Connect with us

Hi, what are you looking for?

MOBILE PRODUCTS

Sophos simplifies management of major mobile platforms

Worldwide combined shipments of devices (PCs, tablets, ultramobiles and mobile phones) are projected to reach 2.5 billion units in 2014, a 7.6 percent increase from 2013.

With more workers choosing to use their personal devices for business, IT managers have been faced with the complexity of managing corporate security, and adhering personal data privacy laws. Managing upwards of four devices per user brings considerable risk into the business, and unnecessarily diverts precious IT resource.

To address this issue, Sophos has released the Sophos Mobile Control 5 (SMC 5), to further simplify mobile device management by setting security and data policy by user, across all three major mobile platforms in one solution.

Typically, each device (laptop, tablet, iPad or smartphone) would have to be configured, updated and managed individually, but by managing rights based on user, IT managers only have to set one policy, from any remote location, to manage the security of corporate content stored on the device or in a personal cloud.

New management options enable an administrator to easily achieve the separation and encryption of personal and corporate information, as well as configure access and security settings through automated tasks, reducing management time and costs.

With a re-designed self-service portal, Sophos Mobile Control 5 makes compliance with corporate security policy simple for both administrator and end user across iOS 8, Windows Phone and Android platforms.

Advertisement. Scroll to continue reading.

“IT administrators need to secure and manage all the various devices employees use today to get work done – smartphones, tablets, laptops and desktops, but most management tools still treat these devices separately,” says Chris Hazelton, Research Director, Enterprise Mobility at 451 Research.

“For small to medium-sized businesses, the ability reduce the number of management consoles can significantly streamline the onboarding process for IT departments that don’t have specialised staff. With the goal of enabling BYOD with simplicity and secure productivity, EMM solutions must enable all forms of mobile computing.  This means managing and securing devices, content, and applications with a user-centric approach that delivers the simplest experience for both users and administrators.”

“By focusing on the user permissions, and with remote management and self-service capability, SMC 5 sets a new standard for usability and simplicity. The redesigned user interface and intuitive workflows make security and management of mobile devices a simple task that takes minimal time,” said Dan Schiappa, SVP and GM of Sophos’ Enduser Security Group.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Built around the Sophos Protected Browser, powered by Island, the solution enables organizations to protect applications, data, users, and guests wherever work takes place,...

HEADLINES

Sophos X-Ops explores a malvertising campaign that leverages Google Ads to distribute an infostealer.

HEADLINES

The update enhances Sophos’ Secure by Design pledge with a brand-new Health Check feature and several other security enhancements.

HEADLINES

Sophos XDR detected 100% of adversary behaviors (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated...

HEADLINES

The percentage of organizations recovered within a week more than doubled from 21% in 2024 to 58% in 2025.  

HEADLINES

Microsoft’s verified SMB Solution status highlights the crucial role of partner collaboration in protecting small and medium businesses against increasing cyberattacks.

HEADLINES

Organizations of all sizes gain real-time access to Sophos threat intelligence within Microsoft’s AI-powered environments, helping them strengthen defenses and respond to threats more...

HEADLINES

This new solution for Sophos XDR and Sophos MDR continuously monitors customer environments for identity risks and misconfigurations and scans the dark web for...

Advertisement