Click here to close now.

SYS-CON MEDIA Authors: XebiaLabs Blog, Pat Romanski, Elizabeth White, Liz McMillan, Carmen Gonzalez

News Feed Item

Sophos Mobile Control 4.0 Delivers User-Centric Approach to Protect, Secure and Manage Mobile Devices

Only Enterprise Mobility Management Solution to Offer Individual File Encryption, Integrated AV and Web Filtering

OXFORD, UNITED KINGDOM -- (Marketwired) -- 05/27/14 -- Sophos today announced Sophos Mobile Control (SMC) 4.0, the first Enterprise Mobile Management (EMM) solution to include individual file encryption, integrated AV and web filtering. Available on premise or as-a-service, SMC provides a simple and differentiated approach for small and mid-market organizations to manage and secure mobile devices, content and applications. The new Sophos solution helps IT professionals confidently implement BYOD policies and provides users the flexibility they demand to stay productive and safe. It supports iOS, Android and Windows Phone 8 devices.

SMC 4.0: Mobile Encryption, Integrated Security and User-Centricity

SMC 4.0 provides a simple, hassle-free and comprehensive approach to protecting mobile devices. With Mobile Content Management for iOS devices, SMC is the only EMM solution to offer file-level encryption, which gates access to each file, to protect the data in the office and on the go. SMC also delivers integrated security against malware and malicious web sites for Android devices, which account for 80 percent of smartphone operating systems* worldwide as well as the majority of mobile malware threats. The number of unique pieces of mobile malware seen by SophosLabs has now reached almost 900,000 and is growing rapidly.

With web protection for Android, IT administrators can select web site categories to control access and block data-stealing or inappropriate web pages. SMC 4.0 also provides unique integration with Sophos UTM, Checkpoint and Cisco to provide network access control. Compromised devices are isolated from the network, protecting the organization's assets from malware on mobile devices. SMC's user-centric deployment, management and pricing greatly simplifies administration. With an intuitive web-based management console, IT administrators can provide their users with a self-service portal to change passwords, register devices and report lost or stolen devices.

Sophos Survey: Mobile Security in a Cloudy World

Sophos conducted a survey of more than 725 IT professionals on their use and preferences of cloud share services, encryption and mobile devices. The survey showed 84 percent of organizations allow some level of access from company-issued devices to cloud-based file share services such as Dropbox, however 65 percent of respondents do not currently encrypt data between the cloud and mobile devices. Surprisingly only 38 percent feel secure sharing corporate files or collaborating on corporate content between the cloud and mobile devices. To access the survey, visit: http://sophos.files.wordpress.com/2014/05/sophos-mobile-cloud-encryption-infographic.pdf

The results of the survey demonstrate the enormous opportunity for SMC 4.0, as it assures organizations that their data is safe wherever users are and provides organizations with the confidence to use cloud accounts for collaborating and maintaining content safely and securely.

Dan Schiappa, SVP and GM of Sophos' Enduser Security Group, said: "SMC 4.0 extends the Sophos commitment to delivering comprehensive data protection, offering solutions to manage, secure and protect not just the mobile devices themselves, but also the content and applications on those devices. SMC 4.0 takes data protection beyond the office door by ensuring persistent mobile encryption on devices. Additional network access control based on device compliance status makes mobile device management, content management and mobile security simple and effective."

Chris Hazelton, Research Director for Mobile & Wireless at 451 Research, said: "The rapid shift to more flexible and increasingly mobile working patterns has led to widespread adoption (with or without the consent of IT) of file-sync and -share services as users seek to store and collaborate on shared content. This 'any device, any cloud' trend will only continue, so organizations face an increased risk of losing sensitive corporate data if they don't deploy encryption and data loss protection tools. The integration of these data security tools into EMM provides companies with a simple deployment option that should resonate well with the SMB market."

Sophos Customers Look Forward to SMC 4.0

Europart is a leading distributor of replacement parts and accessories for commercial vehicles and buses. The company is headquartered in Hagen, Germany, and has more than 1,800 employees worldwide. Björn Risse, Service Manager Infrastruktur, EUROPART Holding GmbH, said, "Sophos Mobile Control has allowed us to easily deploy mobile security, while giving us the peace of mind that client information is safe and confidential. We chose Sophos for our mobile security because it meets our needs and is able to scale with our business requirements."

"As a user of Sophos Mobile Control we definitely see the value of securing mobile devices. Based on the Sophos roadmap for mobile security, we are excited about the added functionality to Mobile Control as a product and believe the latest versions will continue to support our organizational efforts going forward," said Gerald Descoteaux, IT Director, Bell Technical Solutions, Inc., a wholly owned subsidiary of Bell Canada that specializes in phone, Internet and television services throughout Quebec and Ontario.

* ABI Research

About Sophos

More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and use that deliver the industry's lowest total cost of ownership. Sophos offers award winning encryption, endpoint security, web, email, mobile and network security backed by SophosLabs -- a global network of threat intelligence centers.

Sophos is headquartered in Oxford, UK.

Media Contact:
Dave De Jear
Sophos
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
Can the spatial component of your Big Data be harnessed and visualized, adding another dimension of power and analytics to your data? In his session at Big Data Expo®, John Meza, Product Engineer and Performance Engineering Team Lead at Esri, discussed the spatial queries that can be used within the Hadoop ecosystem and their integration with GeoSpatial applications. The GIS Tools for Hadoop project was also discussed and its implementation to discover location-based patterns and relationships...
An effective way of thinking in Big Data is composed of a methodical framework for dealing with the predicted shortage of 50-60% of the qualified Big Data resources in the U.S. This holistic model comprises the scientific and engineering steps that are involved in accelerating Big Data solutions: problem, diagnosis, facts, analysis, hypothesis, solution, prototype and implementation. In his session at Big Data Expo®, Tony Shan focused on the concept, importance, and considerations for each of t...
While there are hundreds of public and private cloud hosting providers to choose from, not all clouds are created equal. If you’re seeking to host enterprise-level mission-critical applications, where Cloud Security is a primary concern, WHOA.com is setting new standards for cloud hosting, and has established itself as a major contender in the marketplace. We are constantly seeking ways to innovate and leverage state-of-the-art technologies. In his session at 16th Cloud Expo, Mike Rivera, Seni...
Containers Expo Blog covers the world of containers, as this lightweight alternative to virtual machines enables developers to work with identical dev environments and stacks. Containers Expo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Bookmark Containers Expo Blog ▸ Here Follow new article posts on Twitter at @ContainersExpo
Compute virtualization has been transformational, yet security policy implementation and enforcement has lagged behind in agility and automation. There are a number of key considerations when implementing policy in private and hybrid clouds. In his session at 15th Cloud Expo, Malcolm Rieke, the Director of Product Management at Catbird, discussed the impact of this new paradigm and what organizations can do today to safely move to software-defined network and compute architectures, including: ...
The cloud is everywhere and growing, and with it SaaS has become an accepted means for software delivery. SaaS is more than just a technology, it is a thriving business model estimated to be worth around $53 billion dollars by 2015, according to IDC. The question is - how do you build and scale a profitable SaaS business model? In his session at 15th Cloud Expo, Jason Cumberland, Vice President, SaaS Solutions at Dimension Data, discussed the common mistakes businesses make when transitioning t...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
There has been a lot of discussion recently in the DevOps space over whether there is a unique form of DevOps for large enterprises or is it just vendors looking to sell services and tools. In his session at DevOps Summit, Chris Riley, a technologist, discussed whether Enterprise DevOps is a unique species or not. What makes DevOps adoption in the enterprise unique or what doesn’t? Unique or not, what does this mean for adopting DevOps in enterprise size organizations? He also explored differe...
Storage administrators find themselves walking a line between meeting employees’ demands to use public cloud storage services, and their organizations’ need to store information on-premises for security, performance, cost and compliance reasons. However, as file sharing protocols like CIFS and NFS continue to lose their relevance, simply relying only on a NAS-based environment creates inefficiencies that hurt productivity and the bottom line. IT wants to implement cloud storage it can purchase a...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, discussed how developers are extremely well-poised to perform tasks critical for securing the application – provided that certain key obstacles are overcome. Arthur Hicken has been involved in automating various practices at Parasoft for almost 20 years. He has worked on projects including database dev...
In this scenarios approach Joe Thykattil, Technology Architect & Sales at TimeWarner / Navisite, presented examples that will allow business-savvy professionals to make informed decisions based on a sound business model. This model covered the technology options in detail as well as a financial analysis. The TCO (Total Cost of Ownership) and ROI (Return on Investment) demonstrated how to start, develop and formulate a business case that will allow both small and large scale projects to achieve...
Cloud Foundry open Platform as a Service makes it easy to operate, scale and deploy application for your dedicated cloud environments. It enables developers and operators to be significantly more agile, writing great applications and deliver them in days instead of months. Cloud Foundry takes care of all the infrastructure and network plumbing that you need to build, run and operate your applications and can do this while patching and updating systems and services without any downtime.
Are your Big Data initiatives resulting in Big Impact or Big Mess? In her session at Big Data Expo, Penelope Everall Gordon, Emerging Technology Strategist at 1Plug Corporation, shared her successes in improving Big Decision outcomes by building stories compelling to the target audience – and her failures when she lost sight of the plotline, distracted by the glitter of technology and the lure of buried insights. The cast of characters includes the agency head [city official? elected official?...