Today is the day we announce UTM Accelerated (9.2) to the world. If you’ve been following our blog series over the past couple of weeks, you’ll already know about many of the excellent new features we’re introducing. However, you may still be asking yourself why we’re calling this version of our UTM “accelerated” and how you can get hold of this great new software. Read on.
This release is all about shifting up a gear to more quickly recognize a broader range of threats and rapidly alert administrators to allow them to isolate infected systems. It’s about accelerating scanning speeds – in particular for IPS – to ensure the optimal use of resources in every deployment scenario and the best possible performance. And it’s about streamlining administration processes to provide simple yet more effective security.
This blog post continues our series introducing the great features you can look forward to in the upcoming UTM Accelerated (9.2) release. I’ll explain how we’re making the web application firewall safer, all in the name of keeping your web services safe from hackers.
A web application firewall (WAF) is a critical defense against the ballooning problem of web-based malware. Hackers are taking over legitimate websites and services at an unprecedented pace to host botnets or distribute malware. Where do you think they find all these websites and services that are ripe for exploitation? I hate to say this, but it’s not always “the other guy’s company” that gets hacked.
This blog post in our series on UTM 9.2 covers a much discussed topic in the network security world: performance. It’s one of those things that customers either don’t care about at all, or it’s at the top of their list of buying criteria. Unfortunately, it’s also an area where there are many misconceptions. So does performance really matter? And if yes, why?
To answer the first question; yes, performance matters. But some throughput numbers matter more than others, and if taken out of context, they matter much less. You need to look at your individual environment to fully understand your requirements.
This blog post continues our series introducing the great features you can look forward to in the upcoming UTM Accelerated (9.2) release. I’ll explain how we’re making two-factor authentication in Sophos UTM safer and … well, yes, simpler.
Two-factor authentication (2FA) may be nothing new. In fact, if you bank online, you may have been using it for years. Recent data breaches have shown that if more businesses used two-factor authentication, they could probably have saved themselves a lot of pain and money. We’re making 2FA easy to implement across your organization.
A new Up2Date is available for Sophos UTM fixing a kernel memory leak in the memory allocation process of the TCP stack.
Web protection on the UTM plays a major role in protecting our customers and their users. In the last blog post I discussed changes to user authentication. In this post I’m going to talk about how we’ve made policy authoring easier, and how we’re addressing the increasing use of HTTPS.
Sophos UTM has always had a pretty comprehensive set of policy features, and has offered a great deal of flexibility when it comes to applying those policies. Power users of the UTM really appreciate this, but our new customers sometimes found it hard to find their way around. We all felt the learning curve was too steep.
Web protection is one of the most widely used features on the Sophos UTM, and no wonder. The importance of dealing properly with web threats is one reason, but there are others.
We’ve made a number of changes in UTM Accelerated (9.2) to strengthen, simplify and accelerate web protection. I’ll be talking about a few of them in this blog series. Two of the most important ones are transparent single sign-on and device-specific authentication.
This was a really big week for Sophos, with so much positive media coverage of our acquisition of leading UTM company Cyberoam Technologies, and the launch of the latest and greatest version of our encryption solution SafeGuard Enterprise.
Our experts from SophosLabs and Naked Security also made headlines this week with head-of-the-pack security research, particularly our discovery of malware-carrying versions of the insanely popular Flappy Bird game. Here are some of the highlights from media coverage of Sophos this week.
Did you know that Sophos provides a number of admin training webinars? You’ve invested in Sophos to protect your environment – why not make sure that you are getting the very most out of that investment by ensuring that you and your team are properly trained to leverage every last bit of the powerful technology that lies within?
Our live instructor-led webinars are a cost effective means to brush up on your existing Sophos skills, get updated training on newly released versions, or bring newcomers to your IT organization up to speed quickly.
The release of Sophos UTM Accelerated (9.2) is just around the corner. In a blog series over the next couple of weeks, we’ll introduce you to some of the highlights you can look forward to in the upcoming release, and show you how we’ve waved the magic Sophos “simple wand” to give you faster, smarter, more effective security – at no extra cost.
With regular data breaches reported in the media, you’ve probably asked yourself if you’re doing enough to protect your sensitive data. For many companies, the biggest barrier to introducing any kind of encryption technologies is the effect they can have on performance and the infrastructure needed to manage encryption keys.