PRODUCTS

Cyber Security Elements by NSS

15 January 2013

Dirty Dozen spam sending nations – find where you finished in our Q3 SPAMPIONSHIP chart

Spammers versus spam senders There’s a big difference, because spammers generally don’t send their own spam in bulk any more. That hasn’t worked for a decade or so, because if you send 10,000,000 unwanted emails as fast as you can from the same server, or even the same data centre, you make an easily-identified target. […]

Dirty Dozen spam sending nations – find where you finished in our Q3 SPAMPIONSHIP chart Read More »

Sophos Delivers Advanced Threat Protection for the Small and Mid-Market

Developed by SophosLabs, this new Sophos UTM approach brings together multiple technologies to rapidly identify and isolate infected clients and prevent communication with malicious command and control hosts. This latest version introduces botnet protection and cloud-based sandboxing to expand on the Sophos UTM’s existing multi-layer Firewall, Web, Email and Endpoint protection. This extends the Sophos

Sophos Delivers Advanced Threat Protection for the Small and Mid-Market Read More »

Sophos and Check Point Partner to Protect Corporate Networks from Non-Compliant Mobile Devices

The partnership means users of Sophos Mobile Control 4.0 and Check Point Mobile VPN can link the two solutions to provide network access control for any mobile devices attempting to use the corporate network. Non-compliant devices are isolated from the network, protecting the organization from unauthorized mobile devices. This ensures that only managed devices that

Sophos and Check Point Partner to Protect Corporate Networks from Non-Compliant Mobile Devices Read More »

Facebook pays $20K for easily exploitable flaw that could have led to account hijackings

As it is, Whitten explains, Facebook gives users the option of linking their mobile numbers with their accounts. Users then can receive updates via SMS and can also login using their phone number rather than their email address. Whitten found that when sending the letter F to Facebook’s SMS shortcode – which is 32665 in

Facebook pays $20K for easily exploitable flaw that could have led to account hijackings Read More »

Sophos wins CRN Security Vendor of the Year Award

In an increasingly complex security environment Sophos works with partners to make security simple to deliver, implement and manage. Over the last 12 months Sophos has created a more flexible and generous partner programme, providing partners with protection for deal registrations, attractive margins and joint lead generation initiatives. The programme also provides up-to-date certification, to

Sophos wins CRN Security Vendor of the Year Award Read More »

As encryption standards tighten, Array retools ADC, eyes SaaS clients

Service providers need higher level of encryption support “If you look at one of our typical deployments, yes, they want security, they want SSL, but the numbers they support are in the thousands,” he said. “It’s nothing compared to a business model that is supporting millions of users. When we are talking to these SaaS

As encryption standards tighten, Array retools ADC, eyes SaaS clients Read More »

Sophos Mobile Encryption 2.2 released. Free file encryption app for Android and iOS

Download the Sophos Mobile Encryption app from Google Play for Android, or from iTunes for iOS devices (iPhones, iPod Touches and iPads). New features available in this version Protect access to your Sophos Mobile Encryption application with an optional password. Fully transparent key management, so you don’t need to enter the passphrase each time you

Sophos Mobile Encryption 2.2 released. Free file encryption app for Android and iOS Read More »

GlobalSign: Biometric Technology Could Mean More Secure Enterprise Data

 But what are the implications of biometric technology as far as enterprise security is concerned? Ryan Hurst, CTO of enterprise SaaS Certificate Authority GlobalSign, has told Softpedia that biometric technology could turn out to be highly beneficial to organizations looking to protect their data, but it depends a great deal on how it’s implemented. “The

GlobalSign: Biometric Technology Could Mean More Secure Enterprise Data Read More »

UTM and next-gen firewalls: What’s the difference? (Infographic)

As we explain below, next-generation firewalls are typically defined as firewalls enhanced with intrusion prevention and application intelligence. On the other hand, UTM systems include those features—plus additional technologies such as email security, URL filtering, wireless security, web application firewalls and virtual private networks (VPNs). In this view, UTM systems include NGFWs as components. Manager’s

UTM and next-gen firewalls: What’s the difference? (Infographic) Read More »

Spam-Bot Invaders: Which countries send the most spam?

When you consider the country’s huge online population, it’s not surprising that the U.S. sends so much spam. Spam comes from “bots” — computers infected with malware and under the control of a criminal. “Bot masters” can use servers anywhere in the world to give the bots instructions. So spam-bots in the countries on our

Spam-Bot Invaders: Which countries send the most spam? Read More »