Sophos Sg105



Malware protection is available in Sophos Firewall XG 105, Cyberoam CR500iNG, Sophos UTM SG105, and later models. XG Firewall offers scanning by two antivirus engines. Primary antivirus engine. Select the primary antivirus engine to scan traffic from the following options: Sophos; Avira. Sophos SG105 Firewall. Condition is 'Used'. Includes power cable. Seller assumes all responsibility for this listing. Shipping and handling. Sophos UTM is a great choice of web filter and it comes with some on-box reporting functionality which isn't too bad compared to Scott (Fastvue) almost 7 years ago Tuesday, April 22, 2014 08:38 PM. Sophos SG 105 FullGuard Plus 3 Years $ 503.00 All-in-One Protection offers the latest next-gen firewall protection you need plus features you can’t get anywhere else – including mobile, web, endpoint email encryption and DLP.

The Sophos SG 105 appliance is designed to provide the optimal balance between performance and protection – for diverse IT environments. Configure your hardware

to suit your infrastructure, even when that changes. Our optional FleXi Port LAN modules give you the freedom to select the connectivity you need – copper, fiber, or 10GbE. You decide.

The SG 105 is built on the most advanced Intel technology, our products provide the utmost in flexibility. Add to your protection as you need it - without changing or upgrading your hardware. That means you benefit from future software and performance enhancements

which guarantees the best possible value for money. Redundancy features such as an additional hard-drive or power supply are available on the 1U SG 450 and on both

of our 2U appliances.

With 1.5 Gbps firewall throughput, 350 Mbps IPS throughput and 325 Mbps VPN throughput, the SG105 effortlessly handles multiple tasks simultaneously. Plus, you can easily scale up by dynamically clustering up to 10 units without external load balancers.

And since every software subscription is available on every SG series appliance, you can flexibly size the solution to fit your budget and your individual security needs. Next-Generation firewall features or all-in-one security on a single box, it's your choice. As the access point is built in, you do not require any extra hardware. Our SG100 Series desktop models with integrated wireless are a very tidy solution for even the most compact office space.

These desktop firewall appliances offer an excellent price-to-performance ratio. They utilize the latest technology and are available with or without integrated wireless networking. -Firewall throughput: 1.5 Gbps -VPN throughput: 325 Mbps -IPS throughput: 350 Mbps -Antivirus throughput (proxy): 90 Mbps -Ethernet interfaces: (4) GbE copper -Wireless standards: (w models only) 802.11b/g/n 2.4 GHz

Company Size

Sophos Sg105

  • S
  • M
  • L

Sophos Sg105 Default Password

5 star 5 8 4 star 4 3 3 star 3 0 2 star 2 0 1 star 1 1
Spiciest Positive Review
'The home version is an excellent tool for home use. It can come as a virtual appliance or installer, your choice. I personally use this for my home...' Read more
Spiciest Critical Review
'We had been using 2 x SOPHOS UTM 425 for a while, all I can say not good and too many bug. Application Controller is not working as it should be, B...' Read more
Read all Sophos SG-105 reviews
Sophos sg105 factory reset
  • Access Control Management
  • Advanced Threat Protection
  • Anti-Malware
  • Anti-Spam
  • Anti-Virus
  • Audit, Analysis and Compliance
  • Breach Detection
  • Content Filtering
  • Data Destruction
  • Data Loss Prevention
  • Data Recovery
  • Database Activity Monitoring
  • Device Control
  • Digital rights management (DRM)
  • Email Encryption
  • End-user awareness and training
  • Endpoint Detection and Response
  • Endpoint Protection Platform
  • File Access Auditing
  • File Encryption
  • Identity Management
  • Intrusion Detection and Prevention (IDS/IPS)
  • Mobile Forensics
  • Network Access Control
  • Network Security, Firewall and Packet Analyzers
  • Password Management

Setup Sophos Sg105

  • Patch Management
  • Penetration Testing
  • Physical Security
  • Proximity Readers
  • Public Key Infrastructure (PKI)
  • SIEM, Log Management
  • Single Sign-on
  • Threat Protection
  • Unified Threat Management (UTM)
  • User Monitoring
  • Virtual Private Network (VPN)
  • Vulnerability Scanners
  • eDiscovery