Mobile

2/5/2018
09:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sophos Delivers New Endpoint Management Tool Integrated with Next-Gen Endpoint Security

BARCELONA, Spain, Feb. 27, 2018 (GLOBE NEWSWIRE) -- Mobile World Congress – Sophos (LSE:SOPH), a global leader in network and endpoint security, today announced Sophos Mobile 8, the latest version of its Unified Endpoint Management (UEM) and mobile security solution. This new version lets system administrators manage and secure corporate-owned and personal Mac, Windows, and mobile endpoints in the cloud-based Sophos Centralmanagement platform to deliver a simpler management strategy for businesses of any size.

This unified approach to endpoint management ensures consistent security policies and secure access to resources regardless of an employee’s choice of device. Sophos Mobile 8 adds a range of management features like MacOS management and configuration, Windows 10 application management, and extended Android and iOS management functionality.

"Mobile devices continue to be the fastest growing malware target,” commented Dan Schiappa, senior vice president and general manager of Products at Sophos. “Personal and IoT devices on the network represent a significant threat to corporate security due to management and discovery issues. With Sophos Mobile 8, IT admins in any size of business can manage and secure all their MacOS, Windows, and mobile endpoints from a single management platform. This streamlined approach to security management helps both administrators and users save time and effort, improving productivity across the business.”

Responding to the rise in mobile malware and ransomware, Sophos Mobile 8 includes the latest in mobile security and anti-ransomware technology to protect devices against the evolving threat landscape. In 2017, SophosLabs processed more than 10 million Android samples (up from 8.5 million in 2016) submitted by customers for analysis. Within that sample, nearly 3.5 million were deemed potentially suspicious or malicious apps, 77 percent of which were malware.   More recently, SophosLabs discovered attackers are increasingly using Google Play to stash malicious apps like cryptocurrency mining or unwanted advertising that can cause a variety of problems for Android users.

“Our Unified Endpoint Management solution can protect user productivity within a secure operating environment. Sophos innovation has led to endpoint protection based on deep learning technology to deliver market-leading levels of detection and prevention. Our vision is to extend that predictive security layer to all endpoints, including mobile devices, giving customers the most comprehensive security tools to maintain secure, productive working environments,” concluded Schiappa.

Sophos Mobile 8 is available now both in the cloud-based Sophos Central platform and for installation on the customer’s own premises.

Read more on Mobile malware and other threat issues in Sophos’ 2018 Malware Forecast.

About Sophos

Sophos is a leader in next-generation endpoint and network security, and as the pioneer of synchronized security develops its innovative portfolio of endpoint, network, encryption, web, email and mobile security solutions to work better together. More than 100 million users in 150 countries rely on Sophos solutions as the best protection against sophisticated threats and data loss. Sophos products are exclusively available through a global channel of more than 30,000 registered partners. Headquartered in Oxford, UK, Sophos is publicly traded on the London Stock Exchange under the symbol "SOPH." More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
New Mirai Version Targets Business IoT Devices
Dark Reading Staff 3/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Reading Schneier's Friday Squid Blog again?
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.