Nominations for the CIO100 Awards - East Africa Edition are now open!



Get Dressed, The Future Has Arrived Early With Sophos

Accelerated digitisation is becoming the norm of the day in such unprecedented times. Kenya, and East Africa as a whole, continues to...


Get Dressed, The Future Has Arrived Early With Sophos

Accelerated digitisation is becoming the norm of the day in such unprecedented times. Kenya, and East Africa as a whole, continues to struggle with data privacy and cyber security infrastructure. While the pandemic and the resultant lockdown has pushed players to the virtual platforms, they have been offered a wider reach but also exposed to the vulnerable virtual world.

As per a report released by Kaspersky, Kenya has seen a rise in attacks with malicious intent bearing the name of COVID. With most organisations in the region either planning or already starting their digital journey, Sophos is here to assist in this process. Through the fact that organizations are increasingly using digital technologies such as cognitive systems, virtual and augmented reality, artificial intelligence, robotics, cloud, big data, and the Internet of Things to streamline their operations, improving customer experience is part and personal of a well oiled security plan.

These new-age technologies are creating a complex ecosystem and introducing a new series of IT security, compliance, data protection, and regulations challenges. Addressing security in the digital age can no longer be an afterthought and cannot be addressed through the traditional ad-hoc approach of installing end-point security solutions. Lucky for you, Sophos has products that provide the worlds best endpoint security, combining ransomware protection, deep learning malware detection, exploit prevention, EDR and more all in a single solution.

“Sophos has set the bar for security, its products integrate seamlessly to better service a company’s whole environment” said Wil Craig, Head of IT at HydraFacial.


Additionally, through Sophos AI defense systems, AI has become a critical technology in information security, as AI is able to quickly analyse millions of events and identify many different types of threats – from malware exploiting zero-day vulnerabilities to identifying risky behaviour that might lead to a phishing attack or download of malicious code. These technologies learn over time, drawing from the past to identify new types of attacks now.

Organizations need to develop a holistic view of their growing security surface and develop a comprehensive security strategy that encompasses all the security pillars of policy, process, technology, organization, and people. With digital transformation, security needs to become more pervasive; it needs to be embedded into the vision of the organization and treated as a core metric. Organizations can no longer settle for standard security solutions; they must move forward by embracing a proactive approach to the issues of defense, protection, mitigation, compliance, trust, and risk.

Sophos has sponsored the Cloud and Security Summit.In what way can the security infrastructure extend to meet the requirements of the fast growing, and constantly changing cloud infrastructure, and in what way can we secure seamless cloud operations whilst also deliberating on the future of cloud with regards to security?

Questions like these, and more will be answered on the 18th and 19th of March at the virtual summit. As organizations rapidly adopt cloud networks, due to flexibility, scalability, cost effectiveness and more, security needs to be at the front and centre. It is against this background that the virtual Cloud & Security Forum 2020 is designed to assist in driving an impartial and informed dialogue in the rapidly evolving information security industry.


Having continued to create an environment for making new connections, the summit with visionary speakers at the nexus of new technologies and cyber security and Cloud solutions purposes to share their insights and demonstrate their ability to safeguard customer data.

From new applications being consistently added to networks to employees taking access control shortcuts and credentials being compromised, it is clear that there are endless vulnerabilities to detect and manage.

Join the information security and cloud industry experts as they discuss strategies, tools and solutions to ensure your organisation is secure.

Register for the event here.


Do you have a story that you think would interest our readers? write to us