Blue Cedar’s Drive to Secure the Extended Enterprise Goes Big Time with New $10 Million Funding​

currencypadlockBlue Cedar Networks – which was spun out of Mocana back in April 2016 – revealed today strong financial backing for the company and its Atlas enterprise mobile security platform. That is excellent news.

I’m a big fan of the “Mocana way” of delivering top-down enterprise mobile security and highly secure mobile connectivity, enough so that last year I designated the platform as Blue Hill Research’s enterprise mobile security benchmark against which all mobile security platforms need to be assessed. I put all of my thoughts and reasoning on it together in several research reports; this is a good starting point: Mocana Atlas Sets the Stage for Advanced Enterprise Mobile Security.

The spinout of Blue Cedar out of Mocana was a great move – it provides Blue Cedar with a unique identity for its still benchmark-level Atlas mobile security platform and allows the new company to fully step out from the dark shadows of EMM, something the company struggled with under the Mocana moniker. The reality is that EMM is a monster that is not going to go away anytime soon – any company with huge and multi-year investments in EMM platforms may understand that Blue Cedar’s platform can in many cases simply eliminate the need for EMM, but let’s face it – no enterprise is going to do so.

EMM – primarily in the guise of mobile device management (MDM) – currently manages in the neighborhood of 250 million mobile devices. It provides cover – or a security blanket of sorts – for most enterprise BYOD and corporate-liable mobile ecosystems. As much as the smart move may be (and in my opinion “is”) to move enterprise mobile security to Blue Cedar’s Atlas, such a move faces far too many entrenched EMM investments (not to mention inertia – things at rest tend to stay at rest and let’s face it, nothing appeals to IT more than inertia).

Rather than fight the internal corporate EMM/mobile device fight, Blue Cedar has now positioned the Atlas platform to solve an even thornier enterprise problem – highly securing both apps and data on mobile devices that fall outside the reach, control, and management of enterprise EMM platforms. Partners, contractors, and external temporary workforces – spanning local, regional, national and global environments, consultants and a host of others that require access to enterprises’ internal data systems either permanently or temporarily through their iOS and Android mobile phones and tablets (we’ll include emerging Windows 10 hybrid PCs here as well) – now form what we collectively refer to as the “extended enterprise.”

The extended enterprise has no real boundaries. Current estimates suggest that it consists of roughly 350 million (and growing) devices that are not and cannot be “managed or secured” by enterprises. This is the key problem that EMM cannot solve, and this, in turn, ends up as the major roadblock for inertia-loving IT departments to deliver on the extended enterprise. But there is a truly simple solution to this conundrum …

The Enterprise Application IS the Security Endpoint

The “mobile security reality” is that mobile devices do not ever need to actually be managed to fully ensure extremely high levels of application and data security. Fully secure the application (mobile or otherwise) and access to data and EMM-based device security becomes irrelevant. Certificate-based and biometric authentication, FIPS-certified data encryption and secure multi-protocol connectivity are among the many capabilities the platform delivers on to do so. Technology aside, total user security transparency and the same exact “tap & go” user experience I highlighted in my research papers is key to its use.

Yes, yes, many – ok most – enterprises really and truly want to control their internal devices and don’t feel comfortable without a device agent sitting on the device, and that is fine. Tightly securing the app and data endpoints, however, is fully compatible with and entirely complimentary to any EMM platform while casting and “extending” its mobile security net far beyond EMM’s device reach (think of it as boldly going where no inertia-bound IT has gone before). This is what chief information security officers want and need to hear.

How and why Atlas delivers on tight enterprise endpoint security and secure connectivity is based on the “Atlas appliance” and is detailed in my research papers. This isn’t something I’ll rehash here. I will say, however, that since last year Blue Cedar has expanded its capabilities by adding the ability to deliver access to the Atlas appliance hardware and platform through both internal infrastructure access (as originally implemented) as well as through a new SaaS cloud-based model, which greatly increases deployment flexibility.

I leave it today as a reader exercise to imagine the huge variety of extended enterprise applications that open up to any business through deploying Atlas. Think in terms of competitive advantages on both the tactical and strategic level. And do share with us your thoughts on this in the comments section!

I happen to have a new Blue Cedar research paper coming out in a week or so that details the many use cases that define the extended enterprise – it will be interesting to see how they match up with your own ideas. The research is based on current Blue Cedar deployments but it merely offers the tip of the extended enterprise iceberg.

Atlas already secures over one million mobile app endpoints, but to date the one thing that has been missing from the Blue Cedar picture is a solid sense and proof of the company’s ability to continue to deliver innovation and platform technology advances and proof it can survive and morph from what is essentially a startup at this point – regardless of its long-standing Mocana roots and 150+ customers in hand – into a highly sustainable business securing many, many millions of extended enterprise data endpoints. Today that proof arrived.

A Powerful Investment Portfolio

A number of blue chip investors have joined forces to deliver a $10 million dollar Series A round of funding for Blue Cedar. This level of investment for a company that currently employs in the neighborhood of 40 employees is a solid first step for building forward-driving momentum on both the sales and technology fronts. The investors are as follows:

- Accelerate IT Ventures (AITV)
- Benhamou Global Ventures (BGV)
- Grayhawk Capital
- Generation Ventures

Anik Bose, General Partner at Benhamou Global Ventures, Brian Nugent of AITV (which is also an investor in Mocana) and Sherman Chu of Grayhawk Capital all join the Blue Cedar board as part of this Series A round. The Blue Cedar management team is led by the same talented “cast of characters” (it’s the only way to describe them!) I’ve gotten to know from their Mocana days, led by CEO John Aisien (a fellow New York University alumni member), CTO Kevin Fox, and CMO Ranjeet Vidwans, among others.

Here’s some trivia – how does one get from Mocana to “Blue Cedar” exactly? Well, the Atlas technology team is based in Boston on a road called Cedar Hill. It turns out there is also a quite regal cedar tree known as the Blue Cedar which is also known as … the Atlas Cedar, hence Blue Cedar. You can’t make this stuff up.

Let me wrap up this blog post with a prediction.

As more and more enterprises begin to take full advantage of Blue Cedar’s Atlas platform to build out extensive extended enterprise platforms through highly securing enterprise application endpoints, they will all eventually come to the realization that they no longer need to secure their internal devices any more than they need to secure extended enterprise devices through EMM/MDM. In my original Atlas research papers, I defined the next-generation model for enterprise mobile security – and in fact for all enterprise security, mobile or otherwise – as being driven through the application endpoint security model.

I’m right; I always am … stay tuned and let’s compare notes in 12 months!

About Tony Rizzo

Tony Rizzo joined Blue Hill Research following a 20 month stint heading up TMC's enterprise mobility and wearable technology coverage. Prior to TMC Tony spent several years within the mobile vendor community. Before his journey into the vendor community Tony spent five years as the Director of Mobile Research for research analyst firm The 451 Group, covering all aspects of enterprise mobility. There he lived through both the early and later stages of both consumer and enterprise mobility and the first stages of the BYOD enterprise mobility consumerization phenomenon following the release of the original iPhone. Tony has served as the Editor in Chief of Mobile Enterprise, Internet World, as the Editorial Director of an Ernst & Young Financial Services Web Advisory project, as the Editor in Chief of NetGuide (the first Internet magazine), as a founding editor and Editor of Network Computing Magazine, and as the founding Technical Editor of Microsoft Systems Journal. Prior to moving into tech journalism, research and analysis, Tony served as the Assistant Director for Information Technology at New York University's School of Continuing and Business Education, delivering extensive computer technology training programs.
Posted on July 20, 2016 by Tony Rizzo

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Latest Blog

Data Wrangling, “Groups & Loops,” and Some Company Called Google: Questioning Authority with Trifacta CEO Adam Wilson This Week in DataOps: The Promotional Edition Living with Legacy in an Era of Innovation – A Security Story

Topics of Interest

Advanced Analytics

AI

Analytics

Anodot

Attunity

authentication

BI

Big Data

Blog

Business Intelligence

Cloud

Cognitive Computing

Corporate Payments

Data Management

Data Preparation

Data Wrangling

DataKitchen

DataOps

DataRobot

design

design thinking

Domo

Emerging Tech

enterprise applications

Enterprise Performance Management

enterprise video

fog computing

General Industry

GoodData

GRC

Hadoop World

Human Resources

IBM

IBM Interconnect

Iguazio

ILTACON

Informatica

innovation

Internet of Things

IoT

knowledge

legacy IT

Legal

Legal Tech

Log Data

Machine Learning

Managed Mobility Services

Microsoft

Mobility

Nexla

Order-to-Cash

passwords

Pentaho

Podcast

Predictive Analytics

Private Equity

Procure-to-Pay

Qubole

Questioning Authority

Recurring Revenue

Risk Management

ROI

Sales Enablement

Salesforce

Security

service desk

Social Media

Strata

Striim

Supply Chain Finance

Switchboard Software

Tableau

Talend

Tangoe

Telecom Expense Management

Time-to-Value

Trifacta

Unified Communications

usability

USER Applications

User Experience

User Interface

video platform

Virtualization

Visualization

Wearable Tech

Yellowfin