Connect with us

Hi, what are you looking for?

HEADLINES

Sophos adds sandboxing technology to its email security gateway

Sophos has announced that its Sophos Email Appliance now includes Sophos Sandstorm, an advanced, next-generation sandboxing technology that quickly and accurately detects, blocks and responds to sophisticated, constantly-changing cyber threats.

Sophos Sandstorm is an advanced persistent threat (APT) and zero day malware security technology.  To combat elusive threats that target email accounts on multiple platforms and mobile devices, companies need signatureless protection in addition to traditional malware protection.

Threats are now engineered to be “low and slow” to stay under the radar, using polymorphic and stealth techniques to avoid and delay detection. Today’s cybercriminals are also proactively taking steps to target, research and crack an organisation’s specific security measures by sending bespoke malware attached to seemingly-benign email messages.

Sophos Sandstorm uses powerful cloud-based technology to isolate and address these types of threats before they enter a business network. Information technology managers are provided with detailed reports of threat behavior and analysis for further investigation and action, if required.

“Sophos Sandstorm combines prevention, detection and investigation in one solution to protect against cybercriminals who now use social-engineering tactics with new, not-previously-known malware to invade company networks,” said Bryan Barney, senior vice president and general manager, Sophos Network Security Group.

Advertisement. Scroll to continue reading.

“Keeping threats away from the network is a critical first line of defense. Sophos Sandstorm automatically isolates files to determine if they’re safe, providing an instant additional layer of detection and protection. Advanced technologies are often too expensive and require additional security expertise to implement and monitor them. Sophos is changing this by providing all businesses access to advanced protection that’s affordable and simple to deploy.”

Sophos Sandstorm determines potential threat behavior across multiple operating systems, including: Windows, Mac and Android; physical and virtual hosts; networks; web mail; Word and PDF documents; more than 20 file types; mobile applications and more. Sophos Sandstorm is available as a subscription option in Sophos Email Appliance 4.0.

Sophos Sandstorm is also available as an option for the Sophos Web Appliance, an advanced web protection solution that scans web content and blocks the latest web threats. Customers will also have the option of adding Sophos Sandstorm to Sophos UTM 9.4, a comprehensive firewall solution, which is currently in beta.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Organizations of all sizes gain real-time access to Sophos threat intelligence within Microsoft’s AI-powered environments, helping them strengthen defenses and respond to threats more...

HEADLINES

This new solution for Sophos XDR and Sophos MDR continuously monitors customer environments for identity risks and misconfigurations and scans the dark web for...

HEADLINES

These offerings – External Penetration Testing, Internal Penetration Testing, Wireless Network Penetration Testing, and Web Application Security Assessment – help fortify an organization’s defenses...

HEADLINES

The global study of 441 IT and cybersecurity leaders shows the education sector is making measurable progress in defending against ransomware, with fewer ransom...

HEADLINES

This initiative enhances protection for more than 300,000 organizations worldwide including Sophos customers using Sophos Endpoint powered by Intercept X, Sophos Managed Detection and...

HEADLINES

This launch marks a significant expansion in the services and support available to partners. By combining the strengths of Sophos and Secureworks, the new...

HEADLINES

Organizations must implement a risk assessment methodology that is aligned with their operational realities – by establishing a clear asset baseline, organizations can engage...

APPS

Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in the Philippines...

Advertisement