Sophos data Protection Suite Preis // IT Management Solutions

Sophos data Protection Suite Preis

A simple policy for encrypting computers.


  • Combines data, endpoint and email protection—all in one license
  • Integrates full-disk, file and email encryption
  • Consistent DLP policies across endpoint and emai
  • Complete endpoint threat protection that includes client firewall; web filtering; application, device, data and network access control (NAC); and patch assessment
  • One antivirus scanning engine across your endpoints and email gateway
  • Switching and deployment made easy
  • Backed by our SophosLabs global security experts and the best support in the industry

You're safer in our world because our EndUser Data Suite combines DLP and encryption with our email and endpoint protection. It makes secure data sharing easy with our full-disk, file and email encryption. And, it stops accidental data loss with sensitive data scanning that's built into our desktop antivirus and email protection. No separate deployment needed.

Because it's all from Sophos, it works better together. And it's so simple to use, you'll actually turn it on—delivering the best protection that saves you time and money.

Ideal for ...

Sophos EndUser Data Suite is ideal for organizations of any size needing complete data protection that's easy to manage.

Our EndUser Data Suite includes:


  • Protect your data with our proven full-disk encryption technology
  • Easily deploy and manage encryption within your endpoint console
  • Setup policies to encrypt email containing sensitive data before it leaves your organization
  • Keep users happy and productive with fast encryption algorithms utilizing the latest technology
  • Reduce help desk calls with single sign-on and local self-help for password recovery
  • Quickly and easily encrypt files, email attachments and files saved to USB sticks (PrivateCrypto)
Data Control
  • Prevent accidental loss of sensitive data with integrated DLP in the endpoint and email gateway
  • Stop data leaking through removable storage devices, browsers, email, and instant messaging
  • Utilize hundreds of pre-packaged data definitions to set up effective policies out of the box
  • Customize your content control lists and keep them consistent across your endpoints and mail gateway
  • Manage data control policies centrally and deploy across your entire estate or by group
Mobile Device Management
  • Enable secure access to corporate email and data from smartphones and tablets
  • Control policy on iPhones, iPads, Android devices, BlackBerry, and Windows Mobile
  • Prevent data loss on mobile devices with policies for auto locking and strong passcodes
  • Track, lock and wipe lost or stolen devices to prevent data from falling into the wrong hands
  • Manage apps with your own enterprise app store
Endpoint Security
  • Stop threats before they can take hold of your systems to steal sensitive data
  • Control removable devices to prevent potential data loss incidents and malware infections
  • Keep applications under control and patched to reduce risk and vulnerabilities
  • Enjoy top performance from a single engine for threat and data protection
  • Protect all your platfroms from Win95 to Win 8, as well as Macs, Linux, UNIX and virtualized systems


A simple policy for encrypting computers.

All in one license

You might also like

A few more thoughts: about protecting data

by portlandgent

Great points, GA. Some more thoughts:
Beyond simply removing the virus/spyware, remember that you are first of all dealing with customer data and a working Windows system. There's a CHANCE you could screw it up, lose their data, etc. You could even drop and destroy a hard drive by accident. Things happen. How do you protect yourself against that? Hint: the data on the drive is surely much more valuable to the customer than the hardware itself. I'd rather buy them a new hard drive for $50 than be sued for losing all their data (which could be much?)
I often use True Image (like Ghost) from Acronis to make snapshots of customer drives before I do ANYTHING

Rowman & Littlefield Publishers Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
Book (Rowman & Littlefield Publishers)

Protecting Data Wherever It Goes: Dell Unveils New End User Data Security ..  — Virtual-Strategy Magazine
Dell today announced new proactive security solutions designed to provide organizations of all sizes with protection for their valuable data in the face of new and increasingly sophisticated end user security threats, while continuing to meet employees ..

Trafford Risky Business: Sharing Health Data While Protecting Privacy
Book (Trafford)
Wiley Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
Book (Wiley)
  • Used Book in Good Condition
Rocky Nook Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets
Book (Rocky Nook)
Prentice Hall Windows Internet Security: Protecting Your Critical Data
Book (Prentice Hall)

Related Posts

Copyright © . All Rights Reserved