- 8 January 2013 12:02
Sophos recognised as a leader in the 2013 Magic Quadrant for Endpoint Protection Platforms
Sydney, Australia – January 8, 2013 –Sophos today announced it has been positioned in the “Leaders” quadrant of Gartner, Inc’s 2013 "Magic Quadrant for Endpoint Protection Platforms*." The quadrant is based on an assessment of a company’s ability to execute and completeness of vision.
According to the report, “the endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.”
In 2012, Sophos added the award-winning functionality of Sophos Endpoint Protection to its unified threat management (UTM) solution, becoming the first company to offer protection for endpoints and the gateway from a single console. Sophos Endpoint Protection is also a key component of the company’s Complete Security Suite, which combines functions like endpoint, data and web and email protection, along with mobile device management (MDM) and protection for Microsoft Exchange and SharePoint.
Gartner also states that “In particular, mobile data protection is the leading complement to EPP and purchasing decisions regarding the two products are increasingly made together. For most organisations, selecting a mobile data protection system from their incumbent EPP vendors will meet their requirements.”
To help meet the need for mobile device management solutions, Sophos will soon announce a combined endpoint and mobile protection license—Sophos EndUser Protection—that provides consolidated protection for every device on a network—for all traditional endpoints and mobile devices.
“Our latest Threat Report highlighted how trends such as BYOD and a move toward cloud services, as well as a more mobile workforce, have increased the complexity of securing an organisation’s IT infrastructure,” said John Shaw, vice president, product management, Sophos. “We continue to advance endpoint protection—from integrating UTM and endpoint into a single console to offering MDM and endpoint as a single, per-user license. Coupled with our array of complete security offerings, we simplify the daunting task of protecting modern networks and ensuring all employees have access to the tools they need to remain productive.”
Sophos was also positioned as a “Leader” in the 2012 Magic Quadrant for Mobile Data Protection and the 2012 Magic Quadrant for Unified Threat Management.
To download a complimentary copy of this report, click here: http://www.sophos.com/en-us/security-news-trends/reports/gartner/magic-quadrant-endpoint-protection-platforms.aspx.
About the Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
More than 100 million users in 150 countries rely on Sophos’s complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’s award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centres.
Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.
*Gartner, Inc. "Magic Quadrant for Endpoint Protection Platforms " by John Girard Neil MacDonald, January 2, 2013
+61 2 8016 2200
+61 2 8016 2200
Sign up now »
RSA offers a wide range of strong two-factor authentication solutions to help organizations assure user identities and meet compliance requirements.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.