A Full-Featured Security Appliance
Protect your servers from incoming threats
Web-based threats occur in two main ways: 1) you either visit an infected website or open an infected email (outbound requests), or 2) your website or service is attacked directly using exploits such as SQL-Injection or Cross-Site Scripting (incoming requests). Your Sophos UTM can be configured to protect you and your users from both outbound and inbound attacks.
The Sophos UTM Web Protection feature can be thought of as anti-virus for web sites that you are browsing. By analyzing the content that you’re visiting while browsing, your Sophos UTM can detect and block malicious content before it ever reaches any of your servers.
Your Sophos UTM comes fully equipped with advanced incoming request filtering, often called a “Web Application Firewall” or a “WAF”, which will filter incoming requests for malicious content. SQLi, XSS, and other incoming attacks are blocked by this feature. Furthermore, if you have a sensitive login-screen that is frequently attacked – a WordPress admin login, for example – you can offload your authentication system to your UTM for an additional layer of enterprise-grade security.
Full-Featured Firewall & Advanced Threat Protection
Add another layer of protection with a VPN
A Virtual Private Network connection (VPN) allows you to connect directly to your Private Network here at Vivio. Once connected to your network, you can access your web servers, email servers, database servers, or anything else that you need access to that’s safely tucked away behind your Sophos UTM, as if your Vivio private network were right there with you. This gives you all the features and convenience of a robust hosted environment, along with all the freedom of a local network.
Implement a UTM into any new or existing topology
Your Sophos UTM can be implemented in a huge variety of ways. Utilizing virtual switching, VLAN’s, and physical hardware (all handled by Vivio Support so you never have to worry about it), you can implement your UTM into any new or existing topology.
UTM’s themselves can also be clustered, eliminating any UTM as a single point of failure. With the Sophos UTM’s Intelligent Clustering capabilities, UTM’s can easily be configured in master/master mode, sharing workload and scaling up to huge numbers of UTM’s. This means that you have options that can support incredible throughput for a secure, clustered environment that can scale with you as you grow.