Innovation powering a new era of mobile data security
Bluebox’s cloud service mobile data security solution is powered by four technology innovations that form the cornerstones of our unique data- and employee-centric approach. Click below to learn how these patent-pending technologies work:
Data Wrapping
Data Wrapping encrypts and protects data at rest on a mobile device, or in transit, in any app
- Protects data, with document level encryption and context-aware configurable policies, both at rest and in transit between mobile apps or over the network
- Allows data security policies to be enforced on any mobile app deployed thru Bluebox
- Enables granular revocation of corporate data from specific mobile devices or apps
- End-to-end security for corporate data from device to source — device-level or application-specific VPNs, and site-to-site connectivity for internal applications
Data Awareness Engine
Sophisticated context-aware mechanisms and policies secure and track enterprise data
- Clear separation of corporate from personal data for enterprise protection and employee privacy
- Provides visibility into corporate data access across the mobile workflow at the user, device, app, and network layers
- Tags and monitors files with sensitive data or patterns of interest
Instant App Protection
Instant App Protect secures and deploys, on-demand, any internal or public app, with no SDKs or coding
- Allows admins to dynamically deploy any app – with mobile data security
- Enables IT to deploy internal apps securely without SDKs or custom development work
- Preserves native UX to maximize productivity
- Empowers employees to use their favorite public apps, without compromising mobile data security
Invisible Workspace
Invisible Workspace is a transparent, secure workspace comprised of mobile apps delivered from the Bluebox App Catalog
- Dynamically updates mobile app security policies without requiring restarts or reinstallations
- Manages centralized passcode-protected access to all apps in the invisible workspace


Securing Mobile Data Wherever It Goes



