News
3/20/2014
03:25 PM
50%
50%

Cryptzone Adds Encrypted Off-Line File Storage To Its Secure Mobile App

MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device

Gothenburg, 20 March 2014

Cryptzone, the data protection specialists, today released the Android version of its security enhanced mobile browser - Mobile Access Protect (MAP). MAP enables workers to use their mobile devices to securely access documents and enterprise web based applications without the risk of data loss.

Cryptzone's approach to mobile security is to deliver content to mobile users in a controlled manner, irrespective of the device. Its MAP solution utilizes policy-based dynamic rules that allow organizations to create a highly granular mobile access strategy, based on risk, without overburdening IT departments.

"Protecting the data not the device is logical and achievable," says Jamie Bodley-Scott, Product Manager for Secure Access at Cryptzone. "We know many organizations still aren't providing users with mobile access to enterprise content for fear of data compromise. We've designed MAP to be policy-based to fully address these concerns and allow organizations to create access rules that align perfectly with their risk tolerance levels. Mobile access can be granted to content based on who is accessing, from which device type and varied by access location and time. You can even decide who is allowed to store encrypted content on a mobile device."

MAP works in conjunction with Cryptzone's AppGate Security Server, which is recognized for its advanced access control capabilities designed to protect enterprise data and applications. Incorporating detailed reporting and audit logging capabilities, visibility and control of mobile/BYOD risks is greatly simplified helping support the overall enterprise access strategy.

New features in MAP 10.3

· Encrypted Off-line Storage

Depending on the enterprise mobile security policy, MAP users can save files to a mobile device. Saved files are stored in the flash memory and individually encrypted using AES256. Policies also determine when these saved files are deleted. Example security options include: after the valid user enters four wrong passwords in a row or if offline viewing is no longer enabled when a user next logs in.

· Annotation and highlighting of pdf documents

Saved files for offline viewing can be annotated.

· Blocking screen shots

While using MAP, screen captures are prevented.

· Viewing Secured files from Microsoft SharePoint

Encrypted files created with Cryptzone's Secured eCollaboration software for MicrosoftTM SharePointTM can be viewed securely on a mobile device with the MAP app, regardless of how the device received the encrypted file.

For more information about Mobile Access Protect visit: http://www.cryptzone.com/products/appgate/Mobile_Access_Protect/

Cryptzone will be exhibiting it secure access and encryption solutions from booth #315 at SecureWorld, Boston from March 25-26th 2014.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-4196
Published: 2015-07-04
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.

CVE-2015-4525
Published: 2015-07-04
The log-gather implementation in the web administration interface in EMC Isilon OneFS 6.5.x.x through 7.1.1.x before 7.1.1.5 and 7.2.0.x before 7.2.0.2 allows remote authenticated users to execute arbitrary commands with root privileges via unspecified vectors.

CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report