Mobile

5/9/2018
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Cedar Launches New Tool for Security Policy Management

SAN FRANCISCO, May 8, 2018 — Blue Cedar today announced the addition of a new dynamic policy capability to its flagship Enterprise product that allows enterprises to leverage mobility to accelerate their digital transformation strategies. Using this innovative dynamic policy capability, IT teams can now easily push fine-grained security controls to mobile apps protected by Blue Cedar. 

“Customers using Blue Cedar Enterprise now have exceptional control over the conditions under which their apps execute,” said Kevin Fox, Blue Cedar CTO. “They can automatically secure mobile apps and deploy fine-grained policy controls without altering the app in any way—and with no additional development work or coding required. Teams can deploy sophisticated policies or update controls across all of their mobile apps in just minutes, greatly reducing risk.”

The January 2018 attacks by Spectre and Meltdown triggered intense concern about protecting mobile apps from processor flaws. The attacks are so complex that patching requires fixes to mobile device chips, firmware, operating systems, and applications.  In a BYOD world, even enterprises that pushed out OS vendor patches had no way of knowing whether users managed to patch their own devices and whether their secure mobile apps were running on a secure platform. 

Blue Cedar enables IT teams to regulate access control based on dynamically configurable rules, rather than having to resort to less intelligent “allow” or “block” controls. For example, in an environment with multiple apps that must run securely, teams can configure rules that first warn users to upgrade the OS or install security patches before a certain deadline and then block access after the deadline passes. Administrators have complete control over end-user screens, how they appear in apps, and whether to serve or block end users or warn and allow them in. 

Blue Cedar also enables customers with corporate app stores to notify their users of information related to Blue Cedar-secured apps via an embedded link to the app store, giving them fine-grained control over app lifecycle communications. For example, customers can deliver custom notifications to apps that inform end users that they are using out-of-date versions of internal apps, that newer versions of apps are available, or that old versions of apps are going out of service. They can issue multiple warnings to users to upgrade an app or face being blocked, and they can set deadlines for users to upgrade to avoid being blocked.

Mobile app administrators can also deliver custom notifications to inform end users of app downtime windows. For example, if an enterprise plans to shut down its corporate infrastructure for maintenance, the mobile team can notify end users that their service will go down on a certain date or for a certain amount of time. When mobile apps are secured by Blue Cedar, administrators can display OS-native notifications at a particular date or time to all active app users. There is no need to find a list of users, send emails, or modify app source code. Any message can be displayed according to established criteria, and the tool is normalized across all apps in the enterprise—even if apps come from different sources and are written by different authors.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6487
PUBLISHED: 2019-01-18
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.