CimTrak for Sophos

What We Monitor

Sophos UTM devices are firewall/VPN devices that provide controlled connectivity between an internal network and an external network (internet) while providing protection for the internal network by blocking traffic that isn’t explicitly allowed.

The VPN functionality allows encrypted external connections to the internal network by pre-configured authenticated users. Sophos UTM devices can be configured to provide additional security functions as well. CimTrak for Network Devices monitors the device configuration for changes, logs the changes, and then notifies the responsible parties of them 

Checkpoint and CimTrak

How CimTrak for Sophos Works

When CimTrak locks a Sophos UTM device for monitoring, it reads the configuration of the device. It calculates a digital signature for the configuration, and store it in CimTrak’s master repository along with a copy of the configuration. At
user-configured configured intervals, CimTrak reads the contents of the configuration, calculates the digital signature, and compares it to the signature stored in CimTrak’s master repository.

When CimTrak detects a change in the configuration, that configuration and its digital signature is then stored in the master repository. The master repository then logs the detected change and sends notifications to the configured emails and/or configured Syslog services and/or SNMP services.

Benefits of using CimTrak for Sophos

CimTrak detects any change to the Sophos UTM device’s configuration.

  • When changes are detected, CimTrak for Network Devices can be used to compare the device’s configuration to its previous configuration, and restore a previous configuration when necessary.
  • CimTrak for Network Devices can detect any change to the Sophos UTM device’s configuration, log the activity, and notify the responsible parties by e-mail, Syslog, or SNMP.
Network Devices

 Real-Time Insight into Your Entire Network

Do you have the confidence and trust with your FIM software?