Application Discovery Tool
By: Sophos View more from Sophos >>
Download this next:
Counter-strategy: How to conquer APT-style attacks
By: Dimension Data
Type: eGuide
“If you know the enemy and know yourself, you need not fear the result of a hundred battles…” Sun Tzu wrote in The Art of War. The quote rings true in not only military campaigns, but also IT security.
In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today’s threat landscape: the Advanced Persistent Threat-style attack.
These are also closely related to: "Application Discovery Tool"
-
Defining "evil maid" attacks, how to stop them
By: Dimension Data
Type: eGuide
An evil maid attack is when an attacker has physical access to a device such as a laptop. With direct access, what can be done to prevent data leakage?
In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn’t enough to protect enterprise data in case an attacker steals your device.
-
New download available: Password Security Guidelines
By: TechTarget
Type: Resource
Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task.
Luckily, searchSecurity is here to help. We’ve created a guide which offers a comprehensive explanation of what zero trust means, delves into the concrete benefits of a zero-trust security policy and then looks at the practical steps to take to reap them.
To access this guide, participate in our Identity and Access Management Research Program.
Find more content like what you just read:
-
Myth vs. reality: Persistent threats hijacking your internet connection
By: Dimension Data
Type: eGuide
In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
-
Zero Trust Hybrid VPCs
By: Zentera Systems Inc.
Type: Product Overview
Hybrid cloud security is challenging, with the average cost of a cyberattack exceeding $1M. Zentera's Zero Trust Hybrid VPCs simplify hybrid cloud security by decoupling connectivity and security from infrastructure. Learn how to secure remote access and enable cloud migration with this product overview.
-
Veeam data platform & Sophos managed detect and response
By: Veeam Software
Type: eBook
With Veeam’s and Sophos’ integration, anomalies in your backup environment automatically generate an alert to the Sophos MDR team. Together, Sophos and Veeam can help you remain secure and radically resilient - even as threats continue to rise. Read this e-book for more integration details.
-
Top 14 ransomware targets in 2023 and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.
-
AI-Powered Search: Maximising Knowledge Mobilisation
By:
Type: Video
Are you ready to revolutionise your AI implementation and digital transformation strategies? Join Coveo in our latest podcast with CCW Europe where you'll get an in-depth look at how Sophos, a global cybersecurity provider trusted by leading enterprises worldwide, uses Coveo to transform their customer experience securely. Here's a glimpse of what you'll learn: • The specific challenges Sophos were facing before bringing Coveo into the picture • How the Sophos team secured executive buy-in for investment in generative AI technology • The work Sophos is doing with data and content in the backend • Roadmaps for AI implementation • How to sidestep concerns around AI hallucinations • The changing dynamics within the general search landscape Featuring Sophos’ Director of Product Documentation and Digital Adoption, Remi Preghenella, and Coveo’s Northern Europe Sales Lead, Geoff Branch, this podcast offers valuable insights for decision-makers driving digital transformation.
-
Recreating the IT walk-in experience through Virtual Tech bars, with Sophos
By:
Type: Replay
Do you have many people working in remote places where the IT walk-in experience is unavailable? Do some of you end-users feel like they are missing out on certain IT services that others are receiving? Sophos had this exact challenge. Specific end-users in remote locations, in countries where IT HQ was unavailable, were desperate to receive the walk-in experience for IT Incidents and Requests. After discovering this was a problem, Sophos worked on how to replicate this experience to all of their end-users - creating a Virtual Tech bar. Find out in this episode the challenges their end-users faced, the solution they implemented and how Sophos increased and maintained end-user Happiness.
-
Recreating the IT walk-in experience through Virtual Tech bars, with Sophos
By:
Type: Replay
Do you have many people working in remote places where the IT walk-in experience is unavailable? Do some of you end-users feel like they are missing out on certain IT services that others are receiving? Sophos had this exact challenge. Specific end-users in remote locations, in countries where IT HQ was unavailable, were desperate to receive the walk-in experience for IT Incidents and Requests. After discovering this was a problem, Sophos worked on how to replicate this experience to all of their end-users - creating a Virtual Tech bar. Find out in this episode the challenges their end-users faced, the solution they implemented and how Sophos increased and maintained end-user Happiness.
-
Secure Email Market Quadrant 2024 - Competitive Analysis
By: Fortra
Type: Analyst Report
The Radicati Secure Email Market Quadrant 2024 evaluates leading vendors in the secure email market, including Proofpoint, Mimecast, Symantec, Cisco, and more. Learn how these vendors protect against email threats like phishing, BEC, and malware. Read the full report for a comprehensive analysis.
-
Best Proactive Ransomware Defense and Orchestrated Recovery
By:
Type: Talk
Ransomware has become the biggest risk to businesses of all size, with an attack estimated to occur every 11 seconds in 2021. It’s time to fight back! You need to arm your organization with a multi-layer protection approach to strengthen your overall data resilience. Join the experts from Arcserve and Sophos for an exclusive webcast to learn about effective ways to minimize your organization’s vulnerability to ransomware: - Proactive ransomware defense for your backup data combined with orchestrated recovery and immutable storage - How to recover data in the event of cyberattacks - How Arcserve & Sophos can give you peace of mind in the event of a ransomware attack so that you can recover and say "no" to ransom demands Arcserve Solutions, secured by Sophos, brings you integrated cybersecurity and data protection with immutable storage for on-premises, cloud, and SaaS-based data.
-
#Infosec18 Video Interview: James Lyne & Thom Langford
By:
Type: Video
Editor and Publisher of Infosecurity Magazine, Eleanor Dallaway, sat down with James Lyne, Sophos and Thom Langford, Publicis Groupe at Infosecurity Europe 2018 to discuss the state of information security
-
Q&A Panel: How to Stay Cybersafe in 2020
By:
Type: Talk
Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face. Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including: • What you can do today to remain secure • The types of threats Sophos Labs is seeing recently • What we know about COVID-19 scams • How to correct your security posture
-
Q&A Panel: How to Stay Cybersafe in 2020
By:
Type: Replay
Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face. Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including: • What you can do today to remain secure • The types of threats Sophos Labs is seeing recently • What we know about COVID-19 scams • How to correct your security posture
-
Proactive Ransomware Defense and Orchestrated Recovery
By:
Type: Talk
Ransomware has become the biggest risk to businesses of all sizes, with an attack estimated to occur every 11 seconds in 2021*. It’s time to fight back! You need to arm your organization with a multi-layer protection approach to strengthen your overall data resilience. Arcserve Solutions, secured by Sophos, brings you integrated cybersecurity and data protection with immutable storage for on-premises, cloud, and SaaS-based data. Register for this live webinar to hear and learn about effective ways to minimize your organization’s vulnerability to ransomware: Proactive ransomware defense for your backup data combined with orchestrated recovery and immutable storage How to recover data in the event of cyberattacks How Arcserve & Sophos can give you peace of mind in the event of a ransomware attack so that you can recover and say "no" to ransom demands If you'd like to reach out or discuss anything further with our speakers, feel free to reach out to Philip and/or Karl below: Philip Dimitriu | APJ Director Systems Engineering M +61 409 258 090 | philip.dimitriu@sophos.com.au Karl Thomson | Senior Sales Engineer Mobile: +6421354865 Karl Thomson karl.thomson@arcserve.com
-
9 essential elements of network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
-
Protection proactive des données contre ransomware et restauration orchestrée
By:
Type: Talk
Avec une attaque toutes les 11 secondes en 2021*, les ransomwares continuent d'être une menace pour toutes les entreprises, malgré le déploiement de solutions de sécurité. Il est temps de réagir! Vous devez renforcer la résilience de toutes vos données en équipant votre société d'une protection muticouche. Rejoignez les spécialistes d'Arcserve et de Sophos lors d'un webcast exclusif et découvrez les méthodes efficaces pour réduire les vulnérabilités de votre organisation aux attaques par ransomware : - Défense proactive contre les attaques par ransomware, restauration orchestrée et stockage immuable, une combinaison gagnante pour assurer la securité de vos données - Restauration des données en cas de cyberattaques - Grâce à Arcserve et à Sophos, vous avez l'esprit tranquille en cas d'attaque par ransomware : vous allez pouvoir récupérer vos données et refuser toute demande de rançon Les solutions Arcserve, sécurisées par Sophos, vous proposent des fonctionnalités intégrées de cybersécurité et de protection des données SaaS, sur site et dans le cloud, grâce à un stockage immuable. * Cybersecurity Ventures : https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021
-
An Interview with Sophos: Navigating Cloud Security
By:
Type: Replay
Curious about how a leader in cybersecurity moves to the cloud? Join us for an exclusive interview with Ganesh Krishnan, VP of Engineering, and Guy Davies, Principal Cloud Architect at Sophos. We’ll discuss how to approach your transition to the cloud, cybersecurity fundamentals and how they need to be re-orientated to deal with cloud threats, and what they’ve learned after all these years of working with security and DevOps teams around the world.
-
Bolster signature-based malware detection with machine learning
By: Sentinel Labs, Inc.
Type: eGuide
Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
-
7 steps to a solid cybersecurity plan
By: Dimension Data
Type: eGuide
This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.
-
Best Practices zum Schutz vor Ransomware-Angriffen
By:
Type: Talk
Ransomware hat sich zum größten Risiko für Unternehmen jeder Größe entwickelt. Schätzungen zufolge erfolgt 2021 alle 11 Sekunden ein Angriff.* Es ist an der Zeit, sich dagegen zur Wehr zu setzen! Rüsten Sie Ihr Unternehmen mit einem mehrschichtigen Schutzsystem aus, um die allgemeine Ausfallsicherheit Ihrer Daten zu stärken. Nehmen Sie an einem exklusiven Webcast mit Experten von Arcserve und Sophos teil und erfahren Sie, wie Sie die Anfälligkeit Ihres Unternehmens gegenüber Ransomware effektiv auf ein Mindestmaß reduzieren können: - Proaktive Ransomware-Abwehr für Ihre Backup-Daten kombiniert mit orchestrierter Wiederherstellung und unveränderbarer Speicherung - So stellen Sie im Falle von Cyberattacken Ihre Daten wieder her - Wie Arcserve & Sophos Ihnen im Falle eines Ransomware-Angriffs Sicherheit geben können, damit Sie sich erholen und Lösegeldforderungen ablehnen können * Cybersecurity Ventures: https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021/
-
Demonstrating the value of marketing in tough times.
By:
Type: Talk
In the middle of volatile market dynamics and downward budget pressures, the need to demonstrate the value of marketing becomes more important than ever. In this webinar, our panelists will explore how we prove the impact of marketing on revenue in tough times. This panel will also discuss how best to navigate the tension between brand and demand for short-term sales, and what can be done to remain innovative despite dwindling budgets. Speakers include: -Megan Cabrera, Vice-President Marketing Ops, Sophos -Jenna Beck, Industry Growth Marketing Executive, TCS -Amanda Thompson, Director of Marketing Segmentation, Pax8
-
The Uncomfortable Truth about Microsoft 365
By:
Type: Talk
Is your Microsoft 365 data backed-up? Are you sure about that..? If these questions spark doubt in your mind then you already know that the answer is realistically - “No”. If you are confidently thinking “Yes”, but you have not recently checked the Microsoft 365 Service Level Agreement (SLA) or do not have your data pointing to a dedicated back-up service/solution then we’re afraid the answer is again, very probably, “No”. Join us our webcast where we will discuss the impact of the current Microsoft 365 SLA pertaining specifically to the significant gaps in data protection, back-up and recovery. Using genuine customer cases and the pitfalls they found themselves in, we will outline the points to be aware of and look at how adopting an Arcserve solution secured by Sophos can help you fill the void and provide peace of mind for you as it has them.
-
Endpoint and antimalware protection for small to large businesses
By: Carbon Black
Type: eGuide
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
-
CW APAC, April 2022: Trend Watch: Cyber security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
-
How to Achieve Effective Cloud Security
By:
Type: Talk
Cloud security is on everyone’s mind, from CEOs and CISOs to admins and endusers. As a result, cloud security spend has increased exponentially in recent years, yet companies still struggle to effectively and efficiently secure their cloud environments. To solve this problem, companies must radically rethink the concept of cloud security by pivoting from the traditional security paradigm to embracing the cloud. They must leverage and practice good architecture to build environments where security is part of the very fabric of the solution. Join Jorn Lutters, Sophos Sr. Security Architect Lead, Public Cloud, for a deep dive into cloud security architecture best practices and how automation and integration can help you optimize the effectiveness of your cloud security spend.
-
Accelerate compliance to regulations with secure SD-WAN
By: Hewlett Packard Enterprise
Type: White Paper
Security and compliance are top priorities for networking and security teams. With Zero Trust and SASE architectures, the network can become a security solution—improving connectivity experiences and compliance at the same time. Read this paper to learn how.
-
Jargon Buster Guide to Unified Communications
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
-
Ensure the security of your endpoint devices: Expert tips
By: Sentinel Labs, Inc.
Type: eGuide
Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
By: TechTarget ComputerWeekly.com
Type: Research Content
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
Your expert guide to endpoint security
By: Carbon Black
Type: eGuide
Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
-
How to get started with SASE
By: TechTarget ComputerWeekly.com
Type: Infographic
Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
-
Best practices for container security in the data center
By: TechTarget ComputerWeekly.com
Type: eGuide
Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.
-
Focus: Network security
By: TechTarget ComputerWeekly.com
Type: eGuide
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
-
The Evolving CIO role: from IT Operator to Business Strategist
By: BMC
Type: eGuide
Since its beginnings nearly 40 years ago, the job of an organization's top IT executive has involved the cost-effective and strategic management of IT systems. But today's CIOs must also understand how IT drives business transformation.
-
DDoS mitigation services: What your organization should consider
By: Arbor Networks
Type: eGuide
Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.
-
Making the case for cloud-based security
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Making the case for cloud-based security
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Voice of the Customer for Application Security Testing
By: Contrast Security
Type: Gartner Research Report
Application security testing tools help analyze apps for vulnerabilities. This Gartner Peer Insights report provides real-user ratings and insights to aid your buying decision. Read the full report for a comprehensive view of the application security testing market.
-
Sophos Ask Me Anything: Bug Bounties - on demand session
By:
Type: Replay
Join Sophos CISO, Ross McKerchar, and Bugcrowd CEO, Dave Gerry, as they answer your questions on the evolution and significance of bug bounty programs. From defining bug bounties and exploring their key benefits to understanding the intricacies of running a successful program, this session offers a comprehensive look into how to leverage crowdsourced security solutions effectively. We’ll dive in to: -Getting started and growing your program: Gain practical insights into launching, expanding, and measuring the impact of bug bounty programs over time. -Collaboration between hackers and organizations: Discover the relationship between the hacking community and organizations -Real-world examples and success stories: Hear about successful bug bounty programs and gain actionable tips for optimizing your own program. -The future of crowdsourced security: Explore emerging trends and predictions for the future of bug bounty programs, including their role in mitigating ransomware threats.
-
Secure texting: The next great healthcare communications frontier
By: AVST
Type: eGuide
In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
-
Network security in the post-pandemic era
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.
-
5 common SD-WAN challenges
By: TechTarget ComputerWeekly.com
Type: Infographic
SD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
April ezine: SD-WAN more than just networking
By: MicroScope
Type: Ezine
An issue covering SD-WAN, storage innovations and opportunities for channel growth
-
How Retailers Use LTE as Wireless WAN to Improve Service & Operations
By: Cradlepoint
Type: White Paper
Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.
-
A Computer Weekly buyer's guide to perimeterless network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Infographic: Who needs to be on your digital transformation team?
By: TechTarget ComputerWeekly.com
Type: Infographic
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.
-
Next generation network security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
-
November ezine: Peer-to-peer lending
By: MicroScope
Type: Ezine
Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for
-
5 endpoint security best practices
By: TechTarget ComputerWeekly.com
Type: eBook
With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.
-
Infographic: 7 steps to secure your home wi-fi network
By: TechTarget ComputerWeekly.com
Type: Infographic
Wi-Fi security, in particular, has evolved. While the days of war driving and finding home networks open to exploit may be over, home Wi-Fi security could still go sideways in many places. Here are seven recommendations to make sure your home Wi-Fi network is secure.