SHARE
Facebook X Pinterest WhatsApp

Sophos to Apply Advanced Algorithms to Endpoint Security

Later this year, Sophos plans to deliver an ensemble of endpoint security technologies that will be infused with machine learning algorithms the company has gained access to in the wake of its acquisition of Invincea this week. As a provider of anti-virus software that doesn’t rely on signatures to identify malware, Invincea has been at […]

Written By
MV
Mike Vizard
Feb 10, 2017

Later this year, Sophos plans to deliver an ensemble of endpoint security technologies that will be infused with machine learning algorithms the company has gained access to in the wake of its acquisition of Invincea this week.

As a provider of anti-virus software that doesn’t rely on signatures to identify malware, Invincea has been at the leading edge of using both machine and deep learning technologies to detect and quarantine potential malware.

Dan Schiappa, senior vice president and general manager for Sophos Enduser and Network Security Groups, says by the third quarter, Sophos plans to integrate the Invincea approach to combating malware with its latest generation of endpoint security offerings that already make extensive use of Big Data analytics.

“We’re going to bring algorithms to the endpoint via an ensemble of products,” says Schiappa.

That combination of security defenses should send a signal to cybercriminals that the time required to get past those defenses is not going to be worth the financial effort, says Schiappa.

Invincea CEO Anup Ghosh says Invincea today has about 300 customers it directly supports. Invincea also has another 25,000 users of its technology via a reseller agreement with Dell Technologies, in addition to over 4 million users of a freeware security software it makes available. By becoming part of Sophos, the base of customers using Invincea technologies should expand, says Ghosh.

SophosSecurity

At its core, Ghosh says, the security software developed by Invincea maps the genome of malware as it emerges across the internet. Armed with the intelligence, IT organizations can then proactively reduce the number of vulnerabilities that can be exploited in a way that also serves to dramatically reduce the number of false positives generated.

“It’s all about reducing the attack surface,” says Ghosh.

Regardless of the method used, a lot of the drudgery associated with maintaining IT security is going away. Less clear is the effect all this automation will have on the need for IT security professionals. It’s unlikely IT security professionals will be made obsolete, but their numbers may end up being substantially lower.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.