PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Boldon James. In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different regions and industries. It summarizes the experiences and plans the organizations have in regard to addressing […]

Boldon James. In Terms Of Main Threat Actors, Expectation Rarely Matches Reality Read More »

Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment

Defence organisations encompass two very different communication environments. Military messaging takes place within live operational environments, and might involve messages passing between different operations and forces, for example, over closed systems and networks. This type of communication must follow strict security procedures and protocols, and conform to stringent standards, as must the classification of the

Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment Read More »

Sophos Mobile gets in sync with Google Cloud Identity

Onboarding new devices to management policy controls includes the important step of user authentication. That’s why we’re excited to be one of the launch partners for Google Cloud’s new secure LDAP feature, launched today at Google Next London. Sophos Mobile customers now have the option to validate their users’ identities with G Suite and Google

Sophos Mobile gets in sync with Google Cloud Identity Read More »

The best just got better. Intercept X now with EDR

We are very excited to announce the launch of Sophos Intercept X Advanced with EDR, a new Intercept X offering that integrates intelligent endpoint detection and response (EDR) with the industry’s top-rated malware and exploit protection. With Intercept X Advanced with EDR, IT and security teams can now better navigate the challenges of today’s most

The best just got better. Intercept X now with EDR Read More »

Boldon James: Data breach reports see 75% increase in last two years

Data breaches are up 75% in two years, finds a report from the Information Commissioner (ICO). The study, carried out by Kroll, took into account an array of personal data, including health, financial and employment details. Access to this data was made possible under the Freedom of Information Act, in addition to some ICO data

Boldon James: Data breach reports see 75% increase in last two years Read More »

Sophos recognized for anti-ransomware success at Channelnomics Awards

We are thrilled to announced that we’ve won the award for Best Anti-Ransomware Solution and have been highly commended in the Best Security Partner Program category at the first Channelnomics Security Awards. As Channelnomics explains, these awards have been “designed to recognize the trailblazers in the security industry – those players who are embracing the

Sophos recognized for anti-ransomware success at Channelnomics Awards Read More »

Sophos is named a Leader in the Gartner UTM Magic Quadrant

We’re very pleased to announce that for the 7th consecutive year, Gartner has named Sophos a Leader in the Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) for 2018. We continue to be one of only three vendors in the Leader’s Quadrant which we firmly believe is a testimony to the strength of our

Sophos is named a Leader in the Gartner UTM Magic Quadrant Read More »

Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part II)

Vulnerability Assessment Builds Security Continuous Improvement Into your Enterprise SDLC Vulnerability assessments are a highly systemised way for established organisations to gain a comprehensive picture of their security posture, and then maintain and continuously improve on it. When new devices, ports, websites, web applications, or services are added, they are included in regular scans. A

Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part II) Read More »