Good Contents Are Everywhere, But Here, We Deliver The Best of The Best.Please Hold on!
Your address will show here +12 34 56 78

SAN FRANCISCO–(BUSINESS WIRE)–Blue Cedar today announced support for Apple’s new Face ID—the revolutionary facial recognition technology that allows iPhone X users to unlock their phones with a quick glance at the screen. Blue Cedar’s innovative authentication code enables customers to use Face ID to securely log into a Blue Cedar-protected app or group of apps on iPhone X—including many popular apps that pre-date the iPhone X. This new capability extends an even greater level of convenience than Blue Cedar’s current biometric technology, which helps users securely access apps via fingerprint per the Touch ID technology introduced with Apple’s iPhone 6.

“We’re excited to offer the innovative capability of integrating Face ID authentication into any app secured by Blue Cedar’s technology, without the need for any code changes by developers,” said Kevin Fox, co-founder and CTO at Blue Cedar. “Our configurable Local App Authentication policy now allows any enterprise mobile app to be unlocked with the same ease and convenience that iPhone X owners use to access their phones. Blue Cedar’s technology allows us to intercept and encrypt network and data-at-rest operations, and when coupled with Face ID, is completely transparent to the user. We are proud to deliver such a critical feature that ultimately offers zero compromise between security and ease-of-use.”

Magic Under the Hood

While the user experience itself is seamless, there is nothing simple about the technological innovation under the hood to achieve this essential security feat. Just as Blue Cedar offered fingerprint access to apps via the APIs (application programming interfaces) in Apple’s mobile operating system, iOS, the company now also offers Face ID support via those APIs for any app on supported hardware through its revolutionary code injection technology.

Face ID uses a variety of sophisticated technologies, including facial mapping that analyzes more than 30,000 points on the user’s face, to create a detailed depth map that enables the iPhone to recognize the user even with glasses, facial hair, or a hat. Neural network technology safeguards against spoofing by masks or other techniques, and infrared sensors ensure that Face ID works in the dark. Blue Cedar customers benefit from these same technologies in accessing their protected apps.

Additionally, Blue Cedar’s new authentication code can be injected into older apps that were built before Face ID technology became available, allowing users to log into these apps with just their face and without requiring developers to go back to update the apps.


December 05, 2017 08:00 AM Eastern Standard Time


Lockheed Martin to Distribute Blue Cedar Mobile Security Technology to its Defense, Aerospace, and First Responder Customers SAN FRANCISCO, September 13, 2017 — Blue Cedar today announced that Lockheed Martin, a global security and aerospace company, has selected Blue Cedar’s mobile security technology for inclusion in its Universal Communications Platform (UCP) mobile app, or UCP Communicator.  The collaboration provides Lockheed Martin with a solution for UCP users that have both iOS and Android devices, who will for the first time be able to connect quickly and securely to deployed military, first responders, or remote commercial operations teams who require interoperability between multiple types of secure radio and cellular communications. In a first for Blue Cedar, the company also announced that Lockheed Martin will distribute the Blue Cedar platform to its customers and prospects via solutions that meet a wide range of mobile security needs. “We are pleased to have entered into this strategic relationship with Lockheed Martin,” said John Aisien, chief executive officer of Blue Cedar.“We believe that mobile communications security starts by securing the app, and this unique approach meets the stringent requirements of the most security-conscious organizations, such as Lockheed Martin.  Our relationship also demonstrates the versatility of Blue Cedar technology and is just one example of a wide range of powerful, potential applications for a variety of commercial and public sector markets.” Lockheed Martin’s UCP integrates all types of fixed and mobile radio systems, enabling interoperability between multiple agencies and coalition force diverse communication and data systems. With Blue Cedar technology, it now enables consumer-grade smartphones to be used to extend and expand secure communications networks to users without access to radio equipment. The collaboration between Blue Cedar and Lockheed Martin will allow users with commercial smartphones and tablets to download and launch the UCP Communicator app, which is inserted with Blue Cedar’s layer of encryption and other security controls which are already included in the app. There is no need to write any security code—accelerating time to market, increasing ease of use, and protecting privacy for users. The combined Lockheed Martin UCP products and Blue Cedar solution provides a number of benefits, including:
  • Simplicity: Users can use the devices they already have. Downloading and launching the app is easy—and users don’t have to do anything else.
  • Security: The app meets mobile security requirements, such as FIPS 140-2 compliance, establishing a secure, encrypted connection and authenticates users for military-grade security.
  • Cost effectiveness: Users and organizations don’t have to purchase additional specialized equipment to enable spontaneous communication.
“Blue Cedar supports our goal in providing our customers with an expanded communications capability to enhance interoperability and mission needs,” said Jim Quinn, Lockheed Martin business development manager. “The app will provide critical security and encryption capabilities to UCP Communicator customers, giving them the latest mobile security and encryption technology available.” To learn more about Blue Cedar’s security solutions for mobile apps, visit To learn more about Lockheed Martin’s Universal Communications Platform products, visit   About Blue Cedar Blue Cedar transforms enterprise mobility with the industry’s most innovative mobile security solution. By securing the app rather than the device, Blue Cedar gives enterprises robust, consistent protection of corporate data across both managed and unmanaged devices, without the cost, complexity, or risk to privacy of device-level security. Blue Cedar’s “follow the app” security sets enterprises free to fully realize the benefits of secure mobility for both employees and customers. The company is privately held and headquartered in San Francisco. For information about Blue Cedar, visit

Apple CEO Tim Cook was recently seen test-driving a prototype blood sugar tracker on his Apple Watch. The sighting was a reminder of the two-edged sword of technological innovation in the connected healthcare arena.   On the one hand, the prototype hints at future applications that will make life easier for the millions of people who suffer from diabetes—perhaps even achieving the diabetes holy grail of non-invasive and continuous glucose monitoring (which Apple is also working on). On the other hand, the prototype is a reminder of the endless proliferation of potential cyber-attack vectors that come with innovation in the healthcare space.   Not that we need a reminder. Thousands of hospitals and other organizations around the world are still recovering from the recent WannaCry ransomware cyber-attack that struck computers running Microsoft Windows on May 12, disrupting healthcare and other services, and potentially threatening every aspect of connected health care, including connected medical devices. In the future, what could such an attack mean for diabetics who depend on an Apple Watch app to keep track of their blood sugar levels? One shudders to think.   A recent article in Forbes by former Homeland Security Secretary Michael Chertoff, now executive chairman of The Chertoff Group, and information security and technology expert Jason Cook, zeroed in on this same two-edged sword.   Connected medical devices provide patients and physicians with technology to better manage chronic conditions, improve outcomes and reduce the overall cost of care. They also reduce doctor visits, shrink response times and shorten hospitalizations by empowering patients to manage aspects of their own care. However, they also increase exposure to the threat of cyber-attacks.   As Chertoff and Cook write in Forbes: “To mitigate cybersecurity risks associated with connected medical devices, and ensure patients continue to derive their full benefits, industry must not only build security into its innovation process, but ensure resources are in place to conduct ongoing monitoring efforts.”   It is precisely for this reason that, earlier this month, Blue Cedar issued a new release of its mobile security platform.  Unlike traditional Enterprise Mobility Management solutions (EMM), Blue Cedar’s security controls are injected into the apps  themselves.  The result is superior security controls that don’t affect user privacy or the ease of use they have come to expect from consumer mobile apps.  Patients and physicians simply download secured apps from the public app store.   It also means, for example, that doctors could use their own smartphones or tablets to securely access patient information. This is what one of our healthcare provider customers had in mind when it chose Blue Cedar as the platform on which to build a mobile app. The customer—a major medical institute that catalyzes innovation in order to advance health—built an app that contains protected patient information and can be run by clinicians on their own personal mobile devices. According to the customer’s chief innovation officer, the Blue Cedar platform met two critical design specs that the healthcare provider was looking to fulfill simultaneously: rigorous security and rapid access.   The chief innovation officer said the solution had to act heavy but feel light, meaning it had to be transparent to the busy clinicians who cannot spend even seconds navigating layers of controls that create user friction and discourages use—which in turn can impede early diagnosis and immediate treatment.   As Chertoff and Cook note, citing the FDA, effective cybersecurity measures are necessary to assure proper device functionality and to protect health information stored on connected medical devices. Blue Cedar’s app-centric approach to security allows enterprises to avoid the drawbacks of existing device-centric approaches, and empowers them to expand the depth and breadth of their mobile app coverage. It’s the logical evolution of mobile security.   To learn more, please contact Blue Cedar,, 415-329-0401.    

SAN FRANCISCO, May 3, 2017 Blue Cedar today redefined enterprise mobility management (EMM) with a new release of its highly acclaimed mobile security platform, which can extend or completely replace traditional EMM solutions to provide secure mobile data access for all enterprise mobile end users, employees, external partners and customers. The new release extends Blue Cedar’s enterprise offering with enhanced functionality and robustness to create a mobile device management (MDM) alternative that secures access to mobile data without having to manage devices, and boosts mobile adoption by eliminating the usability, privacy and other constraints that have plagued traditional, device-centric EMM solutions. “Blue Cedar has had great success in offering enterprises a fast yet simple way to supplement traditional MDM solutions by delivering secure mobile access to their high-value data for every user,” said Chris Ford, chief product officer at Blue Cedar. “With the new platform release, Blue Cedar has significantly broadened its market with the first viable alternative to traditional MDM, enabling businesses to use it as the primary solution for securing mobile data access for all knowledge workers across the enterprise.” Because the Blue Cedar solution secures only the enterprise mobile app and not the device, or the device-resident container, the company is able to deliver superior security controls without impacting end users’ productivity or privacy requirements. Using enterprise apps secured by Blue Cedar on any device is as easy and intuitive as using the myriad of consumer mobile apps that users have become accustomed to. The Blue Cedar security controls are baked into the apps, and do not impose any unnatural burdens that hinder app usage for the end user. “The MedStar Institute for Innovation chose Blue Cedar as the platform on which to build a mobile app that contains protected patient information and that could be run by clinicians on their own personal mobile devices,” said Mark Smith, MD, chief innovation officer of MedStar Health, the largest healthcare provider in the Maryland and Washington, DC region. “We were looking for the simultaneous fulfillment of two critical design specs: rigorous security and rapid access. The solution had to act heavy but feel light, i.e. be transparent to the busy clinicians who cannot spend even seconds navigating layers of controls that create user friction and discourages use, which in turn can impede early diagnosis and immediate treatment. The Blue Cedar platform met our design criteria to a T.” The Blue Cedar platform also meets the needs of enterprise IT and security professionals.  It provides consistent, granular security controls to all mobile apps — native, hybrid and web — and makes it easy to ensure compliance with internal policies and external regulations without writing any security code, and with no data storage concerns.  Enterprises can move to a future-proof architecture that is ready to support next-generation endpoints like wearables and IoT, and be well positioned for securing access to data residing in public or private cloud-based storage. The new platform features innovative capabilities and enhancements to ensure it can meet the requirements of forward-thinking organizations’ architecture for enterprise mobility, including:
  • Distribution of secured apps via public app stores like Apple iTunes and Google Play, providing customers with alternatives to enterprise app stores and opening the door to future enhancements for securing enterprise consumer-facing apps;
  • Support for a broader range of development frameworks, including Microsoft Xamarin, and additional functionality to ensure compatibility with any native, hybrid or web-based enterprise mobile app;
  • Mobile app trust functionality that enables sharing of security policies across trusted apps on a device to streamline authentication and control data sharing among these apps, without the need for an EMM container; and
  • Support for encryption of Voice-over-IP (VoIP) traffic for mobile apps that enable real-time communications.
“This release marks a significant milestone for Blue Cedar as it represents the culmination of a remarkable year-long development effort to broaden the applicability of our platform. The result is that we are now able to offer the Blue Cedar platform to enterprise customers as a destination mobile security solution,” said Ford. “Additionally, our Blue Cedar platform continues to provide enterprises with an ideal solution for expanding their existing EMM footprint with the ability to incorporate support for additional use cases, such as secure apps on unmanaged devices, security and connectivity for VOIP-based apps and enforcement of granular controls for HTTP-based apps.” The new Blue Cedar platform will be featured in its first public demonstration at the NH-ISAC 2017 Masters of Deception Summit, May 8-10 in Orlando, Florida, booth number 13. Availability and Pricing The Blue Cedar platform, version 3.14, is available now. Please contact for additional product and pricing information.   About Blue Cedar Blue Cedar transforms enterprise mobile security with the industry’s most innovative mobile app security solution. Blue Cedar protects mobile apps and their data, with security following the app everywhere it is used. Enterprises gain robust, consistent protection across their employees’ and partners’ mobile devices—whether managed or unmanaged—without the cost, complexity or risk associated with securing individual devices. Users access apps and data without friction or impact to their private personal data. Blue Cedar sets the enterprise free to conduct business safely anywhere. The company is privately held and headquartered in San Francisco. For information about Blue Cedar, visit

Benhamou Global Ventures (“BGV”) is an early-stage venture capital firm with deep Silicon Valley roots and an exclusive focus on enterprise information technology opportunities in global markets. BGV currently has 20 active investments across its fund II and fund III portfolios. With offices in Palo Alto, California and Tel Aviv, Israel, the BGV team has been able to successfully build and implement a successful, cross-border venture investing model. The fund was founded by Eric Benhamou, former chairman and CEO of 3Com, Palm and co-founder of Bridge Communications. BGV often comes in as the first institutional investor in a company, and their network of technical and functional experts actively engage with their portfolio companies. BGV’s Investment Thesis: They are investing in tech companies at the intersection of enterprise digital transformation, early stage and cross border innovation. Digital transformation is changing the way enterprises buy, rent, build, optimize and secure IT infrastructure and applications. This is creating a new generation of technology companies in cloud ($125B market), mobility/IIOT (expected to reach $10T within 15 years) and cyber security ($75B market). An increasing proportion of such technology innovation is occurring outside the U.S. (i.e., Israel, Europe, India, China etc) fueled by the emergence of regional technology hubs.  Many of these startups seek to build cross-border companies by establishing U.S. presence and headquarters that leverage their offshore R&D.   Reflecting this trend, VC investments outside the U.S. have grown from $1.3Bn to $57Bn from 2005 to 2015 BGV applies a value-disciplined and active approach to make seed and series A investments in enterprise startups at the intersection of the above trends.  They focus on companies that contribute to very critical business outcomes – business resiliency, productivity, agility and customer centricity. The team is seeking out startups that are capital efficient, deliver quick value to customers and are focused on unleashing enterprise productivity.  Post-investment BGV plays an active role in utilizing their 100+ years of collective operating experience in building enterprise IT companies and assists its portfolio companies as they “cross the chasm” and identify strategic partnership opportunities with larger industry players. A third of BGV’s portfolio is comprised of cross-border startups and they play an active role in helping them set up a US presence and connect to the Silicon Valley ecosystem. How Does BGV’s Portfolio Fit In? BGV invests in 3 types of deals that leverage the above trends including highly disruptive new category creators, superior fast followers and special situations (i.e., spin outs, pivots and or recaps). Totango is an enterprise customer success management technology company with HQ in Silicon Valley and R&D in Israel.  The company addresses a white space within enterprises.  It focuses on the fast growing market opportunity of SaaS companies whose continued success depends heavily upon their ability to manage customer retention, churn, upsell and lifetime value. The Customer Success function has become a large part of enterprise sales today. It aims to streamline the onboarding process, maximize user engagement, minimize churn and increase the upsell success rate of a subscription business.  BGV led and syndicated the most recent equity round, and also assisted in key hires and strengthening the board with industry experts. Bayshore Networks is an IIOT cyber security startup addressing a key pain point in an old sector undergoing digital transformation.  The company enables the operational technology (OT) part of the industrial enterprises to connect to the internet securely while protecting their manufacturing assets from cyber-based threats. Bayshore enables asset intensive industries that are seeking operational efficiencies by bridging their IT and OT environments securely, collecting the big data and applying the analytics required to unlock the value of these assets. BGV participated in the Series A syndicate and has introduced the company to a number of scale-up strategic partners. Blue Cedar Networks is a spinout from Mocana.  The company secures data at rest and data in motion being accessed by mobile devices.  In today’s era of perimeter-less organizations, the app has become the endpoint for establishing the security controls that protect critical organizational apps and data.  The company’s disruptive non-client centric architecture enables enterprises to protect their assets and empower their users across the Extended Enterprise—employees, partners, consumers, re-sellers, distributors and all other non-employees who need access to enterprise data. BGV led the spinout and Series A financing and subsequently played an active role in shaping the company’s strategy, introducing the company to several strategic partners and hiring key executives. Thank you to Eric Benhamou, Anik Bose and the BGV team for assisting us with this post.     Source:

January 30, 2017: We are thrilled that Blue Cedar has been selected as 1 of the 10 cybersecurity companies on Momentum Partners’ Q4 2016 Watch List. Each quarter, Momentum shines a spotlight on 10 cybersecurity companies, from the 1,500+ that they track, and profile them in their Quarterly Market Report. At Blue Cedar, we passionately believe that in a mobile first generation, security of the app and its data is really what matters to end users, developers and ultimately, to businesses. And the adoption trends that we’ve recently experienced are super-validating! Since our next-generation client architecture became available for Apple iOS 10 last September, and for Google Android Nougat last October, some examples of organizations adopting Blue Cedar include: A National Rail System, for whom two Blue Cedar secured mobile web apps will enable a 4,000 person mobile workforce, consisting of employees and contractors, with secure access to train operation information 24×7, via their corporate-owned and personal devices. A Laboratory Instrument and Software company, that rolled out new, ‘Blue Cedar’-ized versions of hitherto existing field booking, mobile CRM & secure browsing mobile apps to some of their 3,000+ person field workforce. They have simultaneously increased their security posture regarding access to sensitive data, and delighted their end users, by moving the security control point from their devices to their apps. A Global Wireless Communications Giant, whose 85,000 employees generate an average of >100,000 Blue Cedar secure app microtunnels per week, connecting a slew of 26 mobile apps to high-value and risk-sensitive corporate data. Some of these apps’ workflows include project materials management, service vehicle management, sales quoting, crisis/incident ticket management, and internal social collaboration. A Manufacturer of Electrical and Fiber-Optic Interconnection systems has rolled out mobile CRM and pricing optimization mobile apps, secured by Blue Cedar, to 2,500 sales people. They use a curated combination of Blue Cedar security and connectivity policies to scale their security function’s risk hurdles for mobile access to sensitive data, while ensuring that their mobile-savvy end users enjoy a frictionless experience, during initial enrollment and routine day to day usage. It’s certainly humbling to receive an honor that cybersecurity luminaries such as Cylance, Palantir, and others have previously received. We are focused on building solutions to satisfy marketplace demand for a new approach to mobile security – secure the data, rather than the device. This is an exciting time for us and we’d love to share what we have built, and what we are building, with you. We will be hosting meetings at the RSA conference next month at the Intercontinental Hotel, San Francisco from February 14th – 16th.

Anik Bose (General partner at BGV) and Ranjeet Vidwans (CMO at Blue Cedar Networks) share their perspective on the transformation underway in the Healthcare economy. The Digital transformation of the Healthcare economy is being driven by several trends. These include:
  1. The push towards Triple Aim – improving the experience of care, improving the health of populations and reducing per capita costs of health care ( As a consequence the industry is in transition – moving from fee-for-service to clinical outcome/value-based.
  2. Rising cyber security breaches are shifting attention towards improving the security of patient health & other compliance-critical data, and the posture of the devices from which this data is accessed
  3. Increasing adoption of health related smart phone apps is creating the potential for improved productivity through collaboration
  4. Innovation around big data analytics is enabling the analysis of data from multiple sources in novel ways, to improve patient care and patient health outcomes
  5. Evolution in Consumer and Clinician expectations is shifting the healthcare eco-system model to a more mobile, more accessible and more connected one – see chart below:
Slide1 This digital transformation is creating demand for innovative enterprise technologies. These technologies address needs such as easy and secure access to patient data in real time, enabling collaborative care, leveraging big data analytics and telemedicine to improve patient care and outcomes. Some examples of innovative technology providers who are catalyzing these trends include: Blue Cedar Networks ( – The company’s technology powers secure access to health care apps and data for caregivers and other interested and authorized end users, across the healthcare value chain. Its Atlas platform provides healthcare organizations with the trust & confidence that they need to provide access to their compliance-critical data, via mobile apps, to patients, healthcare professionals, researchers and other end users, without the need to manage or control these end users’ mobile devices. By enforcing a broad suite of configurable security policies at the app, rather than at the device level, it powers new forms of digital collaboration for healthcare organizations. For example, a home telehealth organization uses Atlas to secure an Android patient telehealth app, designed to improve healthcare outcomes for select military veterans. Atlas also powers real-time, secure access to two case management apps (for Doctors & Nurses, respectively) that enables these professionals to access & enrich the data generated by the telehealth app, from their own mobile devices, in a manner that complies with HIPAA, & other applicable regulations from the FDA and other governing bodies. Tagnos ( – The company’s technology tracks the patient’s experience in the hospital (from time entry, to time waiting for a test, to the path and process of being admitted or taken into surgery). The solution offers real-time data tracking, alerting of urgent situations, and process improvements that enhance the quality of patient care in hospital surgical centers, emergency departments, radiology departments, clinics, and outpatient services. The result is greater patient throughput, better facility utilization, increased revenues, reduced costs, and enhanced patient satisfaction scores. Auditable service delivery performance and patient satisfaction – automatically provided through the Tagnos software – are essential for optimizing hospital reimbursements under the HITECH Act and Affordable Care Act. MedAware ( – The company’s solution is based on machine learning analysis of healthcare big-data; providing physicians with actionable clinical insight, personalized treatment and outcome assessment. The solution analyzes millions of patient records, harnessing the medical practice patterns from thousands of physicians treating millions of patients in multiple institutions across the world; providing actionable clinical knowledge and decision support for patients, physicians, healthcare providers, and insurance companies. Existing error prevention methods are based on pre-defined rules, focusing primarily on drug interactions, dosages and allergies. These solutions detect only a small fraction of potential errors, and suffer from an unacceptably high false-alarm rate; contributing to “alert fatigue” where physicians learn to disregard the alerts. By utilizing mathematical models to analyze billions of existing prescriptions, MedAware can determine if a specific medication is appropriate for an individual patient at a specific time and place. If a prescription is found to be an outlier, it is flagged as a potential error to the prescribing physician. The physician’s accepting, or rejection of the alert is analyzed by MedAware, thus maintaining a self-learning and adaptive system. The Healthcare value chain and eco-system is complex and pursuit of any one goal (from amongst the three goals of Triple Aim) can negatively affect another – e.g. improving care for individuals can raise costs, adopting technologies that improve the health of populations could reduce revenues for hospitals that are volume driven. This, combined with the regulated nature of this industry makes for a complex Digital transformation journey. Despite these challenges BGV believes that innovative startups like Blue Cedar Networks, Tagnos and Medaware that address compelling pain points while addressing the inherent complexity of the sector will be key contributors to the journey towards a new healthcare economy – one that is closer towards achieving the goals of Triple Aim.