Oxford-based anti-malware software maker Sophos and Check Point Software, a provider of network security software, have joined forces to protect business networks — and the sensitive data that they contain — from rogue smartphones and tablets. The companies announced today that Sophos’ Mobile Control (SMC) 4.0 software now integrates with Check Point’s Mobile VPN (virtual […]
Datamation content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
Oxford-based anti-malware software maker Sophos and Check Point Software, a provider of network security software, have joined forces to protect business networks — and the sensitive data that they contain — from rogue smartphones and tablets.
The companies announced today that Sophos’ Mobile Control (SMC) 4.0 software now integrates with Check Point’s Mobile VPN (virtual private network) product. When linked, the solutions enable secure network access control for devices attempting to log onto a network.
Combined, SMC 4.0 and Mobile VPN enable administrators to link their mobile device management (MDM) policies with their network access controls. If a device passes SMC’s compliance checks, the Check Point Mobile VPN app creates a secure VPN tunnel via Check Point Security Gateway. Non-compliant devices are effectively blocked while users of authorized device enjoy secure access to network resources.
Launched earlier this year, SMC 4.0 continually monitors mobile devices for blacklisted apps, unsafe device settings and jailbreaks. A Web-based management console provides users a batch of self-service capabilities, including changing passwords and reporting devices lost or stolen.
As a bonus, the software wraps corporate data with file-level encryption and keeps malware away from Android devices. SophosLabs, the company’s research division, reported that it detected nearly 900,000 unique pieces of malware as of May. Today, that figure stands at nearly 1 million.
Available as a cloud-based service or on-premise software, SMC 4.0 is compatible with iOS, Android and Windows Phone 8 devices.
During the product’s launch in May, Dan Schiappa, senior vice president and general manager of Sophos’ Enduser Security Group, remarked in a statement that the solution “takes data protection beyond the office door by ensuring persistent mobile encryption on devices.” The addition of “network access control based on device compliance status makes mobile device management, content management and mobile security simple and effective,” he added.
Organizations can now leverage those capabilities with Check Point’s Mobile VPN to proactively prevent data breaches, according to the companies.
The partnership between Sophos and Checkpoint provides one-stop MDM and network access control, enabling administrators “to easily manage how mobile users access centrally-stored corporate resources, allowing them to regain control of their networks all through a simple interface,” commented Check Point’s Alon Kantor, vice president of business development, in a statement.
Explosive mobile adoption and a new breed of threats to devices and their users “means that mobile security is an increasing priority for many organizations,” stated Ari Buchler, senior vice president of corporate development at Sophos. “This integration demonstrates both companies’ commitment to meeting the needs of customers in the face of a continuously evolving threat landscape.”
Pedro Hernandez is a contributing editor at Datamtion. Follow him on Twitter @ecoINSITE.
Photo courtesy of Shutterstock.
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
-
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
-
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
SEE ALL
ARTICLES