PRODUCTS

Cyber Security Elements by NSS

Author name: admin9am

Encryption Without Compromise: The New SafeGuard Enterprise 6.1

With version 6.1 we’re addressing the two biggest issues in encryption – performance and usability – by leveraging native operating system (OS) encryption for better performance; and delivering multi-platform management across all devices and cloud environments. SafeGuard Enterprise also solves the major challenge of managing encryption across multiple platforms, devices, and cloud environments. Users and […]

Encryption Without Compromise: The New SafeGuard Enterprise 6.1 Read More »

Sophos Email Appliance offers Enhanced Phishing Protection

Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both designed to help counteract this issue by helping legitimate senders prove that their email isn’t forged.   Now you can implement anti-spam rules in the Sophos Email Appliance that act on the presence or lack of both SPF and DKIM validation and you can even

Sophos Email Appliance offers Enhanced Phishing Protection Read More »

New Peplink Balance 2500 router and Updated Technology Pages

Learn How Balance and MAX Routers Team Up for Unbreakable VPNs The Balance lineup uses Peplink SpeedFusion technology to integrate seamlessly with MAX cellular routers and deliver unstoppable VPNs in a wide variety of applications. To see how, visit our updated Balance and Unbreakable VPN pages. Filled with helpful deployment diagrams and technology highlights, they’re

New Peplink Balance 2500 router and Updated Technology Pages Read More »

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security

Πως μοιάζει το νέο Κέντρο Διαχείρισης; Ποια λειτουργικά συστήματα υποστηρίζονται και ποιοι clients είναι διαθέσιμοι; Ποια είναι η διαφορά μεταξύ των UEFI και BIOS και γιατί χρειάζεται να το ξέρετε αυτό όταν πουλάτε ή εγκαθιστάτε το SGN; Μπορούμε να υποθέσουμε ότι η Native (Γηγενή) Κρυπτογράφηση είναι ίδια με το SafeGuard Enterprise Device Encryption; Μπορούν οι

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security Read More »

What you need to know about the Bash “Shellshock” vulnerability

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue. Please see our article on Naked Security for an explanation of the vulnerability itself. In addition, we have examined our products and we are

What you need to know about the Bash “Shellshock” vulnerability Read More »

Microsoft to pay first bug bounty for Internet Explorer hole

She writes: “I personally notified the very first bounty recipient via email today that his submission for the Internet Explorer 11 Preview Bug Bounty is confirmed and validated. (Translation: He’s getting paid.)“. She hasn’t yet named names or put a price tag on the first recipient. In fact, there are already multiple researchers who’ll be

Microsoft to pay first bug bounty for Internet Explorer hole Read More »

Οι πελάτες δίνουν πολύ υψηλή βαθμολογία στη Sophos, η οποία πραγματοποιεί όσα υπόσχεται

Στο διάγραμμα που δημοσιοποιήθηκε από ανεξάρτητη εταιρεία ερευνών, και περιλαμβάνει τους Δείκτες Υπόσχεσης και Εκπλήρωσης, μπορείτε να δείτε και να συγκρίνετε την αποτελεσματικότητα ορισμένων από τις σπουδαιότερες εταιρείες της βιομηχανίας των υπολογιστών στο marketing αλλά και στην εκτέλεση. Ένας κατασκευαστής, που βρίσκεται στο πάνω δεξί τεταρτημόριο του διαγράμματος, έχει βαθμολογηθεί με υψηλή βαθμολογία τόσο στο

Οι πελάτες δίνουν πολύ υψηλή βαθμολογία στη Sophos, η οποία πραγματοποιεί όσα υπόσχεται Read More »

Firefox burns Chrome in our trustworthy browser poll

Our poll offered readers the chance to vote for one of the six most popular web browsers – Chrome, Firefox, Internet Explorer, Opera, Safari and Chromium – and asked which you trusted the most. Mozilla’s Firefox, the linear descendant of both Netscape Navigator and the original ‘graphical web browser’ the NCSA Mosaic, was a runaway

Firefox burns Chrome in our trustworthy browser poll Read More »

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet

Syrian Eagle told Mashable that Microsoft deserves what it got because it’s hawking data to US snoops and multiple governments. The SEA will publish proof of the allegations, Syrian Eagle said: “Microsoft is monitoring emails accounts and selling the data for the American intelligence and other governments. And we will publish more details and documents

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet Read More »