Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Bluebox Security Launches Enterprise Mobile Security Solution

Just weeks after announcing an $18 million Series B funding round, Bluebox Security, a San Francisco, California-based mobile security startup, today officially launched its first product offering.

Just weeks after announcing an $18 million Series B funding round, Bluebox Security, a San Francisco, California-based mobile security startup, today officially launched its first product offering.

According to Bluebox, its new cloud-based mobile security solution gives enterprises visibility, control, and security for mobile data, while providing privacy and freedom to employees as they use their mobile devices.

“The new era of mobile security is not about the device or the application,” the company explained on its Web site. “It’s about the data.”

Bluebox Security Logo

Bluebox, which has been operating in stealth mode since 2012, says its new product secures data at rest, and in transit, in any mobile app on iOS or Android.

Built using ‘data-wrapping’ technology, the Bluebox says its SaaS mobile data security solution delivers:

Visibility of corporate data as it moves throughout the mobile workflow – With Bluebox, CISOs gain insights into the ‘who, what, where, when and how’ of corporate data. CISOs can inform and dynamically tune security policies based on actual mobile data use, and respond in real-time to security events with surgical precision or comprehensive action to delete, suspend, or lock documents, users, applications, or devices. 

Security across the device, application, and network – Bluebox identifies and dynamically encrypts corporate data on the device, and in applications, as well as secures corporate data traffic end-to-end, from devices to cloud-based and internal applications. Bluebox also automatically detects and protects against platform-level vulnerabilities, application tampering, and jailbreaks for device and app integrity.

Freedom and privacy for security – Bluebox gives employees the freedom to use any application, maximizing productivity without compromising security. Bluebox’s Instant App Protect secures on-demand any internal or public mobile app, no SDKs or coding required. A transparent privacy dashboard combined with clear separation of corporate and personal data gives employees full visibility into what IT is, and isn’t, tracking.

Advertisement. Scroll to continue reading.

Caleb Sima, Bluebox

“The end user doesn’t want to have to care about security and privacy,” Tyler Shields, a Senior Analyst at Forrester, said in a prepared statement. “They expect privacy to be ‘taken care of’ and to be provided to them as a natural right. To be successful, security products must be transparent and seamless.”

“Data goes everywhere in today’s mobile world,” said Caleb Sima, co-founder and CEO, Bluebox Security. “And you can’t secure what you can’t see. We built Bluebox based on feedback from enterprises and employees, which boiled down to two success drivers. First, provide visibility and security of the data so that enterprises trust they are protected on mobile. Second, provide a native and transparent user experience that aligns with the demands of today’s mobile workers. Now CISOs and employees are partners in enabling mobile security.”

Prior to launching Bluebox, Sima served as an “Entrepreneur in Residence” at Andreessen Horowitz. Sima also previously served as Chief Technology Officer for HP’s Application Security Center after joining the company as a result of HP’s acquisition of SPI Dynamics in 2007, a company he co-founded and as CTO oversaw development of WebInspect – a Web application security testing tool.

Adam Ely, co-founder of Bluebox

Co-founder Adam Ely was previously CISO of the Heroku business unit at salesforce.com. Prior to salesforce.com, Adam led security operations, application security, and compliance for TiVo. Before TiVo, he led security functions at Disney.

In July 2013, Bluebox was credited with discovering a serious vulnerability in Android, which would allow attackers to easily turn legitimate apps into Trojans, without affecting the cryptographic signature. In this SecurityWeek podcast, Ely discusses the flaw, which was called an Android Master Key Vulnerability.

More on Bluebox’s mobile security offering is available online.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.