PRODUCTS

September 2016

Five Reasons Why It’s Time to Put Privilege First

For more than a decade, CyberArk has focused on helping companies to protect high value assets inside the network. Over the years, privileged account security has evolved from compliance-driven projects to thoughtful strategic programs adopted enterprise wide. Along the way, we have innovated and enhanced our offering to stay ahead of ever-changing advanced threats, but […]

Five Reasons Why It’s Time to Put Privilege First Read More »

Introducing Sophos Intercept X – a completely new approach to endpoint security

At Sophos, we’re no strangers to next-generation security. You can see it across our entire product line, from our powerful Security Heartbeat technology that leverages Sophos Central to facilitate communication between endpoints and the network, to our advanced behavioral analytics and malicious traffic detection features (and a whole lot more). Today, with the introduction of

Introducing Sophos Intercept X – a completely new approach to endpoint security Read More »

New SophosLabs research: Cryptomining malware on NAS servers worldwide

SophosLabs has just released a research paper on a new way that cybercriminals are distributing malware that makes money by “borrowing” your computer to mine cryptocurrency. The report by Attila Marosi, Senior Threat Researcher at Sophos, investigates the Mal/Miner-C malware, which criminals are using to mine the cryptocurrency Monero. In this paper, Marosi examines how

New SophosLabs research: Cryptomining malware on NAS servers worldwide Read More »

Sophos is a Magic Quadrant Leader in Unified Threat Management for the fifth year running

We’re excited to announce that the new Gartner Magic Quadrant for Unified Threat Management* is out, and Sophos is positioned in the Leaders Quadrant for the fifth year running. We continue to be one of only three vendors in the Leaders Quadrant. And we think that says a lot about our standing in the eyes

Sophos is a Magic Quadrant Leader in Unified Threat Management for the fifth year running Read More »

Cisco vulnerability shows up in attack tools leaked by “NSA hackers”

The Shadow Brokers are a self-styled hacker group that recently kicked off a tongue-in-cheek media campaign claiming that they’d penetrated the NSA (or someone like that – they’re referring to the victim as the Equation Group). Shadow Brokers say they’ve made off with a virtual warehouse of tip-top “cyberweapons” that they plan to auction off.

Cisco vulnerability shows up in attack tools leaked by “NSA hackers” Read More »

Corero: Choose Your Network Threat Defenses Wisely

Being an IT security professional isn’t easy these days; the cyber threat landscape is constantly evolving. Ransomware, Trojans, Malware, and distributed denial of service (DDoS) attacks are some of the most common types of threats. Each has different vectors and flavors, and each brings its own risks and costs. IT pros clearly need multiple layers

Corero: Choose Your Network Threat Defenses Wisely Read More »