Cymphonix Releases Mobile Device Security Module

A company that sells a network security appliance has released a new application specifically to help its customers manage the security of mobile devices accessing the network as well. Cymphonix, which produces the Network Composer EX appliance for centrally scanning and controlling network traffic, recently came out with the Cymphonix Mobile Client.

The network administrator can use the new program to integrate mobile users and devices into existing reporting and policy management groups maintained in Composer EX. As policy changes are made on the appliance, the new policies will be applied to traffic coming from mobile systems; likewise, the Web traffic from mobile devices will show up in reporting.

When users access the Internet on their mobile device, Mobile Client uses location awareness to determine if the device is on or off network. If outside, the program inspects the Web requests and verifies with Network Composer whether or not the site should be blocked or allowed based on the user's current policy.

The application can be used to create policies that apply to all users or individual users and groups in the institution.

The company also sells Network Conductor EC, an appliance line that performs centralized management and reporting in sites with multiple Composer EX installations.

Cymphonix products have been used at Katy Independent School District in Texas and Lakeview Academy in Georgia.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • laptop displaying a glowing digital brain and data charts sits on a metal shelf in a well-lit server room with organized network cables and active servers

    Cisco Unveils AI-First Approach to IT Operations

    At its recent Cisco Live 2025 event, Cisco introduced AgenticOps, a transformative approach to IT operations that integrates advanced AI capabilities to enhance efficiency and collaboration across network, security, and application domains.

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    Cloud Security Auditing Tool Uses AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has unveiled a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • laptop with AI symbol on screen

    Google Launches Lightweight Gemma 3n, Expanding Emphasis on Edge AI

    Google DeepMind has officially launched Gemma 3n, the latest version of its lightweight generative AI model designed specifically for mobile and edge devices — a move that reinforces the company's focus on on-device computing.