Sophos Delivers Easy-to-Use Security Solutions for Enterprise Mobility Management

Top Quote Enables mobile productivity while protecting employee privacy and company confidential information. End Quote
  • (1888PressRelease) February 17, 2016 - Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced the availability of Sophos Mobile Control 6.0, which now includes Sophos Secure Email, a container solution that isolates and secures business data frompersonal information on devices.Sophos Mobile Control 6.0 also enhances data protection capabilitiesand allows IT managers tooversee devicesused throughout their organizationthrough a simple interface and intuitive workflows.

    Within Sophos Mobile Control 6.0 is Sophos Secure Email, a personal information management (PIM) container solution for email, calendar and contacts. Personal and corporate data can be separated, allowing organizations to manage business data security while enhancing user privacy. IT administrators can remotely provision email to employee mobile devices across popularplatforms, including iOS, and multiple Android versions.

    Also new to version 6.0 is Sophos Secure Workspace which includes Corporate Browser to facilitate safe access to frequently used business productivity sites and applications. Sophos Secure Workspace enables employees to seamlessly access and collaborate on the documents they need, when they need them, in a secure manner. Users also can control levels of access and publishing rights for various cloud storage providers like Dropbox, Google Drive, Microsoft OneDrive and Egnyte. For additional protection,users now can securely move documents and data between mobile devices, cloud storage and corporate endpoints as Sophos SafeGuard file encryption is built in.

    With the continued growth in mobile malware, the ability to detect and quarantine infected devices is a growing priority for enterprise mobility management (EMM). In fact, more than 95 percent of attacks today involve harvesting credentials from customer devices and using those stolen credentials to log in to web applications, according to Verizon 2015 Data Breach Investigations Report.

    Device security is especially difficult to manage in mid-size enterprises that have widely distributed workforces, yet are resource-stretched. A September 2015 CompTIA study, Managing the Multi-Generational Workforce, showed that nearly half (46 percent) of small and mid-sized businesses have now fully adopted BYOD as a standard practice, as opposed to only 28 percent of large enterprises.

    "It's too easy for employees to unknowingly download dangerous apps that expose valuable corporate data, or worse, provide an open path to business networks," said Dan Schiappa, senior vice president and general manager of Sophos Enduser Group. "Providing management, anti-malware and data protection for mobile devices is just as important as it is for laptops or any other corporate asset - the devices are small but they can be hacked and cracked just like any PC. Balancing the levels of productivity and access demanded by users today with the growing need for tighter data security requires the ability to manage and protect. Having an enterprise mobilitymanagement solution with integrated security is becoming a critical need to organizations of any size."

    Sophos Mobile Control 6.0 also detects jail-broken or rooted devices, plus malware and potentially unwanted applications (PUAs). The productblocks infected or non-compliant devicesfrom entering the corporate network and automatically blocks malicious or undesirable websites. A recent analysis by third party AV-Test confirmed that Sophos Mobile Control 5.5 detected 100 percent of known Android malware applied during the test period. All of this is done behind the scenes to users so that productivity isn't sacrificed and critical,confidential data remains private and safe.

    Sophos Mobile Control 6.0 is available now from the global network of Sophos certified partners.

    ###
space
space
  • FB Icon Twitter Icon In-Icon
Contact Information