Highlights

  • Support for the latest
    high-speed wireless
    standards including
    802.11ac and 802.11n
  • Centrally controlled
    wireless
  • No local configuration of
    access points required
  • Automated channel
    optimization for maximum
    performance
  • Complete threat protection
    for wireless clients
  • Quick voucher-based
    guest access customizable
    with your brand
  • Choose from a range
    of access points and
    firewalls with integrated
    wireless
  • Supports Microsoft Lync
    and VoIP

Sophos Wireless Protection Installs fast with automatic setup and configuration
You can set up multiple wireless Access Points (APs) within minutes. They require no local configuration and will simply find the controller, retrieve their IP address via DHCP, and import the configuration. Devices automatically appear in the UTM/firewall interface where you can manually activate them.

Creates reliable networks for all areas
Sophos access points support a variety of deployment scenarios. They include models for desktop/wall mounting such as the entry-level AP 15 and the enterprise-grade AP 55 and AP 100. The AP 15C, 55C and 100C are smoke-detector style ceiling-mount and the AP 100X is suitable for outdoor use.

Provides guest Wi-Fi and BYOD access
Sophos Wireless networks gives you secure, easy-to-manage guest access out-of-the-box without extra appliances, licenses or complex configuration, you can tailor the guest experience to suit your needs. Set bandwidth limits and content filtering as well as customizing the login page and vouchers to strengthen your company brand.

Secure wireless and integrated network protection
To prevent unauthorized access Sophos use the most advanced encryption and authentication standards available, including WPA2-Enterprise in combination with IEEE 802.1X (RADIUS authentication). And, the APs forward wireless traffic to the UTM or firewall, giving wireless clients the same level of security as if they were physically connected to the LAN. You can also choose to authenticate users based on their credentials from any back end server supported by a Sopohos UTM and firewall for greater flexibility and control