Cymphonix Releases Mobile Device Security Module

A company that sells a network security appliance has released a new application specifically to help its customers manage the security of mobile devices accessing the network as well. Cymphonix, which produces the Network Composer EX appliance for centrally scanning and controlling network traffic, recently came out with the Cymphonix Mobile Client.

The network administrator can use the new program to integrate mobile users and devices into existing reporting and policy management groups maintained in Composer EX. As policy changes are made on the appliance, the new policies will be applied to traffic coming from mobile systems; likewise, the Web traffic from mobile devices will show up in reporting.

When users access the Internet on their mobile device, Mobile Client uses location awareness to determine if the device is on or off network. If outside, the program inspects the Web requests and verifies with Network Composer whether or not the site should be blocked or allowed based on the user's current policy.

The application can be used to create policies that apply to all users or individual users and groups in the institution.

The company also sells Network Conductor EC, an appliance line that performs centralized management and reporting in sites with multiple Composer EX installations.

Cymphonix products have been used at Garden City Community College in Kansas and Bridgerland Applied Technology College in Logan, UT.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • Analyst or Scientist uses a computer and dashboard for analysis of information on complex data sets on computer.

    Anthropic Study Tracks AI Adoption Across Countries, Industries

    Adoption of AI tools is growing quickly but remains uneven across countries and industries, with higher-income economies using them far more per person and companies favoring automated deployments over collaborative ones, according to a recent study released by Anthropic.

  • businessmen shaking hands behind digital technology imagery

    Microsoft, OpenAI Restructure AI Partnership

    Microsoft and OpenAI announced they are redefining their partnership as part of a major recapitalization effort aimed at preparing for the arrival of artificial general intelligence (AGI).

  • computer monitor displaying a collage of AI-related icons

    Google Advances AI Image Generation with Multi-Modal Capabilities

    Google has introduced Gemini 2.5 Flash Image, marking a significant advancement in artificial intelligence systems that can understand and manipulate visual content through natural language processing.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.