Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Sophos announced it has been positioned in the Visionaries Quadrant of Gartner’s Magic Quadrant for Enterprise Mobility

June 2015 by Marc Jacob

Sophos announced that for the second consecutive year, it has been positioned in the Visionaries Quadrant of Gartner’s Magic Quadrant for Enterprise Mobility Management Suites (EMM). We believe Sophos is positioned as a Visionary due to its unique understanding of the rapidly evolving mobility landscape.

In addition to Gartner’s acknowledgement, Forrester Research recognizes Sophos as one of the 15 most significant vendors in the EMM space. In the recent follow-up report to the Forrester Wave², it notes that Sophos has a “robust endpoint, encryption, and EMM products,” and that “ Sophos offers strong data, app, OS, and network protection features and has a compelling vision of managing security as a system with deep integration between its mobile, advanced endpoint (laptop/desktop), web, and network security technologies.”

“Sophos delivers the most user-friendly security that empowers employees while mitigating the risks inherent in trends such as BYOD,” said Dan Schiappa, SVP and GM of the Sophos Enduser Security Group. “Businesses can protect their corporate data and maximize their productivity on mobile phones. This is what makes Sophos attractive to small and mid-sized enterprises that do not have large IT staff and has resulted in a 50 percent increase in Sophos Mobile Control installations in the past year.”

With a new self-service portal, Sophos Mobile Control 5 makes compliance with corporate security policy simple for both administrator and end user across iOS 8, Windows Phone and Android platforms. Sophos also delivers advanced anti-malware, anti-spam and web protection for Android devices, as well as network access control to reduce the risk of data breaches.




See previous articles

    

See next articles