Blue Coat software allows blocking, control of mobile apps

Users can be restricted from some social networking tasks and running some apps while on the company network

New software from Web security specialists Blue Coat Systems allows companies to restrict what employees can do on their cellphones while logged into the corporate Wi-Fi.

The software, which works with Blue Coat's ProxySG Web filtering equipment, seeks to fill a gap that exists between company-issued PCs, which are often subject to security and access restrictions, and employee-owned cellphones, on which employees are often free to do what they want.

Companies with high security requirements, such as government departments and banks, see mobile phones as a risk because they could be used to leak documents or send confidential data over insecure channels, said Sasi Murthy, director of Web security at Blue Coat.

"A lot of users are trying to send large datasets over the Internet using Dropbox and Yousendit, but these are not secure," said Murthy. "Now, organizations have the ability to extend application-level control to mobile handsets."

Basic "allow or deny" control is offered for applications such as YouTube, eBay, Gmail and business-networking site LinkedIn. More complex controls exist for apps like Twitter: As well as allow or deny, network mangers can switch on or off the posting of messages, sending email, account login and profile management.

"When we recognize new apps, we identify them and push the controls to all new users," said Murthy. "Every month our Web app team adds new apps to our system."

Because the system runs on the corporate network and not the cellphone, the security policies don't affect what users can do when they are on the cellphone network or other Wi-Fi networks.

"This is not about getting on to the device; we're working on that, but this is about what you can do on [the company] network," said Murthy.

The use of employee-owned handsets in the workplace, commonly known as "bring you own device" (BYOD), is increasing, according to an analyst who tracks the industry.

"In my rough, unscientific surveys, I'd say about 60 percent of clients in North America are planning or have BYOD," said Ken Dulaney, an analyst with Gartner in San Jose, California. "It depends on the company. Some of them are in businesses where they are not too worried about information leaking out. Those that need more security, such as financial, health care and the government, need mobile device management tools."

Pricing for the system begins at US$48 per user per year for up to 100 users. That drops to $29 per user per year for organizations with between 100 and 5,000 employees. The ProxySG Web filtering appliance costs $6,500 for the basic model.

Blue Coat is a big player in the Web security and filtering business. It says 97 percent of Fortune 500 companies use its systems, as do many major banks and U.S. government agencies. Earlier this year it admitted its systems were also being used by the Syrian government to censor Web activity, although the company said it didn't know how they got there.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Martyn Williams

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place