PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Building a BYOD Policy? Use SSL VPN as a Strong Foundation

According to ComputerWeekly’s 2015 IT Priorities Report, 46% of IT managers worldwide plan to implement a Bring Your Own Device (BYOD) initiative in 2015, and 30% plan to deploy mobile apps. If you’re responsible for building your organization’s BYOD policy, there are hundreds, if not thousands, of articles and guides available on the topic –

Building a BYOD Policy? Use SSL VPN as a Strong Foundation Read More »

Are you protecting your Macs? See how to avoid “Mac malice” and other IT sins

Macs are gaining ground on PCs everywhere, including at the office. Companies are adopting programs that allow users to bring their own devices, or choose the corporate-owned devices they prefer. When given the choice, many employees are going with what they have at home, and picking Macs over Windows computers. With more Macs, that means

Are you protecting your Macs? See how to avoid “Mac malice” and other IT sins Read More »

Why choose Sophos Endpoint Protection? Lightning performance that won’t slow users down

Our customers rely on us for innovative protection against today’s evolving threats. And with Sophos, there’s no need to compromise on performance. We know performance matters. Users want their security to operate quietly in the background so they can focus on their jobs, without lagging performance due to software updates and virus scans. Sophos Endpoint Protection

Why choose Sophos Endpoint Protection? Lightning performance that won’t slow users down Read More »

Corero Network Security Strengthens its DDoS Defense Technology to Address Rapidly Evolving Threat Landscape

Corero Network Security, a leading provider of First Line of Defense security solutions against DDoS attacks, today announced enhancements to its SmartWall Threat Defense (TDS) System, now delivering adaptive, analytics-driven DDoS protection for superior network intelligence and infrastructure availability. By algorithmically detecting and defeating emerging DDoS attack vectors, Corero is providing network and security teams

Corero Network Security Strengthens its DDoS Defense Technology to Address Rapidly Evolving Threat Landscape Read More »

Sophos at Mobile World Congress: Hacking mobile devices and the Internet of Things

The security of mobile devices and the Internet of Things is surprisingly lax, especially compared to traditional desktops. James Lyne, global head of security research at Sophos, proved just how insecure these devices really are, in a presentation at the Mobile World Congress in Barcelona. In his live demonstration, James demonstrated tricks that a modestly

Sophos at Mobile World Congress: Hacking mobile devices and the Internet of Things Read More »

Why choose Sophos Endpoint Protection? Our innovative technology and threat intelligence

Today’s endpoint protection needs to do much more than blocking known malware. Your endpoint solution needs to be intelligent enough to prevent attacks based on suspicious behaviors, and it should be able to detect and clean up infections when they do happen. Sophos Endpoint Protection integrates a range of innovative technologies to secure your Windows, Mac

Why choose Sophos Endpoint Protection? Our innovative technology and threat intelligence Read More »

Anatomy of a ransomware attack: CryptoLocker, CryptoWall, and how to stay safe

Ransomware, it’s everywhere. We had hoped that the notorious file-encrypting ransomware called CryptoLocker was defeated after law enforcement knocked out its infrastructure last year, but CryptoLocker and its close cousin CryptoWall have come back stronger than ever. Ransomware is malware that prevents you from using your files or your computer, and then extorts money from you

Anatomy of a ransomware attack: CryptoLocker, CryptoWall, and how to stay safe Read More »