PRODUCTS

December 2023

G2 Names Sophos a Leader for Endpoint Protection, EDR, XDR, Firewall, and MDR

G2 just released their Winter 2024 Reports, and Sophos is the only cybersecurity provider named a Leader across the G2 Grid® Reports for Endpoint Protection Suites, Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), Firewall Software ,and Managed Detection and Response (MDR). This latest recognition makes Sophos the only vendor named a Leader […]

G2 Names Sophos a Leader for Endpoint Protection, EDR, XDR, Firewall, and MDR Read More »

Fortra and Terranova Security. How to guard against the dangers of AI

Fortra’s Terranova Security’s chief information security officer explains the dangers associated with the advancement of AI and how businesses can better prepare against attacks. The rise of artificial intelligence is being accompanied by a rise in consciousness of the risks to cybersecurity.  “Hackers are utilising AI to develop more advanced attacks and evade detection from

Fortra and Terranova Security. How to guard against the dangers of AI Read More »

Fortra Launches Cloud Email Protection to Combat the Rise of Advanced Threats

Global cybersecurity software and services provider Fortra today introduced a transformative advancement in email security with the launch of Cloud Email Protection. This integrated cloud email security (ICES) solution sets a new standard by seamlessly blending artificial intelligence, threat intelligence, and automated remediation to stop advanced threats that elude traditional defenses and make it through to corporate

Fortra Launches Cloud Email Protection to Combat the Rise of Advanced Threats Read More »

BeyondTrust. Assessing PAM Tools and Your Next Step in Privileged Access Management

Identity is the new perimeter — and privileged access management (PAM) is the keystone of modern identity and access security. No identities—human or machine—are more imperative to secure than those with privileged access to systems, data, applications, and other sensitive resources. Beyond that, PAM is also essential for protecting your entire identity infrastructure, including your

BeyondTrust. Assessing PAM Tools and Your Next Step in Privileged Access Management Read More »

The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI

Generative artificial intelligence technologies such as OpenAI’s ChatGPT and DALL-E have created a great deal of disruption across much of our digital lives. Creating credible text, images and even audio, these AI tools can be used for both good and ill. That includes their application in the cybersecurity space. While Sophos AI has been working

The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI Read More »

MailStore. 5 Common Misconceptions About Email Archiving

Steady growth in email traffic has been a constant in the business world for many years, and it’s all the more surprising, therefore, that so many companies are still neglecting to protect the ever-expanding information resource that is email. Yet, securing the valuable information contained in emails can be done quickly, simply and at little

MailStore. 5 Common Misconceptions About Email Archiving Read More »