Sophos, Inc.Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for company name: Sophos, Inc. returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Security Monitoring
 •   Wireless Security
 •   Application Security
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Access Control
 •   Enterprise Data Protection and Privacy

Advertisement

ALL RESULTS
1 - 25 of 106 | Next Page

Advanced Persistent Threats: Detection, Protection and Prevention by Sophos, Inc.

April 08, 2014 - (Free Research)
Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients. 
(WHITE PAPER) READ ABSTRACT |

Two Great Ways to Protect Your Virtual Machines From Malware by Sophos, Inc.

April 03, 2014 - (Free Research)
This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments. 
(WHITE PAPER) READ ABSTRACT |

Managing BitLocker With SafeGuard Enterprise by Sophos, Inc.

February 26, 2014 - (Free Research)
This white paper explores a data protection platform that offers essential encryption functionalities that Microsoft Bitlocker's misses. 
(WHITE PAPER) READ ABSTRACT |

Five Stages of a Web Malware Attack by Sophos, Inc.

November 20, 2013 - (Free Research)
Access this resource to explore the 5 stages of web malware attacks, along with a checklist of what your web security solution needs in order to provide reliable, layered protection to prevent data theft. 
(WHITE PAPER) READ ABSTRACT |

Not Just for PCs Anymore: The Rise of Mobile Malware by Sophos, Inc.

November 04, 2013 - (Free Research)
This informative paper takes an in-depth look at the mobile malware, detailing its history, its current state, where it's going, and what your organization can do to protect your critical data. 
(WHITE PAPER) READ ABSTRACT |

Your CEO Wants to Connect a New Device to the Corporate Network. Now What? by Sophos, Inc.

November 01, 2013 - (Free Research)
This exclusive paper examines the key challenges, risks and rewards of BYOD, discussing how to implement the right strategy to mitigate security concerns. 
(WHITE PAPER) READ ABSTRACT |

Mobile Madness or BYOD Security? by Sophos, Inc.

November 01, 2013 - (Free Research)
This informative paper examines the state of BYOD today and the direction in which it's going, discussing common challenges in implementing and managing it and helpful strategies for overcoming these obstacles. 
(WHITE PAPER) READ ABSTRACT |

Sophos Virus Removal Tool: Free virus detection and removal by Sophos, Inc.

May 09, 2013 - (Free Research)
Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily. 
(TRIAL SOFTWARE) READ ABSTRACT |

Sophos EndUser Protection Overview by Sophos, Inc.

January 10, 2013 - (Free Research)
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage. 
(VIDEO) READ ABSTRACT |

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 05, 2012 - (Free Research)
Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution. 
(ANALYST REPORT) READ ABSTRACT |

The Expanding Network Perimeter: How to Protect it With Unified Threat Management by Sophos, Inc.

August 15, 2012 - (Free Research)
Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management. 
(WHITE PAPER) READ ABSTRACT |

Closing the Back Door on Network Application Vulnerabilities by Sophos, Inc.

July 03, 2012 - (Free Research)
This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers. 
(WHITE PAPER) READ ABSTRACT |

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT)

Unified Threat Management Guide by Sophos, Inc.

December 31, 2013 - (Free Research)
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Buyers Guide by Sophos, Inc.

February 25, 2014 - (Free Research)
This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool. 
(WHITE PAPER) READ ABSTRACT |

Sophos Computer Security Scan by Sophos, Inc.

April 07, 2010 - (Free Research)
Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found. 
(TRIAL SOFTWARE)

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

Stopping data leakage: Exploiting your existing security investment by Sophos, Inc.

June 2008 - (Free Research)
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by Sophos, Inc.

June 2009 - (Free Research)
Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls by Sophos, Inc.

November 2013 - (Free Research)
Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system. 
(WHITE PAPER) READ ABSTRACT |

Five Tips to Reduce Risk From Modern Web Threats by Sophos, Inc.

September 2013 - (Free Research)
Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats. 
(WHITE PAPER) READ ABSTRACT |

NAC at the Endpoint: Control Your Network through Device Compliance by Sophos, Inc.

July 2008 - (Free Research)
Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices. 
(WHITE PAPER) READ ABSTRACT |

Unauthorized Applications: Taking Back Control by Sophos, Inc.

July 2008 - (Free Research)
This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 106 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts