Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools
You are here: Home / Security Solutions / Sophos Security Gateways/UTM / Management Tools

Management Tools

Sophos Command Center

The  Command Center is a central management application which enables users to see and work with all Sophos  products through a single log in. From instant hardware reports to security trend information, monitoring and managing all devices becomes an efficient and effective process. With just a few simple steps, IPSec VPN tunnels can be established and policies can be deployed to many installations.

Features

Real-Time Monitoring
At every site where an Sophos product is used, activity and information is gathered that administrators rely on. Rather than view and work with this data individually, the  Command Center is the central point where you can see information on connected devices.

Site-to-Site VPN Configuration
No longer does making a VPN tunnel between two or more sites require an “information swap” by logging into each device and configuring parameters from the opposite end. The  Command Center makes building VPN tunnels easy, even if dozens of devices need to be connected.

Device Maintenance
The  Command Center lets you take central control over updating your security infrastructure. Using the same technology as our WebAdmin, you can see what firmware version your installations are running and update them all simultaneously.

Inventory Management
Inventory management allows the review of everything connected to the  Command Center. Showing what types of devices are currently being managed, along with hardware specifications like number of processors and amount of memory, administrators can keep track of what their security infrastructure currently consists of.

Access Management
Remove the need to remember complex site passwords and login information. Using encrypted sessions, you can dive directly into a device’s WebAdmin from within the Command Center without needing to re-authenticate.

Global Definitions
Avoid redundant tasks with Global Definitions. You can use to use the  Command Center to centrally define objects and then push them out to your installations, placing objects directly in the target device inventory, ready to be used for building configuration.

Aggregated Reporting
The  Command Center has a central reporting engine which allows you to select and compile over 20 reports individually or combined across multiple installations. This can let you know the most-accessed site in a company for a month, or the total amount of bandwidth transferred by three locations so far this week.

Central Web Content Filter Configuration
Working with a company policy on web usage can be difficult when you have multiple sites or branches to maintain. With central management of Web Content filtering, you can make sweeping changes or selective adjustments anytime with no need for advanced planning and synchronization effort.

Central Packet Filter Rules
When faced with the task of building and maintaining firewall rules for multiple locations, administrators can often be overwhelmed by complex rule sets which must be manually created and maintained at each site, and grow exponentially as more locations are added. For the average SMB to the enterprise company, there is a better and more effective way to work with your security rules.

For more information, click here for the Sophos Command Center Datasheet, or contact us.

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • US Charges 20-Year-Old Head of Hacker Site BreachForums
  • Tesla Hacked Twice at Pwn2Own Exploit Contest
  • CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement