Skip to the content


Five Significant Savings with Synchronised Security

With Sophos' decision to retire on-premise legacy security platforms and focus on next-generation products, I thought today we would have a quick look at the key advantages of synchronised security and how it can save you money.

Teams, Zoom, or Webex?

Teams, Zoom, or Webex?

I’ve been watching with interest the sharp rise in uptake of video conferencing apps during CV-19 lockdown. So far, they've done a great job in meeting the rising demands of our need to communicate and video conference with one another.

Chess Help Protect Our NHS

Necessity, it is said, is the mother of invention. While this is true, it has become clear over recent weeks that the shared concern around the COVID- ...

Securing Remote Workers

Securing Remote Workers

Watch the recording of Security Remote Workers webinar. During the online session, our Chief Information Security Officer and a Sophos Product Specialist discuss the best practices to secure remote working in the current situation.

A Hackers Guide to Remote Working

Remote working for a hacker is brilliant, and not in the sense that they can work from home in a dark room wearing a hoodie. But because remote working means that a business is intentionally giving a path into the internal network that could potentially be accessed by anyone on the internet. This blog post covers some of the things that we have encountered across the team over the years.


Who is looking after your network when you are asleep?

During the online session Eric Kokonas, MTR Senior Product Marketing Manager, and Mat Gangwer, MTR Technical Director, reviewed the threat landscape, explained how MTR fits in an organisation’s cybersecurity strategy and provided an overview of the service.

What is Sophos MTR

Sophos Managed Threat Response (MTR)

We interviewed Peter Mackenzie, Incident Response Team Leader at Sophos, and Jez Turner, Cybersecurity Sales Director at Chess, about the new service by Sophos. Watch the video today.

Types of Penetration Test - What is the Difference?

Types of Penetration Test - What is the Difference?

Learn about the different types of penetration testing

Simplifying Digital Transformation: How CASB can help reduce the causes of slow cloud adoption

Dave Barnett, Head of CASB at Forcepoint, shares the lessons he has learned from over 80 customer implementations of CASB technology – the good, the bad and the downright ugly.

Talking Security with Sophos

What is next for malware?

Malware is a major problem worldwide, but the nature of malware is changing.
Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially when there’s money to be made.
We welcome Jonathan and Fraser from Sophos HQ – they’re with us to discuss if AI can help towards the fight, and what we can do to protect ourselves.

Penetration Test Versus Vulnerability Assessment

Penetration Test Versus Vulnerability Assessment

For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.

Securing the Public Cloud with Sophos and Chess

Securing the Public Cloud with Sophos and Chess

Are you managing, moving, or planning to move to Amazon Web Services, Microsoft Azure, or Google Cloud Platform? Watch this video to learn more about how you can ensure the security of your data in the cloud.


Sophos Cloud Optix

Sophos Cloud Optix - Everything You Need to Know

Introducing the brand new Sophos product, that tracks assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeps them safe.

Going Phishing With Office 365

How Easy Is It To Hack Office 365 and 2FA?

This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.

CREST Certified Penetration Test Sample Report

CREST Certified Penetration Test Sample Report

Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report? 

Sophos Intercept X with EDR Review

In this on Demand webinar we join Gavin Wood, CyberSecurity Director for Chess, as he and Nick Ross, Sales Engineer for Sophos explore the ever growing threat landscape in cyber security as well as discovering how Sophos Intercept X and EDR (Endpoint Detection and Response) are helping businesses stay one step ahead of cyber attacks.

Speak to a Product Specialist

You can fill out the form and one of our product specialists will contact you shortly with more information.
To contact our Sales team directly, please call 0344 770 6000 and choose option 4.
Customer Service
For general queries or to report a non-urgent fault, please log a ticket on our customer portal using the email address associated with your account. Logging a ticket is quick and easy to do. Once you have logged your ticket, we will respond within 24 hours or your Service Level Agreement, whichever is quicker.
I agree for my information to be used for marketing communications.