How to Buy
Sophos offers a number of ways to get the products and solutions you need. Find the right option for you!
IT security products have become as complex as the networks they're trying to secure. Sophos knows that the solution to complexity is not more complexity. We tackle security challenges with clarity and confidence, knowing that simple security is better security.
Sophos offers a number of ways to get the products and solutions you need. So how do you actually choose what to buy? It's easier than you think!
Select a product below:
Endpoint Protection:
Choose Sophos Central cloud-based management or deploy Sophos Enterprise Console software to apply policy, run updates, and gather reporting.
Choose either Standard for entry-level protection or Advanced for additional protection with policy controls.
Optionally, you can add Intercept X if you manage your endpoints through Sophos Central, or you can add Endpoint Exploit Prevention if you're deploying Enterprise console. Both options add CryptoGuard anti-ransomware and exploit technique mitigations. Additionally, Intercept X includes Root Cause Analysis attack visualization.
ENDPOINT PROTECTION STANDARD |
ENDPOINT PROTECTION ADVANCED |
ENDPOINT EXPLOIT PREVENTION |
CENTRAL ENDPOINT STANDARD |
CENTRAL ENDPOINT ADVANCED |
INTERCEPT X | |
---|---|---|---|---|---|---|
ENDPOINT PROTECTION | INTERCEPT X | |||||
ATTACK SURFACE REDUCTION | ||||||
Web Security | ||||||
Download Reputation | ||||||
Web Control / Category-based URL Blocking | ||||||
Peripheral Control (e.g. USB) |
||||||
Application Control | ||||||
Client Firewall | ||||||
BEFORE IT RUNS ON DEVICE | ||||||
Deep Learning Malware Detection | ||||||
Anti-Malware File Scanning | ||||||
Live Protection | ||||||
Pre-execution Behavior Analysis (HIPS) | ||||||
Potentially Unwanted Application (PUA) Blocking | ||||||
Patch Assessment | ||||||
Data Loss Prevention | ||||||
Exploit Prevention | ||||||
STOP RUNNING THREAT | ||||||
Runtime Behavior Analysis (HIPS) | ||||||
Malicious Traffic Detection (MTD) | ||||||
Active Adversary Mitigations | ||||||
Ransomware File Protection (CryptoGuard) | ||||||
Disk and Boot Record Protection (WipeGuard) | ||||||
Man-in-the-Browser Protection (Safe Browsing) | ||||||
INVESTIGATE AND REMOVE | ||||||
Automated Malware Removal | ||||||
Synchronized Security Heartbeat | ||||||
Root Cause Analysis | ||||||
Sophos Clean | ||||||
*Not all features are supported on all operating systems |
Intercept X Endpoint:
Intercept X runs on Windows 7, Windows 8.x and Windows 10. Intercept runs as a standalone agent, alongside your existing antivirus or combined with Sophos Endpoint Protection. Intercept X gives you next-generation anti-exploit, deep learning malware detection, anti-ransomware, root cause analysis, and advanced system clean technology.
INTERCEPT X | ENDPOINT PROTECTION ADVANCED | |
---|---|---|
ATTACK SURFACE REDUCTION | ||
Web Security | ||
Download Reputation | ||
Web Control / Category-based URL Blocking | ||
Peripheral Control (e.g. USB) |
||
Application Control | ||
BEFORE IT RUNS ON DEVICE | ||
Deep Learning Malware Detection | ||
Anti-Malware File Scanning | ||
Live Protection | ||
Pre-execution Behavior Analysis (HIPS) | ||
Potentially Unwanted Application (PUA) Blocking | ||
Data Loss Prevention | ||
Exploit Prevention | ||
STOP RUNNING THREAT | ||
Runtime Behavior Analysis (HIPS) | ||
Malicious Traffic Detection (MTD) | ||
Active Adversary Mitigations | ||
Ransomware File Protection (CryptoGuard) | ||
Disk and Boot Record Protection (WipeGuard) | ||
Man-in-the-Browser Protection (Safe Browsing) | ||
INVESTIGATE AND REMOVE | ||
Automated Malware Removal | ||
Synchronized Security Heartbeat | ||
Root Cause Analysis | ||
Sophos Clean | ||
*Not all features are supported on all operating systems |
Intercept X for Server:
Decide how to deploy
Sophos Server Protection can be deployed on a physical server, or run on a VM (either in your datacenter or on AWS or Azure). It can be managed either through the Sophos-maintained Sophos Central website, or through an on-premises management console. Both deliver outstanding performance and protection. See the licensing guide for details on the features available across the two price tiers on Sophos Central, and on-premises with the Sophos Enterprise Console.
Phish Threat:
Scalable security awareness testing and training kept simple
- Scalable cloud email security kept simple
- Priced per user with bands from 1 to 5000+
- Single license type to keeps things simple
- 1, 2 and 3 year subscriptions
- Monthly pricing with MSP FlexConnect
Sophos Phish Threat Includes |
---|
Unlimited user simulations and training Sophos Phish Threat's single, per-user license type keeps things simple, with unlimited tests and trainings per year |
Automated user enrollment Should a user click on a simulated attack, they are automatically enrolled in personalized training |
Baseline testing Create phishing campaigns without training to discover your organizations overall risk (users are directed to a fake 404 page upon click) |
User template variables Add variables to email templates such as the recipient's email address, first name, and last name |
Multi-language content Interface, selected email templates, and training modules available in English, Spanish, French, German, Italian, Brazilian Portuguese, Japanese, Korean, and Traditional Chinese |
Organization dashboard The intuitive reporting dashboard provides organization-level metrics and awareness insights |
Central user management Phish Threat is fully integrated with Sophos Central, utilizing the global user list for simplified management |
AD sync Synchronize users and groups from Active Directory |
Multi-region SOC 2 Compliant hosting Available in the United States, Ireland and Germany |
SafeGuard Encryption:
License Options
SafeGuard Enterprise and Sophos Mobile Advanced bundle
Combines the best of both worlds. Get the entire SafeGuard Enterprise bundle, seamlessly integrated with our Sophos Mobile device management platform.
SafeGuard Enterprise Encryption
Our SafeGuard Enterprise Encryption includes SafeGuard Disk Encryption and SafeGuard File Encryption in a single convenient license. To secure your data everywhere and prevent data loss, you need both full disk encryption and file encryption. SafeGuard Enterprise provides both capabilities, along with centralized management and reporting.
SafeGuard File Encryption
SafeGuard File Encryption provides file-level encryption through two options: file/folder encryption and next-generation synchronized encryption. Regardless of the option you choose, you can still secure files everywhere; on computers, removable media, cloud storage, and through file shares.
SafeGuard Disk Encryption
Sophos provides centralized management for full disk encryption with the ability to centrally manage device encryption for BitLocker/FileVault 2. You can deploy and manage full disk encryption across Windows and Mac computers using SafeGuard Disk Encryption or Sophos Central Device Encryption.
Sophos Central Device Encryption
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native full disk encryption from the simple, intuitive, web-based interface. There is no server to deploy and no need to configure back-end key servers, meaning you can deploy and start securing data in minutes.
Modules | Sophos Central Device Encryption | SafeGuard Disk Encryption | SafeGuard File Encryption | SafeGuard Enterprise Encryption | SafeGuard Enterprise Encryption and Sophos Mobile Control Advanced |
---|---|---|---|---|---|
Manage BitLocker and FileVault Centrally manage native operating systems' encryption technologies |
|||||
Full Disk Encryption for Legacy Systems Full disk encryption for Windows 7 systems without BitLocker |
|||||
Password Protect Files Create self-extracting, password protected HTML5 files for secure collaboration with external parties |
|||||
File/Folder Encryption Protect files on selected folders |
|||||
Encryption for Removable Media Protect data on removable devices, such as USB sticks and optical media |
|||||
Encryption for File Shares Protect files and folders on local or network shares |
|||||
Centralized Management Set policies for groups and devices from a centralized console |
Web-based | On Premises | On Premises | On Premises | On Premises |
Cross-Platform Key Management Ensure only your users with authorised application have access to your encrypted data |
|||||
Compliance and Reporting Demonstrate compliance with data security regulations |
|||||
Secure Workspace Enable secure collaboration across iOS and Android, providing seamless access to encrypted files |
|||||
Self-Service Key Recovery Allows users to access recovery key for BitLocker and FileVault device encryption |
|||||
Mobile Security View, access, and share encrypted data on mobile devices |
|||||
Mobile Device Management Protects data in the event of a lost or stolen device |
Secure Wi-Fi:
Get Secure Wi-Fi from Sophos in three simple steps:
- Choose How to Deploy
Depending on your buying situation, choose the deployment method to best suit you - Select Your Access Points
We have range of models to suit many different environments - Choose Your License
You need the license for your chosen access points
You can read more about deployment options below
If you need help deciding what's right for you, simply contact us.
Choosing How to Deploy
Depending on your buying situation, you will need to decide how you want to deploy.
Sophos Wireless: Cloud-managed Wi-Fi in Sophos Central
Our cloud-managed Wi-Fi is a simple, scalable solution best suited to customers who want the latest innovations and technology support. It is also best suited to customers who:
- are new to Sophos and not currently using any other Sophos products
- are already using other Sophos solutions in Sophos Central
- are not planning to implement a UTM or Firewall from Sophos
- want to benefit from cloud scalability and adopt an OPEX-based cost model
Controller-managed Wireless
If you're already using Sophos UTM or Sophos XG Firewall, then you can use your existing appliance as a Wireless controller. Find out more under:
Secure Web Appliance:
Choose How to Deploy
No matter which deployment option you choose, you get advanced protection that you can extend everywhere, lightning performance, rich reporting, granular controls, and easy ownership.
Sophos Web Appliance (Hardware/Virtual)
Choose from our range of lightning fast hardware appliance models ideally suited for small business all the way up to large enterprises. Or select our VMware-ready virtual appliance that's easy to deploy into your virtualization infrastructure and size the appliance accordingly. Both offer easy wizard-based setup and come with our unique managed-appliance service that includes remote monitoring and automated updates.
Extend Your Protection and Management
Centralized Management
If you have multiple Sophos Web Appliances, we offer a Sophos Management Appliance to provide seamless centralized management, policy replication, and consolidated reporting across your entire network. It makes managing web security and enforcement on large distributed networks easy.
The Sophos Management Appliance is available in two models. The SM2000 is suitable for organizations with up to 2000 users, and the SM5000 suits organizations up to 15,000 users.
SG UTM:
Three simple steps will get you complete security with Sophos UTM:
- Choose How to Deploy
Hardware, software, virtual or cloud-based appliance - Choose Your License
Choose pre-packaged licenses or license modules individually - Choose Your Add-ons
Extend your protection or take advantage of centralized management and reporting options
You can read more about these steps below. And if you need help deciding what's right for you, simply contact us. We'll both be happy to help.
Choose How to Deploy
SG Series
Our SG Series hardware appliances are purpose-built devices with the latest technology to provide the ultimate in performance.
Software and Virtual
Install the UTM image on your own server hardware or on your preferred virtual environment, including VMware, Citrix, Microsoft Hyper-V and KVM.
Cloud
Deploy your UTM in Amazon Web Services (AWS) using either a traditional subscription license or Amazon's On-Demand pay-as-you-go model.
Sophos Mobile:
It's easy to select the Sophos Mobile license that's right for you. All licenses are conveniently based on the number of users, regardless of the number of actual devices. You only need to make two choices:
- Feature set
Select between the Mobile Advanced or Mobile Standard license features. - Deployment method
Select if you want to manage Sophos Mobile hosted in Sophos Central or to install on your own premises.
Feature Set
Sophos Mobile Advanced | Sophos Mobile Standard | Sophos Mobile Security | |
---|---|---|---|
Choice of management in Sophos Central or on your premises |
Sophos Central only | ||
Device Management | |||
Application Management | |||
Content Management | |||
Sophos Container (Secure Workspace, Secure Email) |
|||
Sophos Mobile Security (for Android) | |||
Mobile SDK |
To learn more, please see the Product Overview.
View the Sophos Mobile Feature Matrix
Deployment Method
Manage Sophos Mobile fully hosted in Sophos Central
Ideal choice if you want to save time and effort managing your traditional and mobile endpoints.
- Full Unified Endpoint Management (UEM) side-by-side with endpoint, network, and server security, managed in the same admin interface
- Get started in minutes and save IT resources with no server installation needed
- Get the same console, the same look and feel, and the same simplicity across all your security products from Sophos
Install on your own premises
If you want to keep all your data on your own in-house server, this is the ideal version for you.
- Fully integrated into your IT environment
- Installed on your premises, so all your data stays in-house
- Connect to your existing user directory
Choose Your License
Other Licenses
Sophos Mobile Security for Android managed by Sophos Central
If you want to protect your Android devices with award-winning, anti-malware technology from Sophos, the Central Mobile Security license is for you. Manage device scanning, web protection, web filtering, and much more, directly from the easy-to-use Sophos Central admin interface.
Both the Mobile Advanced and Central Mobile Advanced licenses also include Sophos Mobile Security.
To learn more, please see the Product Overview.
XG Firewall:
Deployment Models
Software
Deploy a software image on your Intel-compatible hardware.
Virtual
Deploy using your preferred virtual environment (including VMware, Citrix, Microsoft Hyper-V, and KVM).
Protection
Take advantage of our bundles, or purchase your protection
individually as modules.
BASE PROTECTION | NEXT-GEN FIREWALL | TOTAL PROTECTION |
---|---|---|
Included with your purchase. | Recommended if you're looking for a little more protection. |
Recommended if you're looking for a little more protection. |
|
|
|
Recommended Add-ons
Remote Ethernet Devices (RED) and Wireless Access Points
Extend your network easily and securely. Use RED to give your remote locations direct access to your to your firewall via VPN. And, use wireless access points to offer secure wireless networking wherever its needed.
Centralized Management and Reporting
Sophos Firewall Manager offers full-featured management of all your firewall devices from a single console. Sophos iView provides consolidated reporting across all your firewalls for a complete view of your network on a single screen.
Security Heartbeat™ with Sophos Central managed endpoint
Add a Sophos Central account to deploy and manage our award-winning endpoint security, enabling Security Heartbeat™ to link your Firewall and endpoints for the ultimate in advanced threat protection and response.
Support
⭐ Standard Included with purchase |
⭐⭐ Enhanced Included in all bundles |
⭐⭐⭐ Enhanced + |
|
---|---|---|---|
Support Via telephone and email |
Included for 90 days (During regular business hours) | Included (24/7) | VIP Access (24/7) |
Security Updates and Patches For the life of the product |
Included with an active software subscription | Included with an active software subscription | Included with an active software subscription |
Software Feature Updates and Upgrades | Included for 90 days | Included | Included |
Consulting Remote consultation on your firewall configuration and security with a Sophos Senior Technical Support Engineer |
Included (Up to 4 hours) | ||
Warranty and RMA For all software hardware appliances |
1 year (return/replace) | Advance Exchange | Advance Exchange |
Technical Account Manager Dedicated named technical account manager |
Optional (additional cost) | Optional (additional cost) |