and PCI DSS security standards.
Collaboration made easy
Manage and track compliance so key tasks don't get lost, even when using third-party tools like JIRA and ServiceNow.
AI-protected security analytics and monitoring
Cloud Optix continuously monitors and learns about your cloud inventory, configurations and network traffic. AI-backed smart alerts are designed to reduce response time and help minimise security risks with automated alerts and contextual information combined in a ranked list.
- Continuously monitor cloud inventory (Amazon Simple Storage Service (S3), security groups, user access keys, etc. ) configurations and security group logins
- Identify abnormal user behaviour patterns in advanced attacks from stolen user access keys or fraudulent employees
- Predict the flow of your traffic based on their security settings to better protect potential attack points
- Create commands and prevent, detect and fix accidental or maliciously created network setting changes
The increased pace of change in infrastructure as code makes new software appear several times a day through the sustained deployment of DevOps practices. This increases the pressure on their security team and could leave you unprotected. Cloud Optix API-driven architecture enables your DevOps team to seamlessly integrate DevOps processes into their security - ensuring fast and secure delivery.
Detect Deviant Protections
Continuous monitoring of deviations in the default configuration prevents critical settings from being changed that could lead to vulnerabilities in the enterprise.
Proactively scan from infrastructure template
Continuously scan infrastructure as code templates deploy ready solutions such as Terraform, Github or Bitbucket. Identify misconfigurations that may cause the deployment of the system to produce errors in the infrastructure.
Integrate SIEM and DevOps tools
Integrate third-party security tools, such as SIEM and DevOps tools, around CI/CD to simplify security operations.
Simplify management and rollout
The agentless SaaS-based service Cloud Optix works perfectly with other enterprise tools. Connecting to cloud accounts via AWS, Azure or GCP is kept simple based on the instructions and scripts provided, allowing read-only access via the cloud APIs. Connections can be set up in minutes and then have direct access to your cloud environment and important information via Cloud Optix.
Cloud security is a shared responsibility
Public cloud providers enable a foundation with a lot of flexibility, but do they only have to worry about the data centre hardware. Since there is a separation of physical data and the environment, you are responsible for the security of your cloud infrastructure.
Sophos Central Endpoint Protection can do more than defend against known malware based on signatures, and also protects your Windows, Mac and Linux systems from modern endpoint threats. Based on real-time threat data from SophosLabs, the solution correlates suspicious behavior and activity: from malicious URLs to web exploit code and unexpected system changes to command-and-control traffic. This keeps your endpoints and data reliably protected.
Sophos XG software gives you the functionality of Sophos XG hardware firewalls on your own Intel-compatible hardware or as a virtual instance on VMWare, Hyper-V or the Amazon Cloud.
The application software and hardened operating system are combined into a single software image and can be easily deployed on the hardware of your choice. The self-booting software package installs in minutes on a dedicated Intel-compatible computer. The software appliances offer the same full feature set as our pre-installed hardware appliances. However, with the software appliances, you have the option to change or upgrade the underlying hardware.
The performance metrics depend on the hardware you choose. The best performance is achieved with hardware configurations with at least Intel dual/quad-core CPUs running at 2 GHz and 2 GB RAM.
Compared to the Sophos SG series, the new Sophos virtual appliance comes standard with IPSec, SSL VPN and comprehensive wireless protection as part of the base firewall.