Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...

White Paper | Presented by Sophos

Sophos and Microsoft Azure: Considerations for Cloud Security

You've chosen to run your applications and workloads in the cloud. Now how do you secure them? Microsoft works hard to protect the Azure cloud. But that's only for the underlying cloud infrastructure. What about your applications and data themselves? Azure manages security of the cloud; security in the cloud is up to you. As you move workloads to Azure, don't assume they're automatically protected.

White Paper | Presented by Sophos

Protect Your Remote Desktop Users From Malware With An Outbound Gateway Protection On Aws

More and more organizations are moving to AWS to capture the benefits of the cloud, including scalability, reduced TCO, and the flexibility of AWS services to meet unique business needs. A vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure.

Case Study | Presented by Sophos

Sophos Enables ATLO Software to Launch Groundbreaking, Evolutionary Workforce Development

Sophos UTM helps customers by providing an easy to use, all-in-one, network security solution. By leveraging Sophos UTM and Amazon Virtual Private Cloud (Amazon VPC), organizations are able to build an Outbound Gateway (OGW) to enforce user-defined security policies, acceptable use, and help prevent remote desktops from malware infections.

White Paper | Presented by Sophos

A Coming Flood or a Distant Storm? The GDPR from a North American Perspective

The General Data Protection Regulation (GDPR) is a legislative framework valid across all the European Union (EU) states, replacing a patchwork of country-specific legislations. It is a law that is designed to strengthen the privacy and protect data for individuals across all the EU countries by requiring companies to adopt new data protection processes and controls.

White Paper | Presented by Sophos

Exploits. Intercepted.

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads.

White Paper | Presented by Sophos

Firewall Best Practices to Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job.

White Paper | Presented by Sophos

How to Stay Protected against Ransomware

Ransomware threats like Cryptowall, TeslaCrypt and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short and long term steps that organizations should take to protect against them.

White Paper | Presented by Sophos

Keep Your Network Under Control

Unwanted and evasive applications can have serious consequences for the security and performance of your corporate network. Yet a recent survey showed that on average 60% of network traffic is going unidentified. So why are firewalls struggling to identify network traffic? What are the risks with traffic you can't identify? And which features does your firewall need to deliver essential network visibility?

White Paper | Presented by Sophos

Synchronized Security: A Revolution in Threat Protection

Complex, coordinated malware attacks are now the norm - a single threat will often touch your web browser, firewall, servers, endpoints and data. While threats have gotten more coordinated, the security solutions that protect against them have continued to work in isolation. Download to learn how Synchronized Security offers a security system where integrated products automatically share security information and respond automatically to attacks.