Welcome!

Mobile IoT Authors: Peter Silva, William Schmarzo, Liz McMillan, AppDynamics Blog, Scott Allen

News Feed Item

SOTI Enhances Secure Web Browsing and Threat Detection for Enterprise MDM Deployments with Webroot Security Intelligence

MISSISSAUGA, ON, Jan. 14, 2013 /PRNewswire/ - SOTI Inc., the world leader in Enterprise Mobile Device Management (MDM) and Bring Your Own Device (BYOD) Policy Management, today announced the integration of Webroot's web filtering, antivirus and malware scanning technology into MobiControl V10, enhancing enterprise mobility security. Webroot is a leading provider of award-winning internet security solutions empowering enterprises with superior online threat management capability.

SOTI's innovative Android+ technology enables low-level access to certified Android devices allowing for superior enterprise control and management of Android devices.  Android+ coupled with Webroot's technology enables not only virus or malware detection, but more importantly the ability to completely remove threats from devices both locally and remotely by IT administrators.  This partnership of leading technologies brings a new level of Android security to the enterprise.  With real-time antivirus and malware scanning at the application and file system level, MobiControl is the first mobile device management solution that closes the Android security gap, making Android truly enterprise-ready for both enterprise owned and BYOD deployments.

MobiControl V10's Antivirus/Malware Protection Policy:

  • Extends desktop-grade antivirus and malware protection to managed endpoint devices
  • Detects, quarantines, and eliminates web-based threats in real time
  • Protects installed applications and the device file system
  • Automates scanning, virus definition, and quarantine schedules
  • Supports whitelisting capability for superior protection

With Webroot Security Intelligence, MobiControl provides world-class web content filtering, a critical component in enforcing the acceptable use of mobile devices in enterprise and education deployments.  MobiControl's web content filtering helps enable Children's Internet Protection Act (CIPA) compliance, providing a focused and engaging learning experience for students and peace of mind for educators and administrators with devices both in the classroom and in the home.

MobiControl V10 Web Filtering Policy:

  • Configures web filtering policies to block access to specific URLs
  • Restricts URLs based on Webroot's managed categorization
  • Automates redirection of devices to a customized URL
  • Supports whitelist of acceptable URLs

"Enforcing acceptable use policies is critically important to our enterprise and education customers," said Carl Rodrigues, President and CEO of SOTI. "Prior to Android+, low level access to take action on threat detection was not possible.  This partnership has created a new standard in what Android Enterprise Security should be.  Specifically in education, the rapid adoption of mobile technology in the classroom presents significant management challenges for schools. Educators need to balance the need for acceptable use and CIPA compliance with the opportunity to empower students with the latest mobile technologies both at school and home. MobiControl's web filtering functionality allows students to realize the full potential of these exciting new technologies, while assuring teachers, parents and administrators that the experience remains focused and free of objectionable content."

"Today the endpoint is the perimeter of the enterprise network, and Webroot's strategic partnership with SOTI will add our superior mobile security intelligence to its extensive MDM solution to protect that network," said Dick Williams, Webroot CEO. "Protecting the data within it along with an increasingly mobile workforce must be a priority for IT managers, and with MobiControl V10 and Webroot they can do that without sacrificing other priorities."

About SOTI Inc.
SOTI Inc. develops industry-leading solutions for enterprise mobility management, allowing organizations to empower enterprise mobility through support for corporate-liable and Bring Your Own Device (BYOD) policies. SOTI MobiControl solves the unique challenges involved in managing, securing, supporting, and tracking mobile and desktop computing devices across all platforms. Over 10,000 customers around the world rely on SOTI MobiControl every day to manage millions of devices. For more information, visit us at www.soti.net, contact us by email at [email protected] or call us at +1-888-624-9828 (NA), +44 1213680675 (UK) or +61 3 90015554 (Australia).

About Webroot
Webroot is bringing the power of software-as-a-service (SaaS) to Internet security with its suite of Webroot® SecureAnywhere offerings for consumers and businesses. Webroot also offers security intelligence solutions to organizations focused on cyber-security, such as Palo Alto Networks, F5, Corero, Juniper, SOTI, and others. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held security organization based in the United States. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

© 2013 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are trademarks or registered trademarks of Webroot Inc. in the United States and other countries.

SOURCE SOTI Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, outlined ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and sto...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformative effort is likely to also have a modernizing effect, and thus, we can see these as levels of improvement efforts. However, many businesses are being led to believe if they don’t transform now they risk becoming ...