Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today's most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.

Our Website:

Research Report: Sophos 2023 Threat Report

by SophosDec 13, 2022

Based on the research and real-world experiences of Sophos' threat, incident response and AI experts, the Sophos 2023 Threat Report documents the latest cyberthreat trends over the last year and provides insight into:

  • The cyber impact of the war in Ukraine
  • The maturity of the "as-a-service" industry
  • How ransomware operators have evolved their tactics
  • The legitimate security tools criminals are leveraging to execute attacks
  • An analysis of the threats facing Linux, Mac, and mobile systems

Whitepaper: Endpoint Security Buyers Guide

by SophosOct 20, 2022

See how the different security vendors stack up.

  • Get an overview of endpoint security features, and capabilities, including next-gen technologies.
  • Compare the leading vendors including Sophos, Symantec, McAfee, Kaspersky, Microsoft, Bitdefender, Trend Micro, SentinelOne, and CrowdStrike.
  • See a summary of analyst reports from Gartner, Forrester, SE Labs, MRG Effitas, and AV Comparables.

Whitepaper: Extended Detection and Response (XDR) - Beginner's Guide

by SophosOct 20, 2022

XDR (Extended Detection and Response) is a very hot topic in the cybersecurity world. Going beyond the endpoint and server to incorporate firewall, email and other data sources into your IT operations and threat hunting tasks is more important than ever before.

But what exactly is XDR? How can it benefit your organization? And how is it different from Endpoint Detection and Response (EDR)?

Read this beginner's guide for an introduction to Extended Detection and Response. It covers:

  • An overview of XDR
  • The benefits of XDR
  • Real world XDR use cases
  • How Sophos can help

Research Report: Sophos 2022 Threat Report

by SophosOct 20, 2022

As we move into 2022, ransomware shows no signs of slowing down — that's no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It's up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond. In this report you'll find:

  • The future of ransomware
  • The impact of Ransomware-as-a-Service
  • The expanding threat of extortion-style attacks
  • How misuse of "threat emulation" tools has impacted cybersecurity
  • AI and its role in 2022 and beyond

Whitepaper: Getting Started with Threat Hunting

by SophosOct 20, 2022

The practice of threat hunting has become critical in stopping today's elusive human-led cyber threats — but it isn't easy.

In this new report, we provide guidance on getting you started with threat hunting. Drawing on the insights from Sophos' team of expert incident responders and security analysts, the report covers:

  • What threat hunting is and why it has become so important
  • A summary of the tools and frameworks security teams are leveraging to support their threat hunting objectives
  • The five steps IT professionals should follow to prepare for threat hunting

Whitepaper: Managed Detection and Response (MDR) Services Buyers Guide

by SophosOct 20, 2022

Technology solutions alone cannot prevent every cyberattack. As a result, organizations are increasingly looking towards managed detection and response (MDR) services to run their security operations program.

Find out what you need to know before choosing your MDR provider:

  • Key benefits of implementing a MDR service as part of your cybersecurity strategy
  • Overview of the key considerations when choosing a MDR service
  • Compare the leading vendors including Sophos, Carbon Black, Huntress, Perch, Arctic Wolf, eSentire, Expel, Rapid7, Red Canary, SentinelOne, and CrowdStrike.

Whitepaper: Active Adversary Playbook 2022

by SophosJun 21, 2022

Based on a detailed analysis of 144 incidents investigated by the Sophos Rapid Response team — this piece provides insights into how adversaries enter organizations and what they do once inside.

In this report, findings include:

  • Attacker dwell time is up, and varies by company size
  • Exploitation of vulnerabilities is the most common way attacks start
  • RDP is used for internal movement by adversaries in four out of five incidents
  • Data exfiltration has increased over the last year

Research Report: The State of Ransomware 2022

by SophosMay 04, 2022

5,600 IT professionals from 31 countries responded to this year's report, revealing fresh insights into the impact and cost of a ransomware attack. They also exposed how the experience of securing cyber insurance has changed over the last year, and how often insurers pay out in the event of a ransomware attack.

In this report you'll learn:

  • How the rate of ransomware attacks has changed over the last year
  • The different methods used to recover encrypted data
  • The average ransom payment over the last year for mid-sized organizations
  • The wider organizational impact of a ransomware attack
  • How often cyber insurance providers pay the ransom

Whitepaper: What's Next for Cyber Insurance?

by SophosMay 04, 2022

Cyber insurance is changing. Fast.

Growing losses and a rapidly evolving risk landscape—both online and offline—have prompted insurers to respond. As a result, it's a good moment for IT and security professionals to re-examine their approach.

To help you, Dr. Jason R.C. Nurse, Associate Professor in Cyber Security at the University of Kent, and a Visiting Academic at the University of Oxford, has compiled a paper that dives into more detail about the changes in the industry—and what they might mean for your business.

You'll get a clearer idea of the current situation, understand some key trends, and see where they have the potential to impact your security posture.

Whitepaper: Hindsight Cybersecurity: Seven Key Lessons Learned by Breach Victims

by SophosJan 21, 2022

In all walks of life, a mistake is an opportunity to learn and to ensure the same thing never happens again. Cybersecurity is no different.

Fortunately, in this report, Rob Collins, specialist systems engineer for Sophos Managed Threat Response and Rapid Response, shares seven key lessons learned by breach victims to help you better defend your organization and avoid becoming a victim yourself.

Each lesson includes simple recommendations and tips, many of which do not require organizations to purchase any tools.