IT security in an era of falling budgets – how is the public sector coping?

public-sector-150In the UK, local government and police IT budgets are under immense pressure due to ongoing cuts – even in the face of rapidly emerging security threats.

To learn more about the unique challenges of public sector organisations, we commissioned an independent survey of 2,728 public sector employees in the UK to discover their views regarding IT security.

Their responses paint an interesting picture of how organisations are seeking to protect their systems and data in the face of diminishing budgets and a more mobile, connected workforce.

Continue reading

Crowdsourcing threat intelligence with download reputation

SophosLabsLast week, we mentioned that application control is now available as part of a Sophos Cloud public beta. The beta also introduces a new next-generation endpoint protection feature called download reputation.

While it may not sound flashy, download reputation is an important step forward in protecting users from advanced threats, like zero-day malware designed to evade traditional antivirus defenses.

Download reputation crowdsources threat intelligence by drawing on the experience of our global customer base to help determine a file’s reputation. In other words, every user with download reputation enabled helps contribute to the collective security of our customers.

Let’s take a look at how download reputation works.

Continue reading

Stamp out snowshoe spam with Delay Queue in Sophos Email Appliance 3.9

Delay QueueWe’re pleased to announce version 3.9 of the Sophos Email Appliance (SEA). This update features Sophos Delay Queue technology – a sophisticated enhancement that increases spam detection by as much as 4% and blocks snowshoe spam.

Snowshoe spam is a type of unsolicited bulk email that spreads the load of a campaign over a large number IP addresses and domains in short busts, much like how snowshoes distribute your weight as you walk on snow.

Snowshoe spam campaigns only run for a few minutes at a time. This technique has proved to be a challenge for traditional anti-spam approaches of content analysis and IP reputation-based systems.

Continue reading

You asked for application control in Sophos Cloud – try it now in beta

Application control is one of the most popular features of our on-premise Endpoint Protection product – so popular, in fact, that we are frequently asked when it will be available in Sophos Cloud.

Well, we’re happy to say that we’ve launched a public beta of application control for Sophos Cloud.

Application control allows IT admins to monitor and optionally block users running specific applications on their Windows computers. For example, if your business is standardized on Internet Explorer 11, you can prevent users from running Chrome, Firefox and older versions of Internet Explorer.

Continue reading

Why we think Sophos is a Magic Quadrant Visionary in enterprise mobility management

We’re honored to be recognized for the second year in a row as a Visionary in the Gartner Magic Quadrant for Enterprise Mobility Management Suites (EMM).* As one of just 12 vendors in this year’s Magic Quadrant, we think that says a lot about our understanding of the rapidly evolving mobility landscape.

Businesses of all sizes need an innovative mobile solution like Sophos Mobile Control (SMC) that keeps up with the rapid adoption of new devices and applications, and helps businesses protect their corporate data while empowering employees. This is what makes Sophos attractive to small and mid-sized enterprises – and has resulted in a 50% increase in SMC installations in the past year.

We believe we’re a Magic Quadrant Visionary for these five simple reasons:

Continue reading

We just won Vendor of the Year for Enterprise Mobility Management

ict-champion-awards-150People are really starting to pay attention to the great things we’re doing in the mobile security space. It’s not just the analysts, trade press or independent testers – although they certainly have noticed. The channel is catching on too.

That’s why we’re so proud to be named Vendor of the Year in Enterprise Mobility Management at the Integrator ICT Champion Awards 2015 – because we were chosen in voting by the region’s SI (system integrator) channel.

We’ve received a lot of other awards recently for our enterprise mobility management (EMM) solution, Sophos Mobile Control, including a 5 Star rating from SC Magazine, and perfect ratings from AV-Test for our Android antivirus.

Continue reading

How more joined-up security thinking could save billions in data breach costs

coordinated-security-150A new study from the Centre for Economics and Business Research (CEBR) has found that data breaches are costing UK businesses £34 billion a year. The report suggests this is made up of £18 billion in lost revenue and £16 billion in added security measures after breaches have occurred.

It’s the same the world over. According to a 2015 Ponemon Institute study commissioned by IBM, the global average cost of a data breach to an organization has reached $3.8 million – on average, $154 for every single compromised record. It’s significantly higher in the US and Germany, where the costs are $217 and $211 per compromised record, respectively. These are quite staggering figures.

Now, it’s not uncommon for companies who sell cybersecurity services like IBM and Sophos to talk big numbers like this. After all, clearly we think it’s good to see businesses are investing in doing something about this problem. But you do have to wonder if those billions are being spent effectively. As leaders in the security industry, we have a crucial role to play to ensure they are. We need to deal with the growing complexity of threats without introducing more complex solutions, and cost.

Continue reading