Search Refinements
Search Results: Sophos
1-8 of 8 results

Defending the email infrastructure: Why email requires comprehensive protection

With organizations facing a growing number of threats and an increasingly regulated business environment, ensuring security and compliance across...

Published 03 November 2010

Email Security and Control

Keeping unwanted and malicious email out of your inboxes is easy with Email Security and Control.

Published 03 November 2010

Endpoint Security and Control

Endpoint Security and Control combines anti-virus and client firewall protection with endpoint assessment and control to secure your desktops,...

Published 03 November 2010

NAC at the endpoint: control your network through device compliance

Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed...

Published 03 November 2010

Network Access Control

With network access control (NAC) protection you reduce the risk of unauthorized, non-compliant, or infected systems compromising your network...

Published 03 November 2010

Stopping data leakage: Exploiting your existing security investment

As attitudes to work and information continue to evolve away from those of the past, organizations are become more aware of the acute need to...

Published 03 November 2010

Web Security and Control

Web Security and Control at the gateway blocks spyware, viruses, malware, anonymizing proxies and other unwanted applications enabling...

Published 03 November 2010

Sophos overview

Published 03 October 2008

1-8 of 8 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

See more

CBR White Paper Recommendations

  • Defending the email infrastructure: Why email requires comprehensive protection

    03 November 2010 | By Sophos

    With organizations facing a growing number of threats and an increasingly regulated business environment, ensuring security and compliance across the email infrastructure is paramount. The complexity of this challenge requires a comprehensive solution. To block attacks and enforce acceptable use of email, organizations need to deploy integrated protection at the email gateway, on the email server and on all endpoint computers. This paper explores the threats facing email infrastructures, illustrating the need for multi-layered security....

    White Papers
  • NAC at the endpoint: control your network through device compliance

    03 November 2010 | By Sophos

    Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the increase in mobile workers, numbers and type of device and the amount of non-employees requiring network access, has led to a dissolving of that network perimeter. Access requests can come from anyone and anywhere, which is why organizations are turning to network access control (NAC) technologies. This paper discusses why NAC is important and how it should be implemented on the endpoint for maximum protection....

    White Papers
  • Stopping data leakage: Exploiting your existing security investment

    03 November 2010 | By Sophos

    As attitudes to work and information continue to evolve away from those of the past, organizations are become more aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support this policy, and describes where new investment should realistically be made....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.