Earlier this week, Amazon Web Services announced the availability of the AWS Marketplace in Frankfurt, making it the ninth region to offer direct deployment of our popular Sophos UTM and other security products for AWS.
This is fantastic news as compliance with Germany’s stringent data residency and sovereignty regulations poses a material challenge that limits many global and European customers’ ability to realize the flexibility, scalability and economics offered by AWS and the security of Sophos.
The AWS Frankfurt region is fully compliant with all applicable EU Data Protection laws, so customers can now use Sophos security products and other software from the AWS Marketplace without data compliance concerns.
We are well into the 21st century, but it is astonishing how people can still believe that Linux-based operating systems are completely secure. Indeed, “Linux” and “security” are two words that you rarely see together.
Just as some people believe Macs are immune to viruses, some Linux users have the same misconception – and who can blame them? After all, vendors have been telling them that for years.
In 2012, after an exponential rise of OS X malware (such as MacDefender and Flashback), Apple decided to change its homepage by removing sentences like “It doesn’t get PC viruses.”
“Sophisticated simplicity” sounds like a bit of a paradox. How can something be sophisticated and simple? At Sophos, we bring simplicity to everything we do. It’s easy to use our innovative protection – that’s the sophisticated part – because our products are designed with you in mind.
Sophos is a snap to set up and manage, with just a few clicks. Let’s take a look at how easy it is to use the management console – in both our on-premise and cloud-managed solutions – to give you a better idea of what “sophisticated simplicity” means in action.
Always on the go, but need to stay connected? It might be tempting to log on to free open Wi-Fi networks at airports, cafes and other public hotspots. Don’t do it – those networks offer no protection against hackers looking to steal your identity.
Sophos security expert James Lyne drove home that point on the TODAY Show, as he demonstrated how easy it would be for a cybercriminal to intercept communications on open networks to steal passwords and bank account details.
Just like his previous research experiments in cities like London and San Francisco, James set up an open Wi-Fi hotspot in New York City to see how many people would connect to his network. The results might surprise you.
Macs are gaining ground on PCs everywhere, including at the office. Companies are adopting programs that allow users to bring their own devices, or choose the corporate-owned devices they prefer.
When given the choice, many employees are going with what they have at home, and picking Macs over Windows computers. With more Macs, that means extra challenges for IT, from troubleshooting to security.
You’ve heard of the seven deadly sins. We think the 7 Deadly IT Sins are pretty bad too – and neglecting security on Macs is a sin we call “Mac malice.”
Our customers rely on us for innovative protection against today’s evolving threats. And with Sophos, there’s no need to compromise on performance.
We know performance matters. Users want their security to operate quietly in the background so they can focus on their jobs, without lagging performance due to software updates and virus scans.
Sophos Endpoint Protection is lightning fast, runs well on older systems, and updates quickly with low system impact. You don’t have to believe us – independent tests prove it, and our customers back it up.
The security of mobile devices and the Internet of Things is surprisingly lax, especially compared to traditional desktops. James Lyne, global head of security research at Sophos, proved just how insecure these devices really are, in a presentation at the Mobile World Congress in Barcelona.
In his live demonstration, James demonstrated tricks that a modestly talented cybercriminal could use to compromise mobile devices and Internet-connected closed-circuit cameras (CCTV).
In our video below, you can watch James hack into an Android tablet over Wi-Fi to record video and audio, and see how insecure CCTV cameras that use weak or no passwords can be breached from the other side of the world.