sophos mobile control

By: Aalto  11-11-2011

Data protection, policy compliance and device control for mobile devices Give your users the latest mobile technology while keeping your organization’s data safe. We help you secure, monitor and control devices on your network with over-the-air control and a self-service portal that makes mobile protection easy.

  • Protects iPhone, iPad, Android and Windows Mobile devices.
  • Gives you a central role-based web console to distribute consistent policies.
  • Lets you remotely lock and wipe devices to prevent data loss and ensure compliance.
  • Allows users to register and protect their devices through a simple self-service portal.
  • Lets you manage installed apps on a device from a central console and deploy and remove as needed.
Mobile Control

Keep your data safe and comply with regulations With Sophos® Mobile Control, we let your users work with flexibility while on the move—no matter which mobile device they have:

  • Protects your confidential data by letting you configure mobile devices in a consistent and safe way, including password policies and screen locking.
  • Lets admins or users remotely lock devices and wipe data in seconds if a mobile device is lost or stolen.
  • Controls the use of features or apps, like games or Bluetooth, that could lead to productivity concerns, data breaches or compliance issues.
  • Tracks and reports device data traffic, including WiFi, 3G or roaming use.
  • Now available for download in the Android Market.

Manage iPhone, iPad, Android and Windows Mobile

Say yes when people want to use the latest mobile devices, safe in the knowledge you can keep them secure:

  • Lets IT administrators manage all supported smartphones and tablets from one web-based console, regardless of operating system, service provider, network or location of the device.
  • Provides over-the-air setup and configuration so you can control devices from anywhere, at any time.
Mobile security that saves you time

We make things much simpler for your IT staff and provide a good experience for your users, too:

  • Lets users handle routine tasks themselves with a self-service portal that helps them activate a new device and lock (or even wipe) a lost one.
  • Gives you an at-a-glance mobile inventory by recording all registered devices, configuration settings, serial numbers, model numbers and hardware details.
  • Manages apps on devices, letting you deploy pre-configured apps over-the-air. You can also uninstall applications in exactly the same way.
System requirements
  • Windows 2003 or 2008 Server.
  • Java JDK 1.6_20.
  • MS SQL Server 2005 or 2008.
Supported Mobile Operating Systems
  • Apple iOS 4 or higher.
  • Google Android 2.2 or higher.
  • Windows Mobile 6.1 or higher.
Required Components
  • Connection to the Mobile Control SMS server (included while software is in maintenance).
  • Registration in the Apple iOS Developer Enterprise Program to manage iPhone and iPad.

Other products and services from Aalto


it consultation

It provides you with access to a multitude of experience and expertise, whereas individual IT employees can offer only limited skills. We are a Gauteng based IT Consulting Company providing IT solutions in Johannesburg and the greater Gauteng area. Switching to Aalto could be easier than you think and the benefits will undoubtedly surprise and impress you.


network security

Today, your network is also vulnerable to worms, trojans and other malware that require additional anti-virus software and intrusion-prevention systems to prevent and destroy these malicious attacks. Protection can be increased by adding a security token or certificate to the authentication process, and thereafter a fingerprint or retinal scan in appropriate circumstances.


data protection

On the hardware side, we have found HP or Quantum LTO storage drives to outclass the competition, while Symantec Backup Exec or Acronis Backup and Recovery receive our best rating for storage management software. We have the expertise and experience to provide you with rapid disaster recovery systems that could be crucial to the continued operation of your IT infrastructure and your business.