Overview
Video 1
Sophos Cloud UTM9 is a AWS Security Competency approved NextGen Firewall solution that helps customers with their shared security responsibilities by offering multiple layers of protection in a single virtual appliance that scans, controls and reports on traffic entering and leaving a VPC.
Security features include a Web Application Firewall (WAF), a pre-tuned and automatically updated Intrusion Prevention System (IPS), an Outbound Web Proxy/ Layer 7 Application Engine to protect and control connections to the Public Internet, an Advanced Threat Protection engine to identify and block unknown and evasive threats, and VPN Gateway features to securely connect remote sites and users. The UTM9 NextGen Firewall solution also provides detailed logs and reports which can be viewed on system and/or exported to the AWS CloudWatch Logs service and any Syslog compatible device.
You can deploy Sophos UTM as a standalone solution on the EC2 Instance type of your choice, or use the Sophos provided CloudFormation template to deploy an Active/Passive High Availability pair of UTM's that spans across multiple Availability Zones and integrates with key AWS services such as Auto Scaling, CloudWatch, and S3 to comply with AWS Best Practice guidance on secure architecture.
Part of a complete cloud security portfolio. A selection of Sophos AWS Marketplace offerings is included below, while more can be found at www.sophos.com/cloud .
- Sophos UTM Auto Scaling: https://soph.so/utm-autoscaling-payg
- Sophos XG Firewall Standalone (Free Trial): https://soph.so/xg-firewall-payg
- Sophos Cloud Optix (CSPM with Free Tier): https://soph.so/cloud-optix
If you have any questions about Sophos solutions or if you need assistance with deployment or configuration, please contact the Sophos Public Cloud team at aws.marketplace@sophos.com .
Highlights
- Control infrastructure and security costs by combining multiple security tools into a single, easy to deploy and manage solution.
- Web App Firewall (WAF) protects your web apps against common threats like SQL injection and Cross-Site Scripting. Next-Gen Firewall protection and reporting with stateful traffic inspection, Layer-7 application control, secure proxies, and IPS.
- Sophos UTM9 may also be deployed as an Active/Active Auto Scaling solution which provides maximum uptime, elasticity and the Sophos Outbound Gateway (OGW) feature set. Please see the 'Sophos UTM9 Auto Scaling' listing for more details.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
Terminate the EC2 instance(s) or delete the CloudFormation stack at any time to stop incurring charges. You may email aws.marketplace@sophos.com for questions regarding Sophos UTM charges and refund requests.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
You can manage your Sophos UTM on AWS from the Web Interface using HTTPS (TCP port 4444), the command shell using SSH (TCP port 22), and via the RESTful API.
Sophos UTM requires a valid email address for administration purposes. This email address is not used for any other purpose and remains local to the Sophos UTM AMI. Please refer to the Sophos Privacy Policy for more details. https://www.sophos.com/en-us/legal/sophos-group-privacy-policy.aspx
Sophos UTM on AWS Quick Start Guide https://www.sophos.com/en-us/medialibrary/PDFs/documentation/SophosUTMAWS.pdf
For additional information about deploying on AWS please see: https://www.sophos.com/en-us/support/documentation/sophos-utm.aspx
Resources
Support
Vendor support
Sophos provides technical support via phone and web portal as part of your BYOL subscription. Phone: +1-844-591-2756 Web portal:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Great Product
We compare many WAFs that are available in AWS for our clients, and so far Sophos is the only product we've seen that is truly fit for cloud. It leverages the AWS services to provide a clean and elegant solution to autoscale Sophos instances in a highly available envrionment. We've deployed it in many client environments and have always seen a successful turn-out. It also provides a great solution to the AWS limitation of transitive routing to force outbound traffic to flow through the Sophos for inspection before reaching the Internet. Many of our clients have this requirement and so far Sophos is the only product in the market that provides an active/active solution to implementing GRE tunnels that push traffic across VPCs, through the Sophos, and out to the Internet. Additionally, their support team has been very helpful and are very responsive. They spend the time explaining their product and help you as you progress through every step of design, deployment, and implementation in your AWS environment.
Buyer beware, you're on your own
We've been using the UTM in our VPC for a few months now. A few solid pro's for the product:
1. If you're coming from the Cisco ASA world (we were), you'll find the UTM interface incredibly simple. It makes common setup a breeze.
2. It supports a lot of stuff you wouldn't expect without extra cost (e.g. OTP soft tokens, a solid LDAP integration, Site2Site VPN, etc)
3. It's linux under the hood, so you can script certain things - even use tcpdump to analyze traffic.
Unfortunately, the product & company also have some huge drawbacks.
1. Sophos doesn't really care about it's documentation. As another user noted, the documentation provided by Sophos is just terrible. A good portion of it is plain wrong or outdated, and well over half of it is simply useless. An easy example is their documentation for HA support for EC2 (spoiler, they have no HA support for EC2, they have a rough idea of how somebody might do it).
2. A lot of the advanced features are too buggy to use in production. For example, if you want to use their web application firewall (similar to the IDS feature on the ASA), you're going to be manually adjusting Apache mod_security configs or deal with regular connection losses due exceptions. Don't bother reporting these issues to Sophos, due to #3.
3. When things go wrong, Sophos support is not there to help you. This wouldn't be as big of a deal if it wasn't for the documentation problem. When dealing with Sophos support, you get the very strong indication that you're really dealing with Windows AV tech support reps. Most of the time, the tech's don't have the slightest clue about what the UTM does or why. A few days (or weeks) after you file an issue, a properly trained tech may contact you, but who has that kind of time?
4. If you undergo PCI/HIPPA complaint scans, it's probably going to be the device with the most violations. You can report the violations to Sophos support, and they'll tell you to file a UTM feature request.
5. You just can't fix certain things. One of the best parts about the UTM is it's super-easy web interface. However, it completely lacks a command line interface into a lot of it's core features (NACLs, etc). If something misbehaves (e.g. needing to remove a stuck rule), you're down to scrounging the internet for some example of how somebody got Sophos support to give out a magic command.
So, if you're ok being on your own, then the UTM is a great starting point. Lots of good open source tools and it's not terribly difficult to poke around and figure out were they've configured most things.
Rolling out Sophos UTM in EC2
There are virtually no instructions on the Sophos or Amazon web sites, beyond the video <http://www.sophos.com/en-us/lp/aws.aspx >. There is no advice on how to size the UTM VM instance and how it interacts with internal interfaces (virtual network cards). This lack of clear documentation is a major stumbling block when attempting to deploy UTMs in EC2. Personally I wasted over twenty hours, and was almost on the point of giving up when I was finally able to get a UTM working in EC2. Despite the fact I have access to Premium Support from Sophos, they offered almost no support on how to size and deploy a UTM in EC2. The support from Amazon was very spotty. The Amazon technicians I dealt with had never used a soft UTM and did not understand how they work, so I spent a lot of time educating them about the Sophos architecture. All in all, the product is fine but the obstacles to deploying it in EC2 are very daunting. In summary, the lack of documentation could make the Sophos UTM almost useless in the Amazon cloud. If you are brave enough to attempt to use this product, make sure you have phone support from Amazon.
Best Value for Money IPS and VPN Solution
The Sophos UTM is a very straight forward, easy to use appliance that does exactly what you want, GOOD IPS (Snort based), Stable VPN with very good interchangeability to AWS and other vendors plus lot more UTM features - HIGHLY RECOMMENDED
Emind has chosen Sophos UTM for lot's of our deployments.
Talk to us: info@emind.co if you need more help.
Lahav Savir, Cloud Architect
Good solution for VPN
This is a fairly easy solution for AWS VPC connectivity, although I did have to update the firmware before being able to effectively establish a VPN IPSec connection.
The interface is well thought out and is quick to respond to input.