Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

5/9/2018
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Cedar Launches New Tool for Security Policy Management

SAN FRANCISCO, May 8, 2018 — Blue Cedar today announced the addition of a new dynamic policy capability to its flagship Enterprise product that allows enterprises to leverage mobility to accelerate their digital transformation strategies. Using this innovative dynamic policy capability, IT teams can now easily push fine-grained security controls to mobile apps protected by Blue Cedar. 

“Customers using Blue Cedar Enterprise now have exceptional control over the conditions under which their apps execute,” said Kevin Fox, Blue Cedar CTO. “They can automatically secure mobile apps and deploy fine-grained policy controls without altering the app in any way—and with no additional development work or coding required. Teams can deploy sophisticated policies or update controls across all of their mobile apps in just minutes, greatly reducing risk.”

The January 2018 attacks by Spectre and Meltdown triggered intense concern about protecting mobile apps from processor flaws. The attacks are so complex that patching requires fixes to mobile device chips, firmware, operating systems, and applications.  In a BYOD world, even enterprises that pushed out OS vendor patches had no way of knowing whether users managed to patch their own devices and whether their secure mobile apps were running on a secure platform. 

Blue Cedar enables IT teams to regulate access control based on dynamically configurable rules, rather than having to resort to less intelligent “allow” or “block” controls. For example, in an environment with multiple apps that must run securely, teams can configure rules that first warn users to upgrade the OS or install security patches before a certain deadline and then block access after the deadline passes. Administrators have complete control over end-user screens, how they appear in apps, and whether to serve or block end users or warn and allow them in. 

Blue Cedar also enables customers with corporate app stores to notify their users of information related to Blue Cedar-secured apps via an embedded link to the app store, giving them fine-grained control over app lifecycle communications. For example, customers can deliver custom notifications to apps that inform end users that they are using out-of-date versions of internal apps, that newer versions of apps are available, or that old versions of apps are going out of service. They can issue multiple warnings to users to upgrade an app or face being blocked, and they can set deadlines for users to upgrade to avoid being blocked.

Mobile app administrators can also deliver custom notifications to inform end users of app downtime windows. For example, if an enterprise plans to shut down its corporate infrastructure for maintenance, the mobile team can notify end users that their service will go down on a certain date or for a certain amount of time. When mobile apps are secured by Blue Cedar, administrators can display OS-native notifications at a particular date or time to all active app users. There is no need to find a list of users, send emails, or modify app source code. Any message can be displayed according to established criteria, and the tool is normalized across all apps in the enterprise—even if apps come from different sources and are written by different authors.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14248
PUBLISHED: 2019-07-24
In libnasm.a in Netwide Assembler (NASM) 2.14.xx, asm/pragma.c allows a NULL pointer dereference in process_pragma, search_pragma_list, and nasm_set_limit when "%pragma limit" is mishandled.
CVE-2019-14249
PUBLISHED: 2019-07-24
dwarf_elf_load_headers.c in libdwarf before 2019-07-05 allows attackers to cause a denial of service (division by zero) via an ELF file with a zero-size section group (SHT_GROUP), as demonstrated by dwarfdump.
CVE-2019-14250
PUBLISHED: 2019-07-24
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
CVE-2019-14247
PUBLISHED: 2019-07-24
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
CVE-2019-2873
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...