Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner…


The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key…


CyberArk. WannaBe Ready for the Next WannaCry?

We recently passed the one year anniversary NotPetya – one of the most…


Sophos placed as a leader in the latest Forrester Endpoint Wave

Sophos has been named a “leader” in the Forrester Wave: Endpoint…


Boldon James: "Out-of-the-box" Data Classification

Driving data security awareness to transform security culture Data…


CyberArk launches new Privileged Access Security as a Service offering

CyberArk, the global leader in privileged access security, today announced the…


Get the most from your XG Firewall

The new XG Firewall support page and XG Firewall how-to library are packed…


Email security just got much smarter

The predictive power of artificial intelligence is coming to your inbox. The…


XG Firewall v17.1. Shine a light on the shadows in your IT security

XG Firewall v17.1 has arrived, and with it comes visibility to the dark…


You will lose data…

You will lose data, if you haven’t already. That impact of that data loss…


Maximize your investments in Identity Governance and Privileged Access Security

Privileged access security is too often implemented independently from an…


Cybercriminals are after your servers too!

Your servers hold your most critical data, your business applications and your…


Sophos ranks #1 in exploit protection!

Exploits are the techniques that attackers use to gain access and control of…


Think Twice Before You Click to Save Credentials in a Web Browser

It’s increasingly common: attackers target credentials stored within web…


Sophos. Stop rolling your eyes at machine learning

When I speak about machine learning I know I run the risk of having half the…


GDPR is here – how Sophos protects your data

With the implementation of the EU General Data Protection Regulation (GDPR)…


GDPR: protect yourself from data theft

Organizations everywhere are preparing for the enforcement of the EU’s…


Small is beautiful: meet our new Sophos desktop firewall and UTM appliances

We recently launched the new generation of our award-winning XG and SG Series…


8 more reasons to try Sophos

At Sophos we try hard to keep our customers secure, safe and satisfied with…


The endpoint attack chain… simplified

A comprehensive, defense in depth strategy using layers of overlapping…


Your network firewall’s dirty secrets

"There are some things your firewall would rather you didn’t know". In…


Switching from SonicWall to Sophos just got even easier

If you’re planning a migration from SonicWall to XG Firewall, or at…


Data Breaches Are Real – Don’t Be Left Unprotected

2018 – The year of the GDPR, and still, data breaches are occurring at…


GDPR Is Here: Resources for Your Compliance Journey

After all the build-up, the GDPR deadline is officially here. From the…


Sophos Mobile 8.1: Now with Office 365 management

We are pleased to announce that Sophos Mobile 8.1 is now available. This new…


Synchronized App Control: making XG Firewall even more powerful

The apps on your network are eating up your bandwidth, and their unpatched…


CyberArk and AWS: Comprehensive Enterprise-Class Security Solutions for AWS Native, Hybrid and Multi-Cloud

Organizations of all sizes continue to adopt and accelerate their move to the…


Boldon James. Why One Size Does Not Fit All

These days we strive for simplicity, we look for the easiest, simplest, and at…


Ransomware isn’t going away and it’s not slowing down

Ransomware may still be wreaking havoc, but we’ve got everything you…