Mobile

2/5/2018
09:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sophos Delivers New Endpoint Management Tool Integrated with Next-Gen Endpoint Security

BARCELONA, Spain, Feb. 27, 2018 (GLOBE NEWSWIRE) -- Mobile World Congress – Sophos (LSE:SOPH), a global leader in network and endpoint security, today announced Sophos Mobile 8, the latest version of its Unified Endpoint Management (UEM) and mobile security solution. This new version lets system administrators manage and secure corporate-owned and personal Mac, Windows, and mobile endpoints in the cloud-based Sophos Centralmanagement platform to deliver a simpler management strategy for businesses of any size.

This unified approach to endpoint management ensures consistent security policies and secure access to resources regardless of an employee’s choice of device. Sophos Mobile 8 adds a range of management features like MacOS management and configuration, Windows 10 application management, and extended Android and iOS management functionality.

"Mobile devices continue to be the fastest growing malware target,” commented Dan Schiappa, senior vice president and general manager of Products at Sophos. “Personal and IoT devices on the network represent a significant threat to corporate security due to management and discovery issues. With Sophos Mobile 8, IT admins in any size of business can manage and secure all their MacOS, Windows, and mobile endpoints from a single management platform. This streamlined approach to security management helps both administrators and users save time and effort, improving productivity across the business.”

Responding to the rise in mobile malware and ransomware, Sophos Mobile 8 includes the latest in mobile security and anti-ransomware technology to protect devices against the evolving threat landscape. In 2017, SophosLabs processed more than 10 million Android samples (up from 8.5 million in 2016) submitted by customers for analysis. Within that sample, nearly 3.5 million were deemed potentially suspicious or malicious apps, 77 percent of which were malware.   More recently, SophosLabs discovered attackers are increasingly using Google Play to stash malicious apps like cryptocurrency mining or unwanted advertising that can cause a variety of problems for Android users.

“Our Unified Endpoint Management solution can protect user productivity within a secure operating environment. Sophos innovation has led to endpoint protection based on deep learning technology to deliver market-leading levels of detection and prevention. Our vision is to extend that predictive security layer to all endpoints, including mobile devices, giving customers the most comprehensive security tools to maintain secure, productive working environments,” concluded Schiappa.

Sophos Mobile 8 is available now both in the cloud-based Sophos Central platform and for installation on the customer’s own premises.

Read more on Mobile malware and other threat issues in Sophos’ 2018 Malware Forecast.

About Sophos

Sophos is a leader in next-generation endpoint and network security, and as the pioneer of synchronized security develops its innovative portfolio of endpoint, network, encryption, web, email and mobile security solutions to work better together. More than 100 million users in 150 countries rely on Sophos solutions as the best protection against sophisticated threats and data loss. Sophos products are exclusively available through a global channel of more than 30,000 registered partners. Headquartered in Oxford, UK, Sophos is publicly traded on the London Stock Exchange under the symbol "SOPH." More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.