Download presentation
Presentation is loading. Please wait.
1
This Is Next-Gen Mobile Security
Introducing Sophos Mobile Control
2
Agenda Mobile Security Today Defining Next-Gen Mobile Security
Introducing Sophos Mobile Control Mobile Productivity Mobile Security Mobile Simplicity Integration Sophos’ EMM Vision Summary
3
Mobile Security Today
4
Mobile devices can do everything…
Today’s mobile devices aren’t just for making calls. Users can do everything they do on their computer on their mobile. And they expect to be able to do it all on the go without affecting their productivity.
5
…And it’s all about the data
Modern users have many devices and expect to be productive on them all Data moves with the user and needs to be protected wherever it goes Corporate data needs to be secured without slowing the user down!
6
Personal devices are big in business
Employers are often unaware of how extensively personal devices are used for work
7
Android malware is booming
Source: SophosLabs
8
Mobile security is causing IT pain
What security-specific pain points are being generated by the general move to mobility? Data protection is the key issue – 42% of organizations are having issues Personal devices Vs corporate owned – 11% cited personal devices as a problem (aka BYOD & CYOD) Variety of devices and OS versions – 9% of organizations experienced difficulties What security-specific pain points are being generated by the general move to mobility? Source: Information Security – Wave 17 | © Research, LLC Source: Information Security – Wave 17 | © Research, LLC
9
Organizations are using a wide range of solutions
What technologies are being used or considered to deal with these pain points? 91% of organizations are exploring an MDM solution 45% are exploring secure containers 20% are exploring mobile device anti-virus What technologies are being used or considered to deal with these pain points? Source: Information Security – Wave 17 | © Research, LLC Source: Information Security – Wave 17 | © Research, LLC
10
Defining Next-Gen Mobile Security
11
What is Next-Gen Mobile Security?
Productivity Enabling mobile devices in the business so people can work the way they want to Security Ensuring business data always stays safe, and devices are never threatened by malware Simplicity Simple to install, configure, manage and protect Next-Gen Mobile Security enables your users to be as productive on mobile devices as they are on computers, while keeping your corporate data and business secure. As you saw on the previous slide the top 2 issues centre on data protection and employee-owned devices. And that’s exactly what should be at the core of every next-gen mobile security solution. <advance slide> Enabling your users to be as productive on mobile devices as they are on their computers and also keeping your corporate data, mobile devices and business secure. In order to achieve this there are 3 key tenets that should be in every next-gen mobile solution. Productivity – Enabling mobile devices in the business so people can work the way they want to 2) Security - Ensuring business data always stays safe, and devices are never threatened by malware 3) Simplicity - Simple to install, configure, manage and protect
12
Introducing Sophos Mobile Control
13
Why organizations choose Sophos Mobile Control
Mobile productivity Enable users to be as productive on mobile devices as traditional computers Mobile security Holistic protection that secures corporate data and the device Mobile simplicity Easy to setup, easy to manage and easy to maintain
14
Mobile Productivity
15
Make mobile productive
Extend your data protection policy beyond the corporate network onto mobile devices Easily track your mobile inventory and assets Remotely locate, lock and wipe devices Keep corporate data secure even on compromised/non-compliant devices
16
Mobile Security
17
The two pillars of Mobile Security
Securing your data Mobile containers Securing your devices Anti-malware, compliance Calendar Contacts Corporate Documents Corporate Browser
18
Securing your data with containers
Keep corporate data safe and separate from users’ personal data Data is secure even in the event of a lost or compromised device
19
Customize your mobile security
Restrict access to data based on location, time of day and by Wi-Fi SSID Provision across multiple devices and OS versions Securely access commonly used corporate websites
20
Protect your mobile devices
Easily create compliance rules and push them out to devices Monitor device status and quickly take action Get award-winning malware protection
21
Mobile Simplicity
22
Simple & intuitive dashboard
23
Quickly add new mobile devices
Device Enrollment Wizard Since SMC is not a tool that is used on a daily basis but only when new devices are issued to new or existing employees, it can be easy to forget the implementation steps. Once the initial configuration has been completed, for any additional devices the admin can use the Wizard to quickly add additional devices. In just a matter of minutes – the administrator is stepped through a few steps to add a device and immediately issue a QR code to activate the device. The detailed screen shots at each step in the wizard can be found on in the What’s new presentation.
24
Enable your users
25
Integration
26
One-stop security with Sophos Central
Consolidate your data protection strategy across the corporate network Simplified management – one console, one login Create policies for individuals not just devices
27
Mobile integration with Encryption
Benefits: Secure access to encrypted files with the ability to edit and upload Corporate data remains secure even after leaving the mobile device
28
Mobile integration with Network Security
Wi-Fi & VPN Configuration Wi-Fi & VPN Access Benefits: Wi-Fi and VPN settings only need to be configured once Control corporate network access for mobiles based on compliance As with all products, by integration with other products, here Sophos UTM, customers get additional value or protection If SMC is connected to a Sophos UTM, all Wi-Fi and VPN settings in the UTM can be shared with SMC. No need to key in the config twice, no room for errors And if devices are marked as uncompliant, they can be locked out of the corporate network by blocking VPN and moving the devices to a quarantine Wi-Fi network, implementing some NAC functionality
29
Sophos’ EMM Vision
30
Radicati EMM Market Quadrant
Independent analyst report that names Sophos as a Top Player Sophos strengths include: Straightforward one user/one license pricing structure Intuitive, web-based user interface for admins Strong anti-malware and web protection functionality Integration with Safeguard Encryption - share encrypted files to mobile devices and safely utilize cloud storage locations for collaboration. Integration with Sophos UTM for a comprehensive security strategy
31
A visionary for mobile security
Gartner Magic Quadrant ENTERPRISE MOBILITY MANAGEMENT, JUNE 2015 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos Inc. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this [presentation/report]). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. Gartner Magic Quadrant for Enterprise Mobility Management Suites Terrence Cosgrove, Rob Smith, Chris Silva, John Girard, Bryan Taylor, 8 June 2015
32
Simplicity through integration
EMM Vendors 3rd Party Network Security Network Security 3rd Party Encryption Encryption 3rd Party Web Security Web Security 3rd Party Anti-Malware Anti-Malware 5 companies 5 management consoles No integration Increased resource Increase Professional Services 1 company Multiple consoles today but ultimately 1 with Sophos Cloud Integrated, user-centric Reduced resources Reduced professional services EMM EMM “A single solution is better for security” – Gartner, in ComputerWorld 2014
33
Summary
34
Mobile productivity. Sophos security.
Enable users to be as productive on mobile devices as traditional computers Mobile security Holistic protection that secures corporate data and the device Mobile simplicity Easy to setup, easy to manage and easy to maintain
35
Next steps – useful links
Sophos Website Webinars Sophos Blog blogs.sophos.com Latest Sophos Podcasts YouTube Contact us or Find a Partner
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.