Security and mobility management vendor Sophos recently announced the release of Intercept X for Mobile, a mobile threat defense solution that leverages deep anti-malware technology. The tool, a version of their endpoint security solution Intercept X, delivers device, network, and application security through a unified interface. Intercept X for Mobile can be deployed via Sophos’ unified endpoint management (UEM) solution Sophos Mobile or through a third-party UEM platform.
According to Sophos, Intercept X for Mobile provides “advanced levels of protection for the ultimate defense” of mobile devices. The solution focuses on anti-malware and antivirus protection for mobile devices, detection malicious and potentially unwanted applications, including apps not downloaded through official app stores. Intercept X for Mobile uses up-to-the-minute threat intelligence from SophosLabs global research teams.
The tool also features several capabilities for mobile device loss and theft protection. Through Intercept X for Mobile, admins can remotely wipe or lock a stolen Android device or locate a device that’s gone missing. Users are also able to remotely trigger device alarms, display messages, or reset device passcodes; in addition, Sophos will alert them to any SIM charges on lost/stolen devices.
In addition to the announcement of Intercept X for Mobile, Sophos detailed updates to Sophos Mobile 9.5; new features include an improved task bundle wizard, support for Samsung OEM config, and enhanced security reporting. Sophos also announced education-focused Chromebook security, which incorporates web protection designed for education and web filtering for on-campus and off-campus situations.
Looking for more info on the benefits of enterprise mobility management? You should check out our free 2020 Mobility Management Buyer’s Guide. We profile the top vendors in the mobility management field, their key capabilities, and our Bottom Line for each.
Check us out on Twitter for the latest in Enterprise Mobility news and developments!
Latest posts by Daniel Hein (see all)
- Extreme Networks: Seven in 10 Companies See Hacking Attempts via IoT - February 20, 2020
- The 9 Best Mobile Device and IoT Security LinkedIn Groups You Should Join - February 14, 2020
- 5 Essential Mobility and Mobile Security Certifications - February 11, 2020