Sophos is committed to complying with data protection rules and protection of personal data it processes on its platform. Sophos secures customer information by authenticating access via username and password based on managed Active Directory group membership coupled with multi-factor authentication. Logs of support interactions and activity are retained subject to Sophos’s overall privacy policies, as set out in the Sophos Group Privacy Policy. Anonymized summaries may be kept for longer periods to allow investigation of service problems) and are securely destroyed when no longer required. Logs for updating services and individual telemetry reports sent by UTMs are retained as long as we have a legitimate business need to keep them (e.g. Retention policies for data stored on the UTM can be configured by the customer. Visit our Sub-processor listing to find out more about sub-processors engaged by Sophos. See the relevant documents for those services. Sub-processorsĭata shared with some Sophos services may be handled by sub-processors. Where you configure the device to use external logging or monitoring services such as syslog of IPFIXĭata submitted to SophosLabs services is handled in accordance with the SophosLabs Information Security policy ().Reports regarding system errors that occur, that allow us to identify potential product issues before they become more serious.Application accuracy data about IPS and application classification which may be sent to SophosLabs to improve IPS detection.This is used to help us prioritize our development and support efforts. Anonymous telemetry data about the configuration of the UTM.Telemetry from individual devices - this is an optional feature and can be turned off in the product configuration.URL categorization, where selected URLs or parts of URLs are sent to SophosLabs SXL services for categorization.Sandstorm, where files that require analysis are sent to SophosLabs Intelix.Information processed by the UTM is primarily stored on the UTM itself. Purpose of Information Processed by the Sophos UTM Email content (for quarantine purposes).Domains, hostnames and URLs of web traffic.Data about traffic on protected networks.Data about authenticated users, including.Sophos processes the following types of information in Sophos UTM: Error reporting service (AWS deployments only).Sophos Support servicesAccess Proxy for UTM (Remote support tool).Sophos Adaptive Learning – Telemetry services.Sophos UTM interfaces with other Sophos components/ products including: And clear, detailed reports will give you the insight you need to improve your network performance and protection. The intuitive interface will help you quickly create policies to control security risks. It simplifies your IT security without the complexity of multiple point solutions. Sophos UTM provides the ultimate network security package with everything the customer needs in a single modular appliance. In this document, we provide information about the Sophos UTM data handling practices, including personal information collection, use and storage. The purpose of this datasheet is to provide Sophos customers with information on how your privacy choices can be tailored with our offerings.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |