{"id":3769,"date":"2021-09-22T09:23:42","date_gmt":"2021-09-22T07:23:42","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=3769"},"modified":"2021-09-22T09:23:42","modified_gmt":"2021-09-22T07:23:42","slug":"sophos-solution-update-september-2021","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/09\/resources\/sophos-solution-update-september-2021\/","title":{"rendered":"Sophos Solution Update \u2013 September 2021"},"content":{"rendered":"<p>We\u2019re pleased to provide you with your September 2021 Sophos Solution Update. We\u2019re sharing the news below via email with Sophos users \u2013 i.e. your customers \u2013 on September 23, 2021. Please familiarize yourself with the updates listed below, so you\u2019re prepared if customers respond back to you with questions.<\/p>\n<p>It\u2019s also a great opportunity for you to reiterate the updates and stay in touch with your customers. Pick from the list below and provide them with tips, tricks and the latest news on the products they are using. Feel free to share the relevant updates via email, newsletter or social media.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Endpoint.png\" alt=\"YOUR ENDPOINT PROTECTION: SOPHOS ENDPOINT - INTERCEPT X\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR ENDPOINT PROTECTION:<br \/>\nSOPHOS ENDPOINT \u2013 INTERCEPT X<\/strong><\/p>\n<p><strong>Sophos Central Operations Guide: Intercept X Advanced with XDR<\/strong><br \/>\nLearn how to efficiently carry out regular tasks in Sophos Central needed to ensure smooth operations and prevent threats.<br \/>\n<a href=\"https:\/\/community.sophos.com\/intercept-x-endpoint\/f\/recommended-reads\/129852\/sophos-central-operations-guide-intercept-x-advanced-with-xdr\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Using XDR to Discover Unsupported Software<\/strong><br \/>\nCyber insurers are increasingly inserting clauses into their policies regarding unsupported software. Fortunately, you can easily identify this software in your estate using XDR.<br \/>\n<a href=\"https:\/\/community.sophos.com\/intercept-x-endpoint\/f\/recommended-reads\/129607\/using-xdr-for-discovering-unsupported-software\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>On the Side of the Good Guys: A Day in the Life of a Senior Development Manager<\/strong><br \/>\nChloe Acebes, senior development manager at Sophos, provides unique insight into her lead role in developing Sophos&#8217; XDR product.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/20\/on-the-side-of-the-good-guys-a-day-in-the-life-of-a-senior-development-manager\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Customer Success Story: Sophos Implements Wide-Ranging Network Security Solutions at BITUMAT<\/strong><br \/>\nLearn how leading manufacturer BITUMAT benefits from a fully integrated Sophos cybersecurity system, including a next-generation firewall<strong>.<\/strong><br \/>\n<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/case-studies\/sophos-bitumat-ccs.pdf\"><strong>Read the Case Study<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/MTR.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR MANAGED SERVICE:<br \/>\nSOPHOS MTR \u2013 MANAGED THREAT RESONSE<\/strong><\/p>\n<p><strong>Using the MTR Dashboard<\/strong><br \/>\nGet a refresher on how to access and use the MTR dashboard in Sophos Central.<br \/>\n<a href=\"https:\/\/docs.sophos.com\/central\/Customer\/help\/en-us\/central\/Customer\/concepts\/MTRDashboard.html\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Firewall.png\" alt=\"YOUR NEXT-GEN FIREWALL \u2013 SOPHOS XG FIREWALL\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR FIREWALL:<br \/>\nSOPHOS FIREWALL<\/strong><\/p>\n<p><strong>Sophos Firewall Active-Active (AA) Deployment In AWS<\/strong><br \/>\nGet an overview of how to deploy the Sophos Firewall in Fault Tolerance, also known as AA mode, on the AWS platform.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-xg-firewall\/f\/recommended-reads\/129075\/sophos-firewall-aa-active-active-deployment-with-amazon-transit-gateway-tgw-in-aws#mcetoc_1fb5itg3me\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Best Practices for Upgrading Your Sophos Firewall&#8217;s Firmware<\/strong><br \/>\nA comprehensive guide on how to upgrade your Sophos Firewall&#8217;s firmware to take advantage of enhancements and new features.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-xg-firewall\/f\/recommended-reads\/129246\/best-practice-for-sophos-firewall-firmware-upgrade\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Configure Sophos Network Agent for iOS<\/strong><br \/>\nEmmanuel from the Sophos Community walks you through how to configure Sophos Network Agent for iOS devices.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/kCw9K5y4Lsb9LnY1kwLHYD\"><strong>Watch the Video<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN&#8230;<\/strong><\/p>\n<p><strong>Customer Success Story: Sophos Implements Wide-Ranging Network Security Solutions at BITUMAT<\/strong><br \/>\nLearn how leading manufacturer BITUMAT benefits from a fully integrated Sophos cybersecurity system, including a next-generation endpoint protection solution.<br \/>\n<strong><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/case-studies\/sophos-bitumat-ccs.pdf\">Read the Case Study<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Central.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR CYBERSECURITY PLATFORM:<br \/>\nSOPHOS CENTRAL<\/strong><\/p>\n<p><strong>Sophos Achieves AWS Level 1 Managed Security Service Provider Competency Status<\/strong><br \/>\nSophos has successfully met requirements from AWS for a baseline of managed security services to protect and monitor essential AWS resources 24\/7.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/24\/sophos-achieves-aws-level-1-managed-security-service-provider-competency-status\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Sophos Mobile: How to Deploy Sophos Chromebook Security<\/strong><br \/>\nSophos Chromebook Security can be deployed using Sophos Central or Google G Suite. Read on for an overview of the steps involved.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-mobile\/f\/recommended-reads\/117815\/how-to-deploy-sophos-chromebook-security\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Adding Your AWS Environment to Sophos Cloud Optix<\/strong><br \/>\nYou can add your AWS environments to Cloud Optix in many ways. This article outlines how to do so.<br \/>\n<a href=\"https:\/\/docs.sophos.com\/pcg\/optix\/help\/en-us\/pcg\/optix\/concepts\/AddAWS.html\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Endpoint2.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR ENDPOINT PROTECTION:<br \/>\nSOPHOS ENDPOINT \u2013 SEC ENDPOINT<\/strong><\/p>\n<p><strong>Sophos Achieves AWS Level 1 Managed Security Service Provider Competency Status<\/strong><br \/>\nSophos has successfully met requirements from AWS for a baseline of managed security services to protect and monitor essential AWS resources 24\/7.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/24\/sophos-achieves-aws-level-1-managed-security-service-provider-competency-status\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Sophos Mobile: How to Deploy Sophos Chromebook Security<\/strong><br \/>\nSophos Chromebook Security can be deployed using Sophos Central or Google G Suite. Read on for an overview of the steps involved.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-mobile\/f\/recommended-reads\/117815\/how-to-deploy-sophos-chromebook-security\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Adding Your AWS Environment to Sophos Cloud Optix<\/strong><br \/>\nYou can add your AWS environments to Cloud Optix in many ways. This article outlines how to do so.<br \/>\n<a href=\"https:\/\/docs.sophos.com\/pcg\/optix\/help\/en-us\/pcg\/optix\/concepts\/AddAWS.html\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Customer Success Story: Sophos Implements Wide-Ranging Network Security Solutions at BITUMAT<\/strong><br \/>\nLearn how leading manufacturer BITUMAT benefits from a fully integrated Sophos cybersecurity system &#8211; including a next-generation endpoint protection solution.<br \/>\n<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/case-studies\/sophos-bitumat-ccs.pdf\"><strong>Read the Case Study<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/UTM.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR NETWORK PROTECTION:<br \/>\nSG UTM<\/strong><\/p>\n<p><strong>IPS Engine Update \u2013 Early Access Opportunity<\/strong><br \/>\nWe will soon update the IPS engine used by SG UTM and are offering early access to the new release for customers who would like to try it out immediately.<br \/>\n<a href=\"https:\/\/community.sophos.com\/utm-firewall\/b\/blog\/posts\/upcoming-ips-engine-update---early-access-opportunity\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Remote Ethernet Device (RED) Technical Training Guide<\/strong><br \/>\nThis guide details how to setup Sophos RED in each of its operational modes and outlines common troubleshooting steps to resolve connection issues.<br \/>\n<a href=\"https:\/\/community.sophos.com\/utm-firewall\/f\/recommended-reads\/122526\/sophos-utm-red-remote-ethernet-device-technical-training-guide\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Customer Success Story: Sophos Implements Wide-Ranging Network Security Solutions at BITUMAT<\/strong><br \/>\nLearn how leading manufacturer BITUMAT benefits from a fully integrated Sophos cybersecurity system, including a next-generation firewall<strong>.<\/strong><br \/>\n<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/case-studies\/sophos-bitumat-ccs.pdf\"><strong>Read the Case Study<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/megaphone.png\" alt=\"A ROUNDUP OF THE LATEST SOPHOS CYBERSECURITY UPDATES\" width=\"35\" align=\"top\" border=\"0\" \/><br \/>\n<strong>A ROUNDUP OF THE LATEST SOPHOS CYBERSECURITY UPDATES<\/strong><\/p>\n<p><strong>DC Market Note: Sophos Plays a Quartet of Aces<\/strong><br \/>\nGlobal market intelligence firm IDC provide their point of view on Sophos&#8217; recently expanded security portfolio.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/09\/15\/idc-market-note-sophos-plays-a-quartet-of-aces\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Phishing Insights 2021<\/strong><br \/>\nBased on an independent survey of 5,400 IT professionals, our new report reveals the state of phishing and cybersecurity user education.<br \/>\n<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-phishing-insights-2021-report.pdf\"><strong>Get the Report<\/strong><\/a><\/p>\n<p><strong>New Sophos Trust Center: Q&amp;A with Ross McKerchar, Sophos CISO<\/strong><br \/>\nWe caught up with Ross to learn about this new resource, and how it fits with Sophos\u2019 broader vision for the cybersecurity industry.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/18\/new-sophos-trust-center-qa-with-ross-mckerchar-sophos-ciso\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Enforcing Multi-Factor Authentication (MFA) for System Administration and Security Consoles<\/strong><br \/>\nThe first in our series of \u2018hindsight\u2019 articles, Rob Collins, specialist systems engineer at Sophos, looks at the critical role of MFA in preventing unauthorized access to security consoles.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/07\/16\/hindsight-1-enforce-mfa-for-system-administration-and-security-consoles\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3552\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/07\/training-hat.png\" alt=\"\" width=\"55\" height=\"34\" \/><\/strong><\/p>\n<p><strong>SELF-HELP MATERIALS AVAILABLE FOR YOU TO USE AT YOUR OWN PACE<\/strong><\/p>\n<p><strong>Sophos TechVids<\/strong><br \/>\nDiscover our extensive library of how-to, product configuration, and product troubleshooting videos.<br \/>\n<a href=\"https:\/\/app.go.sophos.com\/e\/er?s=1777052651&amp;lid=19467&amp;elqTrackId=695a443810b340d0b89dad93422aa95f&amp;elq=57e5d6d3ef9945a5af0cde1cad394599&amp;elqaid=17827&amp;elqat=1\" target=\"_blank\" rel=\"noopener\"><strong>Access Sophos TechVids<\/strong><\/a><\/p>\n<p><strong>Product Documentation<\/strong><br \/>\nFind all the technical documents for your Sophos products to get your protection up and running right away.<br \/>\n<a href=\"https:\/\/app.go.sophos.com\/e\/er?s=1777052651&amp;lid=3207&amp;elqTrackId=5ff573713cb34cb1abf9963d7323bafc&amp;elq=57e5d6d3ef9945a5af0cde1cad394599&amp;elqaid=17827&amp;elqat=1\" target=\"_blank\" rel=\"noopener\"><strong>Access Product Documentation<\/strong><\/a><\/p>\n<p><strong>Sophos Community<\/strong><br \/>\nConnect. Engage. Earn rewards. The Sophos Community is a platform for users to connect and engage on everything Sophos-related from product questions to best practices.<br \/>\n<a href=\"https:\/\/app.go.sophos.com\/e\/er?s=1777052651&amp;lid=844&amp;elqTrackId=2a76325b40c84013bae98078f9b12fe4&amp;elq=57e5d6d3ef9945a5af0cde1cad394599&amp;elqaid=17827&amp;elqat=1\" target=\"_blank\" rel=\"noopener\"><strong>Access Sophos Community<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay on top of your customers\u2019 minds with relevant product news.<\/p>\n","protected":false},"author":11,"featured_media":3000003058,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[152],"coauthors":[64],"class_list":["post-3769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-sophos-solution-update"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/05\/featured-image-sophos-sync-sec-app-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=3769"}],"version-history":[{"count":2,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3769\/revisions"}],"predecessor-version":[{"id":3772,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3769\/revisions\/3772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=3769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=3769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=3769"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=3769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}