PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos Intercept X Advanced with EDR is now available

The product behind the most successful Early Access Program (EAP) in Sophos history, Intercept X Advanced with EDR, is now generally available to all. In September we first made our new endpoint detection and response (EDR) capabilities available and the response has been overwhelming. In just two months we have had close to 1,000 customers […]

Sophos Intercept X Advanced with EDR is now available Read More »

For a second consecutive year, Sophos has been named a CRN Tech Innovator for Intercept X with deep learning

For a second consecutive year, Sophos has been named a CRN Tech Innovator for Intercept X with deep learning. The Channel Company’s annual CRN Tech Innovator Awards honor standout hardware, software, and services that are moving the IT industry forward. The editors at CRN evaluated 300 products across 34 technology categories using criteria including technological

For a second consecutive year, Sophos has been named a CRN Tech Innovator for Intercept X with deep learning Read More »

Sophos named among vendors with most comprehensive solutions in Gartner market guide

Sophos has already been recognized by Gartner as a leader in seven consecutive Magic Quadrants for Mobile Data protection (2009-2015). And now we’re proud to announce that we’ve been named one of the vendors with the most comprehensive solutions in Gartner’s 2018 Market Guide for Information-Centric Endpoint and Mobile Protection for the third year in

Sophos named among vendors with most comprehensive solutions in Gartner market guide Read More »

Sophos. On cybersecurity product testing

The testing of cybersecurity products is a contentious subject, with vendors and test organizations striving to deliver an objective evaluation despite very different ideas of what that looks like. The threat landscape is constantly evolving, and this makes evaluating a single product’s effectiveness at a single point in time problematic. Yet however imperfect and difficult

Sophos. On cybersecurity product testing Read More »

Boldon James. In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different regions and industries. It summarizes the experiences and plans the organizations have in regard to addressing

Boldon James. In Terms Of Main Threat Actors, Expectation Rarely Matches Reality Read More »

Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment

Defence organisations encompass two very different communication environments. Military messaging takes place within live operational environments, and might involve messages passing between different operations and forces, for example, over closed systems and networks. This type of communication must follow strict security procedures and protocols, and conform to stringent standards, as must the classification of the

Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment Read More »