Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Sophos Updates Mobile Device Management Platform

Sophos today announced the release of Sophos Mobile Control 2.0, the latest version of its mobile device management product.

Sophos today announced the release of Sophos Mobile Control 2.0, the latest version of its mobile device management product.

Among the enhancements in the new version is an enterprise app store, which enables administrators to deploy company-specific applications that are not published in the Apple App Store or Google Market. Sophos has also added new compliance enforcement features that permit administrators to set specific rules and policies from device to device, as well as a self-service portal that empowers users to reset passwords, locate devices and take other actions without involving IT.

SophosThe compliance feature also logs all compliance issues on a Web-based dashboard that permits the admin to see all non-compliance devices, details of their policy violations and any action that needs to be taken for remediation. Non-compliance devices can be automatically barred from receiving access to corporate data, Sophos said.

The product supports a number of mobile devices and operating systems, including BlackBerry, Apple iOS and Google Android devices. According to the company, the accelerating adoption of smartphones and tablets makes the management capabilities a necessary ingredient of enterprise security.

“We understand that businesses are increasingly mobile and their workforce is adding an extra layer of complexity,” said Matthias Pankert, vice president of product management, Mobile Data Protection, at Sophos, in a statement. “With the enhancements within Sophos Mobile Control, we are aiming to streamline and simplify device and data protection, while giving employees the flexibility they want, and IT departments the protection they need.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...