Zen Managed ServicesZen Managed ServicesZen Managed ServicesZen Managed Services
  • Services
    • Domain Names
    • Managed Cyber Security
    • Secure VPN
    • Hosting
      • Managed WordPress Hosting
      • ColdFusion Hosting
      • Lucee Hosting
      • SmarterMail Hosting
    • Migration Services
    • Managed WordPress
    • Email Filtering & Archiving
    • Acronis Cloud Backup
  • Support
    • Open Ticket
    • Knowledgebase
    • News/Announcements
  • BLOG
  • Contact
  • Clients
    • Client Area
    • Hosting Control Panel
    • RMM Dashboard

Sophos UTM Hosting

    Home Sophos UTM Hosting

    WHAT IS IT

    What is a UTM and how can it help you stay secure?

    WEB CONTENT FILTERING

    Protect your services from incoming Internet threats.

    ADVANCED FIREWALL

    Learn about the advanced firewall & threat protection features of your UTM.

    VPN SECURITY

    Add another layer of security by setting up VPN access to your hosted environment.

    WHAT IS A UTM ?

    • Unified Threat Management (UTM)
      A Sophos UTM appliance is an appliance that brings together many different security solutions (like Firewall, VPN, Network Isolation, Web Filtering, etc) into a single location that make it easy to implement and manage.
    • Managed By Default
      As with all Zen services, your UTM will be fully managed by default. This means if you ever have a problem, a question, or simply need to bounce an idea of someone with experience, we’re always here to help.
    • Your Own “Walled Garden” Network
      When you implement a Sophos UTM, by default you isolate your network and the services inside it from the outside world. Your UTM is designed to be the gateway to your network and services, and you have complete control over everything that goes in or out. It’s your own safe, private paradise.
    • Affordable for Anyone
      We have specifically chosen this UTM product offering to be affordable to anyone. With an extremely low cost of entry of £10 per month, you can have top-of-the-line security for less then what you pay for your morning coffee.

    WEB CONTENT FILTERING

    Web-based threats can occur in mainly two ways: 1) you can visit an infected website or open an infected email (outbound requests), or your website or other services can be attacked directly using exploits such as SQL-Injection or Cross-Site Scripting (incoming requests). Your Sophos UTM can be configured to protect you and your users from both types of attacks.

    • Web Protection
      The Sophos UTM Web Protection feature can be thought of as anti-virus for web sites that you are browsing. By analyzing the content that you’re visiting while browsing, your Sophos UTM can detect and block malicious content before it ever reaches any of your servers.
    • Web Server Protection
      Your Sophos UTM comes fully equipped with advanced incoming request filtering, often called a “Web Application Firewall” or a “WAF”, which will filter incoming requests for malicious content. SQLi, XSS, and other incoming attacks are blocked by this feature. Furthermore, if you have a sensitive login-screen that is frequently attacked – a WordPress admin login, for example – you can offload your authentication system to your UTM for an additional layer of enterprise-grade security.

    UTM FIREWALL AND ATP

    • Complete Application Control
      Using the advanced, next-generation firewall available in your UTM, you can track and monitor all activity within your private network. Firewall rules can then be created either on a global scale, or a per-host scale, so that only specific applications have access to specific hosts.
    • Real-Time Application Network Throttling
      As you monitor your network activity on your UTM, you can dynamically create rules on the fly based on what you’re seeing. If you see an unwanted application dominating your network, and you want to limit it’s activity, you can immediately create a rule to limit or block that specific application.
    • Advanced Threat Protection (ATP)
      Using cloud-based heuristics and real-time diagnostics, your UTM has the ability to defend against threats that are as-yet unknown to the majority of the world.
    • Identify Compromised Hosts
      Should the unthinkable happen and one of your servers does become a problem, the real-time reporting of Advanced Threat Protection will identify damaged hosts, as well as help determine specifics of how that host is a problem.

    VPN FEATURES

    A Virtual Private Network connection (VPN) allows you to connect directly to your servers as though they were in your office network. Once connected to your VPN, you can access your web servers, email servers, database servers, or anything else that you need access to that’s safely tucked away behind your Sophos UTM, as if your private network were right there with you. This gives you all the features and convenience of a robust hosted environment, along with all the freedom of a local network and denying access to everyone else.

    • Plenty of VPN Client OptionsYour Sophos UTM Supports a wide variety of VPN Connection options including the standard VPN Clients that come with Windows, Mac, or Linux Desktops; an installable, single-click desktop application; or even a web-based HTML5 enhanced VPN client that’s usable from just about any device. You’ll never have to worry about gaining secure access to your servers no matter where you are in the world or what devices you have available to you.
    • Diverse User Account ControlsAs the administrator for your Sophos UTM, we have compete control over who accesses your private network, how they access it, and what specific machines each user has access to once their in your private network. You’re always in control, and with our fully Managed Support, you’re never alone if you ever have any questions. We’re here to serve.

    SIMPLE YET FLEXIBLE IMPLEMENTATION

    Your Sophos UTM can be implemented in a huge variety of ways. Utilizing virtual switching, VLAN’s, and physical hardware (all handled by Zen Support so you never have to worry about it), you can implement your UTM and private network using almost any combination of Virtual Servers (VPS), Dedicated Servers, or even Micro Clouds. This gives you enormous flexibility to create your clustered environment however you need to in order to succeed.

    UTM’s themselves can also be clustered, eliminating any UTM as a single point of failure. With the Sophos UTM’s Intelligent Clustering capabilities, UTM’s can easily be configured in master/master mode, sharing workload and scaling up to huge numbers of UTM’s. This means that you have options that can support incredible throughput for a secure, clustered environment that can scale with you as you grow.

    UTM licensing is simple and easy to understand: with dedicated UTM devices starting at just £50/mo (includes 1 node) and additional-node licenses for just £10 per month, it’s easy to find a solution that matches your budget, giving you security and flexibility that’s extremely affordable.

      Legal Documents
    • Hosting Master Service Agreement
    • Terms & Conditions
    • Privacy Policy
    • Services
      • Domain Names
      • Managed Cyber Security
      • Secure VPN
      • Hosting
        • Managed WordPress Hosting
        • ColdFusion Hosting
        • Lucee Hosting
        • SmarterMail Hosting
      • Migration Services
      • Managed WordPress
      • Email Filtering & Archiving
      • Acronis Cloud Backup
    • Support
      • Open Ticket
      • Knowledgebase
      • News/Announcements
    • BLOG
    • Contact
    • Clients
      • Client Area
      • Hosting Control Panel
      • RMM Dashboard
    Zen Managed Services