Sophos Tops G2 Winter 2026 Reports: #1 Overall in Endpoint, XDR, MDR and Firewall
G2 has published its Winter 2026 Reports, and customers once again ranked Sophos as a top security vendor. Sophos is...
G2 has published its Winter 2026 Reports, and customers once again ranked Sophos as a top security vendor. Sophos is...
The product team is pleased to announce that Sophos Firewall v22 is now generally available. This update brings several Secure...
We’re thrilled to unveil Sophos Intelix for Microsoft 365 Copilot, a powerful new integration that brings world-class threat intelligence from...
Sophos is excited to announce the launch of the new Sophos Intelix for Microsoft Security Copilot agent, now available in...
Sophos’ latest annual study explores the real-world ransomware experiences of 332 manufacturing and production organizations hit by ransomware in the...
We released Sophos DNS Protection for networks last year, and it is now close to serving its 600 billionth query....
We’re excited to share that the Sophos Central UAE Region is now live! Hosted on Amazon Web Services (AWS) within...
J’ai le plaisir de vous faire part de trois mises à jour importantes qui renforcent la cybersécurité des organisations utilisant...
Les attaquants ne pénètrent plus dans les systèmes, ils se connectent. Ce changement a fait de l’identité le nouveau périmètre...
Dans les derniers articles consacrés à notre dernière version de Sophos Firewall, nous avons abordé de nombreuses améliorations importantes apportées...
La dernière étude annuelle de Sophos explore les expériences réelles vécues par 292 prestataires de santé touchés par des ransomwares...
En tant que MSP (Managed Service Provider) de confiance, en plein développement et prenant en charge plus de 10 000...
It’s that time of year when network admins in many parts of the world are looking forward to spending more...
I’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand...
Attackers don’t break in — they log in. That shift has made identity the new perimeter of modern cybersecurity. Every...