{"id":3169,"date":"2021-05-25T15:44:03","date_gmt":"2021-05-25T15:44:03","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=3169"},"modified":"2021-05-25T15:44:03","modified_gmt":"2021-05-25T15:44:03","slug":"sophos-solution-update-may-2021","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/05\/resources\/sophos-solution-update-may-2021\/","title":{"rendered":"Sophos Solution Update &#8211; May 2021"},"content":{"rendered":"<p>We\u2019re pleased to provide you with your May 2021 Sophos Solution Update. We&#8217;re sharing the news below via email with Sophos users &#8211; i.e. your customers &#8211; on May 26, 2021. Please familiarize yourself with the updates listed below, so you&#8217;re prepared if customers respond back to you with questions.<\/p>\n<p>It&#8217;s also a great opportunity for you to reiterate the updates and stay in touch with your customers. Pick from the list below and provide them with tips, tricks and the latest news on the products they are using. Feel free to share the relevant updates via email, newsletter or social media.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Endpoint.png\" alt=\"YOUR ENDPOINT PROTECTION: SOPHOS ENDPOINT - INTERCEPT X\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>ENDPOINT PROTECTION:<br \/>\nSOPHOS ENDPOINT &#8211; INTERCEPT X<\/strong><\/p>\n<p><strong>I<\/strong><strong>ntercept X\u2019s New Secret Weapon: Dynamic Shellcode Protection<\/strong><br \/>\nGet an overview of this new game-changing feature added to Intercept X designed to prevent active adversaries from achieving one of their most sought-after goals.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/09\/intercept-xs-new-secret-weapon-dynamic-shellcode-protection\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Threat Protection Policy Best Practices<\/strong><br \/>\nWatch this short video outlining best practices for configuring your threat protection policy for Intercept X in Sophos Central.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/QguEJSD2ydngVvS2CZciE4\"><strong>Watch the Video<\/strong><\/a><\/p>\n<p><strong>Cloud Optix Standard Now Included with Intercept X Advanced for Server<\/strong><br \/>\nThe Sophos Cloud Security Posture management service is now included in the license at no extra cost.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-cloud-optix\/b\/blog\/posts\/expansion-of-sophos-cloud-workload-protection\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Firewall Best Practices to Block Ransomware<\/strong><br \/>\nLast month, we told you how to optimize your endpoint protection platform to defend against ransomware. Next, we&#8217;ll show you how to properly configure your firewall to provide an additional layer of protection.<br \/>\n<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/firewall-best-practices-to-block-ransomware.pdf\"><strong>Read the Whitepaper<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/MTR.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>MANAGED SERVICE:<br \/>\nSOPHOS MTR &#8211; MANAGED THREAT RESONSE<\/strong><\/p>\n<p><strong>Installing MTR On the Run to Keep Up with Netwalker Ransomware<\/strong><br \/>\nDelayed the deployment of your Sophos MTR service? Don\u2019t give adversaries an opportunity to attack.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/16\/installing-mtr-on-the-run-to-keep-up-with-netwalker\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Sophos MTR in Real Time: What is Astro Locker Team?<\/strong><br \/>\nA recent incident with a new MTR customer has raised questions about the Mount Locker ransomware group and the relationship it has with Astro Locker Team.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/31\/sophos-mtr-in-real-time-what-is-astro-locker-team\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Firewall.png\" alt=\"YOUR NEXT-GEN FIREWALL \u2013 SOPHOS XG FIREWALL\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>FIREWALL:<br \/>\nSOPHOS FIREWALL<\/strong><\/p>\n<p><strong>New Features in the Sophos Firewall v18 MR5 Release<\/strong><br \/>\nGet a comprehensive breakdown of the performance, stability, and security enhancements brought about by the Sophos Firewall v18 MR5 release.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/06\/new-features-in-the-xg-firewall-v18-mr5-release\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>How to Route and Manage Traffic<\/strong><br \/>\nWatch a refresher on tips to route and manage traffic on Sophos Firewall.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/CeJbQwLgXwfj9F7JiZURu6\"><strong>Watch the Video<\/strong><\/a><\/p>\n<p><strong>The People Behind Your Protection: A Day in The Life of a Distinguished Engineer<\/strong><br \/>\nChris Telfer, Distinguished Engineer in the Network Security Group at Sophos, provides unique insight into what the job entails and how his work has accelerated our next-generation of firewalls.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/28\/small-details-make-a-big-impact-a-day-in-the-life-of-a-distinguished-engineer\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN&#8230;<br \/>\n<\/strong><br \/>\n<strong>Endpoint Best Practices to Block Ransomware<\/strong><br \/>\nLast month we told you how to optimize your firewall to defend against ransomware. Now, we&#8217;ll show you how to properly configure your endpoint protection platform to provide an additional layer of protection.<br \/>\n<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-endpoint-protect-best-practices-wp.pdf\"><strong>Read the Whitepaper<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Central.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR CYBERSECURITY PLATFORM:<br \/>\nSOPHOS CENTRAL<\/strong><\/p>\n<p><strong>Portal Encryption is Now Available for Sophos Email<\/strong><br \/>\nGet an overview of the enhanced range of message encryption options now available for Sophos Email Advanced.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/18\/portal-encryption-is-now-available-for-sophos-email\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>How to Enrol in Multi-factor Authentication (MFA)<\/strong><br \/>\nIn this short video, Shweta from the Sophos community shows you how to set up MFA in Sophos Central.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/VXMtDXFihpQFGbhcNMQXpg\"><strong>Watch the Video<\/strong><\/a><\/p>\n<p><strong>Sophos Wireless: Wi-Fi Fundamentals<\/strong><br \/>\nJelan explains fundamental knowledge required to deploy Sophos Wireless Access points you\u2019ll need to avoid problems like slow or inconsistent Wi-Fi.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/zwed1YsH3ovLVS8ESbGLnB\"><strong>Watch the Video<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Introducing Container Vulnerability Scanning from Sophos<\/strong><br \/>\nSecurity teams are accelerating their cloud migrations. Now enhanced with container image scanning, Sophos Cloud Optix makes advanced Cloud Security Posture Management available to businesses of all sizes and cloud maturity levels.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/22\/introducing-container-vulnerability-scanning-from-sophos\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Endpoint2.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR ENDPOINT PROTECTION:<br \/>\nSOPHOS ENDPOINT &#8211; SEC ENDPOINT<\/strong><\/p>\n<p><strong>How to Upgrade the Certificate Authority<\/strong><br \/>\nGet a comprehensive refresher on how to upgrade the certificate authority installed by Enterprise Console.<br \/>\n<a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000039357?language=en_US&amp;c__displayLanguage=en_US\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Recommended Settings for Updating Policy<\/strong><br \/>\nAre your settings up to date? Take a look at our recommended settings for updating policy.<br \/>\n<a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000036715?language=en_US\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Recommended Migrations from SEC to Next-Generation Solutions<\/strong><br \/>\nWith your endpoint protection platform now in its end of life phase, we&#8217;ve put together a handy list of the recommended migrations to suitable next-generation Sophos Central products.<br \/>\n<a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000034795?language=en_US\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/UTM.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR NETWORK PROTECTION:<br \/>\nSG UTM<\/strong><\/p>\n<p><strong>UTM Up2Date 9.706-9 Released<\/strong><br \/>\nIf you haven&#8217;t done so already, take this opportunity to review the release notes and download the update package to take advantage of the latest enhancements.<br \/>\n<a href=\"https:\/\/community.sophos.com\/utm-firewall\/b\/blog\/posts\/utm-up2date-9-706-9-released\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Best Practices for VoIP Configuration and Debugging Call Quality Issues<\/strong><br \/>\nEnsure reliable VoIP and other real-time communications performance with these best practices curated by the Sophos community.<br \/>\n<a href=\"https:\/\/community.sophos.com\/utm-firewall\/f\/recommended-reads\/118258\/best-practices---voip-configuration-and-debugging-call-quality-issues\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Endpoint Best Practices to Block Ransomware<\/strong><br \/>\nLast month we told you how to optimize your firewall to defend against ransomware. Now, we&#8217;ll show you how to properly configure your endpoint protection platform to provide an additional layer of protection.<br \/>\n<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-endpoint-protect-best-practices-wp.pdf\"><strong>Read the Whitepaper<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/megaphone.png\" alt=\"A ROUNDUP OF THE LATEST SOPHOS CYBERSECURITY UPDATES\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>A ROUNDUP OF THE LATEST SOPHOS CYBERSECURITY UPDATES<\/strong><\/p>\n<p><strong>The State of Ransomware 2021 \u2013 Now Available<\/strong><br \/>\nIn this year\u2019s report, we dive into the prevalence and impact of ransomware. We also reveal the actual ransom payments made by victims, as well as how much data victims were able to recover after they paid.<br \/>\n<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\"><strong>Read the Whitepaper<\/strong><\/a><\/p>\n<p><strong>Introducing Sophos Firewall and the New XGS Series Hardware<\/strong><br \/>\nGet the lowdown on our new XGS Series next-gen firewall appliances with Sophos Firewall OS version 18.5.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/21\/introducing-sophos-firewall-and-the-new-xgs-series-hardware\/\"><strong>Read the Article<\/strong><\/a><br \/>\n<strong><br \/>\nMinimizing the Risk of Supply Chain Attacks<\/strong><br \/>\nThe SolarWinds attack highlighted just how unprepared organizations are when it comes to supply chain attacks. Read our report to get guidance on preparing your defenses.<br \/>\n<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-minimizing-supply-chain-attacks-guide.pdf\"><strong>Read the Whitepaper<\/strong><\/a><\/p>\n<p><strong>Inside a DarkSide Ransomware Attack<\/strong><br \/>\nThe Sophos Rapid Response team was called in to deal with at least five DarkSide attacks in the last year. Get a defender\u2019s view of this headline-seeking ransomware.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/11\/a-defenders-view-inside-a-darkside-ransomware-attack\/\"><strong>Read the Article<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay on top of your customers&#8217; minds with relevant product news.<\/p>\n","protected":false},"author":11,"featured_media":3058,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[152],"coauthors":[64],"class_list":["post-3169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-sophos-solution-update"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/05\/featured-image-sophos-sync-sec-app-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=3169"}],"version-history":[{"count":11,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3169\/revisions"}],"predecessor-version":[{"id":3205,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3169\/revisions\/3205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/3058"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=3169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=3169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=3169"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=3169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}