Use the summertime to become a Sophos Central expert with their exclusive webinar series! You will learn how Sophos Central helps your customers to manage their IT security with a single interface and benefit from the revolutionary Synchronized Security technology. Across a series of 9 technical webinars, you’ll easily and conveniently learn all about Sophos… Read More Sophos Central Academy 2019 – Become a Central Expert and Boost your Sales!
Earlier in the week, the Rackmount.IT team came into our Lifeboat headquarters office to educate our sales team on their rack mount kits. Simply put as this: You protect your phone with a phone case, why wouldn’t you protect your desktop firewalls with the same protection? Rackmount.IT provides rack mount kits for desktop firewalls ,which… Read More Rack Mount Kits from Rackmount.IT now at Lifeboat!
Sophos Partner Portal: Your Gateway to Success Wed, Jul 17, 2019 1:00 PM – 1:30 PM EDT- 1:00pm EDT/10:00am PDT REGISTER TODAY! Tune into the webinar on July 17th to learn about the wide range of resources Sophos offers to help you maximize your success. Sophos wants to make sure you have what you need… Read More Upcoming Sophos Webinars!
Here’s what Sarah Pan, Product Manager at Imperva, considers the biggest contradiction in cybersecurity: the most-financially-damaging, reputation-destroying security incidents almost always involves the theft of millions of database records. Yet, data security is one of the smallest line items in a security budget. Consider that total spending on security is forecast to hit $124 billion… Read More Infonomics-based Model Teaches CISOs how to Assess their Data’s Financial Risk, Invest Properly in Data Security
Today’s data-driven environment means we’re living in a digital world. Many of the promises of “the world of the future” that were pictured years ago have become a reality, as homes are smarter, shopping is easier, and we’re constantly connected to our loved ones. For companies around the world, data and automation have combined to… Read More We’ve Seen The Future, And It’s Cyber Protection
Thycotic is excited to announce the redesign of Secret Server! In 2019, Thycotic has invested heavily in UX. They have built a team of UX and Human Computer Interaction Specialists to lead these initiatives. They are improving the UX/UI of all Thycotic products in 2019 as they continue in their efforts to remain the leader… Read More The Redesign of Secret Server: What went into making Secret Server this good?
There is no “I” in Team, but there is in “TeamViewer Tensor Single-Sign-On”! With TeamViewer Tensor, Enterprises have many Single Sign-On and Multi-factor Authentication Security Options – which is a solution match made in heaven. And if you have enterprise customers who have to manage hundreds of employees and thousands of endpoints, then security upgrades… Read More There is no “I” in Team, but there is in “TeamViewer Tensor Single-Sign-On”!
By James R. Slaby, Acronis Director of Cyber Protection With recent attacks against government offices like Baltimore, MD and the crippling of A2 Hosting’s servers, the scourge of ransomware continues to dominate the headlines about cybercrime. Recognizing that threat doesn’t require an IT background – stories abound regarding the destruction that the online threat causes… Read More Why Is Ransomware Still the Top Cybercrime? A Former FBI Counter-Intelligence Operative Will Explain
Intercept X Advanced for Server with EDR now launched! Bringing the power of Endpoint Detection and Response (EDR) to Intercept X for Server. Unmatched Server Protection Sophos Intercept X for Server secures cloud, on-premises, or hybrid server environments from the latest malware threats, gives unparalleled visibility into the organization’s estate and allows them control exactly… Read More Sophos Intercept X Advanced for Server with EDR- NOW AVAILABLE!
Threat hunting has become a bit of a buzzword within the information security industry and depending on who you ask, you’re likely to get a different response from person-to-person. There is no industry standard for what a threat hunting process looks like, but there are a few characteristics present in most descriptions of the process.… Read More Threat Hunting with Extrahop Reveal(x)