Security Experts:

Connect with us

Hi, what are you looking for?


Mobile & Wireless

Mocana Adds Features To “Self Defending” Mobile App Protection Solution

San Francisco-based mobile and smart device security firm Mocana, today announced release of the latest version of its Mobile App Protection (MAP) solution which lets customers wrap fine-grained app-level DLP, VPN, and access & usage controls around individual mobile applications.

San Francisco-based mobile and smart device security firm Mocana, today announced release of the latest version of its Mobile App Protection (MAP) solution which lets customers wrap fine-grained app-level DLP, VPN, and access & usage controls around individual mobile applications.

Mocana LogoThe latest version brings enhanced security and advanced authentication for Android devices, as well as remediation capabilities and greater flexibility in meeting enterprise application security requirements.

Mocana’s Mobile App Protection complements existing mobile device management (MDM) solutions that may be in place, but goes beyond app sandboxes, SDKs, containers, and hypervisor technologies that other mobile solutions typically utilize.

The announcement was made to coincide with the company’s Amphion Forum Event in San Francisco, a one-day conference focused on securing connected devices.

Due to the often limited security built into smartphone apps, most are unusable in an enterprise environment and are likely to violate security policies, as organizations can’t control what sensitive company information may be flowing in and out of the enterprise. Mocana has been helping enterprises address those issues since the first-generation of MAP was launched in October 2011. In April of this year added support for Apple iOS apps to MAP’s existing support for apps running on Android.

Once “wrapped” with Mocana’s MAP solution, the result is what what the company calls a “Self-Defending App” armed with data protection and IT control for enterprise apps. The solution works on both managed and unmanaged mobile devices and is essentially invisible to end-users.

Mocana MAPNew “app-wrapping” features provider by the latest version of Mocana MAP includes:

· Enhanced security for Android – Rooting (aka “jailbreak”) detection and per-application VPN support on Android (in addition to iOS).

· Enhanced authentication and remediation options – Extended and enhanced user authentication options through complex per-app passcodes, passcode expiration, failed authentication lock-out and help-desk assisted passcode reset. Addition of customizable end user acceptance agreements.

· Greater flexibility in establishing application security baselines – Allows IT to individualize security as needed for user groups and data sensitivity by enabling organizations to “toggle” true FIPS 140-2 encryption on or off.

· Secure data sharing between individually wrapped apps – Enables secured applications to pass data between themselves, fully encrypted, on the same handset.

· Time-based access control policies – Creates a time-limited access window to the application for employees or contractors.

“MAP offers market-critical security features to protect company information such as per-application VPN capabilities and FIPS 140-2 encryption both on iOS or Android,” the company explained in a statement. “While many alternative approaches require modification of the application source code, Mocana eliminates this risky and complicated step by securing mobile applications in seconds without access to source code.”

“The biggest obstacle to enterprise mobility is not device management, it’s applying enterprise grade application security in a timely manner to meet the business objectives of the organization,” said Mike Siegel, VP Products at Mocana. “MAP accelerates mobile app deployment by separating app security from app development, which simplifies operational complexities and addresses security in a scalable way. It’s simply not practical to expect app developers to meet the best-in-class or varying security policies of each enterprise.”

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...