Fraud & Identity Fraud & Identity

Fraud & Identity Featured Article

December 06, 2017

Blue Cedar Employs Apple's Face ID

Apple’s new iPhone X allows smartphone owners to employ facial recognition to unlock these devices. That technology is called Apple’s Face ID. And this week Blue Cedar announced this same technology can be used to allow iPhone X users to securely log into the apps it supports.

Blue Cedar is a mobile security company. It has been offering fingerprint access to apps via application programming interfaces in Apple’s iOS mobile operating system. And now, the company explains, it also offers Face ID support via those APIs for any app on supported hardware through its code injection technology.

“We’re excited to offer the innovative capability of integrating Face ID authentication into any app secured by Blue Cedar’s technology, without the need for any code changes by developers,” said Kevin Fox, co-founder and CTO at Blue Cedar. “Our configurable Local App Authentication policy now allows any enterprise mobile app to be unlocked with the same ease and convenience that iPhone X owners use to access their phones. Blue Cedar’s technology allows us to intercept and encrypt network and data-at-rest operations, and when coupled with Face ID, is completely transparent to the user. We are proud to deliver such a critical feature that ultimately offers zero compromise between security and ease-of-use.”

In a recent company blog, Blue Cedar talks about the important of mobile app security and how different securing apps is from securing networks. “Traditional corporate security focuses on preventing malware, phishing, and advanced persistent threats,” the blog notes. “The security measures that can protect corporate networks and their centralized systems – whether cloud or on premises – are fairly well defined. However, mobile app developers and ISVs still face a critical security challenge: how best to protect corporate data on a device, while at the same time taking advantage of device-specific capabilities to improve business outcomes.”

Edited by Mandi Nowitz

Article comments powered by Disqus

Industry Insights

(MobileID) Proactive Fraud Prevention

Interconnect-related fraud such as International Revenue Share Fraud (IRSF) and PBX hacking fraud continue to be a billion dollar problem to the telecom industry.

(Defender Shield) Defense solutions for the modern SMS ecosystem

SMS is a ubiquitous communication method for person-to-person (P2P) text messaging, which has been in use globally for nearly 20 years.

(Defender Shield) Preventing Grey Routes and the Multi-billion dollar Threat

The convenience of mobile messaging has brought communication efficiency to billions of consumers worldwide. As is often the case with widely accepted technologies; however, convenience can provide a vulnerable gateway to fraudulent activity.

Product Documents

Asset Protect

While unlimited or high-volume voice and SMS plans offer great value to subscribers, sometimes fraudsters exploit these plans to avoid paying termination and interconnect fees.

Defender Shield

In a world with ever-increasing Application-to-Person (A2P) messaging needs and competition, improving customer satisfaction and eliminating revenue leakage is key for protecting SMS profits.


Accurate and cost-efficient routing of voice calls and SMS is critical. Unfortunately, gathering reliable routing data on ported numbers and keeping up with constant changes in number plans is expensive and time-consuming.

Fraud Solutions

Communications fraud is a $20B annual global problem and growing. Companies are looking for peace of mind so that their business and their customers are protected from the onslaught of technology crime that is damaging their reputations and their balance sheets.