Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Mobile

    Bluebox Unveils Mobile App Security Offering

    Written by

    Sean Michael Kerner
    Published February 19, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Bluebox emerged from stealth mode today with a new offering that aims to address mobile app security demands. Instead of trying to solve the bring-your-own-device (BYOD) challenge, Bluebox is positioning itself to offer bring-your-own-apps (BYOA) technology for both Android and IOS devices.

      Bluebox is backed by Andreessen Horowitz and Sun Microsystems co-founder Andy Bechtolsheim, and recently announced an $18 million round of funding to fuel its efforts.

      Bluebox CEO Caleb Sima explained to eWEEK that his company’s technology is focused on data security as opposed to device security. The Bluebox offering includes a feature called instant app protect that enables an administrator to secure any application. The data-wrapping feature in Bluebox provides fine-grained control for visibility and access on a per-document level. At the enterprise level, there is a dashboard that can be tracked to manage and secure all the data.

      “As data goes in and out of an application protected by Bluebox, the enterprise gets visibility into seeing what happens with a document, as well as the ability to revoke or delete the document,” Sima said.

      From a technology perspective, the way the Bluebox technology works on the user’s device is as an isolated workspace that contains a micro virtualization hypervisor.

      “The micro-hypervisor contains a control and policy layer that can retrieve policy and rules in real-time from our Network Operations Center,” Sima said.

      Above the policy layer is the Bluebox data engine, which analyzes what data is going in and out of a given app and also applies the proper encryption. There is also an integrity engine that looks around the space a given application operates in to see if anything has been tampered with.

      There are many products in the mobile app security space that Bluebox will likely compete against. One of them is possibly Juniper’s Junos AppConnect technology, which opens up a per-app VPN tunnel for each mobile app it protects.

      The Bluebox product provides a similar level of application connection security back to the Bluebox Network Operations Center, as well as securing the data at rest on a device, at a per-document level, Sima said.

      The Bluebox app is downloaded from a mobile app store and installed on the user device. Once the app authenticates with the Bluebox service, a set of apps that an enterprise specifies is downloaded onto the user’s device.

      When in use, the Bluebox protected applications will have a small blue border around them. Users can also choose to add their own apps into the secured Bluebox workspace.

      While the Bluebox technology does depend on the user having online access to be fully secured, there is also an offline mode, which is also known as insecure mode, though it does have some protections, Sima said. Bluebox administrators can set up a policy such that if a device does not connect with the Bluebox service within a specified amount of time, access keys can be erased.

      With all the different solutions and approaches to mobile security currently on the market, Bluebox’s primary challenge is to cut through the noise, Sima said.

      “It really comes down to where the rubber meets the road for the technology, being able to cut through with a clear and direct message and being able to execute properly on sales,” Sima said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×