Mobile

5/9/2018
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Cedar Launches New Tool for Security Policy Management

SAN FRANCISCO, May 8, 2018 — Blue Cedar today announced the addition of a new dynamic policy capability to its flagship Enterprise product that allows enterprises to leverage mobility to accelerate their digital transformation strategies. Using this innovative dynamic policy capability, IT teams can now easily push fine-grained security controls to mobile apps protected by Blue Cedar. 

“Customers using Blue Cedar Enterprise now have exceptional control over the conditions under which their apps execute,” said Kevin Fox, Blue Cedar CTO. “They can automatically secure mobile apps and deploy fine-grained policy controls without altering the app in any way—and with no additional development work or coding required. Teams can deploy sophisticated policies or update controls across all of their mobile apps in just minutes, greatly reducing risk.”

The January 2018 attacks by Spectre and Meltdown triggered intense concern about protecting mobile apps from processor flaws. The attacks are so complex that patching requires fixes to mobile device chips, firmware, operating systems, and applications.  In a BYOD world, even enterprises that pushed out OS vendor patches had no way of knowing whether users managed to patch their own devices and whether their secure mobile apps were running on a secure platform. 

Blue Cedar enables IT teams to regulate access control based on dynamically configurable rules, rather than having to resort to less intelligent “allow” or “block” controls. For example, in an environment with multiple apps that must run securely, teams can configure rules that first warn users to upgrade the OS or install security patches before a certain deadline and then block access after the deadline passes. Administrators have complete control over end-user screens, how they appear in apps, and whether to serve or block end users or warn and allow them in. 

Blue Cedar also enables customers with corporate app stores to notify their users of information related to Blue Cedar-secured apps via an embedded link to the app store, giving them fine-grained control over app lifecycle communications. For example, customers can deliver custom notifications to apps that inform end users that they are using out-of-date versions of internal apps, that newer versions of apps are available, or that old versions of apps are going out of service. They can issue multiple warnings to users to upgrade an app or face being blocked, and they can set deadlines for users to upgrade to avoid being blocked.

Mobile app administrators can also deliver custom notifications to inform end users of app downtime windows. For example, if an enterprise plans to shut down its corporate infrastructure for maintenance, the mobile team can notify end users that their service will go down on a certain date or for a certain amount of time. When mobile apps are secured by Blue Cedar, administrators can display OS-native notifications at a particular date or time to all active app users. There is no need to find a list of users, send emails, or modify app source code. Any message can be displayed according to established criteria, and the tool is normalized across all apps in the enterprise—even if apps come from different sources and are written by different authors.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15769
PUBLISHED: 2018-11-16
RSA BSAFE Micro Edition Suite versions prior to 4.0.11 (in 4.0.x series) and versions prior to 4.1.6.2 (in 4.1.x series) contain a key management error issue. A malicious TLS server could potentially cause a Denial Of Service (DoS) on TLS clients during the handshake when a very large prime value is...
CVE-2018-18955
PUBLISHED: 2018-11-16
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resour...
CVE-2018-19311
PUBLISHED: 2018-11-16
Centreon 3.4.x allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the "Monitoring > Status Details > Services" screen.
CVE-2018-19312
PUBLISHED: 2018-11-16
Centreon 3.4.x allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI.
CVE-2018-19318
PUBLISHED: 2018-11-16
SRCMS 3.0.0 allows CSRF via admin.php?m=Admin&c=manager&a=update to change the username and password of the super administrator account.