Connect with us

Hi, what are you looking for?

HEADLINES

Sophos Mobile 8 launched to simplify endpoint management and security for businesses of all sizes

This unified approach to endpoint management enables security policies and secure access to resources regardless of an employee’s choice of device. Sophos Mobile 8 adds a range of management features such as MacOS management and configuration, Windows 10 application management, and extended Android and iOS management functionality.

Sophos announced Sophos Mobile 8, the latest version of its Unified Endpoint Management (UEM) and mobile security solution. This new version lets system administrators manage and secure corporate-owned and personal Mac, Windows and mobile endpoints in the Sophos Central management platform alongside Sophos Endpoint Protection and Intercept X to deliver endpoint security for businesses of all sizes.

This unified approach to endpoint management enables security policies and secure access to resources regardless of an employee’s choice of device. Sophos Mobile 8 adds a range of management features such as MacOS management and configuration, Windows 10 application management, and extended Android and iOS management functionality.

Julius Suarez, manager for engineering of Sophos in ASEAN, said: “As mobile internet usage in the Philippines continues to grow, mobile devices are becoming the fastest growing target for malware. With businesses and their employees becoming more reliant on these devices, there is a need to increase corporate security to handle these threats. Sophos Mobile 8 enables IT admins in any size of business to manage and secure MacOS, Windows, and mobile endpoints from a single management platform. This streamlined approach to security management helps both administrators and users save time and effort, improving productivity across the business.”

Sophos Mobile 8 includes the latest in mobile security and anti-ransomware technology to protect devices against the evolving threat landscape. In 2017, SophosLabs processed more than 10 million Android samples (up from 8.5 million in 2016) submitted by customers for analysis. Within that sample, nearly 3.5 million were deemed potentially suspicious or malicious apps, 77 per cent of which were malware.  More recently, SophosLabs discovered attackers are increasingly using Google Play to hide malicious apps like cryptocurrency mining or unwanted advertising that can cause a variety of problems for Android users.

Sophos Mobile 8 is available now both in the cloud-based Sophos Central platform and for installation on the customer’s own premises.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

APPS

Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in the Philippines...

White Papers

Nearly 50% of companies paid the ransom to get their data back – the second highest rate of ransom payment for ransom demands in...

GAMING

To help players stay safe, Kaspersky is launching “Case 404” — an interactive cybersecurity game that teaches Gen Z how to recognize threats and protect their...

HEADLINES

A zero-trust secure connection has many applications beyond automotive. It’s really for any industry that cares about security, and managing that security at scale.

HEADLINES

Organisations across the Asia-Pacific and Japan region are putting their security posture first, and many are now detecting intrusions early in the attack lifecycle,...

HEADLINES

Agentic AI Assistants—such as Apple Siri, Google Gemini, Microsoft Copilot, OpenAI ChatGPT, and others—are increasingly available to mobile users in consumer and enterprise environments. However, the same...

HEADLINES

Based on breach-tracking research conducted for over two decades, over 124 million Filipino user accounts have been compromised since 2004. This puts the Philippines...

HEADLINES

The results reveal a threat landscape that is not only evolving in complexity but also shifting toward gaps in visibility, governance, and infrastructure, posing...

Advertisement