This year we rose to 40th on the list – more than 15 spots up from last year – beating out many household brands! Plus, we were ranked number 5 in the IT Development and Consulting sector of the survey. We’re really grateful for the recognition and excited to see the impact we are making for our interns and graduate employees.
Today, I’d like to share a short Networking video that shows you how to configure an IPsec VPN on an iPhone on the XG Firewall side and on the iPhone side.
We begin within the XG Firewall Network Security Control Center. From the left navigation menu, select System, VPN and then Cisco VPN Client.
If you think your antivirus alone is enough to stay safe from today’s advanced malware threats, you might want to get a second opinion.
Today’s malware is difficult to detect, difficult to remove and difficult to recover from. We estimate that less than 10% of all the new samples analyzed by SophosLabs is previously known malware. You wouldn’t want to gamble with those odds, and you surely don’t want to gamble with your endpoint security.
Sophos Next-Generation Endpoint Security uses signature-less threat detection and response capabilities to better protect you against zero-day attacks, advanced threats and crypto-ransomware that can evade traditional, signature-based endpoint products.
Now we’ve added another tool to our arsenal. We’re calling it Sophos Clean, the next generation of malware detection and removal tools.
IP EXPO Manchester, part of Europe’s number one Enterprise IT event series, is taking place this 18-19 May. And with over 4,000 visitors, hundreds of free educational seminars and 100+ exhibitors, IP EXPO Manchester is an event IT pros won’t want to miss.
IP EXPO takes place at the Manchester Central Convention Complex, where our experts will be sharing their knowledge in the Cyber Security Zone at stand N320. Register before 7 pm BST on 17 May, and you can get a free pass. As an added bonus, every 50th person to register through our registration page will also win a Sophos goody bag.
Today I’m pleased to tell you about Sophos MSP Connect, a flexible program designed to connect managed service providers (MSPs) and their customers to one complete security solution – centralized and simplified through one vendor, with one dashboard and one monthly bill.
Sophos MSP Connect leverages Sophos Central, the easy-to-use, cloud-based dashboard. If you haven’t seen the new Sophos Central – Partner dashboard, it’s an intuitive, single pane of glass for managing everything Sophos has to offer, from XG Firewall to Next-Generation Enduser Protection.
The main dashboard surfaces all the alerts for your managed customers, where you can quickly drill down for more detailed reports and quickly respond to incidents.
SophosLabs Principal Malware Researcher Gabor Szappanos has closely studied Microsoft Office exploits for the past few years. We’ve previously covered his investigation of the Microsoft Word Intruder exploit creation kit, and his recent paper exploring the most popular Office exploit kits.
In a new research report, Gabor takes a closer look at the top four Office exploit kits used in the last quarter of 2015. He also reports which exploits were most commonly used in malicious documents, and shows us what families of malware were distributed by the studied samples.
As Gabor explains, malware authors are increasingly attracted to document exploits as the initial entry point for their attacks. The attackers spread their booby-trapped Office documents through phishing emails spammed out to large numbers of random recipients (cybercrime groups), or to a more select list of targets (APT groups).
Notably, the majority of Office exploits malware authors have been using in malicious documents are now several years old. The most popular exploit, CVE-2012-0158, has been around for well over three years now.
Miercom, a leading, independent test center, recently conducted a comparative test of UTM/Next-Gen Firewall appliances from leading network security vendors including Sophos, Fortinet, Check Point, Dell SonicWALL and WatchGuard.
Miercom ran an extensive set of tests, including raw firewall throughput at a variety of real-world packet sizes. We were pleased with the results, as our XG 135w outperformed similar competing models in all tests by a significant margin. (See comparison chart below)