Email security just got much smarter
The predictive power of artificial intelligence is coming to your inbox. The…
XG Firewall v17.1. Shine a light on the shadows in your IT security
XG Firewall v17.1 has arrived, and with it comes visibility to the dark…
Maximize your investments in Identity Governance and Privileged Access Security
Privileged access security is too often implemented independently from an…
Cybercriminals are after your servers too!
Your servers hold your most critical data, your business applications and your…
Sophos ranks #1 in exploit protection!
Exploits are the techniques that attackers use to gain access and control of…
Think Twice Before You Click to Save Credentials in a Web Browser
It’s increasingly common: attackers target credentials stored within web…
Sophos. Stop rolling your eyes at machine learning
When I speak about machine learning I know I run the risk of having half the…
GDPR is here – how Sophos protects your data
With the implementation of the EU General Data Protection Regulation (GDPR)…
GDPR: protect yourself from data theft
Organizations everywhere are preparing for the enforcement of the EU’s…
Small is beautiful: meet our new Sophos desktop firewall and UTM appliances
We recently launched the new generation of our award-winning XG and SG Series…
8 more reasons to try Sophos
At Sophos we try hard to keep our customers secure, safe and satisfied with…
The endpoint attack chain… simplified
A comprehensive, defense in depth strategy using layers of overlapping…
Your network firewall’s dirty secrets
"There are some things your firewall would rather you didn’t know". In…
Switching from SonicWall to Sophos just got even easier
If you’re planning a migration from SonicWall to XG Firewall, or at…
Data Breaches Are Real – Don’t Be Left Unprotected
2018 – The year of the GDPR, and still, data breaches are occurring at…
GDPR Is Here: Resources for Your Compliance Journey
After all the build-up, the GDPR deadline is officially here. From the…
Sophos Mobile 8.1: Now with Office 365 management
We are pleased to announce that Sophos Mobile 8.1 is now available. This new…
Synchronized App Control: making XG Firewall even more powerful
The apps on your network are eating up your bandwidth, and their unpatched…
8th Infocom Security Conference: NSS, Boldon James, CyberArk and Sophos will show you the future of cybersecurity
NSS, along with Boldon James, CyberArk and Sophos will show you the future of…
CyberArk and AWS: Comprehensive Enterprise-Class Security Solutions for AWS Native, Hybrid and Multi-Cloud
Organizations of all sizes continue to adopt and accelerate their move to the…
Boldon James. Why One Size Does Not Fit All
These days we strive for simplicity, we look for the easiest, simplest, and at…
Ransomware isn’t going away and it’s not slowing down
Ransomware may still be wreaking havoc, but we’ve got everything you…
CyberArk. Bridging the Gap to Third Party Devices, Applications and Operating Systems
The overall strength of a privileged account security solution can be measured…
Boldon James. The people problem - security’s biggest blind spot
How organisations can turn their biggest security threat — people…
Proper Disaster Recovery Planning 2018
The backup and disaster recovery industry has seen plenty of changes over the…
What’s new in Intercept X?
Intercept X has taken the security world by storm. And it just keeps getting…
Sophos scores with Innovation in Technology award
We continue to be recognized for our groundbreaking, next-gen technology,…
CyberArk acquires Vaultive to advance privileged account security for the cloud
CyberArk, the global leader in privileged account security, announced…
Intercept X: exploring deep learning
Deep learning is a powerful, groundbreaking tool for keeping unknown threats…