Sophos SafeGuard 8 is enabled to directly communicate with endpoint protection as part of Sophos’ synchronized security strategy
Sophos has announced Sophos SafeGuard Encryption 8, a new synchronized encryption solution that protects data against theft from malware, attackers or accidental leaks. All organizations can now choose to adopt the best practice of “always-on” file-level encryption to protect data accessed from mobile devices, laptops, desktops, on-premise networks and cloud-based file sharing applications. Sophos is the first vendor to provide persistent, transparent and proactive encryption that protects files across Windows, Mac, iOS or Android platforms by default.
According to the Sophos survey, The State of Encryption Today , only 29 percent of IT managers said they always encrypt smartphones and only 43 percent of Macs, leaving high levels of exposure across an organization.
As part of Sophos’ synchronized security strategy, Sophos SafeGuard Encryption can respond automatically to threat incidents from connected endpoint protection. During an active infection, Sophos SafeGuard Encryption can temporarily revoke encryption keys to protect data, and users can automatically get those keys back after the incident is resolved. Sophos SafeGuard Encryption also synchronizes keys with Sophos Mobile Control, which seamlessly secures file access rights on smartphones and tablets. Even encrypted documents can be accessed securely within the application’s Secure Work Space feature.
Dan Schiappa, Senior Vice President and General Manager, Enduser Security Group, Sophos said, “Full disk encryption alone only protects data in the event of the theft or loss of a laptop or mobile device. But data travels everywhere – it’s vulnerable and extremely difficult to protect consistently when shared and opened from multiple devices and cloud-based collaboration applications. We’ve completely re-imagined SafeGuard Encryption 8 to encrypt each individual file by default and continuously validate users, applications and devices for secure collaboration. We also provide password protected files, allowing users to share encrypted files with external recipients. When data security is simple and transparent, end users are more likely to accept it, making your whole business more secure and more likely to stay compliant.”