Tags » Enduser

Got malware? Get Sophos Clean

If you think your antivirus alone is enough to stay safe from today’s advanced malware threats, you might want to get a second opinion.

Today’s malware is difficult to detect, difficult to remove and difficult to recover from. 383 more words


5 things to consider when choosing a sandbox solution

Many organizations are considering next-generation solutions to deal with the unknown threats cybercriminals use to evade traditional defenses. One technology that’s had a fair share of hype is the sandbox. 365 more words


EU Parliament passes the General Data Protection Regulation - why it's a good thing

After four years of preparation to overhaul the European Union’s data protection rules, the members of the EU Parliament gave final approval yesterday to the… 294 more words


What is a sandbox? And why do I need one to defend against advanced threats?

IT teams in organizations of all sizes understand that sophisticated cyberattacks can use unknown malware to evade traditional gateway and endpoint protection.

These advanced persistent threats, or APTs, use custom-developed targeted attacks to gain access to a network and remain undetected for long periods of time. 584 more words


Sophos named a Top Player in Radicati's Enterprise Mobility Management Market Quadrant

The Radicati Group has just released its Enterprise Mobility Management – Market Quadrant 2016 report, and we’re proud that Sophos has earned a place in the Top Players quadrant, demonstrating our leadership in the industry. 329 more words


Getting started with enterprise mobility management

Mobile devices are essential for the modern information worker. According to Forrsights Workforce Employee Survey, 74% of information workers use two or more devices for work, including desktops, laptops, smartphones and tablets. 251 more words


Bringing endpoint and firewall together is an idea so simple it's revolutionary

As the information security industry matures, we’re beginning to come to terms with the reality that there is no such thing as perfect prevention. Conventional wisdom in information assurance tells us to assemble best-of-breed network and endpoint components into arrays of controls that will provide some reasonable measure of defense in depth.  998 more words