Tags » Enduser

5 things to consider when choosing a sandbox solution

Many organizations are considering next-generation solutions to deal with the unknown threats cybercriminals use to evade traditional defenses. One technology that’s had a fair share of hype is the sandbox. 365 more words

Network

EU Parliament passes the General Data Protection Regulation - why it's a good thing

After four years of preparation to overhaul the European Union’s data protection rules, the members of the EU Parliament gave final approval yesterday to the… 294 more words

Corporate

What is a sandbox? And why do I need one to defend against advanced threats?

IT teams in organizations of all sizes understand that sophisticated cyberattacks can use unknown malware to evade traditional gateway and endpoint protection.

These advanced persistent threats, or APTs, use custom-developed targeted attacks to gain access to a network and remain undetected for long periods of time. 584 more words

Network

Sophos named a Top Player in Radicati's Enterprise Mobility Management Market Quadrant

The Radicati Group has just released its Enterprise Mobility Management – Market Quadrant 2016 report, and we’re proud that Sophos has earned a place in the Top Players quadrant, demonstrating our leadership in the industry. 329 more words

Corporate

Getting started with enterprise mobility management

Mobile devices are essential for the modern information worker. According to Forrsights Workforce Employee Survey, 74% of information workers use two or more devices for work, including desktops, laptops, smartphones and tablets. 251 more words

Corporate

Bringing endpoint and firewall together is an idea so simple it's revolutionary

As the information security industry matures, we’re beginning to come to terms with the reality that there is no such thing as perfect prevention. Conventional wisdom in information assurance tells us to assemble best-of-breed network and endpoint components into arrays of controls that will provide some reasonable measure of defense in depth.  998 more words

Network

Sophos and Gartner explain: why synchronized security is the next leap forward

Attackers today are increasingly sophisticated, using multiple techniques and points of entry to bypass defenses and evade detection. In response, most vendors design their products to wrap endpoints and users in layers of security. 271 more words

Network