Learn how to enforce access to an internal web application and SSH/RDP servers via the Sophos Protected Browser. Ask questions and get expert answers in the Sophos Community.
Delivered through the AI-powered Sophos Central platform, Sophos Workspace Protection includes Sophos Protected Browser, Sophos ZTNA, Sophos DNS for Endpoints, and an email monitoring system.
Gold Blade doesn’t send phishing emails. Instead, they weaponize resumes and slip past defenses through legit recruitment sites. Sophos threat researcher Morgan Demboski breaks down their stealthy tactics.
Learn how to manually create user mailboxes and import mailboxes using CSV files in Sophos Email. Ask questions and get expert answers in the Sophos Community.
Sophos Anti-Exploitation technology in Sophos Endpoint places lightweight integrity guards inside every running process — including malware itself — to shield your applications and keep them behaving as intended, all without affecting performance.
An overview of Role-Based Access Control (RBAC) in Sophos Central. Learn about the predefined roles for admins, how to manage role members, and the steps to create a custom role. Ask questions and get expert answers in the Sophos Community.