Sophos Continues to Earn Accolades from CRN Test Center

February 11, 2009 Sophos Press Release

CRN Test Center
Sophos Endpoint Security and Control was named the top choice for endpoint security by CRN Test Center

BOSTON, Mass. - February 2009 - IT security and control firm, Sophos, today announced that Sophos Endpoint Security and Control was named the top choice for endpoint security by CRN Test Center.

Over the course of several months, the CRN Test Center analyzed a variety of threats using their own security test bed. The attacks came from places as far away as China and as close as the U.S. The test center saw round the clock port scanning by potential unidentifiable cybercriminals seeking entry into the data center. By the end of 2008, they saw a surge of attacks against their SQL database.

The Test Center's goal was to find a multilayered security approach offering the best protection against today's threats. CRN looked at several security products that focused on at least one or more of these key areas: detection/intrusion protection, endpoint control, and malware and Web content management.

CRN selected Sophos for endpoint protection, noting that "Sophos has an incredible ability to develop great security products while keeping a level of simplicity about the administration and continues its stance as a proven leader in the security business."

Sophos Endpoint Security and Control gives businesses the best proactive protection against viruses, malware and unwanted applications across a wide range of platforms for desktops, laptops, file servers and mobile devices. The company is the first endpoint vendor to incorporate NAC, enabling enterprises to keep all managed, unmanaged and guest computers on their networks healthy with up-to-date protection. One scan using Sophos's faster, lower impact agent will detect malware, adware, suspicious files and behavior, and unauthorized software.

For more information about Sophos Endpoint Security and Control, visit: www.sophos.com/products/enterprise/endpoint/security-and-control/8.0/

To view the full article, visit: www.crn.com/security/212701657