News
3/20/2014
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%

Cryptzone Adds Encrypted Off-Line File Storage To Its Secure Mobile App

MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device

Gothenburg, 20 March 2014

Cryptzone, the data protection specialists, today released the Android version of its security enhanced mobile browser - Mobile Access Protect (MAP). MAP enables workers to use their mobile devices to securely access documents and enterprise web based applications without the risk of data loss.

Cryptzone's approach to mobile security is to deliver content to mobile users in a controlled manner, irrespective of the device. Its MAP solution utilizes policy-based dynamic rules that allow organizations to create a highly granular mobile access strategy, based on risk, without overburdening IT departments.

"Protecting the data not the device is logical and achievable," says Jamie Bodley-Scott, Product Manager for Secure Access at Cryptzone. "We know many organizations still aren't providing users with mobile access to enterprise content for fear of data compromise. We've designed MAP to be policy-based to fully address these concerns and allow organizations to create access rules that align perfectly with their risk tolerance levels. Mobile access can be granted to content based on who is accessing, from which device type and varied by access location and time. You can even decide who is allowed to store encrypted content on a mobile device."

MAP works in conjunction with Cryptzone's AppGate Security Server, which is recognized for its advanced access control capabilities designed to protect enterprise data and applications. Incorporating detailed reporting and audit logging capabilities, visibility and control of mobile/BYOD risks is greatly simplified helping support the overall enterprise access strategy.

New features in MAP 10.3

· Encrypted Off-line Storage

Depending on the enterprise mobile security policy, MAP users can save files to a mobile device. Saved files are stored in the flash memory and individually encrypted using AES256. Policies also determine when these saved files are deleted. Example security options include: after the valid user enters four wrong passwords in a row or if offline viewing is no longer enabled when a user next logs in.

· Annotation and highlighting of pdf documents

Saved files for offline viewing can be annotated.

· Blocking screen shots

While using MAP, screen captures are prevented.

· Viewing Secured files from Microsoft SharePoint

Encrypted files created with Cryptzone's Secured eCollaboration software for MicrosoftTM SharePointTM can be viewed securely on a mobile device with the MAP app, regardless of how the device received the encrypted file.

For more information about Mobile Access Protect visit: http://www.cryptzone.com/products/appgate/Mobile_Access_Protect/

Cryptzone will be exhibiting it secure access and encryption solutions from booth #315 at SecureWorld, Boston from March 25-26th 2014.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.