Introducing the Sophos SG Series – our fastest appliances ever!

We’re very proud to announce a new generation of network security appliances: the Sophos SG Series. Engineered on the very latest Intel technology, they’re built to provide optimal performance, versatility and efficiency to meet the growing security needs of organizations of diverse sizes. Read on for a message from Guenter Junk, General Manager and Senior Vice President, Network Security Group, introducing our fastest appliances ever.

Continue reading

The results are in: New SG Series appliances beat the competition

When it comes to security products performance really matters. At Sophos, we prioritize performance so that our products don’t get in the way of a user getting on with their work. Our products are both effective and fast — with no need to turn off features to maintain speed.

In our recent UTM 9.2 release we accelerated our Intrusion Prevention System (IPS) – to do so we made changes to the underlying engine and worked at making our IPS smarter with new optimized default rule sets. We’ve been getting great reports from customers and partners about the speed boost they’re seeing.

Continue reading

UTM Series appliances – Our best sellers ever!

utmacceleratedWith the recent launch of our SG Series appliances, you might be wondering about where our UTM Series appliances fit in. Of course, the Sophos UTM Series is our best-selling line-up of network security appliances of all time – and we aim to ensure that success continues.

UTM Series appliances will remain an important part of our hardware appliance portfolio and continue to enjoy all the great new features and enhancements that come with every software update.

Our UTM Series delivers unmatched value with a great balance of price, performance and protection.

Continue reading

How do APTs work? The Lifecycle of Advanced Persistent Threats (Infographic)

APT-DarthAdvanced Persistent Threats (or APTs) are a kind of malware that can go undetected for long periods of time, waiting for the opportunity to strike, and leaking out your data secretly. To help you understand how APTs work, we created an interesting infographic showing the lifecycle of an APT.

The APT lifecycle starts with an entry point on your computer network — perhaps by an infected USB device, a phishing email, or a drive-by download — before it calls home for instructions on what to do next.

Once the APT has its marching orders from the command and control (C&C) server, it begins to spread through your network, calling home with interesting data, and hiding itself from detection.

Continue reading