sb-eu logo
Story image

Sophos launches Intercept X for mobile

16 Jan 2020

Cybersecurity company Sophos has introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defence for Android and iOS devices.

Sophos also published research, Fleeceware Apps Persist on the Play Store, that details new findings on Fleeceware applications that overcharge unsuspecting consumers for functionality widely available in other free or low-cost apps.

First discovered by SophosLabs on Google Play in September 2019, Fleeceware remains a problem with more than twenty newly discovered applications with nearly 600 million alleged installations, as reported by Google.

“Fleeceware and other unscrupulous app developers are walking a fine line to avoid breaking hard and fast app store rules. This sneaky behaviour is unethical, but not illegal,” says Sophos chief product officer Dan Schiappa.

“Possibly more worrisome are the stealthy cybercriminals who increasingly target mobile devices to carry out attacks for financial gain or as an ‘easy in’ to connected corporate networks.

“No mobile device is immune, and attackers are counting on unprotected devices and unpatched flaws to carry out their attacks. Intercept X for Mobile protects users from risky applications and malicious content, and keeps business data on mobile devices secure.”

Leveraging the same deep learning anti-malware technology used in Intercept X for Windows, macOS and server, Intercept X for Mobile protects users, their devices and their data from known and never-before-seen mobile threats.

A redesigned interface simplifies security management and aids accessibility for users with disabilities:

Device Security: Intercept X for Mobile continuously monitors for and alerts users and IT administrators to signs of potential compromise so they can rapidly and automatically remediate issues and revoke access to corporate resources. Compliance checks detect jailbreaking, rooting, operating system versions, and more, informing users and IT administrators of violations and taking automatic action

Network Security: Intercept X for Mobile monitors network connections for suspicious activity in real time, warning users and IT administrators of potential Man-in-the-Middle (MitM) attacks. Web filtering and URL checking also stop access to known bad sites, protecting users from unsuitable content, and SMS phishing detection spots malicious URLs

Application Security: Intercept X for Mobile detects malicious and suspicious applications installed on devices, protecting against malware, ransomware and potentially unwanted apps like Fleeceware. Integration with Unified Endpoint Management (UEM) solutions like Sophos Mobile and Microsoft Intune enable administrators to build conditional access policies, restricting access to applications, data and corporate resources when threats are detected

Chromebook Security: The new Chromebook Security extension protects Chrome OS users from unsuitable and malicious web content, provides app white and block-listing, and lets IT administrators report on device status and configuration.

Intercept X for Mobile is managed in the cloud-based Sophos Central platform alongside Sophos’ portfolio of cybersecurity solutions.

Sophos’ Synchronized Security approach empowers these solutions to work together for real-time information sharing and threat response.

“Intercept X for Mobile is the best way to consolidate multiple endpoint management platforms for consistent policies, comprehensive security and letting users be productive on the devices they prefer,” says IDC program vice president Phil Hochmuth.

Sophos Intercept X for Mobile is available now as a stand-alone license or bundled with the new Sophos Mobile 9.5 UEM for additional endpoint management capabilities, providing a complete and secure UEM platform with an integrated mobile threat defence solution.

For individual and unmanaged use, Intercept X for Mobile is available for free on the Apple App Store and Google Play.

Story image
Zero trust security gaining momentum as a cybersecurity model
The model is centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything trying to connect to its systems before granting access, according to CSO.More
Story image
Houseparty denies security breach as users accuse app of hacking accounts
The popular face-to-face video hosting service has been accused of hacking users' other accounts, a claim Houseparty disputes.More
Story image
Interview: Ping Identity exec on why security system updates are critical during COVID-19
Techday spoke with Ping Identity country manager for A/NZ and Japan, Ashley Diffey, on how zero-trust is favourable over perimeter-based security, and what the changes in work mean for businesses in a post-COVID-19 world.More
Story image
Email attacks up 667% following rise of COVID-19 worldwide
Of the COVID-19 related attacks detected by Barracuda Sentinel through March 23, 54% were scams, 34% were brand impersonation attacks, 11% were blackmail, and 1% are business email compromise.More
Story image
Interview: ManageEngine's VP says legacy remote solutions aren't cutting it
Techday spoke with ManageEngine vice president Rajesh Ganesan on the company’s solutions to the rapid changes and issues facing workforces around the globe as millions upon millions pack up their offices and work from home.More
Story image
Google Chrome postpones changing cookie policy in wake of COVID-19
Google Chrome says it began enforcing secure-by-default handling of third-party cookies with its release of the Chrome 80 update in February. But now the work has been postponed due COVID-19.More