SOTI MobiControl helps enterprises protect against vulnerabilities in operating systems that can affect your enterprise’s day-to-day technology-driven operations.
Most recently, a new vulnerability has been found that affects most versions of the Linux and Unix operating systems. Known as “ShellShock” or “Bash Bug”, this security threat gives attackers the ability to take over your enterprise’s computers and mobile devices. This vulnerability is a command-line shell processor that could allow an attacker to take complete control of technology that uses the Bourne-Again Shell (bash).
SOTI customers are UNAFFECTED. SOTI MobiControl and all affiliated SOTI Services are not affected by the ShellShock vulnerability.
MobiControl is used to manage, secure and control mobile devices, which run a number of operating systems. These are the devices that organizations rely upon for critical business operations, and it is paramount for them to remain secure at all times. Those operating systems include iOS, Android, and Windows. None of these operating systems are subject to this vulnerability, unless they have been rooted as described below. As SOTI MobiControl has the ability to identify and take automatic action against rooted, jail-broken devices, MobiControl can secure the organization against the threat.
Windows: NOT AFFECTED - Windows operating systems are not directly affected by this vulnerability since only Unix based operating systems are affected.
Android: NOT AFFECTED – Android devices run a Linux based operating system, and are NOT affected by this vulnerability as long as this operating system has not been rooted, and the vulnerable version of Bash has not been installed and exposed.
iOS: NOT AFFECTED – iOS devices run a Unix based operating system, and are NOT affected by this vulnerability, as long as this operating system has not been jail-broken, and the vulnerable version of Bash has not been installed and exposed.
SOTI continues to remain committed to protecting your enterprise and your users against existing and emerging threats in enterprise mobility.
If you have any questions, please feel free to contact email@example.com