SlideShare a Scribd company logo
BASICS

A Security System
That Changed The World
Enterprise data is a valuable corporate asset, and therefore
ensuring it’s over integrity is an issue of superior business cycle
model to any commercial or government organization.

What you will learn…

What you should know…

• Design of BlackBerry Enterprise Solution
• Mobile malware tendency

• basic knowledge about networking

S

ecurity is the cornerstone of the BlackBerry
legendary security system, allowing users to
confidently access sensitive information at all

times.
The BlackBerry devices, BlackBerry-enabled devices
and supporting technology are developed by Research
In Motion (RIM), a Canadian software and hardware
company based in Waterloo, Ontario.
Special selling feature is that it provides an
integrated wireless messaging system, providing
push email access over cellular wireless networks
throughout the world. Another major factor in the
BlackBerry’s popularity is its comprehensive approach
to security. BlackBerry devices are diversified, and
can be used for a various functions including such
ordinary functions like telephony, SMS, MMS, email,
photos, videos, music, and web-browsing amongst
other things.
End-users are divided into two categories.
•
•

End-user consumers who bought their own
BlackBerry devices, who uses BlackBerry Internet
Service (BIS)
Enterprise end-users who are given the use of a
BlackBerry by their employers with another service
called BlackBerry Enterprise Solution (BES).

The first environment make an end-users are
responsible for the any security measure configuration.

10

In opposition to BES environment where the end-users
have an amount of control, but security is usually
performed by the enterprise by an IT Policy. Here’s a
custom list of BES features, from RIM:
•
•
•
•
•
•
•

Wirelessly synchronize their email, calendar,
contacts, notes and tasks
Manage email folders and search email on the mail
server remotely
Book meetings and appointments, check availability
and forward calendar attachments
Set an out-of-office reply
Edit Microsoft Word, Excel and PowerPoint files
using Documents To Go
Access files stored on the company network
Use mobile applications to access business
systems behind the firewall

The following table identifies the features available with
the BlackBerry Internet Service and the BlackBerry
Enterprise Server.
BlackBerry smartphone applications include inherent
virus protection and spyware protection that is designed
to contain and prevent the spread of viruses and spyware
to other applications. Application controls are available on
BlackBerry smartphones that are running on a BlackBerry
Enterprise Server or on the BlackBerry Internet Service.
BlackBerry smartphone users can use the application
controls on their BlackBerry smartphones to prevent the

02/2011
A Security System That Changed The World

installation of specific third-party applications and to limit
the permissions of third-party applications.

BlackBerry Enterprise Solution

The BlackBerry Enterprise Solution (consisting of a
BlackBerry smartphone, BlackBerry Device Software,
BlackBerry Desktop Software, and the BlackBerry
Enterprise Server) is designed to protect organization
from data loss or alteration while a BlackBerry
smartphone user is sending and receiving, reading and
typing messages and accessing your organization’s
data over the wireless network using the BlackBerry
smartphone. In other words solution is designed so
that data remains encrypted at all points between the
BlackBerry smartphone and the BlackBerry Enterprise
Server. Only the BlackBerry Enterprise Server and
the BlackBerry smartphone can access the data that
they send between them, while third-parties, including
service providers, cannot access potentially sensitive
organization information in a decrypted format.
The BlackBerry Enterprise Solution is a flexible, ITfriendly solution that gives mobile users secure wireless
access to their enterprise email and business-critical
applications. The key elements of the BlackBerry
Enterprise Solution architecture include:
•

BlackBerry Enterprise Server – Robust software
that acts as the centralized link between wireless
devices, wireless networks and enterprise
applications. The server integrates with enterprise
messaging and collaboration systems to provide

•
•
•
•

•

mobile users with access to email, enterprise instant
messaging and personal information management
tools. All data between applications and BlackBerry
smartphones flows centrally through the server.
Learn more about BlackBerry integration with
IBM Lotus Domino and IBM Lotus Sametime
Microsoft Exchange and Microsoft Office Live
Communications Server 2005
Novell GroupWise and Novell GroupWise Messenger
BlackBerry Smartphones – Integrated wireless
voice and data devices that are optimized to work
with the BlackBerry Enterprise Solution. They
provide push-based access to email and data from
enterprise applications and systems in addition to
web, MMS, SMS and organizer applications. Learn
more about BlackBerry smartphones
Devices with BlackBerry Connect software
(BlackBerry-enabled Devices) – Devices available
from leading manufacturers that feature BlackBerry
push delivery technology and connect to the
BlackBerry Enterprise Server*.

While the BlackBerry technology has a comprehensive
embedded security system at all levels it’s still
susceptive to a range of attacks. Attacks, in whatever
types, will confer power to design devices are being
backdoored allowing any data (especially confidential
data) to be exported from various blackberry handhelds.
By the way, it’s being used to build covert channels
for attackers, in spite of exploits are digitally signed or
not. Also, the efficiency and success of such attacks

��������
���������
�������

�����
�������

����������������������������
��������

������������������
�������
������������������
������������������
�������
�������

�������
�������
��������� ���������
�������
�������
�����������������
�����������������

����������
�����������
����������
����������
�����������
�����������
�������������������

��������������

Figure 1. BlackBerry Enterprise Solution

www.hakin9.org/en

11
BASICS

On The ‘Net
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

http://docs.blackberry.com/en/admin/deliverables/12077/BlackBerry_Enterprise_Server_for_Microsoft_Exchange-Feature_and_
Technical_Overview-T305802-817456-1102035401-001-5.0.1-US.pdf – BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0. Feature and Technical Overview, RIM,
http://docs.blackberry.com/en/admin/deliverables/12035/Security_Technical_Overview.pdf – BlackBerry Enterprise Solution
Version: 5.0. Security Technical Overview, RIM,
http://www.comscore.com/Press_Events/Press_Releases/2010/2/comScore_Reports_December_2009_U.S._Mobile_Subscriber_
Market_Share/(language)/eng-US – December 2010 U.S. Mobile Subscriber Market Share, comScore, 2010,
http://www.comscore.com/Press_Events/Press_Releases/2010/3/comScore_Reports_January_2010_U.S._Mobile_Subscriber_
Market_Share/(language)/eng-US – January 2010 U.S. Mobile Subscriber Market Share, comScore, 2010,
http://www.comscore.com/Press_Events/Press_Releases/2010/4/comScore_Reports_February_2010_U.S._Mobile_Subscriber_
Market_Share/(language)/eng-US – February 2010 U.S. Mobile Subscriber Market Share, comScore, 2010,
http://www.comscore.com/Press_Events/Press_Releases/2010/9/comScore_Reports_July_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports July 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/11/comScore_Reports_September_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports September 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/10/comScore_Reports_August_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports August 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/12/comScore_Reports_October_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports October 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/6/comScore_Reports_April_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports April 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/9/comScore_Reports_July_2010_U.S._Mobile_Subscriber_Market_
Share – comScore Reports July 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/7/comScore_Reports_May_2010_U.S._Mobile_Subscriber_Market_
Share – comScore Reports May 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/3/comScore_Reports_January_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports January 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/4/comScore_Reports_February_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports February 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/5/comScore_Reports_March_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports March 2010 U.S. Mobile Subscriber Market Share

depends on the configuration of existing security
controls, i.e. Firewall and IT Policy rules (see Figure 1).

Malware development background

The development of mobile together with wireless
technologies has evidently improved the way

everybody communicates with each other during
the past several years. The growing use of it has
made a good background for re-engineering range
of malwares that identical to PC-malware types, like
viruses, worms, trojans, backdoors, and adwares.
There were major factors requisite for attack on the

Figure 2. ComScore market trend analysis (09.2009 – 10.2010)

12

02/2011
A Security System That Changed The World

Table 1. comScore market trend analysis (09.2009 – 10.2010)

Producer

September November
2009
2009

December
2009

January
2010

February
2010

April 2010

July 2010

October
2010

RIM

42,60%

41,60%

40,80%

43,00%

42,10%

41,10%

39,30%

35,80%

Apple

24,10%

25,30%

25,50%

25,10%

25,40%

25,10%

23,80%

24,60%

Microsoft

19,00%

18,00%

19,10%

15,70%

15,10%

14,00%

11,80%

9,70%

Google

2,50%

5,20%

3,80%

7,10%

9,00%

12,00%

17,00%

23,50%

Palm

8,30%

6,10%

7,20%

5,70%

5,40%

4,90%

4,90%

3,90%

smartphone. However, it didn’t happen. This was due
to the rapid changing situation on the mobile handset
market. In spite of Symbian was leading for two years
smartphone producers could shift industry-leading
Nokia in favour of Windows Mobile (Microsoft) and
BlackBerry (RIM).
Faced with the lack of a market leader in mobile
operating systems and as a consequence, the
impossibility of a simultaneous attack on the majority of
users, malware writers had to try to solve the problem
of cross-platform. Solution was the use of Java Micro
Edition. It’s the well-known fact that almost all modern
phones have Java support and allow you to run Javabased applications that can be easily downloaded from
the Internet. Java-based malware made significant
contribution in damage area increasing by involving not
only smartphones users, but also almost every owner of
a mobile phone.
Exemplary malware to do list of realizable actions is
below:
•
•
•
•
•

d

v

e

YURY CHEMERKIN
Graduated at Russian State University for the Humanities
(http://rggu.com/) in 2010. At present postgraduate at RSUH.
Security Analyst since 2009 and currently works as mobile
security researcher in Moscow.
E-mail: yury.chemerkin@gmail.com.
Facebook: http://www.facebook.com/people/Yury-Chemerkin/
100001827345335.

Spreading via Bluetooth and MMS,
Sending SMS, MMS,
Making backdoor background,
Blocking antivirus actions,
Stealing confidential information, etc.

a

Displaced Nokia surrendered the initiative to the RIM,
Apple and Google. According to comScore market
trend analysis RIM is in lead (see Table 1).
Because of security is the cornerstone of the
BlackBerry legendary security system most of
consumers prefer BlackBerry smartphones to another
like iPhone or Android. Cursory acquaintance with the
BlackBerry Solution shows us various products and
components that are designed to extend organization’s
communication methods to BlackBerry devices.
The BlackBerry Solution is designed to help protect
data that is in transit at all points between a device
and the BlackBerry Server. To help it devices use
symmetric key cryptography to encrypt the data sent
between them. Solution uses confidentiality, integrity,
and authenticity, which are principles for information
security, to help protect your organization from data
loss or alteration.

r

t

i

s

e

m

e

n

t

Subscribe to our newsletter
and stay up to date with all
news from Hakin9 magazine!

http://hakin9.org/newsletter

More Related Content

What's hot

BlackBerry Access
BlackBerry AccessBlackBerry Access
BlackBerry Access
BlackBerry
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
BlackBerry
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
Motorola Solutions
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Tmobile Girl
 
Blackberry Technology ppt
Blackberry Technology pptBlackberry Technology ppt
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
BlackBerry
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security Gap
Ges Ray
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
Killian Delaney
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
AGILLY
 
Windows intune
Windows intuneWindows intune
Windows intune
Iron Cove Solutions
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
IBM Danmark
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
J
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
IBM Notes Traveler 2013 and Beyond
IBM Notes Traveler 2013 and BeyondIBM Notes Traveler 2013 and Beyond
IBM Notes Traveler 2013 and Beyond
Saurabh Calla
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
John Rhoton
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 

What's hot (20)

BlackBerry Access
BlackBerry AccessBlackBerry Access
BlackBerry Access
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
 
Blackberry Technology ppt
Blackberry Technology pptBlackberry Technology ppt
Blackberry Technology ppt
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security Gap
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
IBM Notes Traveler 2013 and Beyond
IBM Notes Traveler 2013 and BeyondIBM Notes Traveler 2013 and Beyond
IBM Notes Traveler 2013 and Beyond
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Viewers also liked

(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013STO STRATEGY
 
Cloudsourcing for competitive advantage
Cloudsourcing for competitive advantageCloudsourcing for competitive advantage
Cloudsourcing for competitive advantage
Eddie Kempe
 
Statistics for Anaesthesiologists
Statistics for AnaesthesiologistsStatistics for Anaesthesiologists
Statistics for Anaesthesiologists
xeonfusion
 
Google Analytics Report
Google Analytics ReportGoogle Analytics Report
Google Analytics Report
Drew West
 
Gianluca & jake changes to planning
Gianluca & jake changes to planningGianluca & jake changes to planning
Gianluca & jake changes to planninggmisso33
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 
Interview with yury chemerkin
Interview with yury chemerkinInterview with yury chemerkin
Interview with yury chemerkinSTO STRATEGY
 
Flowers..............
Flowers..............Flowers..............
Flowers..............
7Nitin7
 
Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...
Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...
Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...GTestClub
 
Men Plain Socks by Cl aovsocks
Men Plain Socks by Cl aovsocksMen Plain Socks by Cl aovsocks
Men Plain Socks by Cl aovsocks
Aov Cleverknits Pvt Ltd
 
Solo Cars
Solo CarsSolo Cars
Solo Cars
Soloten
 
Cabo san lucas
Cabo san lucasCabo san lucas
Cabo san lucas
Rashmi Gautam
 
HubSpot landing analysis
HubSpot landing analysisHubSpot landing analysis
HubSpot landing analysis
Soloten
 
Institutional regulations
Institutional regulationsInstitutional regulations
Institutional regulations
gmisso33
 
Dwi putri Microsoft exel
Dwi putri Microsoft exelDwi putri Microsoft exel
Dwi putri Microsoft exelptari57
 

Viewers also liked (20)

(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
Cloudsourcing for competitive advantage
Cloudsourcing for competitive advantageCloudsourcing for competitive advantage
Cloudsourcing for competitive advantage
 
Statistics for Anaesthesiologists
Statistics for AnaesthesiologistsStatistics for Anaesthesiologists
Statistics for Anaesthesiologists
 
Google Analytics Report
Google Analytics ReportGoogle Analytics Report
Google Analytics Report
 
Suiza y reflexiones
Suiza y reflexionesSuiza y reflexiones
Suiza y reflexiones
 
Gianluca & jake changes to planning
Gianluca & jake changes to planningGianluca & jake changes to planning
Gianluca & jake changes to planning
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Interview with yury chemerkin
Interview with yury chemerkinInterview with yury chemerkin
Interview with yury chemerkin
 
Flowers..............
Flowers..............Flowers..............
Flowers..............
 
Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...
Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...
Grammarly Test Club#2. Выступление Василия Кривоноса (VostokVenutes): "Тестир...
 
Men Plain Socks by Cl aovsocks
Men Plain Socks by Cl aovsocksMen Plain Socks by Cl aovsocks
Men Plain Socks by Cl aovsocks
 
About reading
About readingAbout reading
About reading
 
Solo Cars
Solo CarsSolo Cars
Solo Cars
 
Luquin_linkedin
Luquin_linkedinLuquin_linkedin
Luquin_linkedin
 
Cabo san lucas
Cabo san lucasCabo san lucas
Cabo san lucas
 
HubSpot landing analysis
HubSpot landing analysisHubSpot landing analysis
HubSpot landing analysis
 
Diego 9º3
Diego 9º3Diego 9º3
Diego 9º3
 
Institutional regulations
Institutional regulationsInstitutional regulations
Institutional regulations
 
Dwi putri Microsoft exel
Dwi putri Microsoft exelDwi putri Microsoft exel
Dwi putri Microsoft exel
 
Slide nahu (2)
Slide nahu (2)Slide nahu (2)
Slide nahu (2)
 

Similar to A security system that changed the world

BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry Connect
BlackBerry
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
BlackBerry
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
Alejandro De La Borbolla Ruiz
 
Blackberry ppt
Blackberry pptBlackberry ppt
Blackberry ppt
Satish Kumar
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
IBM Security
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
Prolifics
 
Intro BlackBerry 10 for enterprise
Intro BlackBerry 10 for enterpriseIntro BlackBerry 10 for enterprise
Intro BlackBerry 10 for enterprise
Belsoft
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
Citrix
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
WorksPad
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integration
Mike Taylor
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
IBM Danmark
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
abhijitmadhwaraj
 
It Presentation
It PresentationIt Presentation
It Presentationgonzo1551
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
Bernard Kufluk
 

Similar to A security system that changed the world (20)

BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry Connect
 
Blackberry
BlackberryBlackberry
Blackberry
 
Blackberry basic training deck[1]
Blackberry basic training deck[1]Blackberry basic training deck[1]
Blackberry basic training deck[1]
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
Blackberry ppt
Blackberry pptBlackberry ppt
Blackberry ppt
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Intro BlackBerry 10 for enterprise
Intro BlackBerry 10 for enterpriseIntro BlackBerry 10 for enterprise
Intro BlackBerry 10 for enterprise
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integration
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
It Presentation
It PresentationIt Presentation
It Presentation
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 

More from STO STRATEGY

(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013STO STRATEGY
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013STO STRATEGY
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedingsSTO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013STO STRATEGY
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013STO STRATEGY
 
(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013STO STRATEGY
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013STO STRATEGY
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedingsSTO STRATEGY
 
(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013STO STRATEGY
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013STO STRATEGY
 
(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012STO STRATEGY
 
Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012STO STRATEGY
 
(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011STO STRATEGY
 
Pen test career. how to begin
Pen test career. how to beginPen test career. how to begin
Pen test career. how to beginSTO STRATEGY
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensicsSTO STRATEGY
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 

More from STO STRATEGY (20)

(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
 
(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
 
(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013
 
(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012
 
Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012
 
(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011
 
Pen test career. how to begin
Pen test career. how to beginPen test career. how to begin
Pen test career. how to begin
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensics
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

A security system that changed the world

  • 1.
  • 2. BASICS A Security System That Changed The World Enterprise data is a valuable corporate asset, and therefore ensuring it’s over integrity is an issue of superior business cycle model to any commercial or government organization. What you will learn… What you should know… • Design of BlackBerry Enterprise Solution • Mobile malware tendency • basic knowledge about networking S ecurity is the cornerstone of the BlackBerry legendary security system, allowing users to confidently access sensitive information at all times. The BlackBerry devices, BlackBerry-enabled devices and supporting technology are developed by Research In Motion (RIM), a Canadian software and hardware company based in Waterloo, Ontario. Special selling feature is that it provides an integrated wireless messaging system, providing push email access over cellular wireless networks throughout the world. Another major factor in the BlackBerry’s popularity is its comprehensive approach to security. BlackBerry devices are diversified, and can be used for a various functions including such ordinary functions like telephony, SMS, MMS, email, photos, videos, music, and web-browsing amongst other things. End-users are divided into two categories. • • End-user consumers who bought their own BlackBerry devices, who uses BlackBerry Internet Service (BIS) Enterprise end-users who are given the use of a BlackBerry by their employers with another service called BlackBerry Enterprise Solution (BES). The first environment make an end-users are responsible for the any security measure configuration. 10 In opposition to BES environment where the end-users have an amount of control, but security is usually performed by the enterprise by an IT Policy. Here’s a custom list of BES features, from RIM: • • • • • • • Wirelessly synchronize their email, calendar, contacts, notes and tasks Manage email folders and search email on the mail server remotely Book meetings and appointments, check availability and forward calendar attachments Set an out-of-office reply Edit Microsoft Word, Excel and PowerPoint files using Documents To Go Access files stored on the company network Use mobile applications to access business systems behind the firewall The following table identifies the features available with the BlackBerry Internet Service and the BlackBerry Enterprise Server. BlackBerry smartphone applications include inherent virus protection and spyware protection that is designed to contain and prevent the spread of viruses and spyware to other applications. Application controls are available on BlackBerry smartphones that are running on a BlackBerry Enterprise Server or on the BlackBerry Internet Service. BlackBerry smartphone users can use the application controls on their BlackBerry smartphones to prevent the 02/2011
  • 3. A Security System That Changed The World installation of specific third-party applications and to limit the permissions of third-party applications. BlackBerry Enterprise Solution The BlackBerry Enterprise Solution (consisting of a BlackBerry smartphone, BlackBerry Device Software, BlackBerry Desktop Software, and the BlackBerry Enterprise Server) is designed to protect organization from data loss or alteration while a BlackBerry smartphone user is sending and receiving, reading and typing messages and accessing your organization’s data over the wireless network using the BlackBerry smartphone. In other words solution is designed so that data remains encrypted at all points between the BlackBerry smartphone and the BlackBerry Enterprise Server. Only the BlackBerry Enterprise Server and the BlackBerry smartphone can access the data that they send between them, while third-parties, including service providers, cannot access potentially sensitive organization information in a decrypted format. The BlackBerry Enterprise Solution is a flexible, ITfriendly solution that gives mobile users secure wireless access to their enterprise email and business-critical applications. The key elements of the BlackBerry Enterprise Solution architecture include: • BlackBerry Enterprise Server – Robust software that acts as the centralized link between wireless devices, wireless networks and enterprise applications. The server integrates with enterprise messaging and collaboration systems to provide • • • • • mobile users with access to email, enterprise instant messaging and personal information management tools. All data between applications and BlackBerry smartphones flows centrally through the server. Learn more about BlackBerry integration with IBM Lotus Domino and IBM Lotus Sametime Microsoft Exchange and Microsoft Office Live Communications Server 2005 Novell GroupWise and Novell GroupWise Messenger BlackBerry Smartphones – Integrated wireless voice and data devices that are optimized to work with the BlackBerry Enterprise Solution. They provide push-based access to email and data from enterprise applications and systems in addition to web, MMS, SMS and organizer applications. Learn more about BlackBerry smartphones Devices with BlackBerry Connect software (BlackBerry-enabled Devices) – Devices available from leading manufacturers that feature BlackBerry push delivery technology and connect to the BlackBerry Enterprise Server*. While the BlackBerry technology has a comprehensive embedded security system at all levels it’s still susceptive to a range of attacks. Attacks, in whatever types, will confer power to design devices are being backdoored allowing any data (especially confidential data) to be exported from various blackberry handhelds. By the way, it’s being used to build covert channels for attackers, in spite of exploits are digitally signed or not. Also, the efficiency and success of such attacks �������� ��������� ������� ����� ������� ���������������������������� �������� ������������������ ������� ������������������ ������������������ ������� ������� ������� ������� ��������� ��������� ������� ������� ����������������� ����������������� ���������� ����������� ���������� ���������� ����������� ����������� ������������������� �������������� Figure 1. BlackBerry Enterprise Solution www.hakin9.org/en 11
  • 4. BASICS On The ‘Net • • • • • • • • • • • • • • • http://docs.blackberry.com/en/admin/deliverables/12077/BlackBerry_Enterprise_Server_for_Microsoft_Exchange-Feature_and_ Technical_Overview-T305802-817456-1102035401-001-5.0.1-US.pdf – BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0. Feature and Technical Overview, RIM, http://docs.blackberry.com/en/admin/deliverables/12035/Security_Technical_Overview.pdf – BlackBerry Enterprise Solution Version: 5.0. Security Technical Overview, RIM, http://www.comscore.com/Press_Events/Press_Releases/2010/2/comScore_Reports_December_2009_U.S._Mobile_Subscriber_ Market_Share/(language)/eng-US – December 2010 U.S. Mobile Subscriber Market Share, comScore, 2010, http://www.comscore.com/Press_Events/Press_Releases/2010/3/comScore_Reports_January_2010_U.S._Mobile_Subscriber_ Market_Share/(language)/eng-US – January 2010 U.S. Mobile Subscriber Market Share, comScore, 2010, http://www.comscore.com/Press_Events/Press_Releases/2010/4/comScore_Reports_February_2010_U.S._Mobile_Subscriber_ Market_Share/(language)/eng-US – February 2010 U.S. Mobile Subscriber Market Share, comScore, 2010, http://www.comscore.com/Press_Events/Press_Releases/2010/9/comScore_Reports_July_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports July 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/11/comScore_Reports_September_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports September 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/10/comScore_Reports_August_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports August 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/12/comScore_Reports_October_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports October 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/6/comScore_Reports_April_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports April 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/9/comScore_Reports_July_2010_U.S._Mobile_Subscriber_Market_ Share – comScore Reports July 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/7/comScore_Reports_May_2010_U.S._Mobile_Subscriber_Market_ Share – comScore Reports May 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/3/comScore_Reports_January_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports January 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/4/comScore_Reports_February_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports February 2010 U.S. Mobile Subscriber Market Share http://www.comscore.com/Press_Events/Press_Releases/2010/5/comScore_Reports_March_2010_U.S._Mobile_Subscriber_ Market_Share – comScore Reports March 2010 U.S. Mobile Subscriber Market Share depends on the configuration of existing security controls, i.e. Firewall and IT Policy rules (see Figure 1). Malware development background The development of mobile together with wireless technologies has evidently improved the way everybody communicates with each other during the past several years. The growing use of it has made a good background for re-engineering range of malwares that identical to PC-malware types, like viruses, worms, trojans, backdoors, and adwares. There were major factors requisite for attack on the Figure 2. ComScore market trend analysis (09.2009 – 10.2010) 12 02/2011
  • 5. A Security System That Changed The World Table 1. comScore market trend analysis (09.2009 – 10.2010) Producer September November 2009 2009 December 2009 January 2010 February 2010 April 2010 July 2010 October 2010 RIM 42,60% 41,60% 40,80% 43,00% 42,10% 41,10% 39,30% 35,80% Apple 24,10% 25,30% 25,50% 25,10% 25,40% 25,10% 23,80% 24,60% Microsoft 19,00% 18,00% 19,10% 15,70% 15,10% 14,00% 11,80% 9,70% Google 2,50% 5,20% 3,80% 7,10% 9,00% 12,00% 17,00% 23,50% Palm 8,30% 6,10% 7,20% 5,70% 5,40% 4,90% 4,90% 3,90% smartphone. However, it didn’t happen. This was due to the rapid changing situation on the mobile handset market. In spite of Symbian was leading for two years smartphone producers could shift industry-leading Nokia in favour of Windows Mobile (Microsoft) and BlackBerry (RIM). Faced with the lack of a market leader in mobile operating systems and as a consequence, the impossibility of a simultaneous attack on the majority of users, malware writers had to try to solve the problem of cross-platform. Solution was the use of Java Micro Edition. It’s the well-known fact that almost all modern phones have Java support and allow you to run Javabased applications that can be easily downloaded from the Internet. Java-based malware made significant contribution in damage area increasing by involving not only smartphones users, but also almost every owner of a mobile phone. Exemplary malware to do list of realizable actions is below: • • • • • d v e YURY CHEMERKIN Graduated at Russian State University for the Humanities (http://rggu.com/) in 2010. At present postgraduate at RSUH. Security Analyst since 2009 and currently works as mobile security researcher in Moscow. E-mail: yury.chemerkin@gmail.com. Facebook: http://www.facebook.com/people/Yury-Chemerkin/ 100001827345335. Spreading via Bluetooth and MMS, Sending SMS, MMS, Making backdoor background, Blocking antivirus actions, Stealing confidential information, etc. a Displaced Nokia surrendered the initiative to the RIM, Apple and Google. According to comScore market trend analysis RIM is in lead (see Table 1). Because of security is the cornerstone of the BlackBerry legendary security system most of consumers prefer BlackBerry smartphones to another like iPhone or Android. Cursory acquaintance with the BlackBerry Solution shows us various products and components that are designed to extend organization’s communication methods to BlackBerry devices. The BlackBerry Solution is designed to help protect data that is in transit at all points between a device and the BlackBerry Server. To help it devices use symmetric key cryptography to encrypt the data sent between them. Solution uses confidentiality, integrity, and authenticity, which are principles for information security, to help protect your organization from data loss or alteration. r t i s e m e n t Subscribe to our newsletter and stay up to date with all news from Hakin9 magazine! http://hakin9.org/newsletter