by February 8, 2011 0 comments



Smartphone security is the leading concern among IT executives according to recent Forrester research. Of those IT executives polled, 75% said that they were either concerned or very concerned about the security risks associated with the adoption of these devices and up to 40% allow or support Windows Mobile, the iPhones, and Pads. Further, approximately 150 million people in the US will be using smartphone’s by the middle of this year to perform social and personal functions, according to the Nielsen Company.  And new mobile operating systems are being accepted at a rapid rate; for example IDC expects Android’s Smartphone market share to increase from 16.3% to 24.6% between 2010 and 2014.

IT security and data protection firm, Sophos, announced the availability of Sophos Mobile Control the company’s extension to its data protection and endpoint security product lines. A steady surge in smartphone adoption poses a new set of challenges for businesses as the workforce wants constant connectivity from their individual devices, going beyond what is company-issued. With this new offering, Sophos addresses a major pain-point for businesses by safeguarding data on a broad range of popular smartphone’s and handheld devices, including Apple iPhones and iPads, Google Android, and Windows Mobile devices. Sophos Mobile Control provides comprehensive mobile device management, enabling the ability to simply and quickly secure, monitor, and control the configuration of these devices connecting to the corporate network, allowing similar levels of control and protection with company laptops and desktops.

Sophos Mobile Control addresses the consumerization gap by extending device protection to a broad range of popular mobile platforms.  Designed for IT administrators to simply and quickly secure, monitor, and control the configuration for Smartphone’s running iOS, Android, and Windows Mobile operating systems, Sophos Mobile Control web-based console secures mobile devices by centrally configuring security settings, enabling lockdown of unwanted features and remote over-the-air lock or wipe if device is lost or stolen and enables consistent security policy enforcement, strong password policy and lock period, control and installation of applications, blocking use of cameras, browsers, and the likes of YouTube.

Related Articles:

Predators

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.