Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Mobile Security

Bluebox Security Launches New Security Solution

Paul Anderson by Paul Anderson
February 19, 2014 - Updated on May 17, 2022
in Mobile Security, Public
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Bluebox, a brand new cloud-based mobile security solution gives businesses visibility, control, and a safeguard for mobile data, while offering privacy and freedom to personnel when they use their mobile phones.

You might also like

Are Bluetooth signals being used to track smartphones?

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

SharkBot – A New Generation Android Banking Trojan

“The new era of mobile security is not about the device or the application,” the company explained on its Web site. “It’s about the data.”

States its new service shields save data as well as communications in almost any mobile app on iOS or Android.

Built utilizes “data-wrapping” technology, the Bluebox states its SaaS mobile data security solution delivers:

  • Data Wrapping protects all corporate data, including email attachments, with document-level encryption and security policies that allow you to track, revoke or wipe data
  • Instant App Protect secures data in any internal or public app;  no SDKs or coding required.  Context aware policies control data leakage on the device, between apps, and over the network to cloud storage locations
  • Device and application integrity with full-fledged defense mechanism against platform level vulnerabilities, app tampering as well as jailbreaking/rooting
  • Secure data end-to-end – from your internal or cloud storage applications down to the device
  • Separate corporate from personal data with flexible configurations

“The end user doesn’t want to have to care about security and privacy,” Tyler Shields, a Senior Analyst at Forrester, mentioned in a statement. “They expect privacy to be ‘taken care of’ and to be provided to them as a natural right. To be successful, security products must be transparent and seamless.”

You can see the whole product breakdown as well as how to obtain the new product on their site,

Tags: androidBlueboxIOSMobile security
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Are Bluetooth signals being used to track smartphones?

by Christi Rogalski
June 17, 2022
0
Bluetooth research leads to tracking

Can Bluetooth signals be used to track smartphones? Many people would say "No" to this question. However, a team of engineers at the University of California San Diego...

Read more

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

by Christi Rogalski
June 8, 2022
0
Apple app store security fraud

Apple has recently released statistics on the number of fraudulent and untrustworthy transactions that have passed through the Apple App Store in 2021. In combination, they have stopped...

Read more

SharkBot – A New Generation Android Banking Trojan

by Kyle
May 27, 2022 - Updated on May 31, 2022
0
SharkBot Android Banking Malware

SharkBot is a "newer" Android banking trojan found recently being distributed on the Google Play Store. The trojan was originally found in October of 2021 by the Cleafy...

Read more

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more

Exploit Kit activity on a steep decline since April

by Paul Anderson
July 12, 2016
0
Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

Read more
Next Post
Hold Security Discovers Thousands of Compromised FTPs

Hold Security Discovers Thousands of Compromised FTPs

Related News

Google Chrome Extension fingerprinting source

Google Chrome exposes user extensions to fingerprinting

July 1, 2022
Downthem DDoS Service owner sentenced

Downthem DDoS service owner gets a 2-year prison sentence

June 30, 2022
Cloudflare record breaking DDoS

Cloudflare Stops Record-Breaking DDoS

June 29, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Data Breaches
  • Malware
  • Privacy
  • Contact Us

© 2022 ZeroSecurity, All Rights Reserved.