PRODUCTS

January 2013

Ipoque at Mobile World Congress 2013

a conference featuring prominent Chief Executives representing mobile operators, device manufacturers, technology providers, vendors and content owners from across the world. Ipoque participates at industry tradeshows and conferences around the world. If you are interested in viewing a full demonstration of Ipoque’s products and solutions join at GSMA Mobile World Congress 2013. 25 – 28 […]

Ipoque at Mobile World Congress 2013 Read More »

Jacarta’s Go-Probe Sensor range expanding!

coverage of your Jacarta solution by using Vibration Sensors with Adjustable sensitivity and Airflow Sensors to ensure you know of AC problems. Generally, interSeptor systems have been designed for ease of installation and use. Multiple temperature/humidity sensors are provided out-of-the-box to ensure individual rack and room monitoring can begin immediately as well as many others,

Jacarta’s Go-Probe Sensor range expanding! Read More »

Opera breached, has code cert stolen, possibly spreads malware – advice on what to do

“On June 19th we uncovered, halted and contained a targeted attack on our internal network infrastructure. Our systems have been cleaned and there is no evidence of any user data being compromised. We are working with the relevant authorities to investigate its source and any potential further extent. We will let you know if there

Opera breached, has code cert stolen, possibly spreads malware – advice on what to do Read More »

Sophos Unleashes Strategy to Leverage the Cloud to Simplify Security and Enhance Protection

Easy to deploy and simple to manage, Sophos Cloud gives Sophos partners and IT managers at enterprises of all sizes the ability to manage and maintain endpoint security to protect all users, regardless of physical location, via the cloud-based service. The launch of Sophos Cloud is the first step in the company’s aggressive strategy of

Sophos Unleashes Strategy to Leverage the Cloud to Simplify Security and Enhance Protection Read More »

Encryption Without Compromise: The New SafeGuard Enterprise 6.1

With version 6.1 we’re addressing the two biggest issues in encryption – performance and usability – by leveraging native operating system (OS) encryption for better performance; and delivering multi-platform management across all devices and cloud environments. SafeGuard Enterprise also solves the major challenge of managing encryption across multiple platforms, devices, and cloud environments. Users and

Encryption Without Compromise: The New SafeGuard Enterprise 6.1 Read More »

Sophos Email Appliance offers Enhanced Phishing Protection

Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both designed to help counteract this issue by helping legitimate senders prove that their email isn’t forged.   Now you can implement anti-spam rules in the Sophos Email Appliance that act on the presence or lack of both SPF and DKIM validation and you can even

Sophos Email Appliance offers Enhanced Phishing Protection Read More »

New Peplink Balance 2500 router and Updated Technology Pages

Learn How Balance and MAX Routers Team Up for Unbreakable VPNs The Balance lineup uses Peplink SpeedFusion technology to integrate seamlessly with MAX cellular routers and deliver unstoppable VPNs in a wide variety of applications. To see how, visit our updated Balance and Unbreakable VPN pages. Filled with helpful deployment diagrams and technology highlights, they’re

New Peplink Balance 2500 router and Updated Technology Pages Read More »

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security

Πως μοιάζει το νέο Κέντρο Διαχείρισης; Ποια λειτουργικά συστήματα υποστηρίζονται και ποιοι clients είναι διαθέσιμοι; Ποια είναι η διαφορά μεταξύ των UEFI και BIOS και γιατί χρειάζεται να το ξέρετε αυτό όταν πουλάτε ή εγκαθιστάτε το SGN; Μπορούμε να υποθέσουμε ότι η Native (Γηγενή) Κρυπτογράφηση είναι ίδια με το SafeGuard Enterprise Device Encryption; Μπορούν οι

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security Read More »

What you need to know about the Bash “Shellshock” vulnerability

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue. Please see our article on Naked Security for an explanation of the vulnerability itself. In addition, we have examined our products and we are

What you need to know about the Bash “Shellshock” vulnerability Read More »

$80 million yacht hijacked by students spoofing GPS signals

But those signals were not authentic, and the ship was not on course. The signals were in fact being sent from the White Rose’s upper deck by University of Texas/Cockrell School of Engineering graduate students Jahshan Bhatti and Ken Pesyna. A team from the school had been invited aboard while the White Rose sailed from

$80 million yacht hijacked by students spoofing GPS signals Read More »