Overview: Sophos enables enterprises to secure both their IT infrastructure and confidential data. We protect over 100 million users in nearly 150 countries against malware, spyware, spam, policy abuse, data leakage and compliance drift.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Sophos UK.
Research offered by Sophos UK
A practical guide to keeping your virtual data centre safe by Sophos UK. June 07, 2010 - This whitepaper will focus on the best practices for the protection of virtual servers running in the data centre.
Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos UK. March 16, 2009 - The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them.
Laws, regulations and compliance: Top tips for keeping your data under your Control by Sophos UK. December 01, 2008 - The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Ponemon Institute - Seven Tips for Securing Mobile Workers by Sophos UK. May 02, 2011 - This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organisation's networks, data and reputation.
Presentation Transcript: The Economics of Endpoint Security by Sophos UK. June 24, 2009 - Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
Security Threat Report: 2010 by Sophos UK. May 25, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
Solving Four Primary Security Challenges of Microsoft SharePoint by Sophos UK. November 01, 2009 - This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Stopping data leakage: Making the most of your security budget by Sophos UK. March 16, 2009 - This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Threatsaurus: The A-Z of Computer and Data Security Threats by Sophos UK. December 01, 2009 - Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
What is FakeAV? by Sophos UK. June 07, 2010 - Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.