News
3/20/2014
03:25 PM
50%
50%

Cryptzone Adds Encrypted Off-Line File Storage To Its Secure Mobile App

MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device

Gothenburg, 20 March 2014

Cryptzone, the data protection specialists, today released the Android version of its security enhanced mobile browser - Mobile Access Protect (MAP). MAP enables workers to use their mobile devices to securely access documents and enterprise web based applications without the risk of data loss.

Cryptzone's approach to mobile security is to deliver content to mobile users in a controlled manner, irrespective of the device. Its MAP solution utilizes policy-based dynamic rules that allow organizations to create a highly granular mobile access strategy, based on risk, without overburdening IT departments.

"Protecting the data not the device is logical and achievable," says Jamie Bodley-Scott, Product Manager for Secure Access at Cryptzone. "We know many organizations still aren't providing users with mobile access to enterprise content for fear of data compromise. We've designed MAP to be policy-based to fully address these concerns and allow organizations to create access rules that align perfectly with their risk tolerance levels. Mobile access can be granted to content based on who is accessing, from which device type and varied by access location and time. You can even decide who is allowed to store encrypted content on a mobile device."

MAP works in conjunction with Cryptzone's AppGate Security Server, which is recognized for its advanced access control capabilities designed to protect enterprise data and applications. Incorporating detailed reporting and audit logging capabilities, visibility and control of mobile/BYOD risks is greatly simplified helping support the overall enterprise access strategy.

New features in MAP 10.3

· Encrypted Off-line Storage

Depending on the enterprise mobile security policy, MAP users can save files to a mobile device. Saved files are stored in the flash memory and individually encrypted using AES256. Policies also determine when these saved files are deleted. Example security options include: after the valid user enters four wrong passwords in a row or if offline viewing is no longer enabled when a user next logs in.

· Annotation and highlighting of pdf documents

Saved files for offline viewing can be annotated.

· Blocking screen shots

While using MAP, screen captures are prevented.

· Viewing Secured files from Microsoft SharePoint

Encrypted files created with Cryptzone's Secured eCollaboration software for MicrosoftTM SharePointTM can be viewed securely on a mobile device with the MAP app, regardless of how the device received the encrypted file.

For more information about Mobile Access Protect visit: http://www.cryptzone.com/products/appgate/Mobile_Access_Protect/

Cryptzone will be exhibiting it secure access and encryption solutions from booth #315 at SecureWorld, Boston from March 25-26th 2014.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2174
Published: 2015-05-24
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors,...

CVE-2015-0713
Published: 2015-05-24
The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software befor...

CVE-2015-0722
Published: 2015-05-24
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.

CVE-2015-1894
Published: 2015-05-24
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2015-1895
Published: 2015-05-24
IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 relies on client-side code to verify authorization, which allows remote attackers to bypass intended access restrictions by modifying the client behavior.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.