PRODUCTS

March 2019

CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation

The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this age of innovation. Established industries like finance and healthcare are being disrupted by new and nimble startups who have leap-frogged established […]

CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation Read More »

AV-Test and AV-Comparatives give Sophos Mobile Security 100%

AV-Comparatives recently tested 250 Android security apps available on the Google Play Store against 2,000 of the most common Android threats from 2018. The test was designed to simulate real-world conditions and help Android users identify genuine, effective antivirus apps in a space where there’s no shortage of buggy, dubious or ineffective options. We were

AV-Test and AV-Comparatives give Sophos Mobile Security 100% Read More »

Sophos. A connected approach to compromised mailbox security

Your mailbox is more valuable than ever to attackers, with 93% of company breaches in security now starting with a phishing email. Whether users are targeted to receive phishing emails, or they have their mailbox compromised to send spam and viruses from your organization’s domain, the risks to your organization are great. The symptoms of

Sophos. A connected approach to compromised mailbox security Read More »

CyberArk Version 10.8 Flies High in the Cloud

During this year’s RSA conference (visit us at booth #N6253!), CyberArk announced the release of version 10.8 of the CyberArk Privileged Access Security Solution. Version 10.8 focuses on expanding and improving CyberArk’s ability to continuously discover and protect cloud environments as well as augmenting Just-in-Time capabilities for an easy-to-use privileged access control. We’ve included a

CyberArk Version 10.8 Flies High in the Cloud Read More »

Boldon James. Healthcare Breaches Affected 11.5 Million People In 2018

he total number of records exposed in the healthcare sector rose to 11.5 million in 2018, according to the fifth annual Healthcare Breach Report, published by Bitglass. The number of breaches reached a three-year low at 290 breaches total; however, the number of exposed records nearly doubled from 2017. Also notable in the report was

Boldon James. Healthcare Breaches Affected 11.5 Million People In 2018 Read More »

7 uncomfortable truths of Endpoint Security: A Sophos report

A report released today by Sophos reveals that IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else. The study, 7 Uncomfortable Truths of Endpoint Security, surveyed over 3,100 IT managers in 12 different countries across industry verticals and organization sizes, and was conducted by the independent research

7 uncomfortable truths of Endpoint Security: A Sophos report Read More »

And the Award Goes To…The GlobalSign IoT Identity Platform!

Strong, unique identities are the core of IoT device security. Giving unique identities allows them to be authenticated when they come online and throughout the lifetime. It proves integrity and securely communicates with other devices, services and users. But how do you know what’s the best of the best? In the true spirit of an

And the Award Goes To…The GlobalSign IoT Identity Platform! Read More »

Sophos Intercept X Achieves Highest Scores in NSS Labs 2019 Advanced Endpoint Protection (AEP) Group Test

Sophos is a strong advocate for thorough independent testing of cybersecurity products to help customers choose what’s right for their environment and for vendors to improve the protection in their technology. In the 2019 AEP Group Test published by NSS Labs today, our next-gen endpoint solution Intercept X was recognized as having the highest security

Sophos Intercept X Achieves Highest Scores in NSS Labs 2019 Advanced Endpoint Protection (AEP) Group Test Read More »

7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security

CyberArk aims to make implementing and managing a robust privileged access program as easy as possible for our customers. CyberArk continues to lead the industry with its own investments in innovation to consistently deliver the most value to customers – especially in terms of simplicity, automation and improved operational efficiencies. Over the course of the

7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security Read More »

Sophos Central Architect Training (20-22 March, 2019)

This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. It consists of presentations and practical lab exercises to reinforce the taught content, and electronic copies of the supporting documents for the course will be provided to each trainee

Sophos Central Architect Training (20-22 March, 2019) Read More »