Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Australian Signals Directorate (ASD)

Top 35 Reference Card

The Australian Signals Directorate (ASD) published its “Strategies to Mitigate Targeted Cyber Intrusions” based on its
analysis of incidents across the Australian Government. First published in 2010, an update of these strategies was
released in February 2017. Initially aimed at government organizations, the strategies are equally valuable for commercial
organizations seeking to protect their networks and users.
Each strategy is assigned a “Relative Security Effectiveness Rating” of either Essential, Excellent, Very Good, Good,
and Limited to help organizations prioritize their efforts and to focus limited resources where they are most needed.
Accordingly, the strategies that are with a rating of Essential form the Essential Eight Maturity Model which is the
foundational defense against cyber security threats and represents “the most effective of these mitigation strategies”.
The Essential Eight Maturity Model offers a guideline to assess the progress of implementing each strategy, from a scale
of Zero (Not aligned) to four (higher risk environments). The ASD recommends organizations target level three (Fully
aligned) as a baseline. This document describes how Sophos products can be effective tools to help address some of the
requirements as part of a customer’s efforts to comply with the ASD Top 35 strategies.
Sophos provides data sovereignty and security solutions for organizations in Australia that have strict national or local
regulatory or policy requirements, with a dedicated data center in Sydney, Australia. This provides organizations across
all industries with the ability to store, manage and access data locally from Sophos Central, the cloud management
platform that supports Sophos’ portfolio of advanced, next-generation cybersecurity solutions and services.
Specifications and descriptions are subject to change without notice. Sophos disclaims all warranties and guarantees regarding this information. Use of Sophos products alone
does not guarantee legal compliance. The information in this document does not constitute legal advice. Customers are solely responsible for compliance with all laws and
regulations, and should consult their own legal counsel for advice regarding such compliance.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Mitigation strategies to prevent malware delivery and execution

Application whitelisting of approved/trusted Essential Intercept X for Server: Prevent Sophos Firewall: Allows user-based
programs to prevent execution of unapproved/ unauthorized programs running on policy control over applications, websites,
malicious programs, including .exe, DLL, scripts your servers and receive notification categories, and traffic shaping (QoS).
(e.g. Windows Script Host, PowerShell and HTA) if attempts are made to tamper with Synchronized Application Control in
and installers. critical files. Sophos Firewall identifies all networked
applications in the environment running
on Sophos-managed endpoints.
Intercept X and Intercept X for Server:
Exploit prevention capabilities stop
vulnerabilities in applications and
operating systems from being exploited
by attackers. Application Control
policies restrict the use of unauthorized
applications.

Sophos Intercept X for Mobile: Detects


malicious and potentially unwanted
applications installed on Android
devices using Intercept X deep learning
technology alongside intelligence from
SophosLabs global research team.
Integration with Microsoft Intune allows
administrators to build conditional
access policies, restricting access to
applications and data when a threat is
detected.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Patch applications e.g. Flash, web browsers, Essential Intercept X and Intercept X for Server:
Microsoft Office, Java and PDF viewers. Exploit prevention capabilities stop
Patch/mitigate computers with ‘extreme risk’ vulnerabilities in applications and
vulnerabilities within 48 hours. Use the latest operating systems from being exploited
version of applications. by attackers.

Configure Microsoft Office macro settings to Essential Intercept X and Intercept X for Server:
block macros from the Internet, and only allow Application Control policies restrict the
vetted macros either in ‘trusted locations’ with use of unauthorized applications.
limited write access or digitally signed with a
trusted certificate. Exploit prevention capabilities stop
vulnerabilities in applications and
operating systems from being exploited
by attackers.

User application hardening. Configure web Essential Intercept X and Intercept X for Server: Sophos Firewall: Complete application
browsers to block Flash (ideally uninstall it), Application Control policies restrict visibility and control over all applications
ads, and Java on the Internet. Disable unneeded the use of unauthorized applications. on your network with deep-packet
features in Microsoft Office (e.g. OLE), web Exploit prevention capabilities stop scanning technology and Synchronized
browsers, and PDF viewers. vulnerabilities in applications and App Control that can identify all the
operating systems from being exploited applications that are currently going
by attackers. unidentified on your network.

Automated dynamic analysis of email and web Excellent Intercept X and Intercept X for Server: Sophos Sandstorm: Complements
content run in a sandbox, blocked if suspicious Browser exploit prevention detects and Sophos web and email security products
behaviour is identified, such as network blocks malicious activity attempting and Sophos Firewall by inspecting and
traffic, new or modified files, or other system to take advantage of software blocking executables and documents
configuration changes. vulnerabilities. containing executable content before the
file is delivered to the user’s device.
Web security and web control scans the
web content and can limit access to
known sites.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Email content filtering. Whitelist allowed Excellent Sophos Mobile: Anti-phishing technology Sophos Email: Sophos Email Content
attachment types (including in archives and in Sophos Secure Email and Sophos Control allows customers to filter inbound
nested archives). Analyse/sanitise hyperlinks, Secure Workspace apps protects and outbound messages for keywords
PDFs, and Microsoft Office attachments. users from malicious links received in and file types – Identifying specific
Quarantine Microsoft Office macros. documents or emails. keywords in email subject lines, message
content, and file names. The content
inspection capabilities will recursively
unpack archives so that the contained
files are inspected independently.
The solution is able to identify PDF using
their true file-type and set policy around
those file types.

Time-of-Click URL rewriting analyzes all


URLs at the moment they are clicked,
and automatically removes dangerous
emails to protect against these post-
delivery techniques. Sophos Email
Search and Destroy capabilities take
this one step further, directly accessing
Office 365 mailboxes, to identify and
automatically remove emails containing
malicious links and malware at the point
the threat state changes and before a
user ever clicks on them – removing the
threat automatically.

Web content filtering. Whitelist allowed types of Excellent Intercept X and Intercept X for Server: Sophos Firewall: Full visibility and
web content and websites with good reputation Scans web content and allows category- control over all web traffic with flexible
ratings. Block access to malicious domains and based web filtering to be enforced both enforcement tools that work the way
IP addresses, ads, anonymity networks, and free on and off the corporate network. you need, with options for user and
domains. group enforcement of activity, quotas,
schedules, and traffic shaping. Blocks
Sophos Intercept X for Mobile: Web known malicious domains and IP
filtering and URL checking stops access addresses through configuration of
to known bad sites on mobile devices, its web protection rule and FQDN host
while SMS phishing detection spots appropriately.
malicious URLs.
Delivers advanced protection from
the latest drive-by and targeted web
malware, URL/Malicious site filtering,
Web Application Filtering, Cloud-based
filtering for offsite protection.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Deny corporate computers direct Internet Excellent Sophos Firewall: Creates identity-based
connectivity. Use a gateway firewall to require IPv6-capable firewall rule that can
use of a split DNS server, an email server, and enforce strict authentication to access
an authenticated web proxy server for outbound the internet resources.
web connections.

Operating system generic exploit mitigation Excellent Intercept X and Intercept X for Server:
e.g. Data Execution Prevention (DEP), Address Exploit technique mitigation is applied to
Space Layout Randomisation (ASLR), and the operating system and applications,
Enhanced Mitigation Experience Toolkit (EMET) going well beyond the capabilities offered
in EMET. Intercept X offers the perfect
replacement and alternative to EMET
now that Microsoft has stopped active
development of the tool.

Server application hardening especially Very Good Intercept X for Server: Integrates server
Internet-accessible web applications (sanitise application whitelisting/lockdown with
input and use TLS not SSL) and databases, advanced anti-malware and HIPS that
as well as applications that access important lets you whitelist your applications at the
(sensitive or high-availability) data. click of a button and permits only trusted
applications.

Operating system hardening (including for Very Good Sophos Firewall: Allows restricted
network devices) based on a Standard Operating access to Server Message Block through
Environment, disabling unneeded functionality appropriate firewall rule.
e.g. RDP, AutoRun, LanMan, SMB/NetBIOS,
LLMNR and WPAD.

Antivirus software using heuristics and Very Good Intercept X and Intercept X for Server: Sophos Firewall: Offers advanced Web
reputation ratings to check a file’s prevalence Prevents malware before it can execute Malware Protection with its advanced
and digital signature prior to execution. Use with heuristic evaluation, traditional technology like real-time JavaScript
antivirus software from different vendors for signature matching with known malware, emulation, behavioral analysis, context
gateways versus computers. file reputation scoring, emulation, sensitive inspection, and dynamic URL
sandboxing, and more. analysis for both HTTP and HTTPS traffic.

Sophos Intercept X for Server: Integrates Sophos Email: Employs the latest
server application whitelisting/lockdown antivirus and phishing detection
with our advanced anti-malware and technology that constantly updates in
HIPS to offer effective protection real-time to detect the latest threats.
against zero-day attacks, along with Reputation filtering blocks unwanted
heuristic evaluation, traditional signature spam right at the gateway.
matching with known malware, and file
reputation scoring.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Control removable storage media and Very Good Intercept X and Intercept X for Server:
connected devices. Block unapproved CD/ Device Control allows admins to control
DVD/USB storage media. Block connectivity the use of removable media through
with unapproved smartphones, tablets and policy settings.
Bluetooth/Wi-Fi/3G/4G devices.
Sophos Mobile: Flexible compliance
rules monitor device health and can
automatically deny access to sensitive
data in case of a compromised device.
Emails and documents can be stored
in the secure and encrypted Sophos
Container and accessed with the Sophos
Secure Email and Sophos Secure
Workspace apps.

Block spoofed emails. Use Sender Policy Very Good Sophos Email: Sophos Email scans all
Framework (SPF) or Sender ID to check inbound messages for key phishing
incoming emails. Use ‘hard fail’ SPF TXT and indicators such as brand spoofing
DMARC DNS records to mitigate emails that and impersonation attempts in real-
spoof the organisation’s domain. time using SPF, DKIM, and DMARC
authentication techniques and email
header anomaly analysis. It spots and
blocks phishing emails before they reach
your users.

Sophos Email also uses advanced


machine learning to detect targeted
impersonation and Business Email
Compromise attacks. Utilizing the
deep learning neural network created
by Sophos AI, Sophos Email analyzes
email body content and subject lines for
tone and wording to identify suspicious
conversations.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

User education. Avoid phishing emails (e.g. Good Sophos Phish Threat: Educates and
with links to login to fake websites), weak tests end users against phishing,
passphrases, passphrase reuse, as well credential harvesting, or attachment
as unapproved: removable storage media, attacks, through automated attack
connected devices and cloud services. simulations, quality security awareness
training, and actionable reporting
metrics.

Antivirus software with up-to-date signatures Limited Sophos Intercept X and Intercept X for Sophos Firewall: Leverages Sophos’
to identify malware, from a vendor that rapidly Server: Uses deep learning technology industry-leading machine learning
adds signatures for new malware. Use antivirus to detect both known and unknown technology (powered by SophosLabs
software from different vendors for gateways malware without relying on signatures. Intelix) to instantly identify the latest
versus computers. ransomware and unknown threats before
they get on your network.

Sophos Intercept X for Mobile: Detects Sophos Email: Uses behavioral analysis
malicious and potentially unwanted to stop never-before-seen ransomware
applications installed on Android and boot-record attacks.
devices using Intercept X deep learning
technology alongside intelligence from
SophosLabs global research team.

TLS encryption between email servers to Limited Secure Email: Offers TLS encryption and
help prevent legitimate emails from being support for SMTP/S along with full push-
intercepted and subsequently leveraged for base, and optional pull-based portal
social engineering. Perform content scanning encryption.
after email traffic is decrypted.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Mitigation strategies to limit the extent of cybersecurity incidents

Restrict administrative privileges to operating Essential Sophos Central Device Encryption: Sophos Firewall: Offers centralized
systems and applications based on user duties. Offers role-based management to security management with extensive
Regularly revalidate the need for privileges. separate authorization levels, as well as administrative controls; role-based
Don’t use privileged accounts for reading email detailed logging of all access attempts. administration to delegate control by job
and web browsing. function.

Sophos Central: Configurable role-based Zero Trust Network Access:


administration provides granular control Continuously validates user identity,
of administrator privileges. Protects device health, and compliance before
privileged and administrator accounts granting access to applications and data.
with advanced two-factor authentication.

Keeps access lists and user privileges


information up to date. Provides
procedures to ensure that access rights
are revoked if individuals no longer meet
the conditions to receive access (e.g.,
because they change position or leave
the company).

Sophos Mobile: Role-based


administration ensures user privacy
and appropriate credentials for altering
compliance or device/data access.

Patch operating systems. Patch/mitigate Essential Intercept X and Intercept X for Server: Managed Threat Response: Proactively
computers (including network devices) with Exploit prevention capabilities stop hunt threats 24x7 and neutralize even
‘extreme risk’ vulnerabilities within 48 hours. Use vulnerabilities in applications and the most sophisticated threats with
the latest operating system version. Don’t use operating systems from being exploited our managed detection and response
unsupported versions. by attackers. services backed by an elite team of threat
hunters and response experts who take
targeted actions on your behalf.

Sophos Rapid Response Service: Get


incredibly fast assistance, identifying
and neutralizing active threats against
your organization – delivered by an expert
team of incident responders.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Multi-factor authentication including for VPNs, Essential Sophos Central Device Encryption: Sophos Firewall: Facilitates two-factor
RDP, SSH and other remote access, and for all Authenticates users for access to authentication for VPN connections, with
users when they perform a privileged action specific files/folders with the use of user- granular RADIUS/TACACS integration.
or access an important (sensitive or high- or group-specific keys. Controls remote access authentication
availability) data repository. and user monitoring for remote access,
and logs all access attempts.

Sophos Central: Protects privileged and Zero Trust Network Access:


administrator accounts with advanced Continuously validates user identity,
two-factor authentication. device health, and compliance before
granting access to applications and data.

Disable local administrator accounts or assign Excellent Sophos Central: Prevents shared
passphrases that are random and unique for administrator accounts. Each employee
each computer’s local administrator account has his or her own account, with explicit
to prevent propagation using shared local permissions granted to each account.
administrator credentials.

Network segmentation. Deny network traffic Excellent Sophos Firewall: Limits access between
between computers unless required. Constrain untrusted devices and critical servers
devices with low assurance e.g. BYOD and IoT. with segmentation of the internal
Restrict access to network drives and data network and by applying policies, adding
repositories based on user duties. a layer of protection and logging to
disrupt the attack chain.

Lateral Movement Protection, a


Synchronized Security feature, prevents
the threat or hacker from spreading
to other systems, stealing data, or
communicating back to the host.

Zero Trust Network Access:


Continuously validates user identity,
device health, and compliance before
granting access to applications and data.

Protect authentication credentials. Remove Excellent Sophos Central: Disables or removes Sophos Firewall: Allows strong
CPassword values (MS14-025). Configure default passwords. Passwords are passphrase policy to be applied for admin
WDigest (KB2871997). Use Credential Guard. sufficiently complex to withstand accounts in terms of complexity, length,
Change default passphrases. Require long targeted “brute force” attacks and must password reuse and use of a single
complex passphrases. be rotated periodically. dictionary word.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Non-persistent virtualised sandboxed Very Good Sophos Firewall: Supports next-gen


environment, denying access to important cloud-sandbox technology for protection
(sensitive or high-availability) data, for risky from ransomware and targeted attacks.
activities e.g. web browsing, and viewing
untrusted Microsoft Office and PDF files.

Software-based application firewall, blocking Very Good Sophos Mobile: The Corporate Browser Sophos Firewall: Offers complete
incoming network traffic that is malicious/ in Sophos Secure Workspace delivers visibility into risky users, evasive and
unauthorised, and denying network traffic by secure browsing access to pre-defined unwanted applications, and suspicious
default e.g. unneeded/unauthorised RDP and websites and domains from their mobile payloads.
SMB/NetBIOS traffic. devices. Synchronized Application Control
automatically identifies all unknown,
Sophos Intercept X and Intercept X evasive, and custom applications running
for Server: Enforces web, data, and on your network so you can easily
device policies to allow only authorized prioritize the ones you want, and block
applications to be run, devices to be the ones you don’t.
connected and data to be distributed.

Software-based application firewall, blocking Very Good Intercept X for Server: Denies attackers Sophos Firewall: Offers complete
outgoing network traffic that is not generated by blocking the exploits and techniques visibility into risky users, evasive and
by approved/trusted programs, and denying used to distribute malware, steal unwanted applications, and suspicious
network traffic by default. credentials and escape detection. payloads.
Prevent unauthorized programs running
on your servers and receive notification Lateral Movement Protection, a
if attempts are made to tamper with Synchronized Security feature, prevents
critical files. the threat or hacker from spreading
to other systems, stealing data, or
communicating back to the host.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Outbound web and email data loss prevention. Very Good Sophos Firewall: Blocks and logs
Block unapproved cloud computing services. unapproved cloud computing services
Log recipient, size and frequency of outbound and applications. Offers policy-based
emails. Block and log emails with sensitive outbound email DLP; and flexible, user-
words or data patterns. based monitoring and control of keyword
content and downloadable content,
including files types via FTP, HTTP, or
HTTPS.

Secure Email: Granular control of


data breach prevention policies,
including multi-rule policies for groups
and individual users with seamless
integration of encryption. Create custom
CCLs using Sophos Content Control Lists
or customize out of the box templates
for specific CCLs. Choose from a variety
of policy outcomes including block, drop
attachment, quarantine as well as log
and continue mode.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Mitigation strategies to detect cybersecurity incidents and respond

Continuous incident detection and response Excellent Sophos Central Management: Sophos Sophos Firewall: Provides real-time
with automated immediate analysis of Central provides powerful centralized insights into network and user events,
centralized, time-synchronised logs of permitted management and reporting for all quick and easy access to historical data,
and denied: computer events, authentication, file Sophos products from a single console. and easy integration with third-party
access and network activity. remote management and monitoring
tools (RMMs).

Synchronized Security in Sophos Sophos Managed Threat Response:


products: Shares telemetry and health Monitors and investigates detections
status, enabling coordinated isolation, from Sophos endpoint, network, and
detection, and malware remediation cloud platform solutions to identify,
across servers, endpoints, and firewalls. investigate, contain, and neutralize active
threats.

Intercept X with XDR: Detect and


investigate across endpoint, server,
firewall, and other data sources. Get
a holistic view of your organization’s
cybersecurity posture with the ability
to drill down into granular detail when
needed. The Sophos Data Lake allows
to quickly answer business critical
questions, correlate events from different
data sources and take even more
informed action.

Host-based intrusion detection/prevention Very Good Intercept X for Server: Provides Sophos Firewall: Next-gen protection
system to identify anomalous behaviour during integrated server application whitelisting technologies like deep learning and
program execution e.g. process injection, and Server Lockdown with advanced intrusion prevention to keep your
keystroke logging, driver loading, and persistence. anti-malware and HIPS. organization secure.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Endpoint detection and response software on Very Good Intercept X: Protects Office applications
all computers to centrally log system behaviour vulnerabilities being exploited through
and facilitate incident response. Microsoft’s free malicious abnormalities delivered
SysMon tool is an entry-level option. through Office files.

Intercept X Advanced with XDR and


Intercept X Advanced for Server with
XDR: Inspect your endpoints and servers,
both on-premises and in the cloud across
Windows, MacOS*, and Linux operating
systems. Get the tools you need for
advanced threat hunting and IT security
operations hygiene.

Intercept X Advanced with XDR: It goes


beyond the endpoint, pulling in rich
network, email, cloud* and mobile* data
sources to give you an even broader
picture of your cybersecurity posture.
Quickly find indicators of compromise
(IoCs) across your estate. Remotely
access, investigate, and remediate
devices. Perform guided threat hunting
and response.

Hunt to discover incidents based on knowledge Very Good Intercept X Advanced with XDR: It goes Managed Threat Response: Proactively
of adversary tradecraft. Leverage threat beyond the endpoint, pulling in rich hunt threats 24x7 and neutralize even
intelligence consisting of analysed threat data network, email, cloud* and mobile* data the most sophisticated threats with
with context enabling mitigating action, not just sources to give you an even broader our managed detection and response
indicators of compromise. picture of your cybersecurity posture. services backed by an elite team of threat
Quickly find indicators of compromise hunters and response experts who take
(IoCs) across your estate. Remotely targeted actions on your behalf.
access, investigate, and remediate
devices. Perform guided threat hunting Sophos Rapid Response Service: Get
and response. incredibly fast assistance, identifying
and neutralizing active threats against
your organization – delivered by an expert
team of incident responders.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Network-based intrusion detection/prevention Limited Sophos Firewall: Includes next-gen IPS


system using signatures and heuristics to that offers advanced protection from
identify anomalous traffic both internally and hacks and attacks using a uniform
crossing network perimeter boundaries. signature format backed by SophosLabs.
Besides traditional servers and network
resources, it also identifies and protects
users and applications on the network.

Capture network traffic to and from corporate Limited Intercept X Advanced with XDR: Goes Sophos Firewall: Provides real-time
computers storing important data or considered beyond the endpoint, pulling in rich insights into network and user events,
as critical assets, and network traffic traversing network, email, cloud* and mobile* data quick and easy access to historical data,
the network perimeter, to perform incident sources to give you an even broader easy integration with third-party remote
detection and analysis. picture of your cybersecurity posture management and monitoring tools
with the ability to drill down into granular (RMMs).
detail when needed. With data from each
product flowing into the Sophos Data
Lake you can quickly answer business
critical questions, correlate events from
different data sources and take even
more informed action.

Sophos Central Management: Sophos


Central provides powerful centralized
management and reporting for all
Sophos products from a single console.

Synchronized Security in Sophos


products: Shares telemetry and health
status, enabling coordinated isolation,
detection, and malware remediation
across servers, endpoints, and firewalls.
Australian Signals Directorate (ASD)
Top 35 Reference Card
Relative Security
Mitigation Strategy Effectiveness Endpoint Network
Rating

Mitigation strategies to recover data and system availability

Business continuity and disaster recovery Very Good Sophos Email: In the event of third-party
plans which are tested, documented and printed cloud email service provider outages,
in hardcopy with a softcopy stored offline. Focus alerts are provided if mail can’t be
on the highest priority systems and data to delivered to a server/service; email is
recover. then queued for delivery to ensures no
email is lost, and access to that queued
email is provided from a 24/7 emergency
inbox inside the end user portal. Retry
period for queued email is 5 days.

Mitigation strategy specific to preventing malicious insiders

Personnel management e.g. ongoing vetting, Very Good Sophos Central: Keeps access lists and Sophos Firewall: User awareness across
especially for users with privileged access; user privileges information up-to-date. all areas of our firewall governs all firewall
immediately disable all accounts for departing Procedures are in place to ensure that polices and reporting, giving user-level
users; and remind users of their security access rights are revoked if individuals controls over applications, bandwidth
obligations and penalties. no longer meet the conditions to receive and other network resources.
access (e.g., because they change
position or leave the company).

United Kingdom and Worldwide Sales North American Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: sales@sophos.com Email: nasales@sophos.com Email: sales@sophos.com.au Email: salesasia@sophos.com

© Copyright 2022. Sophos Ltd. All rights reserved.


Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK
Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are
trademarks or registered trademarks of their respective owners.

2022-03-17 RC-NA (PC)

You might also like