ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Sophos

  • Presentation Transcript: Data Protection Market Drivers and Channel Opportunities

    Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution.

  • Understanding the Total Cost of Ownership for Endpoint Security Solutions

    When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  • Presentation Transcript: Endpoint security fundamentals

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • Security Threat Report: July 2009 Update

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Security Threat Report: July 2009 Update

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Presentation Transcript: Endpoint security fundamentals

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • Understanding the Total Cost of Ownership for Endpoint Security Solutions

    When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  • Magic Quadrant for Endpoint Protection Platforms

    Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.

  • Application Discovery Tool

    With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.

  • Laws, regulations and compliance: Top tips for keeping your data under your control

    This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

  • Security Threat Report: July 2008

    This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.

  • Endpoint Security and Control

    Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.

  • Stopping data leakage: Exploiting your existing security investment

    This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.

  • Sophos Email Security Appliances

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.