Cybersecurity Network Engineer at Reliance Infosystems
Real User
Top 10
2024-09-23T11:28:00Z
Sep 23, 2024
As a provider, we are providing services regarding network security. From the server security units of the establishment, we are providing services to our clients to guide them against tech actors. We use perimeter defenses for them, and we have teams working with the endpoints.
Data Office Protect - DPO at DATATRUSTY TECNOLOGIA
Reseller
Top 5
2024-08-07T14:22:45Z
Aug 7, 2024
My primary use case for this solution is managing our company's customer relationship management (CRM) activities. We operate in a mid-sized enterprise environment with around 50 employees. Our setup includes integrating our existing enterprise resource planning (ERP) system and various third-party applications to streamline operations across sales, marketing, and customer service departments.
Information Technology Department at Sunflag Iron and Steel Co Ltd
Real User
Top 5
2023-08-15T06:34:00Z
Aug 15, 2023
We are using many features, such as email security, web security, VPN solution, and network visibility. Our company utilizes SAP ERP software. When clients want to integrate into our system, we give them access and define their usernames and passwords which we share exclusively with them. For that purpose, we use Sophos NAC to prevent any kind of malware outbreak and prevent unauthorized access.
Learn what your peers think about Sophos Network Access Control. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
The scope of the product is for cybersecurity reasons. It means to guarantee the connection to the internet and to the cloud and also to the user. It ensures the service that the cloud can provide is safe for the company and that there is no risk to using this kind of solution. The goal is to guarantee that there is not any risk for the company, in terms of possible attacks from viruses, spyware, or malware. This is mainly done via two different approaches. One is to have the system intercept any possible situation using AI algorithms that can predict and can instruct the hardware to intercept malicious items. The other approach is to create a dedicated channel, a VPN channel, that is encrypted. That helps us avoid any flow of data between one device and the other. There's a high level of encryption that protects data from interception.
I have been using the solution in order to manage the security aspect of access control. It guarantees that the people can access the infrastructure in a correct way when using different kinds of firewalls like Sophos, Cisco, MikroTik, et cetera, for example. It's used for security hosting in terms of firewalls, which is a router with firewall performance and can really control the access from that side. It's able to manage such a level of security due to the fact that it's working on Layer 2 according to the HESA standard.
Technical Operations Manager at a tech services company with 51-200 employees
MSP
2020-09-30T08:03:00Z
Sep 30, 2020
Within our organization, there are roughly 450 users, using this solution. Currently, I would say we're only using about 50% of the full functionality of the device. We definitely will keep using this solution in the future.
Security Analyst at a tech company with 11-50 employees
Real User
2020-03-16T06:56:00Z
Mar 16, 2020
We offer integration services to our customers. They are usually looking into solutions that are out there that are good, and which can work to support the organizational enterprise.
Sophos NAC Provides comprehensive, easy-to-deploy network access control that protects enterprise networks from the threats posed by non-compliant, compromised, or misconfigured endpoint computers. The software solution is vendor-neutral and works with existing network infrastructure and security applications. Computers are permitted or denied access to the network, based on a centrally defined, policy-driven assessment - and isolated, quarantined for remediation, automatically remediated, or...
As a provider, we are providing services regarding network security. From the server security units of the establishment, we are providing services to our clients to guide them against tech actors. We use perimeter defenses for them, and we have teams working with the endpoints.
My primary use case for this solution is managing our company's customer relationship management (CRM) activities. We operate in a mid-sized enterprise environment with around 50 employees. Our setup includes integrating our existing enterprise resource planning (ERP) system and various third-party applications to streamline operations across sales, marketing, and customer service departments.
Sophos Network Access Control is used for access control and network security.
Our use case include web filtering, VPNs, and firewall security.
We are using many features, such as email security, web security, VPN solution, and network visibility. Our company utilizes SAP ERP software. When clients want to integrate into our system, we give them access and define their usernames and passwords which we share exclusively with them. For that purpose, we use Sophos NAC to prevent any kind of malware outbreak and prevent unauthorized access.
We are using Sophos Network Access Control to block certain access to USB ports and desktops.
The scope of the product is for cybersecurity reasons. It means to guarantee the connection to the internet and to the cloud and also to the user. It ensures the service that the cloud can provide is safe for the company and that there is no risk to using this kind of solution. The goal is to guarantee that there is not any risk for the company, in terms of possible attacks from viruses, spyware, or malware. This is mainly done via two different approaches. One is to have the system intercept any possible situation using AI algorithms that can predict and can instruct the hardware to intercept malicious items. The other approach is to create a dedicated channel, a VPN channel, that is encrypted. That helps us avoid any flow of data between one device and the other. There's a high level of encryption that protects data from interception.
I have been using the solution in order to manage the security aspect of access control. It guarantees that the people can access the infrastructure in a correct way when using different kinds of firewalls like Sophos, Cisco, MikroTik, et cetera, for example. It's used for security hosting in terms of firewalls, which is a router with firewall performance and can really control the access from that side. It's able to manage such a level of security due to the fact that it's working on Layer 2 according to the HESA standard.
Within our organization, there are roughly 450 users, using this solution. Currently, I would say we're only using about 50% of the full functionality of the device. We definitely will keep using this solution in the future.
We are a solution provider and this is one of the products that we implement for our clients.
We offer integration services to our customers. They are usually looking into solutions that are out there that are good, and which can work to support the organizational enterprise.
I primarily use the solution to manage all of our devices.