Global IT security and data protection company, Sophos, has announced the availability of Sophos Mobile Control, an extension to the company’s data protection and endpoint security product lines.

A steady surge in smartphone adoption poses a new set of challenges for businesses, as the workforce wants constant connectivity from their individual devices, going beyond what is company-issued.
With this new offering, Sophos addresses a major pain point for businesses by safeguarding data on a broad range of popular smartphones and handheld devices, including Apple iPhones and iPads, Google Android and Windows Mobile devices.
Sophos Mobile Control provides comprehensive mobile device management, enabling the ability to simply and quickly secure, monitor and control the configuration of devices connecting to the corporate network, allowing similar levels of control and protection with company laptops and desktops.
Smartphone security is the leading concern among IT executives, according to recent Forrester research.
Of those IT executives polled, 75% said that they were either concerned or very concerned about the security risks associated with the adoption of these devices, and up to 40% allow or support Windows Mobile, the iPhone and iPads.
“Companies are faced with an unprecedented challenge of allowing consumer devices that they may not own to access company data, while still giving employees control and use of their devices. The very notion of what defines a company endpoint has become redefined,” says Brett Myroff, CEO of regional distributor, Sophos South Africa.
“Sophos’ mission is to provide businesses with the most comprehensive threat and data protection, and to do so while reducing complexity and burden to IT administrators and end-users, regardless of the device type or whether it is in or out of the network.”
Designed for IT administrators to simply and quickly secure, monitor and control the configuration for smartphones running iOS, Android and Windows Mobile operating systems, Sophos Mobile Control web-based console:
*Secures mobile devices by centrally configuring security settings, enabling lockdown of unwanted features and remote over-the-air lock or wipe if device is lost or stolen.
*Enables consistent security policy enforcement, strong password policy and lock period, control and installation of applications, blocking use of cameras, browsers and the likes of YouTube.
*Eliminates administrative burden with a self-service portal that allows end-users to register new devices and lock or wipe lost phones.
*Controls the access to corporate email via a secure gate, allowing only properly secured and registered devices to access email.