Sophos iView

An intelligent view of your network

Monitoring a distributed network across multiple locations can be a challenge. That’s where Sophos iView can help. It provides you with an intelligent, uninterrupted view of your network from a single pane of glass. If you have multiple appliances, need consolidated reporting, or could just use help with log management or compliance, Sophos iView is the ideal solution.

Highlights

  1. Extensive built-in reports with custom view options
  2. Reporting for Sophos XG Firewall, UTM 9 and CyberoamOS devices.
  3. Compliance report grouping for HIPAA, PCI DSS, GLBA, SOX and more
  4. Easy identification of network activities and potential attacks
  5. Persistent long-term retention of all your reporting data
  6. Easy back-up of logs with quick retrieval for audit purposes
  7. Out-of-the-box deployment without the need for technical expertise

Mobile Device Management for iOS and Android

ensures complete protection of all your enterprise mobile endpoints and enables a detailed control over companies’ mobile devices fleet. In the BYOD era, where the line between work and leisure gets thinner day by day, we offer enhanced security for sensitive company information stored on personal smartphones and tablets and discrete monitoring over personal mobile device use in corporate environments, allowing at the same time a clear limitation between business and private employee stored data.

Available as Cloud-based, Hardware or Virtual Appliance it is a flexible solution that fits to any environment.

Consolidated reporting

Sophos iView offers aggregated reporting across multiple Sophos and Cyberoam firewall devices and locations, providing a consolidated view of all your network activity. Get a clear picture of what is happening on your network at any time from a single pane of glass.

User-based Reporting

Sophos iView takes full advantage of our patented Layer-8 user identity to provide visibility into user activities. Get insights into users accessing P2P and other high risk applications, unproductive web surfing, user machines triggering ATP events, downloads and bandwidth consumption across your entire network, regardless of where users are working.

Security intelligence

iView lets you identify potential network issues and possible attacks anywhere across your network. For example, it helps identify malware-infected hosts triggering ATP events, suspect users or traffic anomalies including spikes in ICMP traffic or unusual bandwidth consumption that may indicate a possible attack.

Log backup and management

Sophos iView logs data from multiple devices at distributed locations with smart indexing and easy search facilities, enabling quick retrieval, audits and forensics.

Feature list and technical specifications

Supported Devices

  1. Supports Sophos XG Firewall, UTM 9, and CyberoamOS devices
    1. Log reports
    2. Real-time log
    3. Archive log
    4. Audit log
    5. Archived log search

    1. Reports
    2. Extensive built-in reports
    3. Historical reports
    4. Customized report views
    5. Reports include: Application Reports, Web Reports, Email Reports, Web Server reports, Intrusion attempts, ATP, Wireless, Security Heartbeat, VPN and more
    6. Compliance reports: HIPAA, PCI DSS, GLBA, SOX and FISMA
    7. Multi-format reports: tabular, graphical
    8. Exportable format: PDF, Excel
    9. Search Engine Reports - Google, Yahoo, Bing, Wikipedia, Rediff, eBay
    10. Trend Reports
    11. Custom & Special reports with granular search options

    1. Administration
    2. Web-based management console
    3. Role-based administration
    4. Multiple dashboards: report, resource
    5. Automatic device detection
    6. Device Grouping: Device type, Device models
    7. Reports accessible from any location using a standard web browser
    8. Bookmark Management
    9. Data Retention Management

    1. Appliance specifications
    2. Sophos iView is available as a virtual appliance and software appliance
    3. Sophos iView supports VMware, Hyper-V, Citrix, and KVM virtual environments
    4. The license you purchase should be matched to your environments activity and storage requirements

Note: Reports supported vary based on device type

☎ Call Us ✉ Contact Us