Dropbox usernames and passwords were leaked online this week. It’s the latest in a string of recent data breaches involving compromises of third-party websites that take advantage of password re-use to get at users’ accounts on multiple services.
In 2014 alone, millions have had their private information and passwords compromised, leading to what some are calling data breach “fatigue.”
Dropbox was quick to respond, denying a breach on their end while urging their users to enable tighter password security measures.
We’re pleased to announce the availability of Sophos iView, our new reporting appliance add-on for UTM. Sophos iView extends and enhances the Sophos UTM’s already outstanding on-box reporting, adding consolidated reporting across multiple UTMs, compliance reporting, and long-term log storage.
Back in the summer we ran a little survey on SpiceWorks and almost 400 Small and Medium Business IT managers gave us their view on the main challenges they have with their current firewall. But some of the results weren’t exactly what we were expecting.
The #1 rated issue was the lack of reporting options
35% of respondents said their firewall provides insufficient reporting and 22% also cited lack of visibility into infected machines which speaks to a lack of useful insight too. Users are hungry for bandwidth and regulatory compliance is becoming increasingly important so it’s not really surprising that IT managers crave a better view into what’s happening on their network.
What is surprising is that so few firewall vendors offer their users what they need. Compare the leading UTM/Firewall vendors and you’ll find just one who has over 1000 reports available built-into the appliance. I’ m sure you can guess who check here if you can’t! At Sophos we prioritize reporting and in addition to the on-box reports we also offer Sophos iView our dedicated virtual reporting appliance for those that simply need more reports or want to correlate reporting across multiple appliances.
Sophos was among the select companies that Forrester Research, Inc. invited to participate in its report, The Forrester Wave™: Enterprise Mobile Management, Q3 2014. In this evaluation, we were cited as a leader in enterprise mobile management (EMM).
Each of the vendor products evaluated, including our EMM product Sophos Mobile Control, has a large install base, more than $10 million in revenue in 2013, and significant enterprise interest.
Sophos Mobile Control (SMC) received the highest possible rating in the categories of Architecture and scale; Email and directory support; Employee experience; Support; Training; and Partners. Sophos earned the top ranking among all evaluated vendors in Employee experience.
Today we made available a new Up2Date package for Sophos UTM which will introduce a security fix for CVE-2014-6271 .
Please note, that to date we are not aware that the Sophos UTM is exposed to the described vulnerabilities and this release is a precautionary update.
Please read on to see the full details of this release.
On Thursday, October 23rd there will be casual social meetings in numerous cities around the world to discuss an issue that’s on a lot of people’s minds these days — privacy.
Anyone interested in privacy matters is welcome to come for the discussion, or simply to relax and get to know other people with practical or personal involvements in privacy issues.
These Privacy After Hours events are being organised by members of the International Association of Privacy Professionals (IAPP). There is typically no formal structure, just an evening with some new friends.
Last time we talked about how to set up your firewall. This week we’ll continue looking at some other things that happen in the background but that you can also control and benefit from.
When you set up the UTM for the first time you may have chosen not to enable DHCP, or Dynamic Host Configuration Protocol. You may have chosen not to enable it because you already have a DHCP server on your network or you just don’t know what it is.
In layman’s terms, a DHCP server manages the handing out of IP addresses to devices as they come and go on your network.