Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment
Defence organisations encompass two very different communication environments.…
Sophos Mobile gets in sync with Google Cloud Identity
Onboarding new devices to management policy controls includes the important…
The best just got better. Intercept X now with EDR
We are very excited to announce the launch of Sophos Intercept X Advanced with…
Boldon James: Data breach reports see 75% increase in last two years
Data breaches are up 75% in two years, finds a report from the Information…
Sophos recognized for anti-ransomware success at Channelnomics Awards
We are thrilled to announced that we’ve won the award for Best Anti-Ransomware…
Sophos is named a Leader in the Gartner UTM Magic Quadrant
We’re very pleased to announce that for the 7th consecutive year, Gartner…
Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part II)
Vulnerability Assessment Builds Security Continuous Improvement Into your…
2018 NSS Labs NGFW retest results for XG Firewall
Sophos is committed to providing you with the best protection, performance and…
Sophos Mobile: Day zero support for iOS 12
Apple’s iOS 12 is being released to the public today, and the great news is…
The art of unboxing: Sophos APX Series access points
We’ve watched plenty of software demos over the years, be they with or without…
Sophos Email: Delivering on security and visibility
The latest enhancements for Sophos Email Standard and Advanced customers…
Netsparker. Vulnerability Assessments and Penetration Tests – What's the Difference? (Part I)
Confusion between the terms 'penetration testing' and 'vulnerability…
Sophos Security Heartbeat. Look who’s talking now: Your Wi-Fi, endpoints, mobiles…
With the introduction of Sophos Wireless v2.0 and the new APX Series Access…
Logpoint. Why anti-virus alone can’t stop cryptocurrency mining
Cryptocurrencies like Bitcoin have been a source of worry since their creation.…
Sophos XG Architect Training (October 29-31, 2018)
This three-day training program was designed and intended for experienced…
Sophos gets top marks in CRN’s 2018 Annual Report Card
At Sophos, we believe in being “channel best,” which is why we’re proud to…
Take a tour of Sophos Central’s Endpoint and Intercept X Protection
There are numerous things you can do with Sophos Central, our cloud-based…
CyberArk Launches SAP-certified Privileged Access Security Solution
CyberArk, the global leader in privileged access security, today announced the…
Phish Threat’s security awareness training gets animated
Real-life cyber threat headlines, Hollywood scripts and great animations come…
Privileged Access Security for Dummies: A Practical, "How-To" Guide from CyberArk
Savvy security practitioners understand that one of the most important,…
How to make the most of your Sophos Endpoint
Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as…
Sophos ranks #1 for endpoint protection by SE Labs
Sophos Intercept X Advanced was the top-ranked solution for both enterprise…
Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant
Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner…
The 5 W’s of Data Identification and Inventory
Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key…
CyberArk. WannaBe Ready for the Next WannaCry?
We recently passed the one year anniversary NotPetya – one of the most…
Sophos placed as a leader in the latest Forrester Endpoint Wave
Sophos has been named a “leader” in the Forrester Wave: Endpoint…
Boldon James: "Out-of-the-box" Data Classification
Driving data security awareness to transform security culture Data…
CyberArk launches new Privileged Access Security as a Service offering
CyberArk, the global leader in privileged access security, today announced the…
Get the most from your XG Firewall
The new XG Firewall support page and XG Firewall how-to library are packed…