Sophos, Inc. Company ReportWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Report
Sophos, Inc.
Company URL: http://www.sophos.com

Overview:
Sophos enables enterprises to secure and control their IT infrastructure. Our network access control, endpoint, web and email solutions simplify security to provide integrated defenses against malware, spyware, intrusions, unwanted applications.

> Return to Search Results

Company Information
Public or private company: Private

Company Locations
Corporate Headquarters
This location offers:
Corporate Headquarters
3 Van de Graaff Drive, 2nd Floor
Burlington Massachusetts 01803
United States

Solutions and Research
Research A Manager's Guide To Unified Threat Management And Next-Generation Firewalls
A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
Advanced Persistent Threats: Detection, Protection and Prevention
Application Discovery Tool
Applications, Virtualization, and Devices: Taking Back Control
Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware
Botnets: The dark side of cloud computing
Closing the Back Door on Network Application Vulnerabilities
Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection
Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection
Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
E-Guide: Evaluating network security virtualization products
e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks
Effective Web Policies: Ensuring Staff Productivity and Legal Compliance
EGuide: Testing Enterprise Firewalls
eGuide:Mitigating malicious advertisement malware
Eight threats your antivirus won't stop
Enabling a safer internet: The positive approach to web security
Encryption Buyer's Guide
Endpoint Security and Control
Endpoint Security: Defining the Total Cost of Ownership
Expert Guide to Securing Emerging Endpoints
Five Stages of a Web Malware Attack
Five tips to reduce risk from modern web threats
Five tips to reduce risk from modern web threats
Five Tips to Reduce Risk From Modern Web Threats
Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware
Free yourself to do more, while securing your business simply and cost-effectively
Gartner Magic Quadrant for Unified Threat Management
High-performance protection at the network edge—what, why and how
Hot Tips for Securing Your Wireless Network
How a Next-Generation Firewall Prevents Application-Layer Attacks
How to Implement a Data Loss Prevention Strategy
How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
Is virtualization a black hole in your security? 5 ways to ensure it isn't
Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers
Laws, regulations and compliance: Top tips for keeping your data under your control
Magic Quadrant for Endpoint Protection Platforms
Magic Quadrant for Endpoint Protection Platforms
Magic Quadrant for Mobile Data Protection
Malicious JavaScript Attacks: What Can You Do?
Managing BitLocker With SafeGuard Enterprise
Maturing Your DLP Strategy for Today’s Threats
Mobile Device Management Buyers Guide
Mobile Device Security: What Senior Managers Should Know
Mobile Madness or BYOD Security?
NAC at the Endpoint: Control Your Network through Device Compliance
NAC: Bridging the Network Security Gap
NAC: Managing Unauthorized Computers
Not all Malware Detection is Created Equal
Not Just for PCs Anymore: The Rise of Mobile Malware
Presentation Transcript: 3 Steps to Securing Private Data in the Public Cloud
Presentation Transcript: Data Protection Market Drivers and Channel Opportunities
Presentation Transcript: Endpoint security fundamentals
Presentation Transcript: Endpoint security fundamentals
Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
Protecting Your Roaming Workforce With Cloud-Based Security
Secure Web Gateway Overview: Implementation Best Practices
Security Threat Report 2014 Smarter, Shadier, Stealthier Malware
Security Threat Report: 2010
Security Threat Report: July 2008
Security Threat Report: July 2009 Update
Security Threat Report: July 2009 Update
Security Threat Report: Mid-year 2010
Seven for 7: Best Practices For Implementing Windows 7
Seven Tips for Securing Mobile Workers
Simplifying branch office security
Sophos Computer Security Scan
Sophos EndUser Protection Overview
Sophos Security Threat Report 2011
Sophos Security Threat Report Mid-Year 2011
Sophos Virus Removal Tool: Free virus detection and removal
Stopping data leakage: Exploiting your existing security investment
Stopping Data Leakage: Making the Most of Your Security Budget
Stopping Data Leakage: Making the Most of Your Security Budget
Stopping Fake Antivirus: How to Keep Scareware off Your Network
The 10 myths of safe web browsing
The Business Impact of Data Security Regulations: Featuring Massachusetts
The business impact of data security regulations: Featuring Massachusetts
The Expanding Network Perimeter: How to Protect it With Unified Threat Management
The four rules of complete web protection
The State of Data Security
The State of Privacy and Data Security Compliance
Three simple steps to better patch security
Top 5 Myths about Mobile Security
Top 5 Threat Protection Best Practices
Top 5 Threat Protection Best Practices
Top Five Strategies for Combating Modern Threats - Is Anti-virus Dead?
Top four considerations for securing Microsoft SharePoint
Top Four Considerations for Securing Microsoft SharePoint
Two Great Ways to Protect Your Virtual Machines From Malware
Unauthorized Applications: Taking Back Control
Understanding the Total Cost of Ownership for Endpoint Security Solutions
Understanding the Total Cost of Ownership for Endpoint Security Solutions
Unified Threat Management Guide
Using application control to reduce risk with endpoint security
Web security buyers guide
What is FakeAV?
When Malware Goes Mobile: Causes, Outcomes and Cures
Who's Got the NAC? Best Practices in Protecting Network Access
Who’s Snooping on Your Email?
Why Hackers have turned to Malicious JavaScript Attacks
Windows 7 Security: A Great Leap Forward or Business as Usual?
Your CEO Wants to Connect a New Device to the Corporate Network. Now What?
Zero Trust Model: Securing the Extended Enterprise
 Five tips to reduce risk from modern web threats
 Safer web browsing in four steps
 

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts