Sophos, Inc. Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Sophos, Inc.

Overview: Sophos enables enterprises to secure and control their IT infrastructure. Our network access control, endpoint, web and email solutions simplify security to provide integrated defenses against malware, spyware, intrusions, unwanted applications.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Sophos, Inc..
Research offered by Sophos, Inc.

A Manager's Guide To Unified Threat Management And Next-Generation Firewalls by Sophos, Inc.. December 12, 2013 - As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization?

  View A Manager's Guide To Unified Threat Management And Next-Generation Firewalls research abstract

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls by Sophos, Inc.. November 30, 2013 - Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.

  View A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls research abstract

Advanced Persistent Threats: Detection, Protection and Prevention by Sophos, Inc.. April 08, 2014 - Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  View Advanced Persistent Threats: Detection, Protection and Prevention research abstract

Application Discovery Tool by Sophos, Inc.. February 2008 - With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.

  View Application Discovery Tool research abstract

Applications, Virtualization, and Devices: Taking Back Control by Sophos, Inc.. October 2008 - This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches and highlights how integrating this functionality into malware protection is the simplest and cost-effective solution.

  View Applications, Virtualization, and Devices: Taking Back Control research abstract

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.. April 11, 2011 - Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore.

  View Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware research abstract

Botnets: The dark side of cloud computing by Sophos, Inc.. April 05, 2012 -

Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.

  View Botnets: The dark side of cloud computing research abstract

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure by Sophos, Inc.. February 25, 2014 - This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the trend while ensuring that your sensitive data is protected.

  View BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure research abstract

Closing the Back Door on Network Application Vulnerabilities by Sophos, Inc.. July 03, 2012 - This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.

  View Closing the Back Door on Network Application Vulnerabilities research abstract

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.. June 01, 2009 - This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations.

  View Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection research abstract

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.. June 10, 2009 - This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations.

  View Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection research abstract

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection by Sophos, Inc.. November 19, 2009 - This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a

  View Closing the Gaps in Enterprise Data Security: A Model for 360° Protection research abstract

E-Guide: Evaluating network security virtualization products by Sophos, Inc.. August 06, 2013 - This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more.

  View E-Guide: Evaluating network security virtualization products research abstract

Effective Web Policies: Ensuring Staff Productivity and Legal Compliance by Sophos, Inc.. September 2008 - This paper discusses how to create a policy that balances an organization's need for protection against an individual's expectations.

  View Effective Web Policies: Ensuring Staff Productivity and Legal Compliance research abstract

EGuide: Testing Enterprise Firewalls by Sophos, Inc.. July 23, 2013 - In this expert guide from SearchSecurity.com, learn about the three types of firewall tests you should perform to ensure that the solution you end up selecting is the best for your organization's specific needs.

  View EGuide: Testing Enterprise Firewalls research abstract

Eight threats your antivirus won't stop by Sophos, Inc.. December 23, 2011 - News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.

  View Eight threats your antivirus won't stop research abstract

Enabling a safer internet: The positive approach to web security by Sophos, Inc.. April 08, 2009 - This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.

  View Enabling a safer internet: The positive approach to web security research abstract

Encryption Buyer's Guide by Sophos, Inc.. April 18, 2014 - This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.

  View Encryption Buyer's Guide research abstract

Endpoint Security and Control by Sophos, Inc.. October 2008 - Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.

  View Endpoint Security and Control research abstract

Endpoint Security: Defining the Total Cost of Ownership by Sophos, Inc.. March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  View Endpoint Security: Defining the Total Cost of Ownership research abstract

Five tips to reduce risk from modern web threats by Sophos, Inc.. April 11, 2011 - User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  View Five tips to reduce risk from modern web threats research abstract

Five tips to reduce risk from modern web threats by Sophos, Inc.. April 05, 2012 -

To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.

  View Five tips to reduce risk from modern web threats research abstract

Five Tips to Reduce Risk From Modern Web Threats by Sophos, Inc.. September 30, 2013 - Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.

  View Five Tips to Reduce Risk From Modern Web Threats research abstract

Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware by Sophos, Inc.. June 24, 2010 - Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.

  View Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware research abstract

Free yourself to do more, while securing your business simply and cost-effectively by Sophos, Inc.. June 24, 2009 - It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources.

  View Free yourself to do more, while securing your business simply and cost-effectively research abstract

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.. March 05, 2012 - Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.

  View Gartner Magic Quadrant for Unified Threat Management research abstract

High-performance protection at the network edge—what, why and how by Sophos, Inc.. November 05, 2009 - With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.

  View High-performance protection at the network edge—what, why and how research abstract

Hot Tips for Securing Your Wireless Network by Sophos, Inc.. August 31, 2012 - Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.

  View Hot Tips for Securing Your Wireless Network research abstract

How a Next-Generation Firewall Prevents Application-Layer Attacks by Sophos, Inc.. January 24, 2013 - This expert E-Guide explores the value of next-generation firewalls (NGFWs) in preventing application-layer threats, such as SQL-injections and buffer-overflow attacks. Inside, discover NGFW opportunities and challenges – read on to learn more.

  View How a Next-Generation Firewall Prevents Application-Layer Attacks research abstract

How to Implement a Data Loss Prevention Strategy by Sophos, Inc.. April 23, 2010 - This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by looking at what’s driving data loss prevention, the consequences of data loss, and a possible solution. It then moves on to practical implementation advice and examples. Read on to learn more.

  View How to Implement a Data Loss Prevention Strategy research abstract

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored by Sophos, Inc.. September 01, 2009 - This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.

  View How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored research abstract

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos, Inc.. December 2008 - This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them.

  View Is virtualization a black hole in your security? 5 ways to ensure it isn't research abstract

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by Sophos, Inc.. June 01, 2009 - Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption.

  View Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers research abstract

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.. December 2008 - This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

  View Laws, regulations and compliance: Top tips for keeping your data under your control research abstract

Magic Quadrant for Endpoint Protection Platforms by Sophos, Inc.. April 11, 2011 - Read this Market Overview of the different malware protection and prevention solutions that various vendors are offering.

  View Magic Quadrant for Endpoint Protection Platforms research abstract

Magic Quadrant for Endpoint Protection Platforms by Sophos, Inc.. May 12, 2009 - Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.

  View Magic Quadrant for Endpoint Protection Platforms research abstract

Magic Quadrant for Mobile Data Protection by Sophos, Inc.. April 13, 2011 - This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  View Magic Quadrant for Mobile Data Protection research abstract

Malicious JavaScript Attacks: What Can You Do? by Sophos, Inc.. January 11, 2011 - We’ll review what to watch for, as well as the security strategies that will help keep you safe.

  View Malicious JavaScript Attacks: What Can You Do? research abstract

Mobile Device Management Buyers Guide by Sophos, Inc.. February 25, 2014 - This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.

  View Mobile Device Management Buyers Guide research abstract

Mobile Device Security: What Senior Managers Should Know by Sophos, Inc.. October 31, 2012 - In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success.

  View Mobile Device Security: What Senior Managers Should Know research abstract

NAC at the Endpoint: Control Your Network through Device Compliance by Sophos, Inc.. July 2008 - Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices.

  View NAC at the Endpoint: Control Your Network through Device Compliance research abstract

NAC: Bridging the Network Security Gap by Sophos, Inc.. February 2008 - IT managers are aware of threats to their networks, and have spent heavily on solutions to protect the corporate environment. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security.

  View NAC: Bridging the Network Security Gap research abstract

NAC: Managing Unauthorized Computers by Sophos, Inc.. February 2008 - Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent.

  View NAC: Managing Unauthorized Computers research abstract

Not all Malware Detection is Created Equal by Sophos, Inc.. November 05, 2009 - The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.

  View Not all Malware Detection is Created Equal research abstract

Presentation Transcript: 3 Steps to Securing Private Data in the Public Cloud by Sophos, Inc.. June 12, 2012 - Public cloud storage services enable users to easily share and store data, but they also introduce new security challenges that often clash with exiting IT policies. In this presentation transcript, learn how IT managers can help their users manage access to the public cloud without placing your data or business at risk.

  View Presentation Transcript: 3 Steps to Securing Private Data in the Public Cloud research abstract

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.. December 10, 2009 - Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution.

  View Presentation Transcript: Data Protection Market Drivers and Channel Opportunities research abstract

Presentation Transcript: Endpoint security fundamentals by Sophos, Inc.. June 25, 2009 - This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  View Presentation Transcript: Endpoint security fundamentals research abstract

Presentation Transcript: Endpoint security fundamentals by Sophos, Inc.. June 25, 2009 - This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  View Presentation Transcript: Endpoint security fundamentals research abstract

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It by Sophos, Inc.. February 03, 2010 - Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.

  View Presentation Transcript: Three Reasons Why Security Fails and What to Do About It research abstract

Protecting Your Roaming Workforce With Cloud-Based Security by Sophos, Inc.. December 16, 2013 - This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.

  View Protecting Your Roaming Workforce With Cloud-Based Security research abstract

Secure Web Gateway Overview: Implementation Best Practices by Sophos, Inc.. November 27, 2012 - This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

  View Secure Web Gateway Overview: Implementation Best Practices research abstract

Security Threat Report 2014 Smarter, Shadier, Stealthier Malware by Sophos, Inc.. December 23, 2013 - Looking back at the 2013 threat landscape, one thing is clear, malware attacks are becoming increasingly camouflaged. This in-depth report explores the ever-changing threat landscape and the growing trends of cybercriminals.

  View Security Threat Report 2014 Smarter, Shadier, Stealthier Malware research abstract

Security Threat Report: 2010 by Sophos, Inc.. March 02, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

  View Security Threat Report: 2010 research abstract

Security Threat Report: July 2008 by Sophos, Inc.. November 2008 - This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.

  View Security Threat Report: July 2008 research abstract

Security Threat Report: July 2009 Update by Sophos, Inc.. July 01, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  View Security Threat Report: July 2009 Update research abstract

Security Threat Report: July 2009 Update by Sophos, Inc.. July 06, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  View Security Threat Report: July 2009 Update research abstract

Security Threat Report: Mid-year 2010 by Sophos, Inc.. October 04, 2010 - Halfway through 2010, cybercrime continues to evolve and grow. As social networking becomes ever more deeply embedded in our lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information. Knowledge is power, and understanding the dangers posed is the first step toward keeping safe and secure.

  View Security Threat Report: Mid-year 2010 research abstract

Seven for 7: Best Practices For Implementing Windows 7 by Sophos, Inc.. March 18, 2011 - In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there’s no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it’s the perfect opportunity to assess your...

  View Seven for 7: Best Practices For Implementing Windows 7 research abstract

Seven Keys to Securing Your Growing Business by Sophos, Inc.. November 22, 2013 - This informative paper examines how business owners can identify a cloud-based security solution that is simple and eases the pains of growing an organization, providing seven crucial tips for finding a solution that satisfies your requirements.

  View Seven Keys to Securing Your Growing Business research abstract

Seven Tips for Securing Mobile Workers by Sophos, Inc.. May 02, 2011 - This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organization's networks, data and reputation.

  View Seven Tips for Securing Mobile Workers research abstract

Simplifying branch office security by Sophos, Inc.. December 01, 2011 - Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.

  View Simplifying branch office security research abstract

Sophos Computer Security Scan by Sophos, Inc.. April 07, 2010 - Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.

  View Sophos Computer Security Scan research abstract

Sophos EndUser Protection Overview by Sophos, Inc.. January 10, 2013 - This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  View Sophos EndUser Protection Overview research abstract

Sophos Security Threat Report 2011 by Sophos, Inc.. February 07, 2011 - Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.

  View Sophos Security Threat Report 2011 research abstract

Sophos Security Threat Report Mid-Year 2011 by Sophos, Inc.. August 23, 2011 - Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.

  View Sophos Security Threat Report Mid-Year 2011 research abstract

Sophos Virus Removal Tool: Free virus detection and removal by Sophos, Inc.. May 09, 2013 - Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  View Sophos Virus Removal Tool: Free virus detection and removal research abstract

Stopping data leakage: Exploiting your existing security investment by Sophos, Inc.. June 2008 - This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.

  View Stopping data leakage: Exploiting your existing security investment research abstract

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.. February 20, 2009 - This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...

  View Stopping Data Leakage: Making the Most of Your Security Budget research abstract

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.. November 19, 2009 - This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.

  View Stopping Data Leakage: Making the Most of Your Security Budget research abstract

Stopping Fake Antivirus: How to Keep Scareware off Your Network by Sophos, Inc.. September 01, 2011 - This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

  View Stopping Fake Antivirus: How to Keep Scareware off Your Network research abstract

The 10 myths of safe web browsing by Sophos, Inc.. October 04, 2010 - Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.

  View The 10 myths of safe web browsing research abstract

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.. November 19, 2009 - Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance.

  View The Business Impact of Data Security Regulations: Featuring Massachusetts research abstract

The business impact of data security regulations: Featuring Massachusetts by Sophos, Inc.. June 11, 2009 - This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.

  View The business impact of data security regulations: Featuring Massachusetts research abstract

The Expanding Network Perimeter: How to Protect it With Unified Threat Management by Sophos, Inc.. August 15, 2012 - Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.

  View The Expanding Network Perimeter: How to Protect it With Unified Threat Management research abstract

The four rules of complete web protection by Sophos, Inc.. December 16, 2011 - As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.

  View The four rules of complete web protection research abstract

The State of Data Security by Sophos, Inc.. May 26, 2011 - Recognize how your data can become vulnerable and understand the compliance issues involved. This paper identifies data protection strategies you can use to keep your organization's information both safe and compliant.

  View The State of Data Security research abstract

The State of Privacy and Data Security Compliance by Sophos, Inc.. November 30, 2009 - The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.

  View The State of Privacy and Data Security Compliance research abstract

Three simple steps to better patch security by Sophos, Inc.. December 16, 2011 - Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, uncover three best practices for improving your security and compliance with patch assessment.

  View Three simple steps to better patch security research abstract

Top 5 Myths about Mobile Security by Sophos, Inc.. July 23, 2013 - This expert paper examines the top five myths about mobile security, detailing why these concepts are mistaken for truth and what you can do to appropriately alter your mobile security profile.

  View Top 5 Myths about Mobile Security research abstract

Top 5 Threat Protection Best Practices by Sophos, Inc.. June 24, 2010 - Today’s corporate networks face a barrage of threats, from malware to accidental data loss. The endpoints receive the brunt of these attacks, and if they are not protected they can serve as a threat portal to the entire network. This paper offers advice to help you protect your endpoints and your network against an ever-growing body of threats.

  View Top 5 Threat Protection Best Practices research abstract

Top 5 Threat Protection Best Practices by Sophos, Inc.. April 11, 2011 - The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.

  View Top 5 Threat Protection Best Practices research abstract

Top Five Strategies for Combating Modern Threats - Is Anti-virus Dead? by Sophos, Inc.. October 2008 - Read this whitepaper to learn about the security implications of modern threats, where emerging technologies can add real value, and five key strategies for ensuring solid malware protection.

  View Top Five Strategies for Combating Modern Threats - Is Anti-virus Dead? research abstract

Top four considerations for securing Microsoft SharePoint by Sophos, Inc.. March 08, 2011 - This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets.

  View Top four considerations for securing Microsoft SharePoint research abstract

Top Four Considerations for Securing Microsoft SharePoint by Sophos, Inc.. March 18, 2011 - Microsoft SharePoint is now the standard for internal and external collaboration and content management in much the same way Microsoft Exchange has become the enterprise standard for email. And like Exchange, SharePoint comes with a similar set of adoption challenges: The need to maximize ROI, protect against malware and data loss and establish...

  View Top Four Considerations for Securing Microsoft SharePoint research abstract

Unauthorized Applications: Taking Back Control by Sophos, Inc.. July 2008 - This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.

  View Unauthorized Applications: Taking Back Control research abstract

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.. March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  View Understanding the Total Cost of Ownership for Endpoint Security Solutions research abstract

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.. March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  View Understanding the Total Cost of Ownership for Endpoint Security Solutions research abstract

Unified Threat Management Guide by Sophos, Inc.. December 31, 2013 - This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  View Unified Threat Management Guide research abstract

Using application control to reduce risk with endpoint security by Sophos, Inc.. July 19, 2011 - Unauthorized applications should be a prime consideration for applying application control, as it increases the risk of malware infections and data loss. View this paper to explore how integrating application control with endpoint solutions can provide the most efficient and comprehensive defense against unwanted applications.

  View Using application control to reduce risk with endpoint security research abstract

Web security buyers guide by Sophos, Inc.. October 06, 2010 - A new approach to web security and control is required that supports the needs of businesses, equipping users with the tools they need to be more effective while eliminating the risks of potential infection from trusted legitimate sites. In addition to good preventive practices it is vital that organizations implement a comprehensive solution.

  View Web security buyers guide research abstract

What is FakeAV? by Sophos, Inc.. May 24, 2010 - FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.

  View What is FakeAV? research abstract

When Malware Goes Mobile: Causes, Outcomes and Cures by Sophos, Inc.. May 17, 2013 - This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.

  View When Malware Goes Mobile: Causes, Outcomes and Cures research abstract

Who's Got the NAC? Best Practices in Protecting Network Access by Sophos, Inc.. February 2008 - This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access.

  View Who's Got the NAC? Best Practices in Protecting Network Access research abstract

Who’s Snooping on Your Email? by Sophos, Inc.. December 17, 2013 - This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  View Who’s Snooping on Your Email? research abstract

Why Hackers have turned to Malicious JavaScript Attacks by Sophos, Inc.. April 13, 2011 - Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.

  View Why Hackers have turned to Malicious JavaScript Attacks research abstract

Windows 7 Security: A Great Leap Forward or Business as Usual? by Sophos, Inc.. October 13, 2009 - Debates and discussions about the new Windows 7 have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators.

  View Windows 7 Security: A Great Leap Forward or Business as Usual? research abstract

Zero Trust Model: Securing the Extended Enterprise by Sophos, Inc.. February 02, 2012 - The emergence of new connection options and devices being introduced to the enterprise are extending networks well beyond their controllable boarders. This expert resource offers insight into securing the extended enterprise, exploring the strategy behind Zero Trust Model, creating network security policies for hostile endpoints and more.

  View Zero Trust Model: Securing the Extended Enterprise research abstract

 Five tips to reduce risk from modern web threats by Sophos, Inc.. October 06, 2010 - User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  View  Five tips to reduce risk from modern web threats research abstract

 Safer web browsing in four steps by Sophos, Inc.. October 04, 2010 - Accessing the web poses enormous risks, yet you can’t afford to be isolated from the internet and its resources. This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization’s endpoints, network and data.

  View  Safer web browsing in four steps research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts