FutureRange | Security Division

With new Threats and Security risks for IT every day, the landscape has changed. There are new security threats, identity issues and potential for data loss more than ever as more mobile users enter the workforce. These are real issues for IT. There is a clear need for a robust policy to manage your security strategy.  Ensuring the Management of your infrastructure is enforced whilst securing your mobile workforce and Endpoints.

“I am convinced that there are only two types of companies: those that have been hacked and those that will be. “

Robert S. Mueller, FBI Director. (2012) 

With the new GDPR regulations coming into force May ’18 organisations need to ensure that their data is secure. Companies will be responsible for their data and protecting it, this includes 3rd parties and Cloud providers. Protecting its Data, policy enforcement & compliance. Employee security – employee Identity, mobile and remote users accessing company data. Loss of Data.

The stakes are high. A security breach could expose your business to financial and reputational damage. Non-compliance with legal and other standards can result in steep penalties − and even criminal liability.

Enterprise security isn’t something you can afford to get wrong. Yet it remains one of most challenging organisational disciplines to understand, implement and maintain. FutureRange has over 20 years’ experience in implementing and supporting IT security technologies.


About Heimdal Security

Part of the best in the Cyber Threat space

Heimdal Security is part of Gartner’s selected 25 on Cyber Threat intelligence and part of the best in cyber protection. We deliver market-leading threat intelligence to organizations and users who trust us around the world through the Heimdal suite.

Developed by world champions

The Heimdal Security software was developed in 2011 by the 19th and 20th Team Defcon CTF World Champions in hacking. Heimdal is now used to protect organizations and users across the world against advanced attacks, wherever they may go.

Driven by experienced market experts

Since its incorporation in early 2014, Heimdal has been driven by experts in cyber-security. This includes specialists from security organizations such as BitDefender, BullGuard and Secunia. We are now one of the world’s fastest growing security platform.

Why Heimdal ?

  1. Patches 99,5% of security-critical software

Heimdal patches Java 7 / 8, Acrobat Reader, Acrobat Flash, Quicktime, VLC Player, Silverlight and many other applications, covering 99% of security-critical software apps. Heimdal works automatically and silently, without interruptingng the user.

  1. Traffic scanning to block malicious traffic

Dangerous Internet traffic can be used to infect your workstations and network. This makes scanning and blocking malicious web traffic a core security component. Heimdal protects your workstations against cyber-attacks and infected servers, domains and websites, while also ensuring a safeguard against data leakage

  1. Supplement for Antivirus, which is reactive

Anti-virus looks for files and actions, whereas Heimdal looks at Internet traffic. Therefore, what Heimdal covers and antivirus products cover varies greatly.
Heimdal prevents cyber criminals from taking data from your workstations and moving it out of your network.

Heimdal works to compliment Anti-Virus




Even adds to leading protection

Antivirus products and Heimdal complement each other very well, because they address different endpoint security aspects.

Today’s leading antivirus products offer great signature and file based scanning, with firewall and phishing protection, but they are still different from Heimdal.

Works with any antivirus

Heimdal works with any antivirus engine on the market. The combined protection you receive will vary according to the engines you use, but Heimdal will always add traffic-based protection against new 2nd generation attacks, whereas no antivirus product is able to intercept these attacks. Essentially adding a second layer of security to you network.

What is the difference?

The key difference between Heimdal and Antivirus products: Heimdal focuses on the communication from and to the PC to combat and detect incoming 2nd generation malware, combined with patching to close security gaps used by attackers. In unison, Heimdal offers cutting edge protection for endpoints.

GDPR as a Service


 General Data Protection Regulation - EU Directive - 25 May ’18.

 There are many challenges for IT around its Data, where is it stored, what info is held, enforcing polices, tracking, holding and deleting data. Data Breaches.

Enforcing policies – DLP, deleting, encrypting and archiving data are IT functions that need to be in place in addition there will need to be some Anti-malware solution in place, as any Data Breaches will be taken very seriously. 

Data Breach – Article 58.

A Data Breach is the release of secure or private/confidential data to an untrusted force, can be stolen, viewed, copied or transmitted. 

Data Protection Officer

DPO similar to a compliance office, needs to be proficient at managing IT processes, data security (includes dealing with cyber-attacks) and other critical business continuity issues around holding and processing of personal and sensitive data. Acting as a mini regulator. Legal compliance also. Essentially the DPO is the goto person for data protection for IT, Law and Practising.


Encryption, Anti Malware the expectation is that it is in place.

Backup & Restore

Is your data backed up daily, how easy it to restore and have visibility. 


GDPR as a Service

FutureRange has developed a exciting set of tools to manage your GDPR compliance for a minimal monthly fee, ensuring your organization has peace of mind when it come to data and the new regulations.



Sophos PLC is a security focussed company with innovative security solutions developed in-house. Sophos develops products for communication endpoint, ransomware, encryption, network security, email security, mobile security and unified threat management.

More than 100 million users in 150 countries rely on Sophos to offer end-to-end protection against complex threats and data loss. Sophos is committed to providing complete, enterprise-grade security solutions that are simple to deploy, manage and use, and deliver one of the industry's lowest total cost of ownership. Sophos offers award-winning security solutions covering endpoint, mobile, server, encryption, web, email, Wi-Fi, and UTM/next-generation firewall, all backed by SophosLabs -- a global threat analysis center which provides real-time cloud-enabled security intelligence. Sophos is headquartered in Oxford, UK.


Sophos Central Cloud Management


Sophos Central is a Cloud Management Security Solution. The Console is the central management piece to allow Server and Endpoint Management The unified console for managing your Sophos products from a single interface, synchronized security from a single dashboard. SaaS endpoint protection software solution Sophos Cloud Endpoint Protection combines an outstanding management console. Server lockdown, user-based policy management, and new application control features are its strong suites. Easy to assess security status, set policy, and respond to threats. Context-sensitive help lowers the learning curve and streamlines the installation process.

- Find Threats Faster

Advanced threat indicators like suspicious network traffic are instantly shared between the Next-Gen Firewall and the Next-Gen Endpoint to detect and prevent attacks. Simplify

- Investigation

Active identification of compromised systems shares computer names, users, and paths between your Endpoint and Firewall, so you can take action quickly.

- Minimize Threat Impact

Compromised endpoints are automatically isolated by the firewall, while the endpoint terminates and removes malicious software. And, it saves IT time and money through automated incident response

Modules in  Sophos Central  (purchased separately)

The Server and Endpoint are available in Standard and Advanced and is priced per User/Year.

- Endpoint Protection

- Server Protection

- Intercept X

- Mobile Device Mgmt

- Web Gateway

- WiFi

- Enterprise Encryption

- Email Filtering