PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Making Sophos Web Gateway better, wherever you are

We’re pleased to announce the availability of Sophos Web Gateway – the easy-to-deploy, easy-to-trial web security solution – in additional regions, and there’s a significant update to the product interface coming at the end of November. What’s new? 1. Sophos Web Gateway (Central Web Gateway Advanced) will be available in additional regions from 7 November. […]

Making Sophos Web Gateway better, wherever you are Read More »

Your second chance to get a great impression with Sandstorm in Sophos Web Appliance

They say you never get a second chance to make a first impression, but with the Sophos Web Appliance 4.3.0.1, we’re offering our customers a second 30-day trial of Sophos Sandstorm. Try Sandstorm for a second time to see the value it can bring to your defenses against Ransomware, Advanced Persistent Threats (APTs) and unknown

Your second chance to get a great impression with Sandstorm in Sophos Web Appliance Read More »

NSS, Sophos and CyberArk taking part in the upcoming 18th Infocom World 2016 conference

The biggest ICT & Media Conference in SE Europe, widely regarded as the major annual meeting of all the digital market stakeholders, as well as all those using specialized tools and services in order to implement Digital Transformation, is not far away. It is quite clear that time has come for the real economy to

NSS, Sophos and CyberArk taking part in the upcoming 18th Infocom World 2016 conference Read More »

SophosLabs: Exploring the popularity and applications of document exploit builder Ancalog

Document exploitation is a well-known method of distributing malware in the malware community. A common theory for why crooks use booby-trapped documents is that victims can be more easily convinced to open document attachments than executables. Word, Excel and PDF documents that contain so-called exploits – active booby-traps – have the added trick of not

SophosLabs: Exploring the popularity and applications of document exploit builder Ancalog Read More »

CyberArk: Why Privileged Account Security Must be a Top Priority

Make no mistake, your organization is a target – do you have an effective security program in place to detect and contain the damage of an attack? With nearly daily headlines about cyber attacks, it’s imperative that organizations understand the role privileged accounts play in the attack life cycle.  If privileged credentials are not properly

CyberArk: Why Privileged Account Security Must be a Top Priority Read More »

Sophos named a Leader in the Forrester Endpoint Wave 2016

Sophos  today announced it has been positioned as a ‘Leader’ in Forrester Research, Inc.’s new report, The Forrester Wave: Endpoint Security Suites, Q4 2016. Recognizing that Sophos received the highest scores in the Strategy category, Forrester refers to Sophos Endpoint Protection as delivering “the most enterprise-friendly SaaS endpoint security suite.” The report cites that “buyers

Sophos named a Leader in the Forrester Endpoint Wave 2016 Read More »

Sophos Web Appliance 4.3 with new Sandstorm features and more is available

We’re pleased to announce the latest release of Sophos Web Appliance 4.3, which adds improved Sophos Sandstorm capabilities and completely updates the underlying Sophos Web Appliance operating system to a new improved kernel. If you’re not familiar with Sophos Sandstorm, it gives your organization an extra layer of security to defend against fast-moving, targeted attacks,

Sophos Web Appliance 4.3 with new Sandstorm features and more is available Read More »

CyberArk: Your Security Systems Need to be Secure

According to a variety of industry reports, cyber security spending is measured in Billions of dollars, and it’s projected to grow – driven by a number of market factors including cloud, mobile, IoT and other “elements of digital business.” But as organizations move quickly to shore up their security systems, motivated attackers continue to innovate

CyberArk: Your Security Systems Need to be Secure Read More »