News
3/20/2014
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%

Cryptzone Adds Encrypted Off-Line File Storage To Its Secure Mobile App

MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device

Gothenburg, 20 March 2014

Cryptzone, the data protection specialists, today released the Android version of its security enhanced mobile browser - Mobile Access Protect (MAP). MAP enables workers to use their mobile devices to securely access documents and enterprise web based applications without the risk of data loss.

Cryptzone's approach to mobile security is to deliver content to mobile users in a controlled manner, irrespective of the device. Its MAP solution utilizes policy-based dynamic rules that allow organizations to create a highly granular mobile access strategy, based on risk, without overburdening IT departments.

"Protecting the data not the device is logical and achievable," says Jamie Bodley-Scott, Product Manager for Secure Access at Cryptzone. "We know many organizations still aren't providing users with mobile access to enterprise content for fear of data compromise. We've designed MAP to be policy-based to fully address these concerns and allow organizations to create access rules that align perfectly with their risk tolerance levels. Mobile access can be granted to content based on who is accessing, from which device type and varied by access location and time. You can even decide who is allowed to store encrypted content on a mobile device."

MAP works in conjunction with Cryptzone's AppGate Security Server, which is recognized for its advanced access control capabilities designed to protect enterprise data and applications. Incorporating detailed reporting and audit logging capabilities, visibility and control of mobile/BYOD risks is greatly simplified helping support the overall enterprise access strategy.

New features in MAP 10.3

· Encrypted Off-line Storage

Depending on the enterprise mobile security policy, MAP users can save files to a mobile device. Saved files are stored in the flash memory and individually encrypted using AES256. Policies also determine when these saved files are deleted. Example security options include: after the valid user enters four wrong passwords in a row or if offline viewing is no longer enabled when a user next logs in.

· Annotation and highlighting of pdf documents

Saved files for offline viewing can be annotated.

· Blocking screen shots

While using MAP, screen captures are prevented.

· Viewing Secured files from Microsoft SharePoint

Encrypted files created with Cryptzone's Secured eCollaboration software for MicrosoftTM SharePointTM can be viewed securely on a mobile device with the MAP app, regardless of how the device received the encrypted file.

For more information about Mobile Access Protect visit: http://www.cryptzone.com/products/appgate/Mobile_Access_Protect/

Cryptzone will be exhibiting it secure access and encryption solutions from booth #315 at SecureWorld, Boston from March 25-26th 2014.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOpsí Impact on Application Security
DevOpsí Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, itís a ďdevelopers are from Mars, systems engineers are from VenusĒ situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.