09:35 AM
Dark Reading
Dark Reading
Products and Releases

Sophos Delivers New Endpoint Management Tool Integrated with Next-Gen Endpoint Security

BARCELONA, Spain, Feb. 27, 2018 (GLOBE NEWSWIRE) -- Mobile World Congress – Sophos (LSE:SOPH), a global leader in network and endpoint security, today announced Sophos Mobile 8, the latest version of its Unified Endpoint Management (UEM) and mobile security solution. This new version lets system administrators manage and secure corporate-owned and personal Mac, Windows, and mobile endpoints in the cloud-based Sophos Centralmanagement platform to deliver a simpler management strategy for businesses of any size.

This unified approach to endpoint management ensures consistent security policies and secure access to resources regardless of an employee’s choice of device. Sophos Mobile 8 adds a range of management features like MacOS management and configuration, Windows 10 application management, and extended Android and iOS management functionality.

"Mobile devices continue to be the fastest growing malware target,” commented Dan Schiappa, senior vice president and general manager of Products at Sophos. “Personal and IoT devices on the network represent a significant threat to corporate security due to management and discovery issues. With Sophos Mobile 8, IT admins in any size of business can manage and secure all their MacOS, Windows, and mobile endpoints from a single management platform. This streamlined approach to security management helps both administrators and users save time and effort, improving productivity across the business.”

Responding to the rise in mobile malware and ransomware, Sophos Mobile 8 includes the latest in mobile security and anti-ransomware technology to protect devices against the evolving threat landscape. In 2017, SophosLabs processed more than 10 million Android samples (up from 8.5 million in 2016) submitted by customers for analysis. Within that sample, nearly 3.5 million were deemed potentially suspicious or malicious apps, 77 percent of which were malware.   More recently, SophosLabs discovered attackers are increasingly using Google Play to stash malicious apps like cryptocurrency mining or unwanted advertising that can cause a variety of problems for Android users.

“Our Unified Endpoint Management solution can protect user productivity within a secure operating environment. Sophos innovation has led to endpoint protection based on deep learning technology to deliver market-leading levels of detection and prevention. Our vision is to extend that predictive security layer to all endpoints, including mobile devices, giving customers the most comprehensive security tools to maintain secure, productive working environments,” concluded Schiappa.

Sophos Mobile 8 is available now both in the cloud-based Sophos Central platform and for installation on the customer’s own premises.

Read more on Mobile malware and other threat issues in Sophos’ 2018 Malware Forecast.

About Sophos

Sophos is a leader in next-generation endpoint and network security, and as the pioneer of synchronized security develops its innovative portfolio of endpoint, network, encryption, web, email and mobile security solutions to work better together. More than 100 million users in 150 countries rely on Sophos solutions as the best protection against sophisticated threats and data loss. Sophos products are exclusively available through a global channel of more than 30,000 registered partners. Headquartered in Oxford, UK, Sophos is publicly traded on the London Stock Exchange under the symbol "SOPH." More information is available at

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
The Case for Integrating Physical Security & Cybersecurity
Paul Kurtz, CEO & Cofounder, TruSTAR Technology,  3/20/2018
A Look at Cybercrime's Banal Nature
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/20/2018
City of Atlanta Hit with Ransomware Attack
Dark Reading Staff 3/23/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.