Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Sophos - What you need to know about the Bash “Shellshock” vulnerability

2014/09/26 by admin

In the light of the recent Bash vulnerability known as “Shellshock” (CVE-2014-6271 and CVE-2014-7169), here’s the reality instead of the hype.

Shellshock is a newly-discovered vulnerability in Bash (the Bourne Again Shell), one of the most commonly used shells on Linux, UNIX and OS X.

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue.

Please see our article on Naked Security for an explanation of the vulnerability itself.

In addition, we have examined our products and we are confident that the Shellshock vulnerability can’t be exploited in any Sophos product. Our IT systems have also been patched or were not vulnerable.

For the latest information on how this bug affects Sophos products, please refer to our knowledgebase article from Sophos Support.

Filed Under: Security News, Sophos

How long have you had your firewall?

2014/09/25 by admin

Chances are that you have had the firewall for some time and unless there has been a problem, you simply keep renewing the product year after year. Security and productivity challenges have changed a lot lately, and so has firewall technology.

Unified Threat Management systems provide a layered defense without having to buy each component separately- Firewall, Email Firewall, Web Application Firewall and manage the wireless access Points.

A Unified Threat Management system, such as the Sophos SG /UTM units include:

Network Protection - Configurable intrusion prevention with flexible VPN options for site-to-site and remote access

Email Protection - Stops spam and viruses while keeping sensitive data safe with DLP and policy based encryption

Web Protection - Protect users from web threats, control online productivity and manage your web application bandwidth

Webserver Protection - Reverse proxy protects servers from exploits while providing authentication for external users

Wireless Protection - Centrally manage Wi-Fi access points and set up hotspots and guest access in minutes

Endpoint Protection - Provides desktops, laptops, and servers with antivirus, device control and web security

The Sophos UTM provides all of the above, and more. Contact us for more information.

Filed Under: antivirus, Cloud, compliance, endpoint, Products, Security News, Sophos

Time for a Firewall Refresh?

2014/08/29 by admin

Demands on your network don’t stand still, and nor should your firewall. If your current firewall doesn’t deliver the usability, protection or performance you need, then it’s time to switch.

The Sophos Firewall Product Suite offers products to fit almost any budget as well, they

  • Keep installation as simple as possible
  • Need more power - try the New SG Units
  • Built in Reporting
  • One Box Solution - offering the latest next-gen firewall protection you need plus features you can’t get anywhere else - including mobile, web, endpoint, email encryption and DLP.

Contact us for more information or request an evaluation.

Filed Under: antivirus, compliance, endpoint, industry, Malware, PCI, Security News, Sophos, Unified Threat Management

Sophos Mobile Control 4.0 Delivers User-Centric Approach

2014/05/27 by admin

Sophos Mobile Control 4.0 Delivers User-Centric Approach to Protect, Secure and Manage Mobile Devices

Market Watch - May 27, 2014

Sophos today announced Sophos Mobile Control (SMC) 4.0, the first Enterprise Mobile Management (EMM) solution to include individual file encryption, integrated AV and web filtering. Available on premise or as-a-service, SMC provides a simple and differentiated approach for small and mid-market organizations to manage and secure mobile devices, content and applications. The new Sophos solution helps IT professionals confidently implement BYOD policies and provides users the flexibility they demand to stay productive and safe. It supports iOS, Android and Windows Phone 8 devices.

SMC 4.0: Mobile Encryption, Integrated Security and User-Centricity

SMC 4.0 provides a simple, hassle-free and comprehensive approach to protecting mobile devices. With Mobile Content Management for iOS devices, SMC is the only EMM solution to offer file-level encryption, which gates access to each file, to protect the data in the office and on the go. SMC also delivers integrated security against malware and malicious web sites for Android devices, which account for 80 percent of smartphone operating systems* worldwide as well as the majority of mobile malware threats. The number of unique pieces of mobile malware seen by SophosLabs has now reached almost 900,000 and is growing rapidly.

With web protection for Android, IT administrators can select web site categories to control access and block data-stealing or inappropriate web pages. SMC 4.0 also provides unique integration with Sophos UTM, Checkpoint and Cisco to provide network access control. Compromised devices are isolated from the network, protecting the organization’s assets from malware on mobile devices. SMC’s user-centric deployment, management and pricing greatly simplifies administration. With an intuitive web-based management console, IT administrators can provide their users with a self-service portal to change passwords, register devices and report lost or stolen devices.

Sophos Survey: Mobile Security in a Cloudy World

Sophos conducted a survey of more than 725 IT professionals on their use and preferences of cloud share services, encryption and mobile devices. The survey showed 84 percent of organizations allow some level of access from company-issued devices to cloud-based file share services such as Dropbox, however 65 percent of respondents do not currently encrypt data between the cloud and mobile devices. Surprisingly only 38 percent feel secure sharing corporate files or collaborating on corporate content between the cloud and mobile devices. Click her to access the Survey Results

The results of the survey demonstrate the enormous opportunity for SMC 4.0, as it assures organizations that their data is safe wherever users are and provides organizations with the confidence to use cloud accounts for collaborating and maintaining content safely and securely.

Dan Schiappa, SVP and GM of Sophos’ Enduser Security Group, said: “SMC 4.0 extends the Sophos commitment to delivering comprehensive data protection, offering solutions to manage, secure and protect not just the mobile devices themselves, but also the content and applications on those devices. SMC 4.0 takes data protection beyond the office door by ensuring persistent mobile encryption on devices. Additional network access control based on device compliance status makes mobile device management, content management and mobile security simple and effective.”

Chris Hazelton, Research Director for Mobile & Wireless at 451 Research, said: “The rapid shift to more flexible and increasingly mobile working patterns has led to widespread adoption (with or without the consent of IT) of file-sync and -share services as users seek to store and collaborate on shared content. This ‘any device, any cloud’ trend will only continue, so organizations face an increased risk of losing sensitive corporate data if they don’t deploy encryption and data loss protection tools. The integration of these data security tools into EMM provides companies with a simple deployment option that should resonate well with the SMB market.”

Sophos Customers Look Forward to SMC 4.0

Filed Under: byod, Security News, Sophos

Sophos - SG Series Appliances

2014/05/05 by admin

Sophos has recently released the new SG Series Appliance, these appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organization requiring high-availability and enterprise-grade features, the SG Series appliances are an ideal fit.

For more information, please donwload the SG Series Appliances - Datasheet

Filed Under: Advanced Persistent Threat, Cloud, industry, PCI, Security News, Sophos, Unified Threat Management

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement