PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos announced Sophos Mobile Control 4.0

The new Sophos solution helps IT professionals confidently implement BYOD policies and provides users the flexibility they demand to stay productive and safe. It supports iOS, Android and Windows Phone 8 devices. To learn more about SMC 4.0, check out this video. SMC 4.0: Mobile Encryption, Integrated Security and User-Centricity SMC 4.0 provides a simple, […]

Sophos announced Sophos Mobile Control 4.0 Read More »

Sophos Unleashes Strategy to Leverage the Cloud to Simplify Security and Enhance Protection

Easy to deploy and simple to manage, Sophos Cloud gives Sophos partners and IT managers at enterprises of all sizes the ability to manage and maintain endpoint security to protect all users, regardless of physical location, via the cloud-based service. The launch of Sophos Cloud is the first step in the company’s aggressive strategy of

Sophos Unleashes Strategy to Leverage the Cloud to Simplify Security and Enhance Protection Read More »

Encryption Without Compromise: The New SafeGuard Enterprise 6.1

With version 6.1 we’re addressing the two biggest issues in encryption – performance and usability – by leveraging native operating system (OS) encryption for better performance; and delivering multi-platform management across all devices and cloud environments. SafeGuard Enterprise also solves the major challenge of managing encryption across multiple platforms, devices, and cloud environments. Users and

Encryption Without Compromise: The New SafeGuard Enterprise 6.1 Read More »

Sophos Email Appliance offers Enhanced Phishing Protection

Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both designed to help counteract this issue by helping legitimate senders prove that their email isn’t forged.   Now you can implement anti-spam rules in the Sophos Email Appliance that act on the presence or lack of both SPF and DKIM validation and you can even

Sophos Email Appliance offers Enhanced Phishing Protection Read More »

Microsoft to pay first bug bounty for Internet Explorer hole

She writes: “I personally notified the very first bounty recipient via email today that his submission for the Internet Explorer 11 Preview Bug Bounty is confirmed and validated. (Translation: He’s getting paid.)“. She hasn’t yet named names or put a price tag on the first recipient. In fact, there are already multiple researchers who’ll be

Microsoft to pay first bug bounty for Internet Explorer hole Read More »

New Peplink Balance 2500 router and Updated Technology Pages

Learn How Balance and MAX Routers Team Up for Unbreakable VPNs The Balance lineup uses Peplink SpeedFusion technology to integrate seamlessly with MAX cellular routers and deliver unstoppable VPNs in a wide variety of applications. To see how, visit our updated Balance and Unbreakable VPN pages. Filled with helpful deployment diagrams and technology highlights, they’re

New Peplink Balance 2500 router and Updated Technology Pages Read More »

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security

Πως μοιάζει το νέο Κέντρο Διαχείρισης; Ποια λειτουργικά συστήματα υποστηρίζονται και ποιοι clients είναι διαθέσιμοι; Ποια είναι η διαφορά μεταξύ των UEFI και BIOS και γιατί χρειάζεται να το ξέρετε αυτό όταν πουλάτε ή εγκαθιστάτε το SGN; Μπορούμε να υποθέσουμε ότι η Native (Γηγενή) Κρυπτογράφηση είναι ίδια με το SafeGuard Enterprise Device Encryption; Μπορούν οι

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security Read More »

What you need to know about the Bash “Shellshock” vulnerability

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue. Please see our article on Naked Security for an explanation of the vulnerability itself. In addition, we have examined our products and we are

What you need to know about the Bash “Shellshock” vulnerability Read More »