This year, we’re revolutionizing the firewall, giving our award-winning SG Series appliances an all-new operating system that combines the best of both Sophos and Cyberoam technology.
The codename for this new firewall platform is Project Copernicus, and we’re excited to inform you that the beta phase is now underway. This is your invitation to take an early look at the new software and put it to the test.
Over the coming months we’ll be migrating web services used by our customers and partners to Sophos ID, giving you one account to access all the web services you subscribe to.
Beginning in mid-August, we’re enabling login via Sophos ID for MySophos and SophServ. Using your Sophos ID, you’ll also be able to access Sophos Community, a merger of SophosTalk and Sophos FreeTalk. Later this year, we’ll enable Sophos ID for our partners to access the Partner Portal, Cloud Partner Dashboard, and Sophos Cloud Firewall Manager.
Today we’re announcing the availability of Sophos Mobile Control 5, which redefines how organizations secure mobile devices by focusing on users and the way they work.
By securing devices, content, and applications with a user-centric approach, Sophos Mobile Control 5 (SMC 5) makes compliance with corporate security policy simple for both administrator and end users across iOS 8, Windows Phone and Android platforms.
To get you acquainted with what’s new, here are 5 great things about SMC 5.
“Sophisticated simplicity” sounds like a bit of a paradox. How can something be sophisticated and simple? At Sophos, we bring simplicity to everything we do. It’s easy to use our innovative protection – that’s the sophisticated part – because our products are designed with you in mind.
Sophos is a snap to set up and manage, with just a few clicks. Let’s take a look at how easy it is to use the management console – in both our on-premise and cloud-managed solutions – to give you a better idea of what “sophisticated simplicity” means in action.
In the last couple of days, a widespread Linux vulnerability known as GHOST has been receiving a lot of attention in the security community. In theory, this vulnerability can allow an attacker to remotely execute code on a Linux computer. There is already proof of concept code that puts this theory into practice, and it is expected that real world attacks are just around the corner.
The Sophos product teams have been thoroughly investigating to determine which of our products are affected and what is necessary to address those that are.
In the light of the recent Bash vulnerability known as “Shellshock” (CVE-2014-6271 and CVE-2014-7169), here’s the reality instead of the hype.
Shellshock is a newly-discovered vulnerability in Bash (the Bourne Again Shell), one of the most commonly used shells on Linux, UNIX and OS X.
Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue.
We may yet be accused of “going on” about the recent retirement of XP, but we feel justified in doing so as any systems you have that are still running XP will become more vulnerable over time.
Last week we saw a reminder that Oracle will not be issuing an update to Java on XP on the 15th July when it releases its regular update.
When we asked SophosLabs what they thought about Java on XP and the change in support status, they said that Java had been hard work even for supported operating systems – and so with no support for Java on XP there was no prospect of it getting any better.