Making Sense Out of App Wrapping

This week I have been traveling on the east coast, meeting with customers, prospects and speaking at a security industry event. Throughout my conversations, I’ve noted a reoccurring theme of confusion and misconceptions surrounding mobile app wrapping. Fortunately Gartner published a great report last week, “Debunking the Myths of App Wrapping”[1], that helps bring clarity. […] Read more

How Safe is Your Child’s Tablet: A review of the nine most popular models

There are two key players in the tablet world, Apple and Android. While there is only one Apple tablet, the ubiquitous iPad, dozens of manufacturers have created hundreds of Android tablets, many of which cater specifically to children. Children’s tablets have several features that distinguish them from the average tablet. They typically have a colored, […] Read more

Santa or the Grinch: Android Tablet Analysis for the 2014 Holiday Season

Black Friday and Cyber Monday – the time of the year when you can find deals and sales to officially kick off the holiday spending season. As many retailers offer bargains on consumer electronic; in particular, this time of year Bluebox Labs decided to take the various sub-$100 Android tablets for a spin and determine […] Read more

Creating mobile trust in untrusted environments

Though it’s not a new phenomenon, enterprises are still finding that BYOD creates as much risk as it does reward. Not unsurprisingly, the latest research from Check Point found that 91 percent of IT professionals report that they have seen an increase in mobile devices connecting to corporate networks and 95 percent of IT managers […] Read more

Bluebox supports Pulse Secure App Level VPN

Bluebox now supports Pulse Secure (formerly known as Juniper Junos Pulse AppConnect) further bridging the gap between IT administrators’ need to keep their corporate data secure, and the end users need to maintain productivity on the move without the need for full device control. App-level VPN capabilities enable customers to configure a direct SSL VPN […] Read more

iOS vs Android: Which is More Secure?

Since the introduction of Android there’s been what one might call a religious debate between Android and iOS. Is iOS or Android more secure? This question is often asked and the assumption is iOS is more secure due to its restrictive controls over what developers can do and tight application sandboxing. As a result, enterprise […] Read more

Transform Risky Mobile Apps into Self-Defending Apps

Gartner predicts that 75 percent of mobile applications will fail most basic security tests through 2015. HP reviewed 2,100 mobile apps last year and said 97 percent access the users private information and 86 percent of those apps did not have adequate security measures in place to protect them from common exploits. These statistics are […] Read more

Turning “No” Into “Yes”

Our Co-founder and COO (and former CISO himself) Adam Ely recently wrote a piece for SecurityWeek on how CISOs can overcome “no” fatigue. Adam told readers “trying to protect company, customer and employee data often means having to say ‘no’ to new projects and implementations.”  Furthermore he said, given the ease and speed with which […] Read more

What IT Doesn’t Know CAN Hurt Them

Today we released our first “Mobile Security Trends in the Workplace” report. There were a number of interesting findings; however, many of the results were not all that surprising. For example, it comes as no surprise that BYOD has become the norm. Our survey found that an overwhelming majority of employees use their smartphones (90 […] Read more

10 questions CISOs should ask about mobile security

Earlier this week, our COO & Co-Founder, Adam Ely sat down with Matt Ahrens, VP of Technology Integration, from GuidePoint Security to discuss the 10 Questions CISOs Should Ask About Mobile Security. Mobile is the fastest growing technology in the enterprise. With BYOD adoption at 90 percent it comes as no surprise that organizations will […] Read more