{"id":10312,"date":"2026-02-24T10:38:45","date_gmt":"2026-02-24T09:38:45","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=10312"},"modified":"2026-02-24T10:38:45","modified_gmt":"2026-02-24T09:38:45","slug":"sophos-workspace-protection-enables-secure-access-for-contractors-and-guests","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2026\/02\/products\/sophos-workspace-protection-enables-secure-access-for-contractors-and-guests\/","title":{"rendered":"Sophos Workspace Protection Enables Secure Access for Contractors and Guests"},"content":{"rendered":"<p>Contractors and guest users often require access to internal or SaaS applications \u2013 for short-term projects or during mergers and acquisitions. Granting access is typically the first step in onboarding these workers. However, since their devices are not managed by the IT team, these organizations can never really be sure what\u2019s happening to the data their guests are accessing. More specifically, there are two concerns many customers have raised:<\/p>\n<ul>\n<li><strong>Confidentiality<\/strong> &#8211; providing access to data while ensuring it doesn\u2019t easily leave the application, get saved to a local device, or copied into personal emails.<\/li>\n<li><strong>Integrity<\/strong> \u2013 enabling interaction with apps and data, but not from a device that could be compromised<\/li>\n<\/ul>\n<p>Sophos Workspace Protection, including Sophos Protected Browser and Sophos ZTNA, makes securing contractor and guest access and data easy. Customers can quickly set up guardrails for what applications their guests can access and establish data boundaries for the data within those applications. All the user needs to do is install the Sophos Protected Browser on their device, which takes just seconds, just like installing any other browser, and they will be immediately productive no matter where they are. And customers can be confident their applications and data are secure \u2013 ensuring it\u2019s not being used inappropriately or accessed from a compromised device.<\/p>\n<h2>How To Easily Enable Secure Access for Contractors and Guests<\/h2>\n<p>Watch this video for a brief demo of how easy it is to set up Sophos Protected Browser and Sophos ZTNA to access apps such as SSH or RDP with data boundary controls:<\/p>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/sBYIoq9wbuY?si=XJfpq-fTOBwWuElv\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><strong>Provide Granular Access:<\/strong> Customers control exactly what applications any given contractor, guest, or team has access to \u2013 nothing more and nothing less. Policies are flexible and defined by user\/group or by site\/app. They can ensure only Sophos Protected Browser is used to access their applications so they can\u2019t be accessed via a third-party browser. This works for all kinds of apps and systems, web apps, SaaS apps, as well as SSH and RDP. Management is easy \u2013 they can add new access policies quickly and easily as new users come on-board or decommission them just as easily when they leave.<\/p>\n<p><strong>Establish Data Boundary controls:<\/strong> Customers can easily add controls to prevent data from being misused or mistakes from happening. In fact, they can ensure all their data stays within the app if they want. They have full control copying and pasting between apps and outside of the browser, along with screen sharing, screenshots, file saving, download and uploads. For example, they can allow contractors or guests to only copy data between their applications in the browser but prevent copying data to other apps, email, or storage on the device. They can adjust these controls on an app or user\/group basis to limit contractors or guests more than their own employees, some teams more than others, some apps more than others, or any combination thereof.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10315 size-full\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-boundary-controls.png\" alt=\"\" width=\"1429\" height=\"667\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-boundary-controls.png 1429w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-boundary-controls.png?resize=300,140 300w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-boundary-controls.png?resize=768,358 768w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-boundary-controls.png?resize=1024,478 1024w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\" \/><\/p>\n<p><strong>Guard Against Stolen or Compromised Credentials: <\/strong>Customers can enforce multi-factor authentication access across all applications (both in-house and SaaS) to prevent unauthorized access using compromised credentials.<\/p>\n<p><strong>Prevent Compromised Devices from Accessing Apps and Data:<\/strong> Customers can easily add device posture assessment criteria to access policies to ensure a device is compliant and healthy before connecting to applications and data. Customers can require the device be secured with Sophos or a third-party Endpoint protection product and\/or full disk encryption solution (such as Bitdefender or a variety of others).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10316 size-full\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-device-posture.png\" alt=\"\" width=\"1428\" height=\"654\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-device-posture.png 1428w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-device-posture.png?resize=300,137 300w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-device-posture.png?resize=768,352 768w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/02\/sophos-workspace-protection-device-posture.png?resize=1024,469 1024w\" sizes=\"auto, (max-width: 1428px) 100vw, 1428px\" \/><\/p>\n<p><strong>Reduce the Risk of Browser and other Attacks:<\/strong>\u00a0 Sophos Protected Browser is a hardened Chromium-based browser that provides a more secure workspace environment for interacting with applications and data. It\u2019s ideal for unmanaged devices that may be working remotely or in public spaces.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Learn More:<\/strong><\/p>\n<ul>\n<li>Watch the various <a href=\"https:\/\/techvids.sophos.com\/categories\/workspace-protection\" target=\"_blank\" rel=\"noopener\">Sophos TechVids How-To videos<\/a> \u2013 particularly on how to <a href=\"https:\/\/techvids.sophos.com\/watch\/ginCRLoiEC3eH6p4CM4Non\" target=\"_blank\" rel=\"noopener\">Setup Sophos Protected Browser<\/a><\/li>\n<li>Consult the <a href=\"https:\/\/docs.sophos.com\/central\/customer\/help\/en-us\/ManageYourProducts\/ProtectedBrowser\/index.html\" target=\"_blank\" rel=\"noopener\">online documentation<\/a> including:\n<ul>\n<li><a href=\"https:\/\/docs.sophos.com\/central\/customer\/help\/en-us\/ManageYourProducts\/ProtectedBrowser\/SetUpProtectedBrowser\/index.html\" target=\"_blank\" rel=\"noopener\">Setup<\/a><\/li>\n<li><a href=\"https:\/\/docs.sophos.com\/central\/customer\/help\/en-us\/ManageYourProducts\/ProtectedBrowser\/WebPolicy\/Policies\/index.html\" target=\"_blank\" rel=\"noopener\">Policy<\/a><\/li>\n<li><a href=\"https:\/\/docs.sophos.com\/central\/customer\/help\/en-us\/ManageYourProducts\/ProtectedBrowser\/Settings\/index.html\" target=\"_blank\" rel=\"noopener\">Browser Enforcement<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Be sure to check out our other <a href=\"https:\/\/partnernews.sophos.com\/en-us\/tag\/sophos-workspace-protection\/\" target=\"_blank\" rel=\"noopener\">Sophos Workspace Protection articles<\/a> to help make the most of this exciting new offering.<\/p>\n<p>If you\u2019re new so Sophos Workspace Protection, <a href=\"https:\/\/portal.sophos.com\/#custom\/module?ctm=Sophos%20Workspace%20Protection\" target=\"_blank\" rel=\"noopener\">visit the partner portal<\/a> to start training and learn more about all the great capabilities and benefits it provides for securing your customer\u2019s workers, apps, and data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Easily secure access to private and SaaS applications for contractors and guests<\/p>\n","protected":false},"author":19,"featured_media":30000010159,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[353],"coauthors":[58],"class_list":["post-10312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-sophos-workspace-protection"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2026\/01\/featured-image-sophos-workspace-partner-blog-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/10312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=10312"}],"version-history":[{"count":2,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/10312\/revisions"}],"predecessor-version":[{"id":10317,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/10312\/revisions\/10317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=10312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=10312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=10312"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=10312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}