Story image

Sophos offering mobile device management with Microsoft Intune integration

02 Apr 2019

Network and endpoint security service provider Sophos has announced the integration of Sophos Mobile Security with Microsoft Intune.

The integration will enable Microsoft Intune customers running Sophos Mobile Security 9.0 to configure access controls fed by the latest mobile device threat information, enabling employees to work and access data securely from any device or location while maintaining corporate compliance.

Running on Microsoft Azure, the Sophos integration will enable IT administrators to configure individual device usage policies within Microsoft Intune to enable employees to be productive and work from the devices and applications they prefer, while ensuring corporate data compliance.

If an individual endpoint is compromised, administrators will have access to detailed security insights from Sophos Mobile Security to enable them to more effectively decide when to lockdown an individual endpoint and deny access to corporate data.

''As we move towards zero trust networking, enhanced conditional access is crucial. With remote working on the increase and the knock-on effect that has on corporate data access across a variety of mobile devices, there is a growing requirement to enable user productivity without compromising data security,'' says Sophos chief product officer Dan Schiappa.

''Understanding and managing security threats is central to this operating environment and our integration with Microsoft delivers on this requirement.

“By offering detailed threat insights relating to individual mobile endpoints, IT administrators can make more informed choices on whether to block a device from network access,” Schiappa says.

“By giving administrators that extra context, access denial can be more effectively restricted to ensure productivity is only impacted where necessary.''

Microsoft security marketing director Ryan McGee says, ''In today's increasingly mobile environment, more granular context is becoming essential to ensure networks are less easily compromised by malware or potentially unwanted content.''

''Integrations with security solution providers like Sophos are important to us. We are excited to extend the capabilities of the Microsoft Intune solution to deliver improved security posture to our customers.''

Sophos Mobile Security runs on both Android and iOS devices and can share threat details with Microsoft to provide extra context.

Conditional Access policies can now take threat detections from Sophos into consideration when deciding whether to allow access to requested resources.

Sophos Mobile Security is available now for Android and iOS. 

Licences can be purchased through registered Sophos partners worldwide to enable centralised configuration and the Microsoft Intune integration.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.