PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos Email: Delivering on security and visibility

The latest enhancements for Sophos Email Standard and Advanced customers make the management and reporting of email security even simpler. Here’s what’s changed: New reporting You can now view detailed summary information for every inbound and outbound message processed by Sophos Email. Starting from the ‘Message History’ report in Sophos Central, simply select the new,

Sophos Email: Delivering on security and visibility Read More »

Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part I)

Confusion between the terms ‘penetration testing’ and ‘vulnerability assessments’ often begins at the level of language. Those who are not full-time professionals in web security, such as journalists reporting on a big story that affects consumers, use the terms interchangeably, as if referring to the same process. Experienced professionals in the industry know the difference,

Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part I) Read More »

Sophos Security Heartbeat. Look who’s talking now: Your Wi-Fi, endpoints, mobiles…

With the introduction of Sophos Wireless v2.0 and the new APX Series Access Points, we’re continuing the evolution of our security in order to connect multiple products via our Sophos Central security management platform. When connected through our new APX Series access points, Sophos Wireless can not only talk to your endpoints but also your

Sophos Security Heartbeat. Look who’s talking now: Your Wi-Fi, endpoints, mobiles… Read More »

Logpoint. Why anti-virus alone can’t stop cryptocurrency mining

Cryptocurrencies like Bitcoin have been a source of worry since their creation. Fans of the technology say it’s the future of money in terms of privacy, and the verifiability of complex transactions; but there has always been a great debate that the real ‘value’ of cryptocurrency is in the application and use of the currency

Logpoint. Why anti-virus alone can’t stop cryptocurrency mining Read More »

Sophos XG Architect Training (October 29-31, 2018)

This three-day training program was designed and intended for experienced technical professionals who want to install, configure and support the XG Firewall in production environments and is the result of an in-depth study on the next generation firewall of Sophos. The program consists of presentations and practical workshops for the enhancement of teaching content. Due

Sophos XG Architect Training (October 29-31, 2018) Read More »

Sophos gets top marks in CRN’s 2018 Annual Report Card

At Sophos, we believe in being “channel best,” which is why we’re proud to announce that we swept the Network and Endpoint Security categories at this year’s CRN Annual Report Card awards this month. Not only were we named the “Overall Winner” in Network Security for the third year running, we were also named “Overall

Sophos gets top marks in CRN’s 2018 Annual Report Card Read More »

Take a tour of Sophos Central’s Endpoint and Intercept X Protection

There are numerous things you can do with Sophos Central, our cloud-based management platform. You can manage networking products, mobile devices, phishing training and more. You’d think with so much functionality it would be complicated, but as happy customer Igor Bovio explains, it’s easy to use: “With Sophos Central, the IT system is able to

Take a tour of Sophos Central’s Endpoint and Intercept X Protection Read More »

CyberArk Launches SAP-certified Privileged Access Security Solution

CyberArk, the global leader in privileged access security, today announced the availability of its SAP-certified CyberArk Privileged Access Security Solution. The solution can strengthen and extend security across SAP environments, including SAP ERP systems, by protecting against privileged access-related risk and credential compromise. The CyberArk Privileged Access Security Solution achieved SAP certification as Integrated with SAP

CyberArk Launches SAP-certified Privileged Access Security Solution Read More »