PRODUCTS

October 2015

Sophos Firewall Manager now available in Copernicus beta

If you’ve been following Project Copernicus, you know that it’s our revolutionary new firewall platform that’s been in beta for the last couple of months. Today, we’re pleased to announce that our brand new centralized management platform for Copernicus firewalls is now available for beta. Sophos Firewall Manager (or SFM for short) provides powerful centralized […]

Sophos Firewall Manager now available in Copernicus beta Read More »

When penguins attack: Does Linux power the malware underground?

The malware ecosystem is a complex environment. Criminals must acquire victims, develop scams and figure out the most effective way to turn that activity into cash. Most Internet crimes are opportunistic, meaning that online attacks are best operated as a high-volume business. The keys to profitability are the ability to exploit a high percentage of

When penguins attack: Does Linux power the malware underground? Read More »

Advanced user protection made simple with Sophos Cloud

Corporate end users (including you and me) are super productive when we use multiple devices – laptops, tablets, smartphones – so we can keep working wherever, whenever. These devices are convenient and portable, allowing us to connect from coffee shops, airports, hotels and at home. Unfortunately, cybercriminals are taking advantage of the fact that it

Advanced user protection made simple with Sophos Cloud Read More »

Sophos. Ask yourself these four questions before launching your data protection strategy

We’ve recently talked about some of the main reasons why you need to encrypt your data. And we showed you the potential consequences when your data isn’t encrypted. So now that you’re ready to look more closely at encryption in your organization, where should you begin? Every organization is different, so there is no one-size-fits-all

Sophos. Ask yourself these four questions before launching your data protection strategy Read More »

Corero. DDoS Impact on Mobile Networks – Radio Congestion

Most CSP’s and Mobile Carriers have deployed some form of DDoS scrubbing complex in their network to clean large, long duration DDoS attacks. While this is a necessary first step in proactively working to defeat the DDoS challenge, the threat landscape is constantly changing and requires a more modern approach to protection. Based on recent

Corero. DDoS Impact on Mobile Networks – Radio Congestion Read More »

Sophos adds Auto Scaling to its Unified Threat Management for AWS solution

Sophos, a global leader in network and endpoint security solutions, announced enhancements to its leading Unified Threat Management (UTM) solution designed for organizations of all sizes using Amazon Web Services (AWS). Sophos UTM 9 features Auto Scaling technology to ensure a user’s security layer scales to match application needs without affecting performance. Sophos UTM 9

Sophos adds Auto Scaling to its Unified Threat Management for AWS solution Read More »

Independent tests show Sophos Endpoint beats the rest in usability

We’ve been saying it for years: simple security is better security. We design our products with the IT professional in mind, and the result of our efforts is the most usable security products on the market. You don’t have to take my word for it: independent testing house Tolly has just published a report comparing

Independent tests show Sophos Endpoint beats the rest in usability Read More »

Sophos. Here’s why complex security and endusers don’t mix

Security is really all about your endusers. And that’s a problem, because when one user does something wrong, it has the potential to bring down the whole company. Security companies have been trying to deal with the user problem for decades, but they’ve been going about it the wrong way. The way most security vendors

Sophos. Here’s why complex security and endusers don’t mix Read More »