Rohde & Schwarz Cybersecurity protects companies and public institutions worldwide against espionage and cyberattacks. The company develops and produces high-end encryption products, next-generation firewalls, network traffic analytics and endpoint security software as leading-edge technical solutions for information and network security requirements.
The awarded “made in Germany” IT security solutions range from compact all-in-one products to bespoke solutions for critical infrastructures.
The virtual environment for secured and comfortable web browsing. Browsing the Internet has become an absolutely necessity in today’s work environments. But our computers also process confidential and critical information such personal and company-internal data. Using the Internet offers huge benefits, but is also subject to constantly changing threats.
Two versions available:
Buzzwords: isolated browser, downloaded file scanning, secure cut&paste, complete isolation of intranet from internet, secure browsing, encapsulated browser, virtual machine
More about solution and implementation: BitBox
TrustedDesktop is a secure virtualized desktop solution with practical information flow control. Its basic principle is strong isolation of critical applications and corporate workflows as well as reliable enforcement of security policies. Its innovative technology enables comprehensive and auditable lifecycle protection of all enterprise data. The overall system ensures that protected information is only processed by trustworthy components. Any data leakage due to malicious or accidental errors is effectively prevented.
Buzzwords: secure virtualized desktop, DLP, VPN client, file encryption, full disk encryption, secure kernel, trusted virtual domain, TPM, printing control, device control, information flow control
More about solution and implementation: TrustedDesktop
IT security products have become as complex as the networks they’re trying to secure. Sophos knows that the solution to complexity is not more complexity. Sophos began producing antivirus and encryption products nearly 30 years ago. Today their products help secure the networks used by 100 million people in 150 countries and 100,000 businesses, including Pixar, Under Armour, Northrop Grumman, Xerox, Ford, Avis, and Toshiba. Sophos products allow you to secure every endpoint of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices.
Next-generation endpoint security for today’s businesses and tomorrow’s threats. Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Sophos next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. It also adds web filtering, application control, device control and more directly into the lightweight endpoint agent, so your organization’s policies are enforced anywhere your users go.
Buzzwords: next-gen protection, AV, application control, device control, antiransomware, zero-day protection, web and application exploit blocking, behavioral analytics, malicious traffic detection, web control, data control
More about solution and implementation: Sophos endpoint protection
|Ransomware is the number one malware attack affecting organizations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to business productivity.
Sophos Intercept X features CryptoGuard, which prevents the malicious spontaneous encryption of data by all forms of ransomware—even trusted files or processes that have been hijacked. And once ransomware gets intercepted, CryptoGuard reverts your files back to their safe states.
Buzzwords: antiransomware, ransomware protection, file hostage, cryptoguard, malicious spontaneous encryption prevention, attack forensic analysis, exploit prevention
More about solution and implementation: Sophos Intercept X
|Manage endpoint security and mobile devices from one unified cloud console. Sophos Central is the only fully integrated security solution that protects your corporate IT infrastructure and all of your end users’ devices with integrated endpoint security, mobile device management (MDM), server protection, and secure web gateway into a seamless solution. The web-based management console lets your IT administrators monitor your security status through a single pane of glass view.|
Buzzwords: security heartbeat, AV, application control, device control, anti ransomware, zero-day protection, web and application exploit blocking, behavioral analytics, malicious traffic detection, web control, data control, synchronized security for network and endpoint
More about solution and implementation: : Sophos Central
Add more expertise to your endpoint protection. How do you know if your endpoint protection is actually working? Your security could have missed a virus and be unaware that you’re under attack. With Sophos Clean you can do an additional scan, find security breaches, and get rid of them.
Buzzwords: malware removal, AV verification, second opinion scanning, remediation
More about solution and implementation : Sophos Clean
|Protect your virtual and physical servers without sacrificing performance. Sophos Server Protection effectively protects your server environment from malicious attacks while keeping your servers running at peak performance. Designed to secure mission critical servers, Sophos Server Protection integrates server application whitelisting with advanced anti-malware and HIPS. Protection for your Windows, Linux and UNIX systems and optimized for virtual environments.|
Buzzwords: server application whitelisting/lockdown, server protection on any platform (windows, linux, unix), HIPS, VMware vShield
More about solution and implementation: :Sophos server security
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats
Real-time threat detection, security automation and business context.
Real-time Change Intelligence: Get real-time threat detection and notification at the speed of change. Tripwire® Enterprise delivers change audit and threat detection with high precision, business context and insight for what to do about it.
System Hardening and Compliance Enforcement: Tripwire Policy Manager delivers proactive configuration hardening based on compliance requirements, reduces audit preparation time and cost, and provides audit-ready reporting with evidence of compliance, remediation and exception management.
Security Automation and Remediation: Configuration errors need corrective measures. Tripwire Remediation Manager delivers automation and guidance for rapid repair of broken or security misconfigurations, and integrates with SIEMs, IT-GRC, workflow systems, change management systems and more.
Buzzwords: File integrity management (FIM), secure configuration management (SCM), security automation and remediation, system hardening, vulnerability management, real-time change intelligence, SANS20, baselining, PCI DSS, ISO, adaptive threat protection