Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant
Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner…
The 5 W’s of Data Identification and Inventory
Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key…
CyberArk. WannaBe Ready for the Next WannaCry?
We recently passed the one year anniversary NotPetya – one of the most…
Sophos placed as a leader in the latest Forrester Endpoint Wave
Sophos has been named a “leader” in the Forrester Wave: Endpoint…
Boldon James: "Out-of-the-box" Data Classification
Driving data security awareness to transform security culture Data…
CyberArk launches new Privileged Access Security as a Service offering
CyberArk, the global leader in privileged access security, today announced the…
Get the most from your XG Firewall
The new XG Firewall support page and XG Firewall how-to library are packed…
Email security just got much smarter
The predictive power of artificial intelligence is coming to your inbox. The…
XG Firewall v17.1. Shine a light on the shadows in your IT security
XG Firewall v17.1 has arrived, and with it comes visibility to the dark…
Maximize your investments in Identity Governance and Privileged Access Security
Privileged access security is too often implemented independently from an…
Cybercriminals are after your servers too!
Your servers hold your most critical data, your business applications and your…
Sophos ranks #1 in exploit protection!
Exploits are the techniques that attackers use to gain access and control of…
Think Twice Before You Click to Save Credentials in a Web Browser
It’s increasingly common: attackers target credentials stored within web…
Sophos. Stop rolling your eyes at machine learning
When I speak about machine learning I know I run the risk of having half the…
GDPR is here – how Sophos protects your data
With the implementation of the EU General Data Protection Regulation (GDPR)…
GDPR: protect yourself from data theft
Organizations everywhere are preparing for the enforcement of the EU’s…
Small is beautiful: meet our new Sophos desktop firewall and UTM appliances
We recently launched the new generation of our award-winning XG and SG Series…
8 more reasons to try Sophos
At Sophos we try hard to keep our customers secure, safe and satisfied with…
The endpoint attack chain… simplified
A comprehensive, defense in depth strategy using layers of overlapping…
Your network firewall’s dirty secrets
"There are some things your firewall would rather you didn’t know". In…
Switching from SonicWall to Sophos just got even easier
If you’re planning a migration from SonicWall to XG Firewall, or at…
Data Breaches Are Real – Don’t Be Left Unprotected
2018 – The year of the GDPR, and still, data breaches are occurring at…
GDPR Is Here: Resources for Your Compliance Journey
After all the build-up, the GDPR deadline is officially here. From the…
Sophos Mobile 8.1: Now with Office 365 management
We are pleased to announce that Sophos Mobile 8.1 is now available. This new…
Synchronized App Control: making XG Firewall even more powerful
The apps on your network are eating up your bandwidth, and their unpatched…
8th Infocom Security Conference: NSS, Boldon James, CyberArk and Sophos will show you the future of cybersecurity
NSS, along with Boldon James, CyberArk and Sophos will show you the future of…
CyberArk and AWS: Comprehensive Enterprise-Class Security Solutions for AWS Native, Hybrid and Multi-Cloud
Organizations of all sizes continue to adopt and accelerate their move to the…
Boldon James. Why One Size Does Not Fit All
These days we strive for simplicity, we look for the easiest, simplest, and at…
Ransomware isn’t going away and it’s not slowing down
Ransomware may still be wreaking havoc, but we’ve got everything you…