Mobile

5/9/2018
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Cedar Launches New Tool for Security Policy Management

SAN FRANCISCO, May 8, 2018 — Blue Cedar today announced the addition of a new dynamic policy capability to its flagship Enterprise product that allows enterprises to leverage mobility to accelerate their digital transformation strategies. Using this innovative dynamic policy capability, IT teams can now easily push fine-grained security controls to mobile apps protected by Blue Cedar. 

“Customers using Blue Cedar Enterprise now have exceptional control over the conditions under which their apps execute,” said Kevin Fox, Blue Cedar CTO. “They can automatically secure mobile apps and deploy fine-grained policy controls without altering the app in any way—and with no additional development work or coding required. Teams can deploy sophisticated policies or update controls across all of their mobile apps in just minutes, greatly reducing risk.”

The January 2018 attacks by Spectre and Meltdown triggered intense concern about protecting mobile apps from processor flaws. The attacks are so complex that patching requires fixes to mobile device chips, firmware, operating systems, and applications.  In a BYOD world, even enterprises that pushed out OS vendor patches had no way of knowing whether users managed to patch their own devices and whether their secure mobile apps were running on a secure platform. 

Blue Cedar enables IT teams to regulate access control based on dynamically configurable rules, rather than having to resort to less intelligent “allow” or “block” controls. For example, in an environment with multiple apps that must run securely, teams can configure rules that first warn users to upgrade the OS or install security patches before a certain deadline and then block access after the deadline passes. Administrators have complete control over end-user screens, how they appear in apps, and whether to serve or block end users or warn and allow them in. 

Blue Cedar also enables customers with corporate app stores to notify their users of information related to Blue Cedar-secured apps via an embedded link to the app store, giving them fine-grained control over app lifecycle communications. For example, customers can deliver custom notifications to apps that inform end users that they are using out-of-date versions of internal apps, that newer versions of apps are available, or that old versions of apps are going out of service. They can issue multiple warnings to users to upgrade an app or face being blocked, and they can set deadlines for users to upgrade to avoid being blocked.

Mobile app administrators can also deliver custom notifications to inform end users of app downtime windows. For example, if an enterprise plans to shut down its corporate infrastructure for maintenance, the mobile team can notify end users that their service will go down on a certain date or for a certain amount of time. When mobile apps are secured by Blue Cedar, administrators can display OS-native notifications at a particular date or time to all active app users. There is no need to find a list of users, send emails, or modify app source code. Any message can be displayed according to established criteria, and the tool is normalized across all apps in the enterprise—even if apps come from different sources and are written by different authors.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.