{"id":23401,"date":"2014-05-28T22:41:22","date_gmt":"2014-05-29T02:41:22","guid":{"rendered":"http:\/\/www.opensource.im\/?p=23401"},"modified":"2014-05-28T22:41:22","modified_gmt":"2014-05-29T02:41:22","slug":"sophos-adds-file-level-encryption-to-mobile-security-software","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/sophos-adds-file-level-encryption-to-mobile-security-software.php","title":{"rendered":"Sophos adds file-level encryption to mobile security software"},"content":{"rendered":"<p><p>    Sophos has added file-level encryption to its mobile security    software so that users of Android or Apple iOS devices with    Sophos Mobile Control 4.0 can share encrypted files.  <\/p>\n<p>    IT managers set up the encryption process for the mobile    devices through the Sophos management console, according to    Marty Ward, vice president of product marketing. This can be    organized so that only certain groups of users can share    encrypted files.  <\/p>\n<p>    + MORE ON NETWORK WORLD     VMware outlines vision' for unified mobile security and    management |     BYOD may be SOP but it's still a headache for IT +  <\/p>\n<p>    In addition to the new file-level encryption in Sophos Mobile    Control 4.0, Sophos has also added a way to integrate Web    filtering capability and a network-access control mechanism for    organizations using the Sophos UTM for gateway security.  <\/p>\n<p>    \"If you have our UTM, there's the ability to check that the    mobile phone is compliant,\" says Ward. Types of compliance    checking would include checking to see if a mobile device has    been jailbroken or if it's using apps that are not allowed    under the company's policy. Mobile devices flagged by the    network-access control mechanism can be isolated until    remediation is achieved.  <\/p>\n<p>    Sophos Mobile Control 4.0, which also includes anti-malware    protection, costs $33 per user.  <\/p>\n<p>    Ellen Messmer is senior editor at Network World, an IDG    website, where she covers news and technology trends related to    information security. Twitter: MessmerE. E-mail: <a href=\"mailto:emessmer@nww.com\">emessmer@nww.com<\/a>  <\/p>\n<p>    Read more    about wide area network in Network World's Wide Area    Network section.  <\/p>\n<p>    Tags sophosApplesecurityNetworkingwirelessWide Area NetworkVMware  <\/p>\n<p>    More about AppleIDGSophosVMware  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cio.com.au\/article\/546228\/sophos_adds_file-level_encryption_mobile_security_software\/?utm_medium=rss&utm_source=taxonomyfeed\/RK=0\/RS=9QltU4GzV9PUwE5lQC_MlwuEXHA-\" title=\"Sophos adds file-level encryption to mobile security software\">Sophos adds file-level encryption to mobile security software<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Sophos has added file-level encryption to its mobile security software so that users of Android or Apple iOS devices with Sophos Mobile Control 4.0 can share encrypted files. IT managers set up the encryption process for the mobile devices through the Sophos management console, according to Marty Ward, vice president of product marketing. This can be organized so that only certain groups of users can share encrypted files<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-23401","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23401"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=23401"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23401\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=23401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=23401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=23401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}