Sophos

Displaying 1-15 of 15 results

  • White Papers // Sep 2014

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

    Sponsored By Sophos

  • White Papers // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Sep 2014

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Sep 2013

    Your Company Data, Their Personal Device — What Could Go Wrong?

    Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

    Provided By Sophos

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • White Papers // Jun 2013

    Network protection and UTM Buyers Guide

    Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...

    Provided By Sophos

  • White Papers // Nov 2011

    Endpoint Buyers Guide

    It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...

    Provided By Sophos

  • White Papers // Oct 2011

    Eight threats your antivirus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.

    Provided By Sophos

  • White Papers // Sep 2010

    'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware

    Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...

    Provided By Sophos

  • White Papers // Jun 2010

    The 10 myths of safe web browsing

    Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...

    Provided By Sophos

  • White Papers // Mar 2010

    Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware

    This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...

    Provided By Sophos

  • White Papers // Sep 2009

    The Partnerka - What Is It, and Why Should You Care?

    Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together? What makes them grow in volume and complexity? Who is behind them? What business model drives their...

    Provided By Sophos

  • White Papers // Sep 2014

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

    Sponsored By Sophos

  • White Papers // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Sep 2014

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Sep 2013

    Your Company Data, Their Personal Device — What Could Go Wrong?

    Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

    Provided By Sophos

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • White Papers // Oct 2011

    Eight threats your antivirus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.

    Provided By Sophos

  • White Papers // Nov 2011

    Endpoint Buyers Guide

    It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...

    Provided By Sophos

  • White Papers // Jun 2010

    The 10 myths of safe web browsing

    Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...

    Provided By Sophos

  • White Papers // Sep 2009

    The Partnerka - What Is It, and Why Should You Care?

    Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together? What makes them grow in volume and complexity? Who is behind them? What business model drives their...

    Provided By Sophos

  • White Papers // Mar 2010

    Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware

    This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...

    Provided By Sophos

  • White Papers // Sep 2010

    'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware

    Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...

    Provided By Sophos

  • White Papers // Jun 2013

    Network protection and UTM Buyers Guide

    Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...

    Provided By Sophos