PRODUCTS

February 2015

Why choose Sophos Endpoint Protection? Our innovative technology and threat intelligence

Today’s endpoint protection needs to do much more than blocking known malware. Your endpoint solution needs to be intelligent enough to prevent attacks based on suspicious behaviors, and it should be able to detect and clean up infections when they do happen. Sophos Endpoint Protection integrates a range of innovative technologies to secure your Windows, Mac […]

Why choose Sophos Endpoint Protection? Our innovative technology and threat intelligence Read More »

Anatomy of a ransomware attack: CryptoLocker, CryptoWall, and how to stay safe

Ransomware, it’s everywhere. We had hoped that the notorious file-encrypting ransomware called CryptoLocker was defeated after law enforcement knocked out its infrastructure last year, but CryptoLocker and its close cousin CryptoWall have come back stronger than ever. Ransomware is malware that prevents you from using your files or your computer, and then extorts money from you

Anatomy of a ransomware attack: CryptoLocker, CryptoWall, and how to stay safe Read More »

Sophos wins Best Usability Award from AV-Test

We’re pleased to announce that Sophos has been recognized with the AV-Test Best Usability 2014 Award! AV-Test regularly tests endpoint protection products, including the Windows component of our Endpoint Protection product, which we call Endpoint Security and Control.  Across multiple tests in 2014, “Sophos Endpoint Security and Control excelled consistently and thus earned the 2014 Award

Sophos wins Best Usability Award from AV-Test Read More »

Sophos Mobile Security aces AV-Test review with 100% Android malware detection

The expert product reviewers at AV-Test handed out awards for the best antivirus software for Android in January, and once again Sophos has aced the test with 100% malware detection.  Our Free Antivirus and Security for Android (Sophos Mobile Security) accurately detected and blocked every one of the 2,950 samples of malicious Android apps used in

Sophos Mobile Security aces AV-Test review with 100% Android malware detection Read More »

Facebook’s DeepFace facial recognition technology has human-like accuracy

Facial recognition technology has been around for many years – the fact that the vast majority of people have two ears, two eyes, a mouth and a nose, all appearing in pretty much the same location, makes basic recognition relatively straightforward. Total accuracy, however, is much harder to come by – even us humans can

Facebook’s DeepFace facial recognition technology has human-like accuracy Read More »

Array: Multi-Tenant = Multi-Benefit. Meet the Enhanced AVX10650.

Array announced the second generation of the AVX10650 virtualized application delivery controller. Why is this important? It gives IaaS providers unprecedented flexibility to support multiple customers while managing just one appliance (or two, for high availability). Or, enterprises can support multiple applications, user types, etc. – again, with just one appliance (or two).  And unlike other

Array: Multi-Tenant = Multi-Benefit. Meet the Enhanced AVX10650. Read More »

Array: A Hybrid Virtual/Dedicated Model for SSL/TLS Offloading

In virtualized environments, SSL/TLS data encryption is commonly used to secure mission-critical and sensitive data as it transits to remote users and shared networks. Virtual application delivery controllers (ADCs) are also frequently deployed to provide SSL offloading from servers (reducing their load and thus improving performance) as well as application acceleration, load balancing across links,

Array: A Hybrid Virtual/Dedicated Model for SSL/TLS Offloading Read More »

Corero: The double-edged sword of operating a hosting data center

The more customers you host in your data center, the better, right?  Of course, that means more revenue.  And if those customers are in multiple industry verticals, even better, correct?  Supporting a variety of customer types protects  against revenue fluctuations if rough economic times affect a certain vertical and not the others.  But here’s the

Corero: The double-edged sword of operating a hosting data center Read More »