Sophos Whitepapers


Sort by: Date | Company | Title


Endpoint Security Buyers Guide
By Sophos | 13/7/2018

This guide will provide clarity by walking you through the key preventative technologies to ensure you have the right defences in place at the endpoint to protect your organisation. It will also enable you to see how different vendors stack up in independent tests, helping your make an informed choice.

Download this now


Checklist: How to stop Ransomware
By Sophos | 22/11/2017

Ransomware attacks start in two main ways. A booby-trapped email with a malicious attachment or via a compromised website; which then work their way down to your endpoints and servers. To stop these attacks, it’s critical that you have advanced protection technology in place at each stage of the attack and combine this protection with good user security practices.

Download this now


Firewall Best Practices to Block Ransomware
By Sophos | 25/9/2017

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job.

In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

Download this now


Firewall Best Practices to block Ransomware
By Sophos | 5/9/2017

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers.

Download this now


Synchronized Security: A Revolution in Threat Protection
By Sophos | 5/9/2017

All businesses large, small or in-between, must live and learn to thrive in a world with an ever-increasing threat of cyber risks. Those risks are rising for many reasons, from the growing attack surface to the increasing complexity and sophistication of such attacks.

Download this now


How to stay protected against ransomware
By Sophos | 1/8/2017

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity.

Download this now


Top 5 Myths of Safe Web Browsing
By Sophos | 24/5/2012

There are a lot of misconceptions out there about safe web browsing. You might think you're being safe. But without the facts it’s next to impossible to stay protected against today’s changing threats. In this paper we describe the top five myths of safe web browsing, what the facts really are, and what you can do to stay secure.

Download this now


Fixing Your Dropbox Problem - How the Right Data Protection Strategy Can Help
By Sophos | 23/4/2012

It’s estimated that more than 50 million people have used public cloud storage services such as Dropbox to share and exchange files. Public cloud services are so easy to use that their openness can undermine existing IT policies regarding the transmission of confidential data. With data volumes threatening to overwhelm onsite storage, IT managers are looking to find a solution that’s affordable and secure. This paper details a simple three-step approach to helping users manage access to the public cloud without placing your data or your business at risk. Read on.

Download this now


Endpoint Buyers Guide
By Sophos | 11/4/2012

In this Endpoint Buyers Guide, we examine the top vendors according to market share and industry analysis: Kaspersky Lab, McAfee, Sophos, Symantec and Trend Micro. Each vendor’s solutions are evaluated according to: Product features and capabilities, Effectiveness, Performance, Usability, Data protection and Technical support.

Download this now


Six tips for choosing a unified threat management (UTM) solution
By Sophos | 2/2/2012

As network security grows more complex, businesses are demanding the simplicity of unified threat management (UTM). Businesses like yours are replacing multiple, outdated and costly appliances from different vendors with a single, reliable UTM solution. The best solutions offer a more powerful way to manage network security today and in the future. UTM also promises to slash your network security management efforts and hardware costs. This whitepaper offers you detailed advice on how to choose the comprehensive unified threat management (UTM) that best suits your business.

Download this now