Mobile

5/9/2018
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Cedar Launches New Tool for Security Policy Management

SAN FRANCISCO, May 8, 2018 — Blue Cedar today announced the addition of a new dynamic policy capability to its flagship Enterprise product that allows enterprises to leverage mobility to accelerate their digital transformation strategies. Using this innovative dynamic policy capability, IT teams can now easily push fine-grained security controls to mobile apps protected by Blue Cedar. 

“Customers using Blue Cedar Enterprise now have exceptional control over the conditions under which their apps execute,” said Kevin Fox, Blue Cedar CTO. “They can automatically secure mobile apps and deploy fine-grained policy controls without altering the app in any way—and with no additional development work or coding required. Teams can deploy sophisticated policies or update controls across all of their mobile apps in just minutes, greatly reducing risk.”

The January 2018 attacks by Spectre and Meltdown triggered intense concern about protecting mobile apps from processor flaws. The attacks are so complex that patching requires fixes to mobile device chips, firmware, operating systems, and applications.  In a BYOD world, even enterprises that pushed out OS vendor patches had no way of knowing whether users managed to patch their own devices and whether their secure mobile apps were running on a secure platform. 

Blue Cedar enables IT teams to regulate access control based on dynamically configurable rules, rather than having to resort to less intelligent “allow” or “block” controls. For example, in an environment with multiple apps that must run securely, teams can configure rules that first warn users to upgrade the OS or install security patches before a certain deadline and then block access after the deadline passes. Administrators have complete control over end-user screens, how they appear in apps, and whether to serve or block end users or warn and allow them in. 

Blue Cedar also enables customers with corporate app stores to notify their users of information related to Blue Cedar-secured apps via an embedded link to the app store, giving them fine-grained control over app lifecycle communications. For example, customers can deliver custom notifications to apps that inform end users that they are using out-of-date versions of internal apps, that newer versions of apps are available, or that old versions of apps are going out of service. They can issue multiple warnings to users to upgrade an app or face being blocked, and they can set deadlines for users to upgrade to avoid being blocked.

Mobile app administrators can also deliver custom notifications to inform end users of app downtime windows. For example, if an enterprise plans to shut down its corporate infrastructure for maintenance, the mobile team can notify end users that their service will go down on a certain date or for a certain amount of time. When mobile apps are secured by Blue Cedar, administrators can display OS-native notifications at a particular date or time to all active app users. There is no need to find a list of users, send emails, or modify app source code. Any message can be displayed according to established criteria, and the tool is normalized across all apps in the enterprise—even if apps come from different sources and are written by different authors.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9962
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to VCRUNTIME140!memcpy.
CVE-2019-9963
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
CVE-2019-9964
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey.
CVE-2019-9965
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlReAllocateHeap.
CVE-2019-9966
PUBLISHED: 2019-03-24
XnView Classic 2.48 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to xnview+0x38536c.