Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Photos: Inside Sophos Labs

5 of 8 NEXT PREV
  • imgp0986.jpg

    The outside of the Sophos building, designed by company's two chief executives, near Oxford. It's called 'The Pentagon' because of its security features. The moat around the outside is to stop ram raiders, while the car park contains wedges that can be raised to prevent a vehicle from leaving in the event of a physical attack.

    For the full story on what goes on in The Pentagon, read our feature. 

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0962.jpg

    The entrance hall leads to meeting rooms and the dining hall on the ground floor, which visitors do not need security clearance for. Visitors to the second and third floors (which include the antivirus labs) need clearance and must be accompanied by Sophos staff.

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0976.jpg

    The secure area outside the antivirus labs. Devices with Internet access are barred from the labs, including Wi-Fi enabled laptops and 3G mobile phones. This is because they risk either infecting the closed networks within the labs, or being infected themselves by malicious code on the virus sample testing network.

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0975.jpg

    Visitors must pass through two security gates to get to this point. There is still a third security gate restricting access to the labs. 

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0979.jpg

    The antivirus labs uses heuristic algorithms and signature detection to analyse rogue code. The different systems for analysis and testing of malware samples are physically separate, to avoid one system infecting the other.

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0983.jpg

    Thirty researchers use the labs to analyse spam and malware, working with a further 20 analysts globally. Malware is collected from honeypots and sent in by customers. Major threats are flashed up on overhead monitors.

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0971.jpg

    The quality assurance labs "thrash antivirus software" 24/7 on a variety of different hardware and operating systems. Apple Mac, Unix, Linux and Windows systems are all tested.

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

  • imgp0974.jpg

    This is the Sophos customer technical support team, who also monitor the latest threats on overhead screens. Tech support escalate problems globally if they are unable to answer queries.

    For the full story on what goes on in The Pentagon, read our feature.

    Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

    Caption by: Tom Espiner

5 of 8 NEXT PREV
  • imgp0986.jpg
  • imgp0962.jpg
  • imgp0976.jpg
  • imgp0975.jpg
  • imgp0979.jpg
  • imgp0983.jpg
  • imgp0971.jpg
  • imgp0974.jpg

Behind the gleaming glass of an Oxfordshire building lurks the UK headquarters of Sophos, the anti-malware company. Join ZDNet UK as we walk the corridors of The Pentagon...

Read More Read Less

The antivirus labs uses heuristic algorithms and signature detection to analyse rogue code. The different systems for analysis and testing of malware samples are physically separate, to avoid one system infecting the other.

Published: November 29, 2005 -- 12:30 GMT (04:30 PST)

Caption by: Tom Espiner

5 of 8 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • How to protect your Google Account with the Advanced Protection Program

    If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, ...

  • Who is really in the driver’s seat? Unknown digital threats to your car’s security

    The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk. ...

  • Data leaks: The most common sources

    This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...

  • Facebook's worst privacy scandals and data disasters

    Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • How to avoid being phished during holiday shopping season

    Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...

  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums