Endpoint
1/8/2013
03:10 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Sophos Makes Security Personal And Enables BYOD With EndUser Protection

New offering combines endpoint and mobile protection

Sophos today announced Sophos EndUser Protection, a new security offering that tackles the challenges associated with bring-your-own-device (BYOD), and the increasing number of devices used by today’s mobile workforce. Unlike traditional security products, which are licensed for each device separately, Sophos EndUser Protection provides consolidated protection for every device on a network by securing per-user rather than per-device. This means the organization receives protection for all of a user’s devices—from Windows and Macs to mobile devices like iPhones, iPads, and Android devices—wherever users go.

Sophos EndUser Protection, the combination of the company’s award-winning endpoint protection and mobile device management (MDM) offerings, further alleviates the burden that BYOD places on IT while providing businesses with a compelling licensing proposition unmatched in the industry. This fusion also simplifies and improves the security and management of every device employees are using to access corporate data.

“Smartphones and tablets are an everyday part of today’s workplace, so businesses are adapting their policies and practices to ensure these devices don’t disrupt productivity or compromise security; security enables users to do their work,” said Charles Kolodgy, research vice president, Security Products, IDC. “Sophos’ model of combining their endpoint and mobile device management offerings to secure users rather than devices can eliminate many of the costs and complexities normally associated with securing BYOD.”

In today’s business environment, employees are accessing data from both personal and corporate mobile phones, tablets, and laptops, whether they’re at headquarters, remote offices or on the road. According to the Cisco IBSG Horizons Study, in 2012, the average number of connected devices per knowledge worker was 2.8, and this number is projected to rise to 3.3 by 2014. While these figures express the average number of devices per knowledge worker, for many employees who travel frequently or require constant connectivity, the number of devices used could be much higher. This increase in multiple devices has put a strain on IT departments and their budgets as they work to secure, manage and support these devices.

“Our clients are struggling to deal with the reality of BYOD, employees working from remote locations, and using multiple devices to access the business network,” said Sophos solution provider Josh More, senior security consultant, RJS Smart Security.”With Sophos Enduser Protection, we can help make securing our customers’ mobile workforces easier and more affordable, giving us a distinct advantage over other resellers that offer security by device.”

“Every day, I use three or four different devices for business purposes, and the consumerization trend points to more people using even more devices,” said Matt Fairbanks CMO, Sophos. “Our value proposition to customers and partners is complete security without complexity. And as BYOD moves more to the forefront of complete security, Sophos EndUser Protection allows more IT professionals to embrace BYOD rather than try to reverse it.”

About Sophos

More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and use and that deliver the industry's lowest total cost of ownership. Sophos offers award-winning encryption, endpoint security, web, email, mobile and network security solutions backed by SophosLabs - a global network of threat intelligence centers.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.