With the release of Sophos Cloud Server Protection, we’re expanding Sophos Cloud to protect desktops, laptops, mobile phones, tablets – and now servers – with the most effective and simple-to-manage business security offering available.
If compromising desktops is like stealing a wallet, then hacking a server is like robbing a bank. Servers store large amounts of sensitive information and have become popular targets for cybercriminals.
Today’s businesses need the most up-to-date protection, and Sophos Cloud Server Protection gives overtaxed IT personnel an innovative, high performance and simple-to-manage solution for securing server environments.
We’re proud to announce that Sophos SafeGuard Enterprise has been awarded the 2014 TechTarget Readers’ Choice Award for the best encryption solution.
TechTarget invited readers to complete an online survey to identify the top security tools from a list of more than 400 products for their ninth annual Readers’ Choice Awards.
More than 1,700 IT security professionals cast votes in one or more of this year’s 22 categories and told TechTarget which products they can’t live without.
Sophos today announced new capabilities in our mobile products to help businesses manage and secure Android devices.
Unsecured Androids are a major source of data insecurity for the increasingly mobile workforce, with a mix of corporate-owned and employee-owned devices. According to SophosLabs, Android is the fastest growing attack surface with an 1,800% increase in Android malware over the past two years.
To keep your business data safe, your Androids need better protection, and that’s where Sophos steps in.
If you want to help stop cybercrime and protect yourself from malware threats at the same time, today is a perfect day to do it: Kill a Zombie Day.*
We’re not talking about the kind of zombie you see in cult movies like Dawn of the Dead. No, these zombies are malicious programs that take control of your computer and turn it into an undead walker in the army of a cybercriminal.
The first step in killing a zombie is finding out if your computer is infected with malware or viruses. You can do that by downloading our free Virus Removal Tool and running it.
The tool will automatically grab the latest virus detection identities from Sophos and scan your computer’s memory and hard disk for malware. If you do find any zombies, the Virus Removal Tool will clean them up for you, too.
Dropbox usernames and passwords were leaked online this week. It’s the latest in a string of recent data breaches involving compromises of third-party websites that take advantage of password re-use to get at users’ accounts on multiple services.
In 2014 alone, millions have had their private information and passwords compromised, leading to what some are calling data breach “fatigue.”
Dropbox was quick to respond, denying a breach on their end while urging their users to enable tighter password security measures.
Sophos was among the select companies that Forrester Research, Inc. invited to participate in its report, The Forrester Wave™: Enterprise Mobile Management, Q3 2014. In this evaluation, we were cited as a leader in enterprise mobile management (EMM).
Each of the vendor products evaluated, including our EMM product Sophos Mobile Control, has a large install base, more than $10 million in revenue in 2013, and significant enterprise interest.
Sophos Mobile Control (SMC) received the highest possible rating in the categories of Architecture and scale; Email and directory support; Employee experience; Support; Training; and Partners. Sophos earned the top ranking among all evaluated vendors in Employee experience.
Shellshock, a serious vulnerability affecting Linux, UNIX and OS X computers, is making life difficult for IT admins, as vendors rush out patches to stay ahead of the cybercriminals trying to exploit this bug.
Like the Heartbleed bug in OpenSSL, Shellshock has a nasty-sounding name, far-reaching impact, and major consequences for security. Yet Shellshock is worse than Heartbleed in one important way – it could allow an attacker to take complete control of vulnerable machines.
If you’re looking for a little tutorial on Shellshock, we’ve created a simple infographic to explain the bug, how an attacker might exploit it, and what you can do to stay safe.