News
Jan
Peplink has verified and confirmed that all of the products are not affected by this vulnerability – including Balance, MAX, FusionHub, AP One/Pro, Surf, Device Connector families. As for the online services, they are either unaffected or Peplink has been able to apply mitigation to fully resolve the issue. There is no customer action required on your part.
Thank you for your attention.
The Peplink Team
You can read the original article here.
Jan
This data can include sensitive material such as the server’s private key, but is not limited to that, any data that is in memory on the server is at risk including sensitive customer data as well. This is not limited to web servers, if you use a SSL based VPN that leverages OpenSSL you may also be at risk. Access to this type of sensitive data creates a serious vulnerability because attackers can use it to decrypt past communications (when Perfect Forward Secrecy (PFS) is not configured), steal critical data and in the case of a private key compromise, enable the attacker to impersonate the associated server.
Resolution and Recommendations
We strongly recommend anyone using OpenSSL to:
- Verify what version of OpenSSL they are using and upgrade their systems to the appropriate fix from OpenSSL.
- Request a reissue (with new private key) for SSL Certificates that were installed on affected servers, install the new certificate, then request revocation of the old certificate.
- Use GlobalSign’s SSL Configuration Checker tool to test your server for the Heartbleed vulnerability
GlobalSign offers free reissues to its direct customers, so if you are a GlobalSign SSL customer affected by the Heartbleed bug, please see our support center for instructions on reissuing your SSL Certificate.
You can read the original article here.
“The new Sophos SG Series appliances are the fastest UTM and Next-Gen Firewall devices we’ve ever produced,” said Guenter Junk, Senior Vice President and General Manager, Network Security Group, Sophos. “They run our latest operating system, version 9.2, and are optimized to get the most out of latest performance innovations from Intel to ensure our customers and partners get an unrivalled performance and protection combination.”
The new SG Series includes models to meet the requirements of small offices to large, distributed enterprises. These 1U appliances are available today in the mid-range 200, 300 and 400 models. They all deliver over 10 Gbit/sec firewall throughput to easily handle the demands of multi-layered protection. The SG Series is the 6th generation of Sophos security gateways built on an Intel® architecture, to enable Sophos customers to quickly benefit from the frequent performance and protection enhancements. They utilize Intel® technologies including high-speed LAN interfaces, high volume Solid State Drives and AES-NI acceleration.
“By using Intel® Architecture, Sophos has been able to use the performance gains we’ve been able to deliver with the 4th Generation Intel Core processors which delivers improved software processing architecture,” said Bob Ghaffari, Director, Communications and Storage Infrastructure Division, Intel. “Sophos has been able to see dramatic performance improvements by unlocking Intel’s core processor capabilities to make fast, intelligent decisions.”
The SG Series run the latest Sophos UTM 9.2 operating system which features over 150 enhancements including new Advanced Threat Protection and SPX Email Encryption functionality. Designed to run on an Intel architecture, version 9.2 can also be deployed on Intel compatible servers as virtual appliances and in the cloud using Amazon Web Services.

Bruce Kneece, Chief Technology Officer at Convergent Information Security Solutions, said, “Our team was heavily involved in the UTM 9.2 beta program. From the outset we liked what we saw – added performance and simplicity across the board. Version 9.2 running on the SG Series hardware is a true winner. It’s easy for us to recommend it to our customers.”

Additional information on all of the features in Sophos SG Series appliances and Sophos network security solutions is available at: www.sophos.com/accelerated.
In our recent UTM 9.2 release we accelerated our Intrusion Prevention System (IPS) – to do so we made changes to the underlying engine and worked at making our IPS smarter with new optimized default rule sets. We’ve been getting great reports from customers and partners about the speed boost they’re seeing.
But it’s not just software that can boost performance — it’s pretty obvious the hardware it runs on plays a critical role too. That’s why we’re releasing some new security gateway appliances that we’re calling our SG Series appliances.
These are the fastest appliances we’ve ever built. When we started the refresh project we would have been pleased with a 50% speed increase, and we were hoping we’d be able to double the speed. When our engineering team ran our benchmark tests the results were impressive — the new SG Series is up to four times faster than its predecessors. Now it’s all very well beating your own personal best but for us the real question was how would they fare in a race – just how do they stack up to the competition?
So we asked Miercom Labs, a respected testing house, to run tests. And the results were proof that we’ve built some appliances that will provide Sophos customers and partners with the best price/performance ratio anywhere in the market.
This first chart shows a comparison on firewall throughput. Now it’s important to note these results aren’t from some special, high end box targeted for thousands of users. These are from the SG 210; a mid-range model which is offered at a great price point that any business can afford.
And this performance advantage is seen not just on raw Firewall speed. The chart below shows results with Application Control enabled, a key component in next generation firewalls. As you see, our hard work paid off here as well.

And as you know Sophos has a great heritage in virus scanning and here our expertise really shows. Just look at the AV scanning numbers in the chart below.

This test compares AV proxy scanning which is widely known to be the most effective form of scanning because it looks at the entire file rather than taking shortcuts. But not everybody can do it “at speed,” and as you can see some don’t offer it at all.
The complete report from Miercom Labs will be published soon but as we announce the availability of the new SG Series appliances I just wanted to share some of the great results we are seeing. And as we extend the SG Series and continue to optimize our software here’s to even faster, even better protection!
You can read the original article here.
Download the Sophos Mobile Encryption app from Google Play for Android, or from iTunes for iOS devices (iPhones, iPod Touches and iPads).
New features available in this version
- Protect access to your Sophos Mobile Encryption application with an optional password.
- Fully transparent key management, so you don’t need to enter the passphrase each time you open a file.
- Store your encrypted files in the local storage area within the app. Local storage is also accessible via USB from your PC or Mac.
- Encrypt and upload files handed over by applications from cloud storage providers.
- Supported cloud storage solutions: Dropbox, Google Drive, Microsoft One Drive (former SkyDrive), Egnyte, Telekom Media Center, WebDAV (e.g., Windows Server, ownCloud or Strato HiDrive)
Sophos Mobile Encryption for Android
Download the Sophos Mobile Encryption app from Google Play for Android devices. Requires Android 2.3.3 and up.
Sophos Mobile Encryption for iOS
Download the Sophos Mobile Encryption app from iTunes for iOS devices. Requires iOS 5.0 or later. Compatible with iPhone, iPad, and iPod Touch. This app is optimized for iPhone 5.

For business users: You can get Sophos Mobile Encryption together with the optional SafeGuard Enterprise Encryption for Cloud Storage module. The app extends access to encrypted files to mobile devices –for persistent encryption wherever your users are working.
You can read the original article here.
UTM Series appliances will remain an important part of our hardware appliance portfolio and continue to enjoy all the great new features and enhancements that come with every software update. Our UTM Series delivers unmatched value with a great balance of price, performance and protection.
As you know, at Sophos, every feature is available on every appliance — and our UTM Series appliances are no different. And because they are based on an Intel architecture, you can benefit from all future software enhancements and performance optimizations — past, present, and future.
Features you get with Sophos UTM Series
- Intel architecture provides a future-proof upgrade path unlike ASICs
- Same protection on every appliance, from our smallest to our largest
- Cluster up to 10 appliances dynamically without external load balancers
- A range of models at performance and price points to fit diverse environments
- Sophos UTM Series — Eight (8) models suitable for organizations of all sizes
Small: The UTM 100, 110, and 120 are ideal for small organizations or branch offices that have less demanding traffic capacity requirements, but still want the best network protection
Medium: The UTM 220, 320 and 425 provide the optimal balance between performance and protection for a variety of different environments.
Large: The UTM 525 and 625 are designed to protect even the most demanding enterprise networks. They are purpose built for scalability, reliability, and high availability.
UTM Series Tech Specs

Datasheets: UTM 1xx | UTM 220 | UTM 320 | UTM 425 | UTM 525 | UTM 625
You can read the original article here.
Jan
The new release also brings reliability improvements and support for Windows Server 2012 and Windows Server 2012 R2.
SAV for NetApp is also included in the following endpoint products and suites:
Endpoint Protection Advanced
Enduser Protection
Enduser Data Suite
Enduser Web Suite
Complete Security Suite
To learn more, visit the Sophos for Network Storage page or download the free trial.
If you have a current license for one of these products, you can download Sophos Antivirus for NetApp 3.0 on your MySophos download page.
You can read the original article here.
The new Sophos solution helps IT professionals confidently implement BYOD policies and provides users the flexibility they demand to stay productive and safe. It supports iOS, Android and Windows Phone 8 devices.
To learn more about SMC 4.0, check out this video.
SMC 4.0: Mobile Encryption, Integrated Security and User-Centricity
SMC 4.0 provides a simple, hassle-free and comprehensive approach to protecting mobile devices. With Mobile Content Management for iOS devices, SMC is the only EMM solution to offer file-level encryption, which gates access to each file, to protect the data in the office and on the go. SMC also delivers integrated security against malware and malicious web sites for Android devices, which account for 80 percent of smartphone operating systems* worldwide as well as the majority of mobile malware threats. The number of unique pieces of mobile malware seen by SophosLabs has now reached almost 900,000 and is growing rapidly.
With web protection for Android, IT administrators can select web site categories to control access and block data-stealing or inappropriate web pages. SMC 4.0 also provides unique integration with Sophos UTM, Checkpoint and Cisco to provide network access control. Compromised devices are isolated from the network, protecting the organization’s assets from malware on mobile devices. SMC’s user-centric deployment, management and pricing greatly simplifies administration. With an intuitive web-based management console, IT administrators can provide their users with a self-service portal to change passwords, register devices and report lost or stolen devices.
You can read the original article here.
Jan
So here are some tips on how you can use Sophos products to maintain security for your yet-to-be-decommissioned XP systems during the transition period.
1. Run the Sophos endpoint
With the Sophos endpoint you will of course get our award-winning anti-malware scanner, but you’ll also get Host Intrusion Prevention System (HIPS), Application Control, and Patch Assessment (if you are licensed for it).
- Using HIPS is easy and requires no work on your part — HIPS is enabled by default. The guys and gals at SophosLabs are constantly tweaking the detection rules for HIPS to make sure we detect and block exploits of new vulnerabilities.
- By using Application Control you reduce the threat surface further by blocking thousands of applications from running at all.
- Bonus tip: While you are at it, make sure you uninstall any software on your XP systems that isn’t absolutely necessary.
- Our endpoint is also available with Patch Assessment. Use this to find vulnerable software on your XP machines. Missing patches will be listed in order of priority starting with the most critical (currently exploited), making it easy for you to decide where to start.
2. Use Sophos Client Firewall
Sometimes overlooked, the client firewall allows you to really lock down the machine as much as you like — to the point of making it near unusable if you so wish!
- Train the firewall to only allow traffic to and from your known good processes.
- You can also enable checksumming to identify known processes. It’s more secure, but will require more work from your side to maintain.
- You can also manage ICMP request to stop the system from responding to Ping requests.
Learn more about Sophos products
Those are the choices for the top two technologies you really should consider for any remaining XP systems. There are more you can use. I haven’t mentioned Device Control, Data Control, Web Control or Full-Disk Encryption — they all play a part in endpoint security. Or you may want to take it one step further and take full control of the network traffic using our SG Series network appliances. Your requirements will of course vary. In any case, we will have a product that can help you stay secure and it will be as easy as possible to implement.
You can read the original article here.
Authorities have apparently taken control of the Gameover bots and seized its command servers over the weekend, effectively freeing 300,000 of the 500,000 to 1 million infected Windows computers. Even better, they’ve found the crime ring behind the botnet and have charged alleged Russian mastermind Evgeniy Mikhailovich Bogachev with hacking, different types of fraud, money laundering and conspiracy.
Gameover Zeus, for those who’ve never heard of it in the past, is a P2P malware that pilfers banking information and initiates wire transfers to overseas bank accounts. It’s typically propagated through spam emails disguised as bills or invoices embedded with malicious links — the kind you tell your grandparents to never click. Once Gameover worms its way into a system, that computer becomes part of the extortion ring’s global network of infected machines, which funnel ill-gotten info back to the criminals. The perpetrators would sometimes also install compromised PCs with Cryptolocker, a “ransomware” that takes users’ files hostage until they pay up. According to the FBI’s estimates, the criminals have stolen over $100 million using both Gameover and Cryptolocker. But whether that’s enough for Bogachev to stand trial in the US (home to 25 percent of the affected machines) remains to be seen, as Russia does not extradite accused criminals. For now, all the authorities can do is spread word about the botnet and help people remove it from their computers.
The next stage – the part of the operation that is the duty of all of us – is to dismantle the rest of the botnet, by progressively disinfecting all the zombie-infected computers that made the Gameover and Cryptolocker “business empires” possible in the first place. US-CERT has come up with a whole list of free tools so you can do just that, and (if you are the go-to person for IT problems amongst your friends and family) so that you can help others, too. The Sophos Virus Removal Tool is amongst the recommended cleanup utilties. It’s a free download; you don’t have to uninstall your existing anti-virus first; and it detects and cleans the same malware, including rootkits, that Sophos Anti-Virus knows about, not just CryptoLocker.
The Balance 50 features our advanced load balancing and failover. It supports PepVPN, so it can act as a SpeedFusion endpoint for branch VPN networking. Plus, it offers everything else customers love about the Balance 20/30. And the Balance 50 delivers speed and reliability to spare, even when individual connections slow down or drop out.
Download the datasheet for more information on the Peplink Balance 50 multi-WAN router. For pricing details and to stock up today, visit the online cart.
It features user-based management, reporting and licensing; built-in web security to prevent user access to malicious and infected websites, and new policy-based Web Control features to enforce safe and productive web usage. Sophos Cloud is effortless to deploy and easy to use and manage for IT managers and channel partners, given its simple, intuitive user experience.
A recent Sophos survey of IT managers highlighted the growing challenge of device diversity across their organizations, with a need to support Windows PCs, Macs and mobile devices: 78 percent support or plan to support Macs on their corporate networks, and 41 percent see the number of Macs increasing in their corporate environments. A recent IDC study showed that a quarter of SMBs are using mobile device management (MDM) and Sophos is the number one solution. However, 75 percent still have not adopted MDM and with this new release Sophos has made it simpler than ever for those customers to get control of their mobile devices to secure their future. Clearly organizations need an integrated security strategy to support users’ demands to choose their own device (BYOD), while providing IT managers real-time visibility and access to information to keep organizations safe from advanced threats. Sophos Cloud delivers a simple and effective approach for IT organizations to confidently embrace BYOD and to support and protect the wide range of user devices in their environments.
Based on the same proven technology that protects over 100 million devices worldwide, Sophos Cloud is a smart choice for global organizations. It delivers effective mobile device management to keep users productive and corporate information secure. The new web features enable IT managers to easily set and enforce policies for enhanced security and compliance; user-based policies can be created once and rapidly deployed across multiple groups and platforms, and follow the users and their devices even when they are off the network. Sophos Cloud also adds Active Directory synchronization to simplify deployment and management for users and groups.
“IDC predicts that the continuing SMB productivity push will drive cloud and mobility adoption, in a big way; in the U.S., 1/3 of small businesses and almost 3/4 of mid-sized firms are using the cloud, and the share will continue to grow,” reports Raymond Boggs, research vice president at IDC. “Sophos Cloud can help manage security across Windows, Mac, and mobile devices, which is especially important given the diversity – some might say chaos – of an SMB environment. Its user-based management is well suited to SMBs looking to secure users of corporate devices or their own BYOD equipment. Sophos Cloud will be a useful resource for channel partners to leverage in helping support the resource-limited IT teams of their SMB customers.”
“We’re pleased to deliver this new release of Sophos Cloud, as it’s another positive step in our strategy to use the cloud to create new, innovative solutions to the ever-increasing security challenges faced by small and mid-market businesses today,” said Bill Lucchini, vice president and general manager of Sophos Cloud. “Sophos Cloud is a differentiated offering that enables IT professionals to simplify security management without compromising users’ demands for usability and performance. We continue to address the market’s desire for powerful simple-to-use solutions to combat the evolving threat landscape. Sophos security delivered with cloud simplicity is clearly resonating with our customers and partners.”
Sophos Cloud: Ideal for IT Solutions Providers
Consistent with Sophos’ commitment to its channel partners, Sophos Cloud enables IT solution providers and outsourcers to deliver value to customers. A unified web-based management console, hosted in the cloud by Sophos, enables complete protection for users and devices, and a new partner dashboard gives partners visibility into, and control over, their customers’ subscriptions, devices and policies.
Sophos Cloud is currently available. For more information or for a 30-day trial, visit: www.sophos.com/cloud
We want to share a little tip – did you know that we offer an amazing alternative to cheap consumer grade Internet routers?
The difference is, our software is enterprise class, fully maintained and free. Here’s how you can try our Sophos UTM Home Edition and our free Sophos UTM Essential Firewall for businesses.
If you think you need to be truly “unlucky” to be targeted – try putting an unshielded Windows computer or a web server on the Internet and watch it being probed within seconds. This is not a matter of misfortune; it’s a matter of seconds.
Being such a critical piece of equipment you might think firewalls all come as cast iron, industrial strength appliances. But, as has been apparent, this is not the case.
Many times the software is not maintained on these devices. Some are not made to update automatically, or are difficult to upgrade. Or the vendor has simply stopped maintaining the software.
Let us give you some examples security weaknesses we’ve seen recently.
- Admin access: this is the holy grail. Anyone can go in a reconfigure your router.
- UPnP – an autoconfiguring standard to allow devices on your network to open up ports in your firewall
The good news is that the Sophos UTM Essential Firewall (for businesses) and Sophos UTM Home Edition address all the issues I’ve mentioned above.
- We continuously maintain and update the software for it. This means we can make continuous improvements and quickly address any issues.
- We don’t support UPnP so it will never be an issue
- You get remote access so you can access you home network wherever you are without having to open any ports on the firewall
Try our Sophos UTM Home Edition, and our free Sophos UTM Essential Firewall for businesses.
You can choose how you deploy it:
- Use an existing standard PC with at least two network cards
- Install it as a VM in your virtual environment
- Buy a hardware appliance from us
- Or you can geek out completely and even run it in the Amazon EC2 cloud … the possibilities are endless
You can read the original article, here.
Saving your data and increasing your bottom line just got easier. Purchase a WD Arkeia backup appliance at a reduced price and get all licenses for popular software agents at no additional cost. The WD Arkeia bundle comes standard with software, hardware and one year of maintenance at up to 50% less than the competition.
Here’s what’s included:
- Software, hardware and one year of maintenance
- Virtualization agents: VMware and MS Hyper-V
- Microsoft hot-backup agents: MS SQL, Exchange, Active Directory & SharePoint
- Agents for MySQL, PostgreSQL and Oracle
- Agents for Novell GroupWise and eDirectory / NetIQ
- Hybrid-cloud backup replication
- End-to-End
- Encryption
- Bare metal restore for Linux and Windows
- Remote Storage Option and Shared Storage Option
WD Arkeia offers six backup appliance models including both desktop and rackmount options. See our full backup appliance range here.

This limited time offer ends September 21, 2014. Find more at http://info.arkeia.com/emea/bundle
Independent test vendor Miercom has done rigorous testing of the Sophos SG Series alongside comparative appliances from other vendors. We shared some data points from Miercom earlier this year which looked very good indeed. Now Miercom has made available more results – and I don’t think you will be disappointed.
The report includes measurement of throughput for Firewall, Firewall + Application Control and Firewall + IPS (Intrusion Prevention System). Miercom also looked at how many new TCP connections can be established per second by each device.
In the firewall test, the SG appliances were so fast they didn’t come anywhere near their limits and allowed traffic to flow freely at the 3Gbps maximum.
Miercom had to install an extra port module with more ports and run traffic in both directions in order to reach the limit.
You can read the original article, here.
When you consider the country’s huge online population, it’s not surprising that the U.S. sends so much spam. Spam comes from “bots” — computers infected with malware and under the control of a criminal. “Bot masters” can use servers anywhere in the world to give the bots instructions. So spam-bots in the countries on our list aren’t the authors of the spam, they are more like the messengers.
While it’s interesting to call out the 12 “dirty dozen” countries that send the most spam by volume, we also like to look at the amount of spam by population. It’s a diverse list of nations, and even small countries have a big spam problem.
The Dirty Dozen Spampionship
We’ve been measuring spam in our quarterly “Spampionship” going back a few years, and the U.S. consistently tops our charts. As you can see in the graphic below, bots in the U.S. send by far the most spam of any country, with second-place France (responsible for 6.7% of spam) well behind.
Other countries in our top 12 include China (third at 6.2% of spam) and Russia (fifth at 5.1% of spam), both consistently at the top of our charts quarter after quarter.
Spam per person – a fairer measure
We also look at spam “per person.” We do this because we think it’s a fairer measure of how spammy a country is. By setting the U.S. as the baseline, we can see how likely it is that a computer in a given country is a spam-sending bot compared to the U.S.
This past quarter, Bulgaria was the top country for spam per person, coming in at 2.1 times the U.S. Belarus, which had been the tops of the spam per-person chart for the past year, dropped to second place, at 1.9 times the U.S. spam level.

Fight back against spam and cybercrime – kill a spam-bot
Spam is truly a global problem — spam-bots can be anywhere in the world. Remember, if your computer is infected with spam-sending bot malware, you are part of the problem. Do your part to fight back against spam — download our free Virus Removal Tool to scan your computer and automatically clean up malware.
You can learn more about our “Spampionship” series by visiting our award-winning Naked Security blog. If you’re a business looking to keep your email secure, Sophos blocks spam and email-borne threats. Learn more about email security from Sophos.
You can read the original article, here.
Jan
TrueCrypt’s sudden demise
Despite being nominally open source software, TrueCrypt was always a bit secretive. Unlike many free, open source projects, the main developers and maintainers were unknown to the community. Someone, apparently one of the maintainers of TrueCrypt, shut down the project, claimed the product was not secure, and replaced it with a modified version designed only for undoing the encryption of previous versions. Sophos security adviser Maxim Weinstein tells us that TrueCrypt’s warning should be taken seriously. “We don’t know exactly why this was done, who exactly did it, or whether the software is, in fact, compromised or to what degree,” Max tells Sophos Blog. “As the community attempts to unravel the mystery, it’s best for users to stop using TrueCrypt and to find another solution.”
5 tips for data security
Encrypting your data and communications is vital in today’s security landscape. Our security experts offer these five key recommendations for moving beyond TrueCrypt to an alternative for data protection.
- Use vetted, trusted, operating system-level encryption like Microsoft BitLocker and Mac FileVault 2. TrueCrypt was not using the latest technology, so now is a great time to move to compliant encryption standards.
- The real issue with business use of encryption has been key management. You need good key management that enables encryption beyond just full-disk on your laptops.
- Data isn’t only on your disks. Users are taking it everywhere, especially the cloud. Now’s a good time to reevaluate your data protection strategy to make sure you’re protecting data everywhere.
- Non-Windows platforms need encryption, including OS X, Android and iOS. And don’t forget any systems still running Windows XP, you’ll need to protect them too.
- A thumb drive or DVD can hold sensitive records too. You need to encrypt all your storage devices as well.
The TrueCrypt alternative: SafeGuard Encryption
Only Sophos offers a single solution for all your encryption needs — for all your PCs, laptops, cloud, mobile devices, removable media, and file shares. And our software has been certified by several crypto-analysts, including the Federal Office of Information Security in Germany (the BSI), as truly secure.
You can manage all your data encryption simply, from a central console. And SafeGuard Encryption won’t slow users down. Visit sophos.com/truecrypt to learn more. Or click here for a free trial of SafeGuard Encryption.
You can read the original article, here.
Jan
There are many reasons why you should consider Sophos for your next firewall — here are five of them.
1. We keep it simple. It’s super easy to deploy, manage, and use – you’ll never need to configure with the command-line again.
2. You get lightning speed. Our SG Series appliances blow the competition away in independent tests. And if you prefer you can go software, virtual or cloud-based instead.
3. Everything’s on one box. It gives you the latest next-gen firewall features. Plus email, endpoint, and mobile features you can’t get anywhere else.
4. Reporting’s built in. Detailed reports come as standard, stored locally on a built-in hard drive. No separate appliances or tools required.
5. And we’re a three-time Gartner Magic Quadrant Leader. No other firewall vendor can say that. So you can rest assured you get proven protection you can trust from a Leader in UTM, Endpoint and Mobile Data Protection.
All of this good stuff, packaged in one super-fast, easy-to-use solution. To learn more, and see how we stack up against the competition, visit sophos.com/firewall.
You can read the original article, here.
Jan
Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both designed to help counteract this issue by helping legitimate senders prove that their email isn’t forged. Now you can implement anti-spam rules in the Sophos Email Appliance that act on the presence or lack of both SPF and DKIM validation and you can even add your own DKIM signatures to outbound mail, providing an added layer of trust to email originating from your organization.
As you would expect, enabling SPF or DKIM policy rules couldn’t be simpler. With just a couple of clicks you can easily add sender validation using these frameworks to your spam evaluation criteria.
But that’s not all, with v3.8 we’ve also enabled wildcards for selecting sub-domains for “Select Users” and “Custom Groups” when setting up policy and a few more enhancements. This release also includes a patch for the OpenSSL man-in-the-middle vulnerability. You can read all about the updates in the release notes.
Sophos Email Appliance Documentation and Release Notes. Existing email appliance customers will receive this automatically during your next specified update window.
You can read the original article, here.
Jan
And, as an IT professional, I faced the same challenge in all of these roles: SMBs have many of the same infrastructure needs as larger enterprises, but I didn’t have the time, budget or expertise to implement enterprise technology. Antivirus is a great example.
When I worked at an educational non-profit organization, we had a couple hundred users and a fast-changing environment. We had students doing who-knows-what with the classroom computers, limited Internet bandwidth that was often brought to its knees by people watching streaming video during peak usage times, and an Executive Director who wanted to use his Blackberry for work.
I was familiar with technologies like device control, host-based intrusion prevention systems (HIPS), web content filtering, and mobile device management. But who had the time or budget to research, acquire, learn, configure and maintain each of these systems?
Like most SMB IT professionals, I was left with a choice: attempt to implement one or more complex enterprise solutions as best I could, or I could compromise on the features and integration by selecting a hodgepodge of “small business” products. Goodbye Active Directory sync and HIPS! Hello separate web filtering, antivirus and mobile solutions!
It is no exaggeration to say that if someone had showed me Sophos Cloud back then, I would have thought it was an April Fool’s prank. No server and console to configure and install? Enterprise-class technology that is both affordable and easy to use? Everything integrated into a single intuitive interface?
Surely that’s not possible! And, to be fair, it wasn’t possible back when I was working in IT. But today it is.
About Sophos Cloud
Sophos Cloud provides everything you need to manage security for all of your organization’s end user devices: Windows, Mac and mobile. From device control to HIPS, Active Directory sync to web content filtering, it’s all there.
More importantly, it’s designed to give you enterprise-level protection with Sophos’s trademark simplicity. It’s almost enough to make me wish I was working in IT again.
Try it out today. You’ll be up and running with the 30-day free trial in just 60 seconds.
You can read the original article, here.
