PRODUCTS

Cyber Security Elements by NSS

News

15

Jan

We want to share a little tip – did you know that we offer an amazing alternative to cheap consumer grade Internet routers?

The difference is, our software is enterprise class, fully maintained and free. Here’s how you can try our Sophos UTM Home Edition and our free Sophos UTM Essential Firewall for businesses.

If you think you need to be truly “unlucky” to be targeted – try putting an unshielded Windows computer or a web server on the Internet and watch it being probed within seconds. This is not a matter of misfortune; it’s a matter of seconds.

Being such a critical piece of equipment you might think firewalls all come as cast iron, industrial strength appliances. But, as has been apparent, this is not the case.

Many times the software is not maintained on these devices. Some are not made to update automatically, or are difficult to upgrade. Or the vendor has simply stopped maintaining the software.

Let us give you some examples security weaknesses we’ve seen recently.

  • Admin access: this is the holy grail. Anyone can go in a reconfigure your router.
  • UPnP – an autoconfiguring standard to allow devices on your network to open up ports in your firewall

The good news is that the Sophos UTM Essential Firewall (for businesses) and Sophos UTM Home Edition address all the issues I’ve mentioned above.

  • We continuously maintain and update the software for it. This means we can make continuous improvements and quickly address any issues.
  • We don’t support UPnP so it will never be an issue
  • You get remote access so you can access you home network wherever you are without having to open any ports on the firewall

Try our Sophos UTM Home Edition, and our free Sophos UTM Essential Firewall for businesses.

You can choose how you deploy it:

  • Use an existing standard PC with at least two network cards
  • Install it as a VM in your virtual environment
  • Buy a hardware appliance from us
  • Or you can geek out completely and even run it in the Amazon EC2 cloud … the possibilities are endless

 

You can read the original article, here.

15

Jan

Saving your data and increasing your bottom line just got easier. Purchase a WD Arkeia backup appliance at a reduced price and get all licenses for popular software agents at no additional cost. The WD Arkeia bundle comes standard with software, hardware and one year of maintenance at up to 50% less than the competition.

Here’s what’s included:

  • Software, hardware and one year of maintenance
  • Virtualization agents: VMware and MS Hyper-V
  • Microsoft hot-backup agents: MS SQL, Exchange, Active Directory & SharePoint
  • Agents for MySQL, PostgreSQL and Oracle
  • Agents for Novell GroupWise and eDirectory / NetIQ
  • Hybrid-cloud backup replication
  • End-to-End
  • Encryption
  • Bare metal restore for Linux and Windows
  • Remote Storage Option and Shared Storage Option

WD Arkeia offers six backup appliance models including both desktop and rackmount options.  See our full backup appliance range here.

WD Arkeia Specs

This limited time offer ends September 21, 2014. Find more at http://info.arkeia.com/emea/bundle

15

Jan

Independent test vendor Miercom has done rigorous testing of the Sophos SG Series alongside comparative appliances from other vendors. We shared some data points from Miercom earlier this year which looked very good indeed. Now Miercom has made available more results – and I don’t think you will be disappointed.

The report includes measurement of throughput for Firewall, Firewall + Application Control and Firewall + IPS (Intrusion Prevention System). Miercom also looked at how many new TCP connections can be established per second by each device.

In the firewall test, the SG appliances were so fast they didn’t come anywhere near their limits and allowed traffic to flow freely at the 3Gbps maximum.

Miercom had to install an extra port module with more ports and run traffic in both directions in order to reach the limit.

 miercom-performance-report

You can read the original article, here.

15

Jan

When you consider the country’s huge online population, it’s not surprising that the U.S. sends so much spam. Spam comes from “bots” — computers infected with malware and under the control of a criminal. “Bot masters” can use servers anywhere in the world to give the bots instructions. So spam-bots in the countries on our list aren’t the authors of the spam, they are more like the messengers.

While it’s interesting to call out the 12 “dirty dozen” countries that send the most spam by volume, we also like to look at the amount of spam by population. It’s a diverse list of nations, and even small countries have a big spam problem.

The Dirty Dozen Spampionship

We’ve been measuring spam in our quarterly “Spampionship” going back a few years, and the U.S. consistently tops our charts. As you can see in the graphic below, bots in the U.S. send by far the most spam of any country, with second-place France (responsible for 6.7% of spam) well behind.

Other countries in our top 12 include China (third at 6.2% of spam) and Russia (fifth at 5.1% of spam), both consistently at the top of our charts quarter after quarter.

Spam per person – a fairer measure

We also look at spam “per person.” We do this because we think it’s a fairer measure of how spammy a country is. By setting the U.S. as the baseline, we can see how likely it is that a computer in a given country is a spam-sending bot compared to the U.S.

This past quarter, Bulgaria was the top country for spam per person, coming in at 2.1 times the U.S. Belarus, which had been the tops of the spam per-person chart for the past year, dropped to second place, at 1.9 times the U.S. spam level.

spam-bot-invaders-infographic-pop

Fight back against spam and cybercrime – kill a spam-bot

Spam is truly a global problem — spam-bots can be anywhere in the world. Remember, if your computer is infected with spam-sending bot malware, you are part of the problem. Do your part to fight back against spam — download our free Virus Removal Tool to scan your computer and automatically clean up malware.

You can learn more about our “Spampionship” series by visiting our award-winning Naked Security blog. If you’re a business looking to keep your email secure, Sophos blocks spam and email-borne threats. Learn more about email security from Sophos

You can read the original article, here.

15

Jan

TrueCrypt’s sudden demise

Despite being nominally open source software, TrueCrypt was always a bit secretive. Unlike many free, open source projects, the main developers and maintainers were unknown to the community. Someone, apparently one of the maintainers of TrueCrypt, shut down the project, claimed the product was not secure, and replaced it with a modified version designed only for undoing the encryption of previous versions. Sophos security adviser Maxim Weinstein tells us that TrueCrypt’s warning should be taken seriously. “We don’t know exactly why this was done, who exactly did it, or whether the software is, in fact, compromised or to what degree,” Max tells Sophos Blog. “As the community attempts to unravel the mystery, it’s best for users to stop using TrueCrypt and to find another solution.”

5 tips for data security

Encrypting your data and communications is vital in today’s security landscape. Our security experts offer these five key recommendations for moving beyond TrueCrypt to an alternative for data protection.

  • Use vetted, trusted, operating system-level encryption like Microsoft BitLocker and Mac FileVault 2. TrueCrypt was not using the latest technology, so now is a great time to move to compliant encryption standards.
  • The real issue with business use of encryption has been key management. You need good key management that enables encryption beyond just full-disk on your laptops.
  • Data isn’t only on your disks. Users are taking it everywhere, especially the cloud. Now’s a good time to reevaluate your data protection strategy to make sure you’re protecting data everywhere.
  • Non-Windows platforms need encryption, including OS X, Android and iOS. And don’t forget any systems still running Windows XP, you’ll need to protect them too.
  • A thumb drive or DVD can hold sensitive records too. You need to encrypt all your storage devices as well.

The TrueCrypt alternative: SafeGuard Encryption

Only Sophos offers a single solution for all your encryption needs — for all your PCs, laptops, cloud, mobile devices, removable media, and file shares. And our software has been certified by several crypto-analysts, including the Federal Office of Information Security in Germany (the BSI), as truly secure.

You can manage all your data encryption simply, from a central console. And SafeGuard Encryption won’t slow users down. Visit sophos.com/truecrypt to learn more. Or click here for a free trial of SafeGuard Encryption.

You can read the original article, here.

15

Jan

There are many reasons why you should consider Sophos for your next firewall — here are five of them.

1. We keep it simple. It’s super easy to deploy, manage, and use – you’ll never need to configure with the command-line again.

2. You get lightning speed. Our SG Series appliances blow the competition away in independent tests. And if you prefer you can go software, virtual or cloud-based instead.

3. Everything’s on one box. It gives you the latest next-gen firewall features. Plus email, endpoint, and mobile features you can’t get anywhere else.

4. Reporting’s built in. Detailed reports come as standard, stored locally on a built-in hard drive. No separate appliances or tools required.

5. And we’re a three-time Gartner Magic Quadrant Leader. No other firewall vendor can say that. So you can rest assured you get proven protection you can trust from a Leader in UTM, Endpoint and Mobile Data Protection.

All of this good stuff, packaged in one super-fast, easy-to-use solution. To learn more, and see how we stack up against the competition, visit sophos.com/firewall.

You can read the original article, here.

15

Jan

Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both designed to help counteract this issue by helping legitimate senders prove that their email isn’t forged.   Now you can implement anti-spam rules in the Sophos Email Appliance that act on the presence or lack of both SPF and DKIM validation and you can even add your own DKIM signatures to outbound mail, providing an added layer of trust to email originating from your organization.

As you would expect, enabling SPF or DKIM policy rules couldn’t be simpler.  With just a couple of clicks you can easily add sender validation using these frameworks to your spam evaluation criteria.

But that’s not all, with v3.8 we’ve also enabled wildcards for selecting sub-domains for  “Select Users” and “Custom Groups” when setting up policy and a few more enhancements.  This release also includes a patch for the OpenSSL man-in-the-middle vulnerability.  You can read all about the updates in the release notes.

Sophos Email Appliance Documentation and Release Notes. Existing email appliance customers will receive this automatically during your next specified update window.

You can read the original article, here.

15

Jan

And, as an IT professional, I faced the same challenge in all of these roles: SMBs have many of the same infrastructure needs as larger enterprises, but I didn’t have the time, budget or expertise to implement enterprise technology. Antivirus is a great example.

When I worked at an educational non-profit organization, we had a couple hundred users and a fast-changing environment. We had students doing who-knows-what with the classroom computers, limited Internet bandwidth that was often brought to its knees by people watching streaming video during peak usage times, and an Executive Director who wanted to use his Blackberry for work.

I was familiar with technologies like device control, host-based intrusion prevention systems (HIPS), web content filtering, and mobile device management. But who had the time or budget to research, acquire, learn, configure and maintain each of these systems?

Like most SMB IT professionals, I was left with a choice: attempt to implement one or more complex enterprise solutions as best I could, or I could compromise on the features and integration by selecting a hodgepodge of “small business” products. Goodbye Active Directory sync and HIPS! Hello separate web filtering, antivirus and mobile solutions!

It is no exaggeration to say that if someone had showed me Sophos Cloud back then, I would have thought it was an April Fool’s prank. No server and console to configure and install? Enterprise-class technology that is both affordable and easy to use? Everything integrated into a single intuitive interface?

Surely that’s not possible! And, to be fair, it wasn’t possible back when I was working in IT. But today it is.

About Sophos Cloud

Sophos Cloud provides everything you need to manage security for all of your organization’s end user devices: Windows, Mac and mobile. From device control to HIPS, Active Directory sync to web content filtering, it’s all there.

More importantly, it’s designed to give you enterprise-level protection with Sophos’s trademark simplicity. It’s almost enough to make me wish I was working in IT again.

Try it out today. You’ll be up and running with the 30-day free trial in just 60 seconds.

You can read the original article, here.

15

Jan

The mobile workforce are the super productive bunch. They are the ones pushing the envelop of BYOD. For the mobile workforce, balancing work and life can mean that they check corporate email on a personal device, and browse the Internet using a corporate laptop while traveling.

Many IT professionals would agree that empowering these mobile workers with the tools they need while ensuring security can be a tough balancing act. Here are a few tips to help you secure your mobile workforces without overworking the IT folks.

1. Choose a cloud-based security subscription service that offers secu­rity software and policy updates anywhere without slowing down users.
Let’s face it, when your users are on the road, how often do they use a VPN to connect? If you rely on VPN connection to send security updates or refresh policies, you’ll be constantly behind.

2. Take advantage of security software web filtering capabilities that block malicious and web-borne threats before they reach the computer, as well as enforce proper usage policy.
When your mobile workers are on the road, it is expected that they would connect to the hotel’s Wi-Fi to browse the Internet to check the sports page on their work iPad.

The key is to keep them protected from web-borne threats. Take advantage of endpoint enforced web protection capabilities built-in to the local security agent. This way, you avoid latency and eliminate the need to backhaul traffic using a VPN connection. (We already know that people don’t always connect to the VPN before they browse the Internet!)

3. Select a solution that will protect Windows and Mac com­puters equally with a single policy.
Take a look at an airline lounge and count how many Macbooks are being used. According to our recent survey, 10% of laptop computers on the corporate network are Macs.

Get a security solution that will protect Windows and Mac equally. To reduce IT’s workload, it is also important to ensure that you can manage both with a single policy engine. This way, you will only have to configure policy once and it works automatically on both Windows and Mac OS X.

4. To protect data and ensure compliance, be sure to encrypt data on both Windows and Mac.
We all know encryption is essential for mobile workers, yet 80% of corporate computers are un-encrypted. Many mobile workers refuse to get encryption on their laptops out of concerns of slow speeds and longer boot time.

Select an encryption solution that works on both Windows and Mac, and with high performance that won’t slow down your users.

5. Select a single solution that gives you visibility into all the devices your remote users are using, including Windows or Mac laptops and mo­bile devices.
Mobile users today use an average of three devices to get their work done. Ideally, use a solution with a user-centric view, so when you are trouble shooting for a mobile worker, you can easily see the events, devices used and policy applied to the specific individual.

About Sophos Cloud

Businesses and IT managers have a simple choice – Sophos Cloud. There’s no server to install and the management console is hosted in the cloud. So, you’ll be up and running in just 60 seconds.

1) Windows, Mac and mobile device security in a single, integrated console
2) User-centric pricing, policy and reporting
3) Comprehensive protection without complexity

Try Sophos Cloud for free.

You can read the original article, here.

15

Jan

Sign up for our beta program today and we’ll notify you by email when the beta is available. And here’s the best part — if you sign up for the beta before 30th September, you’ll be automatically entered to win a $25 Google Play gift card!

Here’s how to sign up for the beta:

1. Join the Sophos Mobile Beta Google group: http://soph.so/yUzZg
2. Opt in to receive the beta software, triggered by an email from the Google group

Sign up before 30th September — we’ll draw 20 lucky winners for the $25 gift card.

Sophos Mobile Security for Android

Sophos Mobile Security for Android is a free app available on Google Play.

Sophos Mobile Security

Sophos Mobile Security is a robust yet lightweight app that protects your Android devices without compromising performance or battery life. Using up-to-the-minute intelligence from SophosLabs, it automatically scans apps as you install them. Other features include a privacy advisor, data and device encryption, and per-app password protection that you can set up for sensitive apps like your email.

We’ve received several awards and many great reviews for Sophos Mobile Security, which has been downloaded more than 100,000 times from Google Play. Sophos Mobile Security is also available as an enterprise version you can manage through Mobile Control, our enterprise mobility management and security product.

You can read the original article, here.

15

Jan

SC Magazine’s July 2014 review calls Sophos Mobile Control 4.0 (SMC) a “solid, quality enterprise-capable product,” and notes that SMC is “easy to deploy and manage with a vast set of features.”

This award shouldn’t be too surprising — SMC version 3.5 also received five stars from SC Magazine. And we’ve been recognized as a Visionary in the Gartner Magic Quadrant for Enterprise Mobility Management.

Here are some other highlights from the SC Magazine review:

1. SMC supports BYOD initiatives with its self-service portal, so users can “handle most of the help desk activities themselves if admins choose this path.”
2. “Configuration, user provisioning and device enrollment took only minutes.”
3. “The dashboard was feature-rich and easy to navigate.”
4. “One of the features of note was the integration of the anti-virus and protection solution well known to Sophos customers.”
5. Support documentation provided “excellent information for each feature of the product” that were “clear and easy to understand.”
6. “Value for money is good.”

Sophos is a Visionary in Enterprise Mobility Management

​Gartner’s Magic Quadrant for Enterprise Mobility Management Suites 2014 recognizes Sophos in the Visionary Quadrant. Find out what Gartner has to say about Sophos and SMC in the free Magic Quadrant report.

Learn more about Sophos Mobile Control

SMC 4.0 takes data protection beyond the office door by ensuring persistent mobile encryption on devices. Additional network access control based on device compliance status makes mobile device management, content management and mobile security simple and effective.

Available on premise or as a service, SMC provides a simple and differentiated approach for small and mid-market organizations to manage and secure mobile devices, content and applications. Watch the video for a quick overview of Sophos Mobile Control, or sign up for a free trial to see for yourself why SMC is the best EMM product for businesses of any size.

You can read the original article, here.

15

Jan

McAfee may be big, but that doesn’t mean better. When you look at independent tests and evaluations, Sophos comes out on top. Get our Endpoint Buyers Guide to see all the research that will help you evaluate the top endpoint protection products.

This buyers guide shows you how we match up against McAfee and other vendors in performance, protection, ease of management and customer support.

Better performance

Your endpoint protection can’t come at the expense of user productivity.

In a recent AV-Comparatives performance test, Sophos Endpoint Protection had the best (lowest) system impact score, meaning our software had the least amount of impact on a computer’s speed in performing tasks like launching programs and files.

As you can see in the chart below, we have the industry’s lowest impact on performance, while McAfee scored at the bottom of the scale. In this comparison, a lower score means better performance.

Sophos gives you protection that won’t slow you down.

SophosVsMcAfee-AV-Comp-Chart

Better protection 

When you choose Sophos, you’re choosing better protection from malware.

As you can see in Info-Tech’s latest Vendor Landscape: Endpoint Anti-Malware report, Info-Tech placed us far higher and to the right of McAfee, meaning we continue to beat McAfee with better protection against malware. This also proves how our strategy of complete security, our strong market presence, and our reputation as trendsetters in the industry leaves McAfee far behind.

Info-Tech Research Group has ranked us Champions for the last three years, recognizing our superior products based on features, affordability, usability, and architecture. In addition, Info-Tech evaluates vendors for viability, strategy, reach and channel.

SophosVsMcAfee-InfoTech-Chart

Fast on Macs

Here’s what a user from LowEndMac.com has to say about Sophos Endpoint Antivirus:

“With some antivirus suites for Windows you can really feel a difference in computer performance, sucking system resources and some even bring them down to a crawl. How does Sophos compare? I have been running Sophos on my 2009 MacBook running Mavericks for just over a week, and I haven’t noticed any performance drop since it has been installed.”

Read more about this review on our Sophos Blog.

Take a look at how we rank against other security vendors. Click the button below to download the Endpoint Buyers Guide.

Give Sophos a try

The best way to see how we perform is to give us a try. It’s easy to take a free trial of our Endpoint Antivirus. You can choose either on-premise or cloud deployment, and start your trial today.

You can read the original article, here.

15

Jan

Sophos is the only IT security company to be positioned as a Leader across three critical security areas: Unified Threat Management (UTM), Mobile Data Protection and Endpoint Protection Platforms. “We believe it is a privilege to receive recognition from Gartner. The momentum in our UTM business is truly exciting,” said Bryan Barney, General Manager, Network Security Group, Sophos.

“Most notably, in the past year we’ve released our SG Series appliances, the fastest UTM devices we’ve ever produced and expanded the UTM protection we offer with our new cloud-based sandboxing, integrated mobile device management and really simple to use email encryption. Smaller businesses need effective security that is easy to use and that’s exactly what we provide. And it’s why we’re seeing more and more partners and customers switching to Sophos for their UTM and Next-Gen Firewall needs.”

In the most recent quarter of trading, April to June 2014, Sophos recorded a 27 percent increase in UTM sales, and a 33 percent increase in new customer business for UTM. This demonstrates the significant share gains the company is making; Sophos’ network security business now accounts for billings in excess of $150 million — with tremendous growth across North America, Asia Pacific and EMEA, among other regions. Additionally, the company’s “channel first” focus continues to deliver success with the signing of several new strategic channels to market such as the recently agreed distribution deal with Ingram Micro in North America. Sophos now has over 25,000 UTM channel partners worldwide, with the number of partners growing at over 20 percent a year.

According to Gartner, “the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use.

Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer.”

To download a complimentary copy of this report, click here.

You can read the original article, here.

15

Jan

The partnership means users of Sophos Mobile Control 4.0 and Check Point Mobile VPN can link the two solutions to provide network access control for any mobile devices attempting to use the corporate network. Non-compliant devices are isolated from the network, protecting the organization from unauthorized mobile devices. This ensures that only managed devices that meet an organization’s security policy may connect and use business resources.

Mobile devices continue to multiply rapidly in the workplace and today’s flexible working styles mean that, increasingly, employees are requiring and gaining access to the corporate network wherever they are. As a result of this surge in mobility, effectively securing both corporate data and networks has become an enormous challenge for IT and security managers. Much of an IT administrator’s day can be spent provisioning, securing, locating, managing and updating these mobile devices.

Sophos Mobile Control continually assesses the compliance status of each mobile device – detecting jailbreaks, blacklisted apps or insecure settings. Via a simple out-of-the-box interface with Check Point’s Mobile VPN, it blocks any non-compliant device from accessing the corporate network via VPN, proactively reducing the risk of data breaches.

“By integrating Check Point Mobile VPN with the mobile device management features of Sophos Mobile Control, IT departments can easily manage how mobile users access centrally-stored corporate resources, allowing them to regain control of their networks all through a simple interface,” says Alon Kantor, vice president of business development at Check Point Software Technologies. “Check Point’s partnership with Sophos provides our joint customers with a simple solution for the increasingly common problem of mobile network access control.”

“The rapid growth of mobile devices in the workplace combined with today’s range of threats means that mobile security is an increasing priority for many organizations,” says Ari Buchler, senior vice president corporate development at Sophos. ”We’re delighted to be partnering with Check Point to provide a simple solution to this complex problem, and to enable users of Sophos Mobile Control and Check Point Mobile VPN to keep compromised mobile devices off their networks. This integration demonstrates both companies’ commitment to meeting the needs of customers in the face of a continuously evolving threat landscape.”

Sophos Mobile Control 4.0

Sophos released Sophos Mobile Control 4.0 in May 2014. In addition to managing mobile devices, applications and email, it is the only EMM solution to offer file-level encryption, ensuring that each document connected to the server remains secure and that users can collaborate safely. Sophos Mobile Control also delivers robust, integrated security against malware and malicious web sites to protect against the rapidly-growing, nearly 1 million unique pieces of mobile malware seen by SophosLabs. In addition, Sophos is the only EMM vendor to offer categorical web filtering so organizations can control network performance and security by managing which websites their users can access. Available on premise or as-a-service, Sophos Mobile Control provides a simple and differentiated approach for organizations to manage and secure mobile devices, content and applications. Learn more about Sophos Mobile Control 4.0.

According to IDC, Sophos Mobile Control is the market leader among small and medium businesses in North America, with 25% market share. Sophos is also the only IT security company to be positioned as a Leader in all three of the following Gartner Magic Quadrants: Unified Threat Management (UTM), Mobile Data Protection and Endpoint Protection Platforms.

Integration with Check Point Mobile VPN

Check Point Mobile VPN application establishes a secure VPN (Virtual Private Network) tunnel to the corporate network infrastructure via a Check Point Security Gateway. By unifying Sophos Mobile Control and Check Point VPN gateways, IT departments can ensure that only compliant devices are allowed access to the corporate network. Compliance policies for corporate owned mobile devices reside on the Mobile Device Management Servers.

When a device attempts to connect to the corporate network, compliance is checked. This can prevent users from installing a VPN client on unmanaged devices and trying to access the organization. The Security Gateway can also block the unknown devices of valid users.

You can read the original article, here.

15

Jan

For the first time, AV-Test has released test results comparing malware protection for Macs among 18 major security vendors. The results show a wide disparity in protection against Mac OS X malware. Sophos came out near the top with a 96.6% detection rate. Our Mac protection was better than Kaspersky, Trend Micro, Symantec and McAfee. You can see the full results at the AV-Test website. AV-Comparatives tests also show Sophos protects Macs better — and we won’t slow Macs down either. According to the Register, the AV-Comparatives tests showed that Sophos “aced the test.”

 Protect your Macs

Malware targeting Mac OS X isn’t as widespread as malware for Windows and Android, but the threat is real and growing. And with more businesses expecting to add Macs in the future, protecting them will need to be a top priority. You need security that works not just for Windows malware, but for Macs and mobile devices too.

Visit sophos.com/best-endpoint to see how Sophos beats the other security vendors, from protection to performance, compatibility, and price.

You can read the original article, here.

15

Jan

Of course, it isn’t just film stars who have sensitive data on their Apple devices – employees will often have corporate data on their iPhones and iPads while home users may also have their personal pictures and videos stored on their iOS device.

With that in mind, here are 3 tips to help keep your photos and other data safe:

1. Use a strong password

This is an easy one – it’s important to make sure you use a strong, unique password for your iCloud account, especially as Apple hasn’t yet enabled two-step verification for iCloud. To do this, make the new password long (minimum 14 characters), avoid using real words and switch between UPPER, lower, d1g1t5 and //@ckies. If you have trouble remembering such a complex password, consider using a password manager.

And while we’re here, make sure you use unique passwords for every account on every website that you use. It’s important because if someone gains access to one of your accounts, they can only access that one – not every account you own.

2. Limit what you backup to iCloud

iCloud SettingsNow is a good time to check what exactly is being backed up to your own iCloud account. Go to Settings on your device and then select iCloud. Here you will see a list of all the apps on your device that are being backed up to the cloud. Each can be individually toggled on or off. You need to decide for yourself as to what you want to backup – for example, you may decide to not backup your Photos (especially if they’re a little risque), but keep backing up your Mail and Documents & Data.

It’s a case of weighing up the risk of losing or bricking your device, versus the risk of having your information stolen through the cloud. Of course, there’s always the option of…

3. Turn iCloud off and backup locally

If you feel that the risk of having your iCloud storage hacked outweighs the convenience of the service then you may wish to delete your account entirely. Doing so is very easy. Go to Settings on your iDevice and then select iCloud. Scroll all the way to the bottom of the screen and you will see the option to Delete Account. Of course, that means your device will no longer be backed up, so you’ll need an alternative means of backing up your data. Fortunately, you have that with Apple’s iTunes which offers a manual alternative.

To backup with iTunes:

1. Make sure your computer has the latest version of iTunes

2. Connect your iOS device to your computer

3. Choose File, then Devices and Back up.

If you decide to backup your devices this way, remember to continue backing up on a regular basis. 

You can read the original article, here.

15

Jan

And we’ve been named a Visionary in the Gartner Magic Quadrant for Enterprise Mobility ManagementPlease contact technical support if you need more information or guidance.

What’s available in Sophos Mobile Control 4.0

SMC offers a full range of enterprise mobility management features, including:

  • Central management of your mobile devices, content and applications with a user-centric approach
  • Robust security protection with built-in anti-malware and web filtering
  • Mobile content management with individual file encryption, ensuring encryption without compromise on your devices
  • Reduced risk of data breaches with integrated Network Access Control
  • Easy deployment and management with user based pricing, simplifying your budget

Highlights

  • Use a simple role-based web console
  • Push out policies and apps over the air
  • Assign policies based on users’ Active Directory groups
  • Regularly check for device compliance
  • Remotely locate, lock and wipe devices
  • Secure mobile content on iOS devices
  • Filter web pages by category on Android devices
  • You can choose either on-premise or SaaS deployment, or as a subscription option with Sophos Cloud.

Learn more about the great features in Sophos Mobile Control, or sign up for a free trial.

And find out how Sophos gives our customers security that’s simply better.

You can read the original article, here.

15

Jan

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue. Please see our article on Naked Security for an explanation of the vulnerability itself.

In addition, we have examined our products and we are confident that the Shellshock vulnerability can’t be exploited in any Sophos product. Our IT systems have also been patched or were not vulnerable. For the latest information on how this bug affects Sophos products, please refer to our knowledgebase article from Sophos Support. 

You can read the original article, here.

15

Jan

Here are the Top 10 reasons to choose Array’s APV Series Application Delivery Controllers (ADCs). Today, many industries and enterprises are looking to simplify and optimize business operations. Array’s high-performance technology is the first step towards achieving that goal. Designed to solve real-world business and organization problems, Array’s solutions can dramatically increase employee productivity and business agility while streamlining network management and delivering dramatic cost savings. With the advent of virtualization, public and private clouds, the explosion in mobile traffic and the move towards new standards including IPv6 and 2048-bit encryption, modern application delivery controllers must provide performance and scalability in line with the demands of mobile and cloud computing and the agility to extract maximum efficiency and ROI from application infrastructure.

Array APV Series application delivery controllers address the challenges faced by enterprise, service provider and public sector organizations in the areas of application and cloud service delivery. Available as purpose-built appliances or software engineered for virtual environments, Array ADCs combine cutting-edge performance and scalability with transformative features at industry-leading price points, creating unmatched value and ROI as compared to brand name alternatives.

Top 10 Reasons to Choose APV Series Application Delivery Controllers (ADCs)

1) Superior Performance
Delivers 99.999% application availability, up to 5x application acceleration and provides a first line of defense for Web-enabled applications and cloud services.

2) Management Integration
Array’s eCloud™ API provides a script-level interface for cloud management systems.OpenStack integration allows rapid integration and control of Array technology.

Array APV Series application delivery controller1

3) Lowest Cost per SSL TPS
Typically 30 – 70% lower cost than similar models for 2048-bit SSL across the complete APV Series product line.

4) IPv6 Migration
Array’s DNS64/NAT64 allows organizations running IPv6 networks to access IPv4 networks, servers and content. Array’s SLBPT allows organizations with an IPv4 Web presence to support access from IPv6 clients.

5) Easy Traffic Management
Advanced Layer 7 policy engine, SpeedPolicy, offers point-and-click WebUI configuration executed at the system level for agility and performance.

Array APV Series application delivery controller2

6) High-Performance Features
Since features are executed at the system level, APV appliances maintain unmatched levels of performance with multiple, concurrent features enabled.

7) Multi-Layer Security
WebWall provides the first line of defense for Web-based cloud apps and shields Web Application Firewalls from brute force attacks and unauthorized requests.

8) Great Support
Array’s pre- and post-sales engineers and customer support are committed to strive for excellence and continual improvement in quality.

9) Flexible Platform Options
Physical, virtual or multi-tenant – APV Series offers all three options. And AVX10650 is a true multi-tenant ADC, with dedicated SSL, I/O and compute resources for up to 8 instances.

Array APV Series application delivery controller3

10) Established Company
With a 10-year record and proven at thousands of worldwide customers, Array application delivery networking solutions are recognized for industry-leading performance and value.

10

Jan

Best in Biz Awards, the only independent business award program judged by members of the press and industry analysts.

The Arkeia Network Backup Suite comprises Arkeia Software’s line of backup-and-restore solutions. Administrators can deploy Arkeia’s backup servers as software applications, hardware appliances or virtual appliances. Arkeia Software protects both virtual and physical environments and manages backups to disk, to tape, and to the cloud.

For more information click here