Sophos XG Firewall

Sophos XG Firewall is an integrated security system that can protect networks from hybrid threats using unique user identity policies orIP as a firewall.
Sophos XG Firewall is a set of security systems such as firewall, support for creating virtual private network VPN, Antivirus, Anti-Spam, IPS, Content Filtering, bandwidth management, multi-link internet management and the ability to provide full reports of how the Internet is used in the network, all embedded on the same device. The features mentioned allow companies, institutes, government agencies and organizations to protect their internal network against domestic and foreign attacks, including spyware and deceptive attacks, viruses, worms, Troy horses, Dos attacks and other types of attacks.

Introducing the Features of the Device
– Bandwidth Policy
By applying this limitation, the network administrator can have proper and accurate management on the internet bandwidth of the organization and use it optimally in its network and assign it to each user based on the case and type of use of that user's bandwidth Internet.

– Firewall
This section provides the network manager with the possibility of comprehensive management of the communication openings of the organization's network with the outside. For example, it is possible to determine which time intervals each user will use different TCP or UDP ports according to their needs.

- Managing the use of the Internet as Floating Time
Sometimes in organizations, depending on the limitations, the approach of applying restriction policies on the amount of time to use the Internet can be useful for managers. This policy applies so that users can use the Internet to a certain extent over a period of time, for example 2 hours a day.

- Management of volume usage of the Internet
In some organizations, depending on the policies of the managers of the organization, there is a need to impose volume restrictions on the use of the Internet for users. This policy can be applied through Sophos XG Firewall in various ways, such as Download Volume Limit and Upload Volume Limit, or for both.

– Web and Application filter
Other features of this device include restrictions on access to various sites, as well as restrictions on the use of internet-connected software such as Download Managers, Filter Breakers, Chat software, as well as download restrictions, Upload of various files.

Fixed Time Limit
Internet access is limited to a fixed timeframe. By applying this policy, the network administrator will be able to share the use of the Internet for users in different time intervals.

– Simultaneous use of multiple internet connection lines
This enables network administrators to use multiple internet connections simultaneously or as each other's supporters. Using this possibility, you can ensure that the network communicates permanently with the Internet.

– HA
It is possible to use two devices simultaneously with the same settings in the network, which provides the network administrator with features such as Load Balancing and Fail Over.

-Report
Providing comprehensive and complete reports on how to use the Internet in the network are other features of this device.Reports such as the amount of time of internet use by users, the amount of download volume, uploaded by users, the sites referred to, the time intervals of internet use by users, the events occurred on the device, the number of attacks carried out and the determination of the attacker's IP and viruses and spam filtered and many other combined reports.


Device Security Facilities
– Web Protection
Full protection against web threats, along with powerful tools to enforce security rules, to keep users safe and efficient on the Internet.

– Wireless Protection
Launch, manage and secure wireless networking equipment within minutes with Firewall XG products with Sophos Access Point.

– Network Protection
Protection needed to stop complex attacks and advanced threats and simultaneously provide network access to those you trust.

– Web Server Protection
Make your servers and web applications resistant to intrusive attacks while using the reverse proxy authentication feature to securely access users outside the organization.

– Email Protection
Complete security of SMTP and POP3 messages against spam, fraud and data theft with integrated protection that combines message encryption with DLP and anti-spam.
 
- Implementation
The implementation of the above system after the company's experts visit the organization's network and provide the initial explanation and final approval of that respectable organization within a period of one or two days along with training and final testing and finally with one-year international support from the manufacturer and local support of the company It will be wise.
Saia Ertebat Aren Company Having an experienced and trained staff and according to its mission and vision of providing security services to private and government organizations, organizations and companies, the above project is based on a security-oriented approach in private networks and the launch of secure services on the Internet platform. With the aim of achieving the highest level of security and stability in dealing with various internet threats, it is presented to that respected organization.