Sophos

Displaying 1 - 10 of 33 results

  • Sophos Synchronised Security Webcast

    Webcasts // Feb 2016 // provided by Sophos

    This webcast introduces Sophos' Synchronised Security solution, explaining the motivation behind its creation, how the solution works and how it makes the lives of IT decision makers and the IT department easier. By automating threat discovery, investigation, and response, Synchronized Security revolutionizes threat detection. Incident response times are reduced exponentially ...

    Register Now
  • Deciphering the Code: A Simple Guide to Encryption

    White Papers // Oct 2015 // provided by Sophos

    With data breaches and accidental data loss hitting the headlines more than ever; the role of encryption in your security plan continues to grow in importance. This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an ...

    Download Now
  • Endpoint Buyers Guide

    White Papers // Oct 2015 // provided by Sophos

    Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

    Download Now
  • A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    White Papers // Oct 2015 // provided by Sophos

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What ...

    Download Now
  • Protecting Your Roaming Workforce With Cloud-Based Security

    White Papers // Oct 2015 // provided by Sophos

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Download Now
  • Find the best protection for your business in network security

    White Papers // Jun 2015 // provided by Sophos

    Unified threat management (UTM) simplifies network security and data protection. It integrates multiple security capabilities in one platform, all controlled by a simple management console. Learn what a modern UTM can do for you and evaluate solutions to keep your network secure with this Network Protection and UTM Buyers Guide.

    Find out more
  • University of San Carlos (USC) turns to Sophos for simple, comprehensive protection of its campus network

    White Papers // Jun 2015 // provided by Sophos

    USC is the premier university in Cebu and one of the top 10 leading universities in the country ranked by the International/World QS rating among the top 300 universities in Asia. Learn how Sophos helped USC achieved a resource-friendly security solution with lower total cost of ownership by standardizing on ...

    Learn more
  • Lightning Performance with Sophos Endpoint Protection

    White Papers // Jun 2015 // provided by Sophos

    Sophos keeps your users secure without slowing them down, even on older systems. Our lightweight agent and small definition updates (typically about 30KB) mean that initial deployment, updates, and daily use are super-fast and produce minimal overhead. See how we stack up in the latest AV-Comparatives performance test.

    Read more
  • The Forrester Wave Report: Endpoint Encryption 2015

    White Papers // Apr 2015 // provided by Sophos

    In Forrester’s 52-criteria evaluation of endpoint encryption vendors, they identified the seven most significant providers in the category and researched, analysed, and scored them. This report details the findings about how well each vendor fulfills the criteria and where they stand in relation to each other, to help security ...

    Download Now
  • Five Stages of a Web Malware Attack

    White Papers // Apr 2015 // provided by Sophos

    Today’s web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This whitepaper shows you how modern web attacks work, broken down into five stages, from entry through execution.

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?