News
3/20/2014
03:25 PM
50%
50%

Cryptzone Adds Encrypted Off-Line File Storage To Its Secure Mobile App

MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device

Gothenburg, 20 March 2014

Cryptzone, the data protection specialists, today released the Android version of its security enhanced mobile browser - Mobile Access Protect (MAP). MAP enables workers to use their mobile devices to securely access documents and enterprise web based applications without the risk of data loss.

Cryptzone's approach to mobile security is to deliver content to mobile users in a controlled manner, irrespective of the device. Its MAP solution utilizes policy-based dynamic rules that allow organizations to create a highly granular mobile access strategy, based on risk, without overburdening IT departments.

"Protecting the data not the device is logical and achievable," says Jamie Bodley-Scott, Product Manager for Secure Access at Cryptzone. "We know many organizations still aren't providing users with mobile access to enterprise content for fear of data compromise. We've designed MAP to be policy-based to fully address these concerns and allow organizations to create access rules that align perfectly with their risk tolerance levels. Mobile access can be granted to content based on who is accessing, from which device type and varied by access location and time. You can even decide who is allowed to store encrypted content on a mobile device."

MAP works in conjunction with Cryptzone's AppGate Security Server, which is recognized for its advanced access control capabilities designed to protect enterprise data and applications. Incorporating detailed reporting and audit logging capabilities, visibility and control of mobile/BYOD risks is greatly simplified helping support the overall enterprise access strategy.

New features in MAP 10.3

· Encrypted Off-line Storage

Depending on the enterprise mobile security policy, MAP users can save files to a mobile device. Saved files are stored in the flash memory and individually encrypted using AES256. Policies also determine when these saved files are deleted. Example security options include: after the valid user enters four wrong passwords in a row or if offline viewing is no longer enabled when a user next logs in.

· Annotation and highlighting of pdf documents

Saved files for offline viewing can be annotated.

· Blocking screen shots

While using MAP, screen captures are prevented.

· Viewing Secured files from Microsoft SharePoint

Encrypted files created with Cryptzone's Secured eCollaboration software for MicrosoftTM SharePointTM can be viewed securely on a mobile device with the MAP app, regardless of how the device received the encrypted file.

For more information about Mobile Access Protect visit: http://www.cryptzone.com/products/appgate/Mobile_Access_Protect/

Cryptzone will be exhibiting it secure access and encryption solutions from booth #315 at SecureWorld, Boston from March 25-26th 2014.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?