News
Jan
According to Gartner, Leaders are at the forefront of making and selling mobile data protection products that are built for enterprise business environments. The requirements necessary for leadership include a long-term road map that follows and/or influence Gartner, Inc’s vision of the developing needs of buyers in the market. Vendors in this quadrant lead the market by making their competitors’ sales staffs nervous and force competitors’ technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists.
“To be positioned as a leader for the past nine years is a testament to our product teams who continue to deliver innovative encryption and data protection products,” said John Shaw, Vice President for enduser security products at Sophos. “An aggressive roadmap, coupled with our plans to make it even simpler for small and medium sized businesses to protect their data by encrypting drives, files, cloud storage and mobile files invisibly, positions us for even more success in the months and years ahead.“
Sophos delivers leading solutions to help organizations protect critical assets. Sophos SafeGuard Enterprise protects data on desktops, laptops, removable media, file shares and to the cloud with proven, standards-based encryption—fully managed from one central console. Sophos also recently announced Sophos Mobile Control 3.5, the latest version of its award-winning mobile device management (MDM) solution, which now also supports iOS 7. Available both on-premise and as-a-service, Sophos Mobile Control 3.5 makes it simple for small and mid-market organizations to secure, monitor and control mobile devices.
Sophos was also positioned as a “Leader” in Gartner, Inc’s “2013 Magic Quadrant for Unified Threat Management.“
Embedded 4G model supporting 4G LTE for EU and worldwide GSM carriers and providing automatic fallback to 3G as needed. Technologies and frequency bands supported: 4G LTE (Band 1/3/7/8/20); WCDMA/HSDPA/HSUPA/HSPA+/DC-HSPA+ (900/2100 MHz).
You can read the original article here.
Saving your data and increasing your bottom line just got easier. Purchase a WD Arkeia backup appliance at a reduced price and get all licenses for popular software agents at no additional cost. The WD Arkeia bundle comes standard with software, hardware and one year of maintenance at up to 50% less than the competition.
Here’s what’s included:
- Software, hardware and one year of maintenance
- Virtualization agents: VMware and MS Hyper-V
- Microsoft hot-backup agents: MS SQL, Exchange, Active Directory & SharePoint
- Agents for MySQL, PostgreSQL and Oracle
- Agents for Novell GroupWise and eDirectory / NetIQ
- Hybrid-cloud backup replication
- End-to-End
- Encryption
- Bare metal restore for Linux and Windows
- Remote Storage Option and Shared Storage Option
WD Arkeia offers six backup appliance models including both desktop and rackmount options. See our full backup appliance range here.
This limited time offer ends September 21, 2014. Find more at http://info.arkeia.com/emea/bundle
Jan
Of 2,000 respondents surveyed globally, 58 percent confirmed that management does not see cyber attacks as a significant risk to their business. Despite this, IT infrastructure and asset security incidences, as well as wider security related disruptions, were found to have cost these SMBs a combined average of $1,608,111 over the past 12 months.
The research, sponsored by Sophos, also identified that the more senior the position of the decision maker in the business, the more uncertainty there was surrounding the seriousness of the potential threat.
“The scale of cyber attack threats is growing every single day,“ said Gerhard Eschelbeck, Chief Technology Officer for Sophos, “yet this research shows that many SMBs are failing to appreciate the dangers and potential losses they face from not adopting a suitably robust IT security posture.”
According to the research, there are three main challenges preventing the adoption of a strong security posture: failure to prioritize security (44 percent); insufficient budget (42 percent); and a lack of in-house expertise (33 percent). In many SMBs there is also no clear owner responsible for cyber security, which often means it falls into the purview of the CIO.
“Today in SMBs, the CIO is often the “only information officer”, managing multiple and increasingly complex responsibilities within the business,” said Eschelbeck. “However, these “OIOs” can’t do everything on their own and as employees are demanding access to critical apps, systems and documents from a diverse range of mobile devices, it would appear security is often taking a back seat.”
The study also reveals uncertainty around whether ‘Bring Your Own Device’ policies (BYOD) and the use of the cloud are likely to contribute to the possibility of cyber attacks. Seventy-seven percent of respondents said the use of cloud applications and IT infrastructure services will increase or stay the same over the next year, yet a quarter of those surveyed indicated they did not know if this was likely to impact security.
Similarly, 69 percent said that mobile access to business critical applications would increase in the next year, despite the fact that half believe this will diminish security postures.
“Small and midsize organizations simply cannot afford to disregard security,” said Larry Ponemon, president of the Ponemon Institute. “Without it there’s more chance that new technology will face cyber attacks, which is likely to cost the business substantial amounts. CIOs are under pressure to implement new technology that informs agile and efficient ways of working, but this should not take precedence over security. The industry needs to recognize the potential dangers of not taking cyber security seriously and create support systems to improve SMB security postures.”
The study targeted SMBs in the United States, United Kingdom, Germany and Asia-Pacific (Australia, India, China and Singapore) to better understand how such organizations are managing security risks and threats. Key findings of the study include:
- Fifty-eight percent of respondents say management does not see cyber attacks as a significant risk.
- One-third of respondents admit they are not certain if a cyber attack has occurred in the past 12 months. Forty-two percent of respondents said their organization had experienced a cyber attack in the past 12 months
- Respondents in more senior positions have the most uncertainty about the threats to their organizations, indicating that the more removed the individual is from dealing on a daily basis with security threats, the less informed they are about the seriousness of the situation and the need to make it a priority.
- CISOs and senior management are rarely involved in decisions regarding IT security priorities. While 32 percent say the CIO is responsible for setting priorities, 31 percent say no one function is responsible.
- Forty-four percent of respondents report IT security is not a priority. As evidence, 42 percent say their budget is not adequate for achieving an effective security posture. Compounding the problem, only 26 percent of respondents say their IT staff has sufficient expertise.
- Respondents estimate that the cost of disruption to normal operations is much higher than the cost of damages or theft of IT assets and infrastructure.
- Mobile devices and BYOD are much more of a security concern than the use of cloud applications and IT infrastructure services. However, these concerns are not preventing extensive use and adoption of mobile devices, especially personal devices.
Uncertainty about their organization’s security strategy and the threats they face varies by industry:
- Respondents in financial services have more confidence, which can probably be attributed to the numerous data protection regulations.
- The technology sector is also more security aware, which is probably due to the IT expertise that exists in these organizations.
- Retailing; education and research; and entertainment and media have the highest level of uncertainty about their organization’s security strategy and the threats they face.
Recommendations:
- Organizations need to concentrate resources on monitoring their security situation in order to make intelligent decisions. While assessing where they stand on the security continuum, organizations need to focus on monitoring, reporting and proactively detecting threats.
- Establish mobile and BYOD security best practices. Carefully plan and implement a mobile strategy so that it doesn’t have an impact on the overall security posture.
- Organizations should look for ways to bridge the gap created by a shortage of information security professionals. Consider ways to free-up time for in-house resources, including a move to cloud technologies, security consulting and easy-to-manage solutions.
- Measure the cost of cyber attacks, including lost productivity caused by downtime. Work with senior management to make cyber security a priority and invest in solutions that restore normal business activity more quickly for a high return on investment.
- Organizations in all sectors are regularly breached and regulations are often simply the beginning of properly securing a network. Consider consolidated security management to gain a more accurate picture of threats that will help focus on problem areas.
A full copy of the Ponemon Institute study: The Risk of an Uncertain Security Strategy, is available here.
Jan
Unfortunately, these companies don’t provide complete end-to-end encryption, and there are many loopholes the NSA, or cybercriminals, can slip through.
That’s why an encryption solution that protects data everywhere — in emails, on disk, or in the cloud — is essential. In this short video, we explain how you can get security and performance; plus how you can manage native encryption on Macs and Windows PCs, while also protecting data everywhere it resides.
James Lyne, global head of security research at Sophos, explains that many companies aren’t using encryption for fear of slowing users down. With Sophos, you don’t have to worry about encryption impacting performance, James says.
The new SafeGuard Enterprise solves the major challenge of managing encryption across multiple platforms, devices, and cloud environments. Users and IT staff can easily share data safely between Windows, Mac and mobile devices – securing data wherever it lives and wherever it is sent.
For more information about how to manage native encryption on Windows PCs with SafeGuard Enterprise, you can download our free whitepaper – Managing BitLocker With SafeGuard Enterprise (registration required).
What’s New in SafeGuard Enterprise 6.1
- With SafeGuard Enterprise you can manage Microsoft BitLocker for Windows or Apple FileVault 2 for Mac from a single console.
- Now with support for Windows 8, and file and disk encryption on Macs, SafeGuard covers more operating systems and platforms.
- Simplified keyring creation grants you seamless, centralized management. With this newest release, you can save time with our key ring creation that requires no repeat login.
- Centrally manage full-disk encryption and file encryption, wherever data is stored: removable media, network file shares and even in the cloud.
- Get up-to-date security status for all your devices with reporting and auditing that lets you monitor and enforce compliance with internal policies and external regulations.
You can read the original article here.
Jan
Sophos is the only IT security company to be positioned as a Leader across three critical security areas: Unified Threat Management (UTM), Mobile Data Protection and Endpoint Protection Platforms. “We believe it is a privilege to receive recognition from Gartner. The momentum in our UTM business is truly exciting,” said Bryan Barney, General Manager, Network Security Group, Sophos.
“Most notably, in the past year we’ve released our SG Series appliances, the fastest UTM devices we’ve ever produced and expanded the UTM protection we offer with our new cloud-based sandboxing, integrated mobile device management and really simple to use email encryption. Smaller businesses need effective security that is easy to use and that’s exactly what we provide. And it’s why we’re seeing more and more partners and customers switching to Sophos for their UTM and Next-Gen Firewall needs.”
In the most recent quarter of trading, April to June 2014, Sophos recorded a 27 percent increase in UTM sales, and a 33 percent increase in new customer business for UTM. This demonstrates the significant share gains the company is making; Sophos’ network security business now accounts for billings in excess of $150 million — with tremendous growth across North America, Asia Pacific and EMEA, among other regions. Additionally, the company’s “channel first” focus continues to deliver success with the signing of several new strategic channels to market such as the recently agreed distribution deal with Ingram Micro in North America. Sophos now has over 25,000 UTM channel partners worldwide, with the number of partners growing at over 20 percent a year.
According to Gartner, “the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use.
Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer.”
To download a complimentary copy of this report, click here.
You can read the original article, here.
Jan
Sophos currently offers an optimized AMI that is compatible with AWS cloud services. With this new hourly-based model, customers are able to take advantage of the many scaling, redundancy and elasticity features offered by AWS. Put simply, this approach lets customers access and securely defend their cloud resources with a solution optimized for the AWS environment.
“With AWS Marketplace, businesses can find, buy and deploy software that is optimized for Amazon EC2, allowing them to focus on delivering business results faster and at a lower cost,” said Sajai Krishnan, GM, AWS Marketplace. “We’re excited to add the Sophos UTM to AWS Marketplace, as we believe its new on-demand hourly pricing allows customers to utilize this advanced network security solution with the elasticity and ease-of-use they want in the cloud.“
“As a long-standing security provider, we know about the many benefits that Amazon Web Services provides, especially to SMBs that have adopted the cloud,” said Angelo Comazzetto, Senior Product Manager, Sophos. “We pride ourselves on developing complete security offerings that are simple to use, and with this offering, companies can better defend their cloud security resources with layers of security provided by Sophos UTM. We are excited to enable this unique offering in the AWS Marketplace.”
For additional information on Sophos’ UTM offerings, please click here.
The Federal Communications Commission reports that mobile phone theft constitutes 30-40% of all robberies across the United States, a crime that cost US citizens $30 billion in 2012. In the Senator’s own state of California such thefts are even more prevalent, accounting for over 50% of street robberies, Los Angeles alone has seen a 12% increase in smartphone thefts over the last year. If the kill switch legislation is passed, carriers will be able to remotely send a message to any device that has been reported as either lost or stolen. That message would trigger the device to ‘brick’ itself, effectively making it useless, and a far less appealing option for would-be thieves. With a few exceptions, most phones do not offer any form of remote deactivation at this time which makes them especially appealing to thieves who can snatch and sell them on in a very short period of time.
One manufacturer that does offer deactivation is Apple, though Gascón would like to see such a feature become the default rather than an option: “Apple should be commended for leading the way and making efforts to safeguard their customers, but it is still too early to tell how effective their solution will be. Until Activation Lock is fully opt-out, it appears many iPhone owners will not have the solution enabled. This leaves iPhone users at risk as thieves cannot distinguish between those devices that have the feature enabled and those that do not”.
Gascón, along with New York Attorney General Eric Schneiderman, have asked mobile phone manufacturers to propose methods of curtailing the theft of smartphones. Having presented the tech companies with a June 2014 deadline, Gascón said: “I appreciate the efforts that many of the manufacturers are making, but the deadline we agreed upon is rapidly approaching and most do not have a technological solution in place. Californians continue to be victimized at an alarming rate, and this legislation will compel the industry to make the safety of their customers a priority”.
The bill will be formally introduced in January 2014.
The readers who wish to protect their Android devices in case of loss or theft can install Sophos’s free Antivirus and Security app which includes the following features:
- Supports remote commands for Wipe, Lock, Alarm, Locate, Reset passcode and Message to finder
- Reporting of the device location before the battery runs out
- Notification if the SIM card is replaced
You can read the original article here.
In our recent UTM 9.2 release we accelerated our Intrusion Prevention System (IPS) – to do so we made changes to the underlying engine and worked at making our IPS smarter with new optimized default rule sets. We’ve been getting great reports from customers and partners about the speed boost they’re seeing.
But it’s not just software that can boost performance — it’s pretty obvious the hardware it runs on plays a critical role too. That’s why we’re releasing some new security gateway appliances that we’re calling our SG Series appliances.
These are the fastest appliances we’ve ever built. When we started the refresh project we would have been pleased with a 50% speed increase, and we were hoping we’d be able to double the speed. When our engineering team ran our benchmark tests the results were impressive — the new SG Series is up to four times faster than its predecessors. Now it’s all very well beating your own personal best but for us the real question was how would they fare in a race – just how do they stack up to the competition?
So we asked Miercom Labs, a respected testing house, to run tests. And the results were proof that we’ve built some appliances that will provide Sophos customers and partners with the best price/performance ratio anywhere in the market.
This first chart shows a comparison on firewall throughput. Now it’s important to note these results aren’t from some special, high end box targeted for thousands of users. These are from the SG 210; a mid-range model which is offered at a great price point that any business can afford.
And this performance advantage is seen not just on raw Firewall speed. The chart below shows results with Application Control enabled, a key component in next generation firewalls. As you see, our hard work paid off here as well.
And as you know Sophos has a great heritage in virus scanning and here our expertise really shows. Just look at the AV scanning numbers in the chart below.
This test compares AV proxy scanning which is widely known to be the most effective form of scanning because it looks at the entire file rather than taking shortcuts. But not everybody can do it “at speed,” and as you can see some don’t offer it at all.
The complete report from Miercom Labs will be published soon but as we announce the availability of the new SG Series appliances I just wanted to share some of the great results we are seeing. And as we extend the SG Series and continue to optimize our software here’s to even faster, even better protection!
You can read the original article here.
Jan
“On June 19th we uncovered, halted and contained a targeted attack on our internal network infrastructure. Our systems have been cleaned and there is no evidence of any user data being compromised. We are working with the relevant authorities to investigate its source and any potential further extent. We will let you know if there are any developments. The current evidence suggests a limited impact. The attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some malware. This has allowed them to distribute malicious software which incorrectly appears to have been published by Opera Software, or appears to be the Opera browser. It is possible that a few thousand Windows users, who were using Opera between 01.00 and 01.36 UTC on June 19th, may automatically have received and installed the malicious software. To be on the safe side, we will roll out a new version of Opera which will use a new code signing certificate“.
The conclusions we reached, based on the announcement above, were:
- The network was breached.
- A code-signing key was stolen.
- Malware has been signed with it and circulated.
- At least one infected file was posted on an Opera server.
- That file may have been downloaded and installed by Opera itself.
- Cleanup and remediation has now been done at Opera.
- That sounds a bit more like Security breach not stopped.
- How else could a signed-and-infected file have been automatically downloaded by an already-installed instance of Opera? Anyway, wouldn’t Opera’s auto-update have failed or produced a warning due to the expired certificate? Until Opera has worked out the answer to these questions, Opera users probably want to assume the worst.
The good news is that the malware involved is widely detected by anti-virus tools, and the period of possible exposure via Opera itself was at most 36 minutes.
→ According to Opera, Sophos products block the offending file as Mal/Zbot-FG.
So, if you are an Opera for Windows user:
- Download a fresh copy of the latest version (since the buggy download appears to be a thing of the past).
- Make sure your anti-virus is up to date.
- If you can spare the time, do an on-demand (“scan now”) check of your computer.
- If we find out more detail about whether malware was distributed by existing Opera installations or not, we’ll let you know.
You can read the original article, here.
Spammers versus spam senders
There’s a big difference, because spammers generally don’t send their own spam in bulk any more. That hasn’t worked for a decade or so, because if you send 10,000,000 unwanted emails as fast as you can from the same server, or even the same data centre, you make an easily-identified target. So 1,000,000 of the messages might get loose before either the data centre (if it cares, and reputable ones most definitely do) or the majority of your recipients, or both, say, “No more!” Not only are you blocked from sending the remaining 9,000,000 emails from your truncated campaign, you probably can’t use those same servers again for days, weeks, months, perhaps ever.
How spam is delivered
Enter the botnet, or robot network. That’s an unwitting collection of surreptitously co-operating zombie computers – in homes, at offices, in coffee shops, at the mall, by the beach – that regularly call home for instructions to servers that the criminals control. The crooks can send each bot in the network a list of email addresses, and then command the entire botnet to start a giant spam campaign. Using bots, those 10,000,000 spams can be sent, say, in 10,000 batches of 1000 emails at a time, presenting a much less obvious pattern to those who defend against spam. (And sticking those 10,000 bot-infected users with the cost of the bandwidth, if you don’t mind.)
Why spam matters
I used the words “unwitting” and “surreptitious” above because, although some users may knowingly participate, the majority of botnet spam senders don’t even realise they’re doing it. That’s why we publish the SPAMPIONSHIP tables: not to lay wholesale accusations of cybercriminality against entire countries, but to raise awareness of something we’ve said a number of times recently, since it’s Cyber Security Awareness Month:
If you don’t make an effort to clean up malware from your own computer, you aren’t part of the solution, you’re part of the problem.
We’re not pointing fingers here at anyone who ever made a mistake and ended up infected by malware, but we do want you to be mindful of the consequences of inaction. For as long as you fail to do anything about spambot malware on your computer, you’re actually helping the crooks to make money, and putting the rest of us, no matter how modestly, in harm’s way.
The SPAMPIONSHIP tables
And with those firm-but-fair words behind us, here are the latest figures showing spam by volume on a country-by-country basis:
As you can see, the top of the table is surprisingly consistent, with the countries in the first five places having all been in the Dirty Dozen throughout the year. Of course, you probably expected to see India and China in the list: they each have populations exceeding 1 billion people, so it would be surprising not to see them near the top. Nor is is surprising that the USA is in the Number One spot yet again, this time sending nearly three times as much spam as second-placed Belarus. After all, the US has 30 times the population of Belarus, and internet access is much more strongly established, so you would expect a higher proportion of Americans to have their own computers and to use the internet regularly. It’s when we turn the SPAMPIONSHIP into a per capita comparison that things get interesting:
Here, the numbers next to each country denotes the average spamminess per person compared to the USA. In other words, we divided each country’s spam total by its population, then divided every country’s spam-per-person value by the figure for America. Obviously, that makes US = 1.00, and tells us that the average computer in Belarus was eleven times more likely to send spam than if it were in the USA. Israelis, whose propensity for sending spam sneaks the Middle Eastern country into twelfth place on chart for the first time this year, were 1.8 times as likely as Americans to be spam senders. The per capita chart doesn’t do any favours to small countries, which tend to hide near the bottom of volume-only lists, even if their computers are awash with zombie malware. US neighbour The Bahamas, for example, made it to eighth spot, with double the likelihood of its computers spamming compared to the US. Luxembourg got up to fourth spot, with a spammishness 2.7 times than of the US, up from sixth in Q2 and seventh in Q3.
You can read the original article, here.
Once Microsoft officially ends support for XP on Patch Tuesday in April (the last security update for XP), there will be no new security updates, non-security fixes, assisted support options, or online technical content updates from Microsoft.
That means that XP users, even those with anti-malware protection from Microsoft or security vendors, will face significantly higher security risks after the end of support. As Microsoft said in its announcement, “Our research shows that the effectiveness of anti-malware solutions on out-of-support operating systems is limited.”
To ease the burden of upgrading, Sophos will officially support Windows XP Service Packs 2 and 3 until at least September 30, 2015; and Windows Server 2003 until at least January 31, 2017. See our support knowledgebase for a complete platform support list.
Upgrading to newer Windows operating systems is causing plenty of problems for specialized systems, including for point-of-sale (POS) registers, medical devices, and even ATMs. For those using “embedded” versions of XP on specialized equipment, we recommend isolating these machines and restricting access to non-essential functions using application control available in next-gen firewalls.
In most cases, however, it’s time to upgrade. As Naked Security expert Paul Ducklin writes, Microsoft’s extended anti-malware support doesn’t really change much. “Windows XP will still officially fall off the edge of the world in April 2014 when Microsoft ends support,” Paul writes.
You can read the original article here.
Independent test vendor Miercom has done rigorous testing of the Sophos SG Series alongside comparative appliances from other vendors. We shared some data points from Miercom earlier this year which looked very good indeed. Now Miercom has made available more results – and I don’t think you will be disappointed.
The report includes measurement of throughput for Firewall, Firewall + Application Control and Firewall + IPS (Intrusion Prevention System). Miercom also looked at how many new TCP connections can be established per second by each device.
In the firewall test, the SG appliances were so fast they didn’t come anywhere near their limits and allowed traffic to flow freely at the 3Gbps maximum.
Miercom had to install an extra port module with more ports and run traffic in both directions in order to reach the limit.
You can read the original article, here.
Jan
In an increasingly complex security environment Sophos works with partners to make security simple to deliver, implement and manage. Over the last 12 months Sophos has created a more flexible and generous partner programme, providing partners with protection for deal registrations, attractive margins and joint lead generation initiatives. The programme also provides up-to-date certification, to ensure partner sales and technical teams are fully trained across Sophos’s latest solutions to help drive partner businesses forward. Delivered by dedicated channel relationship managers, Sophos gets to know partner businesses to ensure they feel supported every step of the way.
James Vyvyan, Regional Vice President, UKI, Sophos said: “We’re delighted to have won ‘Security Vendor of the Year’. Sophos is committed to a ‘channel first’ strategy and we believe that by taking the time to understand our partners’ business model, we can work together to provide the solutions that best suit their customers’ IT security needs.”
Sophos also won two awards in CRN’s DACH awards on 13 November: Security Vendor of the Year and Channel Champion of the Year 2013.
Commentary from the Sophos Channel
“Many of the innovations Sophos has introduced are unique to the market. These unique solutions make it possible for us to differentiate ourselves from other security consultants and better meet our clients’ needs,” said Mark Robinson, Director, Globelink Infrastructure & Network Security.
“The Sophos Partner Programme empowers proactive and enthusiastic partners like ourselves to achieve the levels of technical and sales accreditation required to represent Sophos at the highest level,” said Paul Cox, Managing Director, Quadsys.
“We’ve worked closely with Sophos for more than 12 years and feel the relationship is stronger now than it has ever been. The sales, technical, financial and management teams at Sophos and Foursys are all working really closely together, which means we get it right and we both put customer service at the top of the agenda,” said Paul Prior, Managing Director, Foursys.
Jan
Developed by SophosLabs, this new Sophos UTM approach brings together multiple technologies to rapidly identify and isolate infected clients and prevent communication with malicious command and control hosts. This latest version introduces botnet protection and cloud-based sandboxing to expand on the Sophos UTM’s existing multi-layer Firewall, Web, Email and Endpoint protection. This extends the Sophos commitment to small and mid-market companies, delivering access to advanced protection without the complexity and cost normally associated with such functionality.
“The initial stages of targeted attacks can often go unnoticed by security systems that don’t control incoming and outgoing traffic. For organizations with limited IT resources, investing time and money in a dedicated ATP solution to detect these early signs is simply not realistic, given how tricky, complex and fast moving this type of traffic is,” says Chris Kraft, vice president, product management, Sophos. “That’s what we wanted to change. Today, with a few simple clicks, users get advanced protection without needing to be full-time security experts themselves.”
This new release also significantly enhances the speed of security scanning, with initial data showing the new performance optimized IPS doubling throughput speed in test environments. The Email, Web, and Network Protection modules all experience significant enhancements, including:
- Simplified Email Encryption and DLP – Sophos SPX technology eliminates need for a separate Public Key Infrastructure and policy-based DLP can trigger automatic encryption
- Smarter Web Control – streamlined policy setup enables granular user control and transparent web filtering of https traffic provides seamless protection
- Mobile Access Control – enhances Wi-Fi and VPN security by combining Sophos UTM with Mobile Device Management functionality in Sophos Mobile Control
- Performance Optimized IPS – intelligent processes and pattern management deliver enhanced scanning speeds to rapidly block network attacks and prevent breaches
- Botnet/Command and Control Protection – Sophos Advanced Threat Protection identifies and blocks infected machines communicating with malware command and control servers
“The UTM market is one of the most competitive in security. Numerous features and applications have been added over the past few years, and we’re increasingly seeing solutions are providing more effective security and better performance,” said John Grady, Research Manager, Security Products and Services, IDC. “This latest release from Sophos continues to simplify complex technologies. SPX email encryption is an example of that and is a differentiated approach among other UTM vendors.”
“Students are smart and always find ways to circumvent security, so schools are always in need of better ways to manage their web access and block inappropriate content,” says Bart Wilson, systems support manager, from Twotrees Technologies LLC, a Sophos partner. “UTM 9.2 is a huge step forward in solving this problem. By adding https traffic to web filtering in transparent mode, Sophos will help our customers to take back control – especially with so many students browsing on mobile devices.”
For additional information on all of the features in Sophos UTM 9.2 and extra information on Sophos’ network security solutions, please visit our Network Security area, watch the UTM videos, or check out the dedicated Sophos UTM blogs.
You can read the original article here.
Jan
The partnership means users of Sophos Mobile Control 4.0 and Check Point Mobile VPN can link the two solutions to provide network access control for any mobile devices attempting to use the corporate network. Non-compliant devices are isolated from the network, protecting the organization from unauthorized mobile devices. This ensures that only managed devices that meet an organization’s security policy may connect and use business resources.
Mobile devices continue to multiply rapidly in the workplace and today’s flexible working styles mean that, increasingly, employees are requiring and gaining access to the corporate network wherever they are. As a result of this surge in mobility, effectively securing both corporate data and networks has become an enormous challenge for IT and security managers. Much of an IT administrator’s day can be spent provisioning, securing, locating, managing and updating these mobile devices.
Sophos Mobile Control continually assesses the compliance status of each mobile device – detecting jailbreaks, blacklisted apps or insecure settings. Via a simple out-of-the-box interface with Check Point’s Mobile VPN, it blocks any non-compliant device from accessing the corporate network via VPN, proactively reducing the risk of data breaches.
“By integrating Check Point Mobile VPN with the mobile device management features of Sophos Mobile Control, IT departments can easily manage how mobile users access centrally-stored corporate resources, allowing them to regain control of their networks all through a simple interface,” says Alon Kantor, vice president of business development at Check Point Software Technologies. “Check Point’s partnership with Sophos provides our joint customers with a simple solution for the increasingly common problem of mobile network access control.”
“The rapid growth of mobile devices in the workplace combined with today’s range of threats means that mobile security is an increasing priority for many organizations,” says Ari Buchler, senior vice president corporate development at Sophos. ”We’re delighted to be partnering with Check Point to provide a simple solution to this complex problem, and to enable users of Sophos Mobile Control and Check Point Mobile VPN to keep compromised mobile devices off their networks. This integration demonstrates both companies’ commitment to meeting the needs of customers in the face of a continuously evolving threat landscape.”
Sophos Mobile Control 4.0
Sophos released Sophos Mobile Control 4.0 in May 2014. In addition to managing mobile devices, applications and email, it is the only EMM solution to offer file-level encryption, ensuring that each document connected to the server remains secure and that users can collaborate safely. Sophos Mobile Control also delivers robust, integrated security against malware and malicious web sites to protect against the rapidly-growing, nearly 1 million unique pieces of mobile malware seen by SophosLabs. In addition, Sophos is the only EMM vendor to offer categorical web filtering so organizations can control network performance and security by managing which websites their users can access. Available on premise or as-a-service, Sophos Mobile Control provides a simple and differentiated approach for organizations to manage and secure mobile devices, content and applications. Learn more about Sophos Mobile Control 4.0.
According to IDC, Sophos Mobile Control is the market leader among small and medium businesses in North America, with 25% market share. Sophos is also the only IT security company to be positioned as a Leader in all three of the following Gartner Magic Quadrants: Unified Threat Management (UTM), Mobile Data Protection and Endpoint Protection Platforms.
Integration with Check Point Mobile VPN
Check Point Mobile VPN application establishes a secure VPN (Virtual Private Network) tunnel to the corporate network infrastructure via a Check Point Security Gateway. By unifying Sophos Mobile Control and Check Point VPN gateways, IT departments can ensure that only compliant devices are allowed access to the corporate network. Compliance policies for corporate owned mobile devices reside on the Mobile Device Management Servers.
When a device attempts to connect to the corporate network, compliance is checked. This can prevent users from installing a VPN client on unmanaged devices and trying to access the organization. The Security Gateway can also block the unknown devices of valid users.
You can read the original article, here.
But those signals were not authentic, and the ship was not on course. The signals were in fact being sent from the White Rose’s upper deck by University of Texas/Cockrell School of Engineering graduate students Jahshan Bhatti and Ken Pesyna. A team from the school had been invited aboard while the White Rose sailed from Monaco to Rhodes, Greece, on the Mediterranean Sea. Using a blue box about the size of a briefcase, the duo spoofed the ship’s GPS signals, sending counterfeit signals that slowly, subtly overpowered the authentic GPS signals until the ship ultimately came under their control.
If this sounds familiar, it’s because students from this engineering school did the same thing to a drone last year. In May 2012, the engineering students tried out their $1,000 spoofer, which they had cobbled together in response to a dare from the US Department of Homeland Security (DHS). Under the direction of Assistant Professor Todd Humphreys, who is now working for the Department of Aerospace Engineering and Engineering Mechanics, the students last spring managed to hack and hijack a drone with what Humphreys at the time said was the most advanced spoofing device ever.
Both the drone and yacht hijackings were designed to shed light on the perils of navigation attacks, serving as evidence that spoofing is a serious threat to marine vessels and other forms of transportation. In plain English, that means that hackers can send drones smashing, say, into our skulls.
After the students had gained control of the ship’s navigation system, the team planned to coerce the ship onto a new course with subtle maneuvers that positioned the yacht a few degrees off its original course. When the ship’s navigation system detected the location discrepancy, the crew corrected the course – at least, they thought they did. In reality, their course corrections were setting the ship slightly off its course line. Watch a video about the attack here.
You can read the original article, here.
Jan
But what are the implications of biometric technology as far as enterprise security is concerned? Ryan Hurst, CTO of enterprise SaaS Certificate Authority GlobalSign, has told Softpedia that biometric technology could turn out to be highly beneficial to organizations looking to protect their data, but it depends a great deal on how it’s implemented.
“The recent confirmation of the integration of biometrics in the new iPhone has many asking what the implications are for enterprises. It is too early to tell for sure as the answer will depend on how they have implemented this feature,” said Hurst told us in an emailed statement.
“That said, as mentioned during the Apple keynote, only about half of smartphone users apply a passcode today making mobile devices carrying sensitive corporate data a huge vulnerability for enterprises. If the biometric technology used on the device is applied correctly this could mean more secure enterprise data,” he added.
“More importantly this will force many enterprises to take another look at their own authentication strategy and ask if biometrics is a viable form of authentication for them in comparison to other stronger forms, such as one time passwords and smart cards, and weighing the security benefits and risks of each.”
Hurst highlights the fact that the use of biometric technology could be beneficial in case mobile devices containing enterprise data are stolen or lost. “The first rule of security is if the attacker has physical access to your device then the device is no longer yours. However, the use of biometrics has the potential to make it more difficult for the attacker which can significantly reduce the impact of lost or stolen phones containing enterprise data,” he explained.
You can read the original article, here.
Service providers need higher level of encryption support
“If you look at one of our typical deployments, yes, they want security, they want SSL, but the numbers they support are in the thousands,” he said. “It’s nothing compared to a business model that is supporting millions of users. When we are talking to these SaaS providers, it’s a whole new level of value proposition” and a market segment that Array wants to target.
With the new encryption standard requiring almost five times the computational power as 1,024-bit encryption, more robust ADCs are a necessity, he said. SaaS provider YourMembership.com is using Array’s 5600 platform to beef up its capacity and throughput, said Chief Technology Officer Hutch Craig. The St. Petersburg, Fla.-based SaaS provider serves more than 2,300 associations with its menu of back-office services, reaching more than 20 million users. A lot of the provider’s traffic requires secure processing, Craig said; everything from e-commerce to dues information and other sensitive data.
YourMembership.com deployed a pair of ADCs for failover protection at a data center in Orlando, Fla. They replaced two older Array ADCs that were running at more than 50% utilization each because of the volume of transactions they had to process. “Things were getting really tough on them; the 5600s are unbelievable,” Craig said. “Everything is funneled through the ADC, from the API to the actual front-end offering. We have millions of [end users] and tens of thousands of administrators that go into the box.”
-
Craig said the 5600’s SSL acceleration capabilities were a key attribute. In YourMembership.com’s case, the processor-intensive steps needed to handle public-key encryption algorithms are handed off to a hardware accelerator, although the ADC has the ability to process SSL transactions without the use of separate servers.
- More traffic headed in 2014
-
YourMembership.com will increase the amount of traffic routed through the Array ADCs next year as part of a plan to consolidate all of its data center operations in Orlando, Craig said. Right now, the provider has a data center in Austin, Texas, that serves clients YourMembership.com inherited as part of its 2012 acquisition of rival Affiniscape.
-
Craig said YourMembership.com will phase out the Austin data center and route all traffic to Orlando and the 5600s by next spring. Andersen said SaaS providers are a logical target for his company’s ADCs, which are priced from 30% to 40% below competitors’ similarly equipped models.
-
“They have to support a lot more customers and they also have to be on a higher standard of SSL. At the same time, they can’t afford to pay through the nose for ADC hardware,” Andersen said.
The 5600 is priced beginning at $28,995; models that support hardware SSL acceleration begin at $37,995. -
In addition to the 5600, Array beefed up two other models to handle the new encryption standards. The 2600 can process up to 5,000 SSL transactions per second, while the high-end 10650 can handle up to 70,000 transactions per second. All of the devices are engineered with 10 Gigabit Ethernet connectivity and multicore processing with throughput ranging from 10 Gbps to 120 Gbps, depending on the model.
You can read the original article here.
Download the Sophos Mobile Encryption app from Google Play for Android, or from iTunes for iOS devices (iPhones, iPod Touches and iPads).
New features available in this version
- Protect access to your Sophos Mobile Encryption application with an optional password.
- Fully transparent key management, so you don’t need to enter the passphrase each time you open a file.
- Store your encrypted files in the local storage area within the app. Local storage is also accessible via USB from your PC or Mac.
- Encrypt and upload files handed over by applications from cloud storage providers.
- Supported cloud storage solutions: Dropbox, Google Drive, Microsoft One Drive (former SkyDrive), Egnyte, Telekom Media Center, WebDAV (e.g., Windows Server, ownCloud or Strato HiDrive)
Sophos Mobile Encryption for Android
Download the Sophos Mobile Encryption app from Google Play for Android devices. Requires Android 2.3.3 and up.
Sophos Mobile Encryption for iOS
Download the Sophos Mobile Encryption app from iTunes for iOS devices. Requires iOS 5.0 or later. Compatible with iPhone, iPad, and iPod Touch. This app is optimized for iPhone 5.
For business users: You can get Sophos Mobile Encryption together with the optional SafeGuard Enterprise Encryption for Cloud Storage module. The app extends access to encrypted files to mobile devices –for persistent encryption wherever your users are working.
You can read the original article here.