Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/13/2012
04:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sophos Helps Businesses Embrace BYOD With Newest Release Of Mobile Device Management Solution

Sophos Mobile Control 2.5 offers easy integration with existing IT infrastructure

BOSTON, MA – August 13, 2012 – Sophos today announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 2.5. With an updated web-based administrative console and extensive new feature set, the latest version provides a simple way to bring BYOD into the enterprise—quickly, safely and securely, all while reducing the reliance upon IT.

The Growing Issues and Opportunities of BYOD (and BYOT)

Businesses of all sizes are embracing the use of personal devices on their corporate network as a means to reduce IT expenses. According to the Cisco IBSG Horizons Study published in May of 2012,

95 percent of companies allow employee-owned devices in some shape or form, with 84 percent providing some level of support, and 36 percent providing full support for these devices. And according to the June 2012 Forrester Research, Inc. report, “Charting the Rising Tide of Bring-Your-Own Technology,” BYOT brings both issues and opportunities into an IT organization — and info workers recognize that. 35 percent stated that their organization would make them uninstall or stop using the unauthorized software they have installed. Given the tremendous momentum behind this trend, blocking or ignoring BYOT will put an organization at a distinct disadvantage, such as not being able to attract top talent or to collaborate and share documents easily with business partners outside corporate boundaries.

Increased control, reduced intervention

Sophos Mobile Control 2.5 has optimized workflows, so IT administrators can complete many common tasks in just one click. The new version also offers easy integration with existing IT infrastructure by supporting the use of directories, such as Active Directory, to automatically assign newly-registered devices to existing groups and apply the associated policies to them.

The enhanced interface includes detailed graphical reports to assist IT administrators in managing all aspects of mobile devices, offering them immediate insight into which devices require updating, and ensuring that all devices are secure.

“BYOD is top of mind for myriad organizations; however, it’s causing some concern among IT. The increase in personal devices accessing the network may complicate the process of ensuring devices are secure and compliant with company policies, making it difficult for IT to justify broad BYOD acceptance,” said Stacy K. Crook, senior analyst, Mobile Enterprise Research, IDC. “Solutions with features like those found in the latest version of Sophos Mobile Control allow organizations to develop BYOD strategies without compromising on security, or complicating the overall management of the network.”

Read: BYOD Risks and Rewards

Ensuring compliance, on the go

It is increasingly difficult to manage employees’ mobile devices through self-service portals because employees often are unable to access the internet. Sophos’ new mobile client interface includes a compliance tab, which provides the device’s compliance status, reasons for non-compliance and any actions the user needs to resolve the issue, thereby alleviating the need for IT help. The user can also access their current compliance status and a list of issues in the self-service portal.

Sophos Mobile Control 2.5 offers improved risk mitigation, such as allowing IT to remotely conduct a corporate wipe of a device if an employee leaves the company or remains non-compliant with security policies. The support for iOS-managed apps allows the company to tie their corporate or compulsory apps to their MDM solution and to push them to the employee device. These apps, as well as any associated data, can be deleted directly from the admin console. In addition, if it a mobile device becomes non-compliant, the new release will alert IT, so the administrator can send messages to the user for minor violations . For more serious incidents, the administrator can configure a set of tasks, which will be applied automatically. Examples include corporate or full wipes as well as policy changes to avert any risk for corporate data.

“We have made considerable advancements in MDM over the past few months. Following our recent acquisition of DIALOGS, we have been able to aggressively improve the features within our complete mobile security offerings, which have resonated with the market. We now count more than 1,500 Mobile Control customers using the solution to control and secure half a million devices—companies are saying ‘yes’ to BYOD without risking security and compliance,” said Matthias Pankert, vice president of Product Management, Mobile Data Protection, Sophos. “This rapid momentum in our mobile business is evidence that it is no longer enough for businesses to just control their own devices. They must now make sure that all devices, regardless of whether they are corporate or personal, are protected and secured and meet the corporation’s security standards.”

Sophos Mobile Control is available as a subscription license or as part of the Sophos Complete Security Suite, which combines endpoint, data, email, web, server and mobile protection in one license. Sophos plans further integration of its mobile products in future releases, for example, with the integration of Sophos Mobile Control into Sophos UTM and reporting for both Sophos Mobile Security and Sophos Mobile Encryption in Sophos Mobile Control.

For more information, visit the what’s new in Sophos Mobile Control 2.5 page on our website.

About Sophos

More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...