Sophos Mobile Control has been given five stars and the “Best Buy” award from SC Magazine, beating AirWatch, IBM and Citrix in the publication’s latest review of mobile device management solutions.
We’re delighted that Sophos Mobile Control came out on top, and received a perfect five out of five stars in all categories in the July 2016 issue.
The review editors at SC Magazine were full of praise for Sophos Mobile Control:
“Out of the gate we need to say that this product impressed us.”
Back in April we announced the release of Sophos Central (previously Sophos Cloud) with its all-new integrated management platform. This marked a major step forward in simplifying security management in an industry that has been increasingly trending toward complicated point products.
We’ve been steadfast in our belief that powerful, feature-filled, and industry-leading security should be integrated and uncomplicated. Today we take another step forward in delivering on that vision, as we add Sophos Wireless to the ever-expanding Sophos Central protection portfolio.
At Sophos, we’re committed to taking a fresh approach to complex problems. In November, we announced synchronized security: no longer does security mean making sense of piecemeal tools and reacting to alerts. With synchronized security, your security solutions communicate with each other both across the network and on endpoints to mitigate risks and stop data loss instantly.
A sophisticated security program shouldn’t just be limited to protection at the firewall and endpoint level of course – your files need to be protected too, wherever they reside, at all times. That’s why Sophos SafeGuard Encryption 8 – launched today – now offers automatic, always-on file-level encryption on endpoints, mobile devices and in cloud storage — across Windows, Mac, iOS and Android.
No longer does file-level encryption mean lengthy set-up by administrators or hand-selecting what files to encrypt. Your users’ files start by default with the highest level of security to keep their sensitive information out of the wrong hands, and from there they can choose to opt-out specific files.
Better yet, it’s all made even more effective and effortless with synchronized security, our coordinated incident response technology.
The online game of the moment is Pokémon GO, a mobile phone app that became so popular so quickly that its availability was limited outside the USA in order to stop the game servers being overloaded.
But what about everyone outside the US who wants to join in the fun?
On iOS, there’s not a lot you can do to install apps from alternative markets, because Apple only officially supports the App Store for downloads.
On Android, however, there’s an option called “Allow apps from untrusted sources” that opens up your phone to software from anywhere, not just Google Play.
So, millions of people all over the world are deliberately lowering their Android security settings to pirate Pokémon GO from unofficial download sites.
Is it safe to do this?
After all, millions of people have already pirated the app, apparently without anything bad happening, so surely the many millions who follow the crowd will be OK, too?
We’re delighted to announce that independent experts CRN have recognized the Sophos Partner Portal by awarding it Best Partner Website 2016!
The Sophos Partner Portal is a one-stop-shop that gives our valued channel partners everything they need to support their customers. As part of our channel-first strategy we’re constantly enhancing the portal to make it as useful as possible for our partners, and we think this award is testament to the excellence of the Portal.
Our UTM has been the leading solution for protecting network infrastructure in Amazon Web Services (AWS) for years now. Over that time, we’ve added more and more purpose-built features and capabilities to Sophos UTM that continue to make it an ideal fit for securing your AWS cloud-based servers and networks. So it’s with great pleasure that today we’re announcing the availability of our new Outbound Gateway (OGW) protection for AWS. It provides unique visibility, policy enforcement, and elastic scalability to outbound web traffic from AWS.
Arguably one of the most exploited Microsoft Office vulnerabilities of the last decade, CVE-2012-0158’s longevity is one of constant adaptation. Ever since its disclosure in 2012, this vulnerability has been the attack vector of choice for exploitation by attackers who seek to hijack Microsoft Word or Excel and force these programs to execute malicious code.
In fact, according to SophosLabs research, as late as Q4 2015, CVE-2012-0158 was still used by 48% of exploits specifically targeting Office documents.
In this new research paper, Graham Chantry of SophosLabs provides a deep dive into several exploits found in the wild and how they work using CVE-2012-0158.