Provider Profile

Sophos

Science Park, The Pentagon, Barton Ln, Abingdon OX14 3YP, Vereinigtes Königreich
1985
>10000

About Sophos

With threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos offers a broad portfolio of state-of-the-art products and services. These reliably protect users, networks and endpoints against malware, exploits, phishing and other cyberattacks. With Sophos Central, Sophos offers a central, cloud-based management console. It forms the heart of our adaptive cybersecurity ecosystem. Part of this system is a centralized data lake. It uses a variety of open APIs that are available to customers, partners, developers and other cybersecurity providers. Sophos sells its products and services through a global network of distribution partners and managed service providers (MSPs).

What Differentiates Them From Competitors?

With Sophos Central, Sophos offers a central, cloud-based management console. It forms the heart of our adaptive cybersecurity ecosystem. Part of this system is a centralized data lake. It uses a variety of open APIs that are available to customers, partners, developers and other cybersecurity providers. Sophos sells its products and services through a global network of distribution partners and managed service providers (MSPs).

Top Capabilities

Endpoint Protection
Technical solutions to protect the endpoints against cyber attacks (e.g. AV, EDR or EPP).
Incident Response Services
Expert services like incident response retainers and forensics.
NDR – Network Detection / Response
Network Detection and response (NDR) is a security tool that monitors an enterprise's network traffic to gain visibility into potential cyberthreats relying on advanced capabilities like behaviorial analytics.
Network Security Solutions
Technical implementation services and solutions like e.g. NAC.
Security Operations Center
Central point for monitoring and ad-hoc response to all security events.

Top Industries

Healthcare
Public Authorities

All Capabilities

Anomaly Detection
Application Security
APT-Response (Advanced Persistent Threat)
Asset Management
Back-up Management
Backup Infrastructure
Backup Solutions
BCM (Business Communications Management)
Certification (ISO 27001, IEC 62443, ...)
Cloud Security
Code Scanner
Data Governance
Data Loss Prevention
Data Protection
Detect & Respond
Digital Identity
Disaster Recovery
EDR (Endpoint Detection and Response)
eMail Encryption
eMail Security
Endpoint Security
Forensics
GRC (Governance, Risk, Compliance)
Hardening
Identity & Access Management
Incident Response
ISMS (Information Security Management System)
Legal Counseling
Logging
MDR (Managed Detection and Response)
MFA (Multi-Factor Authentication)
Mobile Security
NDR (Network Detection and Response)
Network Security
OT Monitoring
PAM (Privileged Access Management)
Patch Management
Penetration Testing
Phishing Reporting
Phishing Tests
PKI (Public Key Infrastructure)
Product Security
Remote Access
Remote Maintenance
Risk Scoring
Secure Code
Secure Data Workflow
Secure File Sharing
Security Architecture
Security Consulting
Security Testing
SIEM (Security Information and Event Management)
SOC (Security Operations Center)
Software Implementation
SSO (Single Sign-on)
Strategy & Advisory
Threat Detection
Training & Security Awareness
Versionsmanagement
Vulnerability Management
Vulnerability Scanner
Workplace Security
XDR (Extended Detection and Response)
Zone Concept

Provider Contact

pd_contact_avatar_fallback_old_pd
Sven Janssen
VP, Sales - EMEA Central