Mobile

2/5/2018
09:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sophos Delivers New Endpoint Management Tool Integrated with Next-Gen Endpoint Security

BARCELONA, Spain, Feb. 27, 2018 (GLOBE NEWSWIRE) -- Mobile World Congress – Sophos (LSE:SOPH), a global leader in network and endpoint security, today announced Sophos Mobile 8, the latest version of its Unified Endpoint Management (UEM) and mobile security solution. This new version lets system administrators manage and secure corporate-owned and personal Mac, Windows, and mobile endpoints in the cloud-based Sophos Centralmanagement platform to deliver a simpler management strategy for businesses of any size.

This unified approach to endpoint management ensures consistent security policies and secure access to resources regardless of an employee’s choice of device. Sophos Mobile 8 adds a range of management features like MacOS management and configuration, Windows 10 application management, and extended Android and iOS management functionality.

"Mobile devices continue to be the fastest growing malware target,” commented Dan Schiappa, senior vice president and general manager of Products at Sophos. “Personal and IoT devices on the network represent a significant threat to corporate security due to management and discovery issues. With Sophos Mobile 8, IT admins in any size of business can manage and secure all their MacOS, Windows, and mobile endpoints from a single management platform. This streamlined approach to security management helps both administrators and users save time and effort, improving productivity across the business.”

Responding to the rise in mobile malware and ransomware, Sophos Mobile 8 includes the latest in mobile security and anti-ransomware technology to protect devices against the evolving threat landscape. In 2017, SophosLabs processed more than 10 million Android samples (up from 8.5 million in 2016) submitted by customers for analysis. Within that sample, nearly 3.5 million were deemed potentially suspicious or malicious apps, 77 percent of which were malware.   More recently, SophosLabs discovered attackers are increasingly using Google Play to stash malicious apps like cryptocurrency mining or unwanted advertising that can cause a variety of problems for Android users.

“Our Unified Endpoint Management solution can protect user productivity within a secure operating environment. Sophos innovation has led to endpoint protection based on deep learning technology to deliver market-leading levels of detection and prevention. Our vision is to extend that predictive security layer to all endpoints, including mobile devices, giving customers the most comprehensive security tools to maintain secure, productive working environments,” concluded Schiappa.

Sophos Mobile 8 is available now both in the cloud-based Sophos Central platform and for installation on the customer’s own premises.

Read more on Mobile malware and other threat issues in Sophos’ 2018 Malware Forecast.

About Sophos

Sophos is a leader in next-generation endpoint and network security, and as the pioneer of synchronized security develops its innovative portfolio of endpoint, network, encryption, web, email and mobile security solutions to work better together. More than 100 million users in 150 countries rely on Sophos solutions as the best protection against sophisticated threats and data loss. Sophos products are exclusively available through a global channel of more than 30,000 registered partners. Headquartered in Oxford, UK, Sophos is publicly traded on the London Stock Exchange under the symbol "SOPH." More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
How Well Is Your Organization Investing Its Cybersecurity Dollars?
Jack Jones, Chairman, FAIR Institute,  12/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1817
PUBLISHED: 2018-12-13
IBM Security Guardium 10 and 10.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150021.
CVE-2018-1818
PUBLISHED: 2018-12-13
IBM Security Guardium 10 and 10.5 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 150022.
CVE-2018-1821
PUBLISHED: 2018-12-13
IBM Operational Decision Management 8.5, 8.6, 8.7, 8.8, and 8.9 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 150170.
CVE-2018-1886
PUBLISHED: 2018-12-13
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 152021.
CVE-2018-1887
PUBLISHED: 2018-12-13
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force...