Sophos, Inc.Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for company name: Sophos, Inc. returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Endpoint Security
 •   Security Monitoring
 •   Application Security
 •   Wireless Security
 •   Intrusion Prevention Solutions
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Anti-Virus Solutions

Advertisement

ALL RESULTS
1 - 25 of 99 | Next Page

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls by Sophos, Inc.

November 30, 2013 - (Free Research)
Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system. 
(WHITE PAPER) READ ABSTRACT |

Seven Keys to Securing Your Growing Business by Sophos, Inc.

November 22, 2013 - (Free Research)
This informative paper examines how business owners can identify a cloud-based security solution that is simple and eases the pains of growing an organization, providing seven crucial tips for finding a solution that satisfies your requirements. 
(WHITE PAPER) READ ABSTRACT |

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure by Sophos, Inc.

February 25, 2014 - (Free Research)
This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the trend while ensuring that your sensitive data is protected. 
(WHITE PAPER) READ ABSTRACT |

Encryption Buyer's Guide by Sophos, Inc.

April 18, 2014 - (Free Research)
This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs. 
(WHITE PAPER) READ ABSTRACT |

Advanced Persistent Threats: Detection, Protection and Prevention by Sophos, Inc.

April 08, 2014 - (Free Research)
Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients. 
(WHITE PAPER) READ ABSTRACT |

Unified Threat Management Guide by Sophos, Inc.

December 31, 2013 - (Free Research)
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Buyers Guide by Sophos, Inc.

February 25, 2014 - (Free Research)
This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report 2014 Smarter, Shadier, Stealthier Malware by Sophos, Inc.

December 23, 2013 - (Free Research)
Looking back at the 2013 threat landscape, one thing is clear, malware attacks are becoming increasingly camouflaged. This in-depth report explores the ever-changing threat landscape and the growing trends of cybercriminals. 
(WHITE PAPER) READ ABSTRACT |

Five Tips to Reduce Risk From Modern Web Threats by Sophos, Inc.

September 30, 2013 - (Free Research)
Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats. 
(WHITE PAPER) READ ABSTRACT |

The Expanding Network Perimeter: How to Protect it With Unified Threat Management by Sophos, Inc.

August 15, 2012 - (Free Research)
Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management. 
(WHITE PAPER) READ ABSTRACT |

NAC at the Endpoint: Control Your Network through Device Compliance by Sophos, Inc.

July 2008 - (Free Research)
Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices. 
(WHITE PAPER) READ ABSTRACT |

Unauthorized Applications: Taking Back Control by Sophos, Inc.

July 2008 - (Free Research)
This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution. 
(WHITE PAPER) READ ABSTRACT |

Application Discovery Tool by Sophos, Inc.

February 2008 - (Free Research)
With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software. 
(TRIAL SOFTWARE)

NAC: Managing Unauthorized Computers by Sophos, Inc.

February 2008 - (Free Research)
Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent. 
(WHITE PAPER) READ ABSTRACT |

NAC: Bridging the Network Security Gap by Sophos, Inc.

February 2008 - (Free Research)
IT managers are aware of threats to their networks, and have spent heavily on solutions to protect the corporate environment. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security. 
(WHITE PAPER) READ ABSTRACT |

Who's Got the NAC? Best Practices in Protecting Network Access by Sophos, Inc.

February 2008 - (Free Research)
This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access. 
(WHITE PAPER) READ ABSTRACT |

Who’s Snooping on Your Email? by Sophos, Inc.

December 2013 - (Free Research)
This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Roaming Workforce With Cloud-Based Security by Sophos, Inc.

December 2013 - (Free Research)
This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter. 
(WHITE PAPER) READ ABSTRACT |

A Manager's Guide To Unified Threat Management And Next-Generation Firewalls by Sophos, Inc.

December 2013 - (Free Research)
As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization? 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Evaluating network security virtualization products by Sophos, Inc.

August 2013 - (Free Research)
This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more. 
(EGUIDE) READ ABSTRACT |

EGuide: Testing Enterprise Firewalls by Sophos, Inc.

July 2013 - (Free Research)
In this expert guide from SearchSecurity.com, learn about the three types of firewall tests you should perform to ensure that the solution you end up selecting is the best for your organization's specific needs. 
(EGUIDE) READ ABSTRACT |

Top 5 Myths about Mobile Security by Sophos, Inc.

July 2013 - (Free Research)
This expert paper examines the top five myths about mobile security, detailing why these concepts are mistaken for truth and what you can do to appropriately alter your mobile security profile. 
(WHITE PAPER) READ ABSTRACT |

When Malware Goes Mobile: Causes, Outcomes and Cures by Sophos, Inc.

May 2013 - (Free Research)
This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: What Senior Managers Should Know by Sophos, Inc.

October 2012 - (Free Research)
In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success. 
(WHITE PAPER) READ ABSTRACT |

Sophos Virus Removal Tool: Free virus detection and removal by Sophos, Inc.

May 2013 - (Free Research)
Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 99 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts