Inhalte springen

Modernste Cybersicherheit

Die perfekte Kombination aus erstklassiger Technologie und menschlicher Expertise – optimal abgestimmt auf Ihre Bedürfnisse. So gewinnen Sie auf ganzer Linie.

Starker Schutz und eine adaptive, KI-native Plattform zur frühzeitigen Abwehr von Angriffen

DR-Experten, die Bedrohungen schnell und zuverlässig finden und beseitigen

Einzigartige Abwehrmaßnahmen für die gesamte Angriffsfläche – Endpoint, Firewall, E-Mail und Cloud

Company - Banner with Background Media - BG Image
About us

Technology you trust.
People you count on.

Sophos defeats cyberattacks with an adaptive
AI-native open platform and unmatched security expertise.

Company - Banner with Background Media - video
Play
Focus Scroll Background

Adaptive, KI-native Cybersecurity-Plattform

Sophos Central bietet Kunden erstklassigen Schutz und sorgt für mehr Effizienz bei der Abwehr. Dynamische Abwehrmaßnahmen, modernste KI und ein offenes Ökosystem mit vielen Integrationen – all das bietet die branchenweit führende KI-Cybersecurity-Plattform.

Sophos Central

Dynamischer Schutz

Der Schutz wird basierend auf Echtzeiteingaben aktualisiert und adaptive Abwehrmaßnahmen reagieren automatisch auf Bedrohungen.

Media and Icon Cards BG

Adaptive AI-native cybersecurity platform

Sophos Central delivers unrivalled protection for customers and enhances the power of defenders. Dynamic defenses, battle-proven AI, and an open, integration rich ecosystem come together in the largest AI-native platform in the industry.

Sophos X-Ops

Sophos X-Ops

Bietet kollektives Expertenwissen über die gesamte Angriffsumgebung zur effektiven Abwehr hochkomplexer Angreifer.

Wie Unternehmen mit
Sophos sicher bleiben

Customer success

Already a customer?
Find additional information to inspire, grow your knowledge, troubleshoot, and get help.

Sophos AI Robust Generate BG Image

Robust generative AI development process

The benefits of GenAI for cybersecurity are matched by their potential danger. Sophos deploys rigorous processes for all GenAI tools, from concept to full deployment. Detailed performance analysis and user feedback at each stage informs the next step in the development process.

Sophos AI Robust Generate

2nd Gen XGS desktop models

Product Detail Slider Background

* Transceivers sold separately

** 5G module (Gen.2) not sold in Japan 

Frequently asked questions

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

    1. Sophos Central offers
    2. centralized security

    3. management, real-time threat protection

    • It integrates seamlessly
    • automated responses, multi-factor aut

    • comprehensive and scalable solution for man

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs. Sophos Central offers centralized security section, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

  • Sophos Central offers centralized security management, real-time threat protection, automated responses, multi-factor authentication, secure data encryption, and custom dashboards. It integrates seamlessly with all Sophos products, providing a comprehensive and scalable solution for managing your cybersecurity needs.

Gated Resource Background

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Sophos and Tech Research Asia (TRA) present the latest Cybersecurity Playbook for Partners in Asia Pacific and Japan.

Based on research with 900 companies, the playbook explores trends in cybersecurity investment, challenges, and areas of growth for MSPs, building on insights from our previous report.

Key Insights:

  • Alignment of business goals with cybersecurity investments
  • Budget visibility and top growth areas for partners
  • Demand for AI-augmented cybersecurity solutions
  • Country-specific data snapshots for tailored partner strategies

Unlock Growth Potential

With 83% of companies increasing cybersecurity budgets and more than 50% expanding MSP use, the opportunity for growth is immense. Use this playbook to enhance client engagement, offer strategic support, and strengthen their cybersecurity resilience.

Download the full report to discover how you can drive growth in the APJ region.

Online criminal forums, both on the public internet and on the “dark web” of Tor .onion sites, are a rich resource for threat intelligence researchers. The Sophos Counter Threat Unit (CTU) have a team of darkweb researchers collecting intelligence and interacting with darkweb forums, but combing through these posts is a time-consuming and resource-intensive task, and it’s always possible that things are missed.

As we strive to make better use of AI and data analysis, Sophos AI researcher Francois Labreche, working with Estelle Ruellan of Flare and the Université de Montréal and Masarah Paquet-Clouston of the Université de Montréal, set out to see if they could approach the problem of identifying key actors on the dark web in a more automated way. Their work, originally presented at the 2024 APWG Symposium on Electronic Crime Research, has recently been published as a paper.

The approach

The research team combined a modification of a framework developed by criminologists Martin Bouchard and Holly Nguyen to separate professional criminals from amateurs in an analysis of the criminal cannabis industry with social-network analysis. With this, they were able to connect accounts posting in forums to exploits of recent Common Vulnerabilities and Exposures (CVEs), either based upon the naming of the CVE or by matching the post to the CVEs’ corresponding Common Attack Pattern Enumerations and Classifications (CAPECs) defined by MITRE.

Using the Flare threat research search engine, they gathered 11,558 posts by 4,441 individuals from between January 2015 and July 2023 on 124 different e-crime forums. The posts mentioned 6,232 different CVEs. The researchers used the data to create a bimodal social network that connected CAPECs to individual actors based on the contents of the actors’ posts. In this initial stage, they focused the dataset down to eliminate, for instance, CVEs that have no assigned CAPECs, and overly general attack methods that many threat actors use (and the posters who only discussed those general-purpose CVEs). Filtering such as this ultimately whittled the dataset down to 2,321 actors and 263 CAPECs.

The research team then used the Leiden community detection algorithm to cluster the actors into communities (“Communities of Interest”) with a shared interest in particular attack patterns. At this stage, eight communities stood out as relatively distinct. On average, individual actors were connected to 13 different CAPECs, while CAPECs were linked with 118 actors.

Pinpointing the key actors

Next, key actors were identified based on the expertise they exhibited in each community. Three factors were used to measure level of expertise:

  1. Skill Level: This was based on the measurement of skill required to use a CAPEC, as assessed by MITRE: ‘Low,’ ‘Medium,’ or ‘High,’ using the highest skill level among all the scenarios related to the attack pattern, to prevent underestimating actors’ skills. This was done for every CAPEC associated with the actor. To establish a representative skill level, the researchers used the 70th percentile value from each actor’s list of CAPECs and their associated skill levels. (For example, if John Doe discussed 8 CVEs that MITRE maps to 10 CAPECs – 5 rated High by MITRE, 4 rated Medium, and one rated Low – his representative skill level would be considered High.) Choosing this percentile value ensured that only actors with over 30 percent of their values equivalent to “High” would be classified as actually highly skilled.

Overall distribution of skill level values

  1. Commitment Level: This was quantified by the proportion of ‘in-interest’ posts (posts relating to a set of related CAPECs based on similar Communities of Interest) relative to an actor’s total posts. Actors who had three or fewer posts were disregarded, reducing the set to be evaluated to 359 actors.
  2. Activity Rate: The researchers added this element to the Bouchard/Nguyen framework to quantify each actor’s activity level in forums. It was measured by dividing the number of posts with a CVE and corresponding CAPEC by the number of days of the actor’s activity on the relevant forums. Activity rate actually turns out to be inverse to the skill level at which threat actors operate. More highly skilled actors have been on the forums for a long time, so their relative activity rate is much lower, despite having significant numbers of posts.

Descriptive statistics of sample

As shown above, the sample for the identification of key actors consisted of 359 actors. The average actor had 36.68% of posts committed to their Community of Interest and had a skill level of 2.19 (‘Medium’). The average activity rate was 0.72.

14 needles in a haystack

Finally, to identify the truly key actors — those with high enough skill level and commitment and activity rate to identify them as experts in their domains — the researchers used the K-means clustering algorithm. Using the three measurements created for each actor’s relationship with CAPECs, the 359 actors were clustered into eight clusters with similar levels of all three measurements.

Skill Level ValueCAPECs% of Skill Level Values among all values in actors’ list
Low118 (44.87%)57.71%
Medium66 (25.09%)24.14%
High79 (30.04%)18.14%
Figure 1: Bimodal actor-CAPEC networks, colored according to Communities of Interest; the CAPECs are shown in red for clarity

Overview of clusters

One cluster of 14 actors was graded as “Professionals” — key individuals; the best in their field; with high skill and commitment and low activity rate, again because of the length of their involvement with the forums (an average of 159 days) and a post rate that averaged about one post every 3-4 days. They focused on very specific communities of interest and did not post much beyond them, with a commitment level of 90.37%. There are inherent limitations to the analysis approach in this research— primarily because of the reliance on MITRE’s CAPEC and CVE mapping and the skill levels assigned by MITRE.

Conclusion

The research process includes defining problems and seeing how various structured approaches might lead to greater insight. Derivatives of the approach described in this research could be used by threat intelligence teams to develop a less biased approach to identifying e-crime masterminds, and Sophos CTU will now start looking at the outputs of this data to see if it can shape or improve our existing human-led research in this area.

EYEBROW

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Sophos and Tech Research Asia (TRA) present the latest Cybersecurity Playbook for Partners in Asia Pacific and Japan.

Based on research with 900 companies, the playbook explores trends in cybersecurity investment, challenges, and areas of growth for MSPs, building on insights from our previous report.

  • Alignment of business goals with cybersecurity investments
  • Budget visibility and top growth areas for partners
  • Demand for AI-augmented cybersecurity solutions
  • Country-specific data snapshots for tailored partner strategies

Based on research with 900 companies, the playbook explores trends in cybersecurity investment, challenges, and areas of growth for MSPs, building on insights from our previous report.

Python is dead. Long live Python!

Our people make Sophos special.

Join our team today. Check out our current openings.

shutterstock_1151944862-compressor

Sed et Lorem consectetur sit

Aliqua. ipsum et incididunt consectetur . amet Lorem aliqua. Lorem dolore incididunt adipiscing amet . tempor dolore tempor adipiscing tempor amet ut . amet consectetur magna elit amet do tempor consectetur . elit consectetur labore elit ut .

Partner News Cards BG
ROI Calculator Background

SD WAN Savings Calculator

See how much you can save by switching from MPLS to Sophos SD-WAN

Reduce reliance on expensive MPLS links by switching to SD-WAN. Maintain or increase application performance and availability.

How many sites do you have?
Current bandwidth of MPLS link
MBPS
Monthly payment for MPLS link
US$
Internet link bandwidth
MBPS
Monthly payment for internet link
US$
How much will you reduce MPLS?
%

The results provided by this tool are an estimate based on the information you provide. Your actual savings may vary.

See Your Savings

Current Monthly Cost

US$ 2,500

Projected Monthly Costs

US$ 1,500

Monthly Cost Reduction

40.00%

Three-year Savings

US$ 36,000

Sophos can help you decrease costs by offloading some or all of your MPLS connections to less expensive local internet services like 3G/4G, DSL, and cable. We'll work with you to build a secure, highly available, and higher performance WAN at a significant savings.

Single Card Block BG