There is also the inline IPS which is functional in Sophos. Much more secure and I can tell it exactly which device can do what to the outside. Sophos however requires you to punch pin holes through. Thus once you have an infected device on the inside and it calls back to HQ for whatever nefarious reason the average router & FW will just let the devices talk assuming that since it started from inside it must be legit. However the idea that every pc/cell phone/xbox is virus/malware free would be woefully incorrect. Thus opening the return port for a response from wherever your local device "phoned home". The main reason I chose it over pfSense is because it is more secure.īy default most home level FW's assume traffic originating from the inside is secure & allows it to traverse out to the internet. The learning curve is semi-steep but google and the Sophos forums are you friend. I hope I at least pointed you in the right direction? If you are on a limited budget, PfSense can't be beat. If you have the funds to buy a UTM.go with Sophos. Sophos is expensive but for what you get.it does an outstanding job! Sophos is always top rated when it come to their Security.and from every one that I know that runs them.they do the job very well. I bought hardware directly from the Electric Sheep guys.top notch hardware and support. It take awhile to really get into the interface but once you figure things out.it is by far the better Enterprise solution.Īs far as the mini ITX boxes on Amazon.be careful. I tried out Sophos and the interface is clunky but the features are top notch. And if you want Professional Support, its on there site at a very reasonable cost for SMB's. There is a ton of useful information on there forums if you run into issues. It is easy to figure things out and basic set up is easy and informative to use. Pfsense is free, has great support, and is BSD based.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |