The Privilege of Android™ Privacy: How PRIV™ Safeguards Your Data
This 10-page guide provides an overview of PRIV's key security components and explains what makes it secure and how it protects your privacy.
PRIV combines the superior privacy and security you’ve come to expect from BlackBerry with the flexibility of Android’s ecosystem and apps. It protects your mobile experience from the device level up to the application level, and offers a powerful suite of tools through which you can take charge of your private data. The end result is a device that you can trust will offer you better protection from threats against your apps, networks, and – most importantly – personal information.
PRIV: Get the Most Out of Your New BlackBerry SmartphoneBlackBerry
Simple steps on how to get acquainted with your new BlackBerry PRIV's key features. This quick how-to guide will help you make the most of PRIV with information on details including:
* Access to over 1 million applications on Google Play™
* Both touch and slide out physical keyboards
* 5.4" Quad HD dual-curved screen
* Long lasting 3410 mAh battery
* Schneider-Kreuznach® certified 18 MP dual flash camera
* BlackBerry Hub and Calendar
* DTEK™ by BlackBerry® warning system app to provide
you with the power of privacy
Switching to PRIV™ is simple. With the BlackBerry® Content Transfer app, you can move contacts, calendar events and more from a BlackBerry 10 device, BlackBerry 7 device, Android™ device, or iPhone® to your PRIV. Here are three easy steps to help you move your content from your old smartphone to your PRIV.
The BlackBerry PRIV pocket-sized sales guide offers quick tips and a demo guide on the key features of PRIV. Designed for smartphone sales people, the PRIV sales showcases the key specs and features of the first Android-powered smartphone to be backed by BlackBerry's world-class security and features.
Learn about the PRIV's security and privacy features, camera, keyboard, onboard software, the overall form and function and other specs of BlackBerry's new smartphone.
Now available from BlackBerry®, SecuSUITE® for Enterprise is a software-based solution that provides secure calling and text messaging on mobile devices, across multiple operating systems, including iOS®, Android™ and BlackBerry® 10.
With SecuSUITE® for Enterprise, technology that was designed to protect national security has been adapted and optimized to secure your organization’s voice and text communications against electronic eavesdropping and third-party attacks.
Experience SecuSUITE for Enterprise on your preferred device today.
A collection of posters with a variety of stylized PRIV angles and Android operating system user interfaces to highlight the primary features of the device. PRIV is the first Android-powered smartphone backed by BlackBerry's legendary security, privacy, keyboard, battery life and other specs.
A collection of posters using the most current creative identity and photography exclusively designed for PRIV, the first Android-powered smartphone backed by BlackBerry's legendary security, privacy, keyboard, battery life and other specs.
Simple steps on how to get started with your new DTEK50 secure smartphone powered by Android. This quick how-to guide will help you make the most of DTEK50 with information on how to use the Content Transfer app, regain control of your privacy, and take dazzling photos with DTEK50’s cameras.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
PRIV: Get the Most Out of Your New BlackBerry SmartphoneBlackBerry
Simple steps on how to get acquainted with your new BlackBerry PRIV's key features. This quick how-to guide will help you make the most of PRIV with information on details including:
* Access to over 1 million applications on Google Play™
* Both touch and slide out physical keyboards
* 5.4" Quad HD dual-curved screen
* Long lasting 3410 mAh battery
* Schneider-Kreuznach® certified 18 MP dual flash camera
* BlackBerry Hub and Calendar
* DTEK™ by BlackBerry® warning system app to provide
you with the power of privacy
Switching to PRIV™ is simple. With the BlackBerry® Content Transfer app, you can move contacts, calendar events and more from a BlackBerry 10 device, BlackBerry 7 device, Android™ device, or iPhone® to your PRIV. Here are three easy steps to help you move your content from your old smartphone to your PRIV.
The BlackBerry PRIV pocket-sized sales guide offers quick tips and a demo guide on the key features of PRIV. Designed for smartphone sales people, the PRIV sales showcases the key specs and features of the first Android-powered smartphone to be backed by BlackBerry's world-class security and features.
Learn about the PRIV's security and privacy features, camera, keyboard, onboard software, the overall form and function and other specs of BlackBerry's new smartphone.
Now available from BlackBerry®, SecuSUITE® for Enterprise is a software-based solution that provides secure calling and text messaging on mobile devices, across multiple operating systems, including iOS®, Android™ and BlackBerry® 10.
With SecuSUITE® for Enterprise, technology that was designed to protect national security has been adapted and optimized to secure your organization’s voice and text communications against electronic eavesdropping and third-party attacks.
Experience SecuSUITE for Enterprise on your preferred device today.
A collection of posters with a variety of stylized PRIV angles and Android operating system user interfaces to highlight the primary features of the device. PRIV is the first Android-powered smartphone backed by BlackBerry's legendary security, privacy, keyboard, battery life and other specs.
A collection of posters using the most current creative identity and photography exclusively designed for PRIV, the first Android-powered smartphone backed by BlackBerry's legendary security, privacy, keyboard, battery life and other specs.
Simple steps on how to get started with your new DTEK50 secure smartphone powered by Android. This quick how-to guide will help you make the most of DTEK50 with information on how to use the Content Transfer app, regain control of your privacy, and take dazzling photos with DTEK50’s cameras.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
Android smartphones and tablets are used extensively for business purposes. Many of these devices are accessing sensitive company information that must be protected. Read this white paper to understand how additional hardware/software based protection can help you protect your business.
DTEK60 by BlackBerry is ideal for enterprises and organizations looking to deploy devices to manage the security and productivity of their data and employees. It offers best-in-class security for enterprise customers with flagship specs – but at a lower price tier than most flagship phones – to help power productivity and security for users and enterprises.
This Buyer's Guide outlines some of DTEK60's key security, productivity and usability features.
Before the age of smartphones, no one could imagine the kind of functionality we’d have at our fingertips in 2015.
Today, we don’t just use smartphones to communicate, we use them to do business, too. Business people now make use of mobile devices more and more because smartphones are more flexible than traditional office equipment.
The smartphone is no longer just a phone, it is now a mobile office.
Learn about all the new developments and features we have in store for you with the new Galaxy S6 edge+ and Galaxy Note 5.
C0c0n 2011 mobile security presentation v1.2Santosh Satam
Mobile phone security has been a hot topic for debate in recent times. The top mobile manufacturers seem to claim that their mobiles and applications are secure, but recent news on mobile hacking and malware suggest otherwise.
One of the key challenges in mobile security is the diverse platforms and multitude of operating systems (both open and proprietary) in the market. This makes it almost impossible to devise a generic catch-all strategy for mobile application security. Every platform whether it is iOS, Android, Blackberry, Windows Mobile, Symbian etc. is unique and requires a specialized treatment.
In this talk, we will demystify mobile and related application security. We will understand the architectures of various mobile operating systems and the native security support provided by the manufacturers and operating system vendors. Then we will look at how hackers have come up with different techniques and tools to break mobile security, and what mobile companies are doing to mitigate these attacks.
Finally, we will look at secure practices for mobile deployment in the Enterprise using policy files and other technology solutions, We will also outline best practices for business users and road warriors, on how to ensure your company data is protected while still continuing to enjoy the flexibility provided by mobile phones.
iPad 3 provides an even more fertile app development platform for all the developers in the world. Flocks of iPad 3 Programmer are waiting eagerly as the fans, for new and better apps.
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
Both Galaxy S7 and Galaxy S7 Edge are a perfect match for your business needs. Boost your security productivity and management with these powerful devices.
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
Right from the start of IT era information security and user experience were the opposite poles. Complex password policies enforce users to keep it on the sticky notes. Or they should carry with them inconvenient hardware OTP tokens wherever they go. But information security and especially identity management could be convenient. And from this session you'll learn how.
Mobile Bootcamp Presentation: Mobile Application Development PlatformsWilfred Mutua Mworia
A broad presentation on the various mobile application development platforms that exist. From programming for low end devices, at the SMS and SIM card level to Smartphone platforms
The 10 Commandments Security Of Mobile App DevelopmentMobio Solutions
Ensure the security of your mobile apps with our "10 Commandments of Mobile App Security". From ideation to launch, we emphasize incorporating robust security measures, utilizing advanced encryption techniques, and minimizing data storage for utmost protection. Get an insight into how we craft secure, functional, and user-friendly mobile applications at Mobio Solutions.
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
It’s getting more complex to comply with new legislation and policies around data security. Meeting the high demands of end users that want Cloud and BYOD. In this session, you’ll get to see how Dell Dataprotection Protection & Encryption solution reduce encryption/security IT administrators work load and provide a transparent experience to their end-users, whilst reducing encryption complexity and cost.
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
Android smartphones and tablets are used extensively for business purposes. Many of these devices are accessing sensitive company information that must be protected. Read this white paper to understand how additional hardware/software based protection can help you protect your business.
DTEK60 by BlackBerry is ideal for enterprises and organizations looking to deploy devices to manage the security and productivity of their data and employees. It offers best-in-class security for enterprise customers with flagship specs – but at a lower price tier than most flagship phones – to help power productivity and security for users and enterprises.
This Buyer's Guide outlines some of DTEK60's key security, productivity and usability features.
Before the age of smartphones, no one could imagine the kind of functionality we’d have at our fingertips in 2015.
Today, we don’t just use smartphones to communicate, we use them to do business, too. Business people now make use of mobile devices more and more because smartphones are more flexible than traditional office equipment.
The smartphone is no longer just a phone, it is now a mobile office.
Learn about all the new developments and features we have in store for you with the new Galaxy S6 edge+ and Galaxy Note 5.
C0c0n 2011 mobile security presentation v1.2Santosh Satam
Mobile phone security has been a hot topic for debate in recent times. The top mobile manufacturers seem to claim that their mobiles and applications are secure, but recent news on mobile hacking and malware suggest otherwise.
One of the key challenges in mobile security is the diverse platforms and multitude of operating systems (both open and proprietary) in the market. This makes it almost impossible to devise a generic catch-all strategy for mobile application security. Every platform whether it is iOS, Android, Blackberry, Windows Mobile, Symbian etc. is unique and requires a specialized treatment.
In this talk, we will demystify mobile and related application security. We will understand the architectures of various mobile operating systems and the native security support provided by the manufacturers and operating system vendors. Then we will look at how hackers have come up with different techniques and tools to break mobile security, and what mobile companies are doing to mitigate these attacks.
Finally, we will look at secure practices for mobile deployment in the Enterprise using policy files and other technology solutions, We will also outline best practices for business users and road warriors, on how to ensure your company data is protected while still continuing to enjoy the flexibility provided by mobile phones.
iPad 3 provides an even more fertile app development platform for all the developers in the world. Flocks of iPad 3 Programmer are waiting eagerly as the fans, for new and better apps.
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
Both Galaxy S7 and Galaxy S7 Edge are a perfect match for your business needs. Boost your security productivity and management with these powerful devices.
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
Right from the start of IT era information security and user experience were the opposite poles. Complex password policies enforce users to keep it on the sticky notes. Or they should carry with them inconvenient hardware OTP tokens wherever they go. But information security and especially identity management could be convenient. And from this session you'll learn how.
Mobile Bootcamp Presentation: Mobile Application Development PlatformsWilfred Mutua Mworia
A broad presentation on the various mobile application development platforms that exist. From programming for low end devices, at the SMS and SIM card level to Smartphone platforms
The 10 Commandments Security Of Mobile App DevelopmentMobio Solutions
Ensure the security of your mobile apps with our "10 Commandments of Mobile App Security". From ideation to launch, we emphasize incorporating robust security measures, utilizing advanced encryption techniques, and minimizing data storage for utmost protection. Get an insight into how we craft secure, functional, and user-friendly mobile applications at Mobio Solutions.
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
It’s getting more complex to comply with new legislation and policies around data security. Meeting the high demands of end users that want Cloud and BYOD. In this session, you’ll get to see how Dell Dataprotection Protection & Encryption solution reduce encryption/security IT administrators work load and provide a transparent experience to their end-users, whilst reducing encryption complexity and cost.
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises.
View and listen to the entire webinar here:
http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
Unicom Conference - Mobile Application SecuritySubho Halder
Mobile adoption is strategic in every industry today. Although it can be a great catalyst for growth, the security risks that come with it cannot be overlooked. Even though this fact is established, many companies are still not following some of the mobile application security best practices. The goal of this is to raise awareness about application security by identifying some of the most critical risks facing organizations during development. We will be covering from basic OWASP top 10 security issues to live demos on different use-case scenarios on how a hacker can hack your application, and how to prevent them.
Partner with Creative Encode Technologies, your trusted mobile app development agency in the USA, for secure and robust Android apps. Contact us today and let's build impenetrable fortresses for your users' data!
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
Watch webinar recording: http://hubs.ly/H01l56L0
Join Brian Katz, director of mobile strategy at VMware, and Varun Kohli, vice president at Skycure, discuss how to:
- Get visibility into ALL mobile threats, vulnerabilities and attacks impacting your organization today
- Integrate Skycure with AirWatch to predict, detect, and protect against mobile cyber attacks
- Stop attacks before they make it to the enterprise by profiling good and bad device, app and user behaviors by leveraging crowd wisdom
Transforming any apps into self-defending apps Blueboxer2014
According to Gartner, 75 percent of mobile applications will fail basic security tests through 2015. The explosive growth of BYOA raises the question of, “Are you at risk?" Take a look at our latest webinar with Sean Frazier, senior sales engineer, to learn how to transform any mobile app into a self-defending app to best protect your enterprise from mobile threats.
Download the full recording here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
Quality Management, Information Security, Threat Hunting and Mitigation Plans for a Software Company or a Technology Start-up engaged in building, deploying or consulting in Software and Internet Applications.
Mobile apps are the primary cause behind this rise in mobile productivity. These virtual technologies connect servers and APIs all over the world to provide users with services, data, convenience, and value. For information, visit our website :
https://www.cerebruminfotech.com/
Mobile App Security Protecting Your App from Cyber Threats.edited.docxmadhuri871014
This has the potential to deceive individuals into downloading the mobile app to obtain absolutely nothing and enable the provider another opportunity to turn individuals into loyal customers. The use of in-app advertising is another prevalent strategy that lets you showcase relevant advertisements from within the application.
File Sharing Use Cases in Financial ServicesBlackBerry
Financial services institutions need to meet high standards of security, particularly when collaborating with external partners, in order to comply with federal regulations and protect their customers. However, security protocols designed to protect sensitive information can actually hinder workplace productivity. This presentation demonstrates different ways that financial institutions were able to get back to business using BlackBerry Workspaces, the secure file sync & share solution.
Check it out - BlackBerry QNX is the only company to pop up in 4 categories of this infographic showcasing all of the autonomous vehicle companies in Ottawa, Canada! Learn more at OttawaAVCluster.com.
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
How many companies pushing the envelope on self-driving cars are based in the Kanata North Tech Park in Ottaway, Canada? And how many times does BlackBerry QNX and its Autonomous Vehicle Innovation Center (AVIC) show up? Learn more at OttawaAVCluster.com
In most industries, the enterprise market is bigger than the consumer market; the Internet of Things (IoT) is no exception. Spend in 2016 was valued at $737 billion, with most of that spend occurring among enterprises. This is why when it comes to “Things,” BlackBerry is focused on EoT – the Enterprise of Things. So today we have taken our unique quality and turned it into a market-leading strategy – securing the EoT.
BlackBerry is a security software and services company dedicated to securing the enterprise of things. The Enterprise of Things is the network of intelligent connections and end points within the enterprise that enable products to move from sketch to scale. BlackBerry's integrated security software helps companies manage and secure their mobile devices and connected things and secures communications for all messaging and file types – ultimately making them BlackBerry Secure.
The Future of Security in Australia: a Think Tank Report by BlackBerry. This white paper from BlackBerry, the mobile-native software and services company dedicated to securing the Enterprise of Things, features the analysis and thoughts from a 10-expert roundtable late last year looking at trends in cyber and mobile security.
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
451 Research report evaluates BlackBerry's turnaround from a device manufacturer into an enterprise software and security business under John Chen's leadership.
451 Research's conclusions include:
-- "Under CEO John Chen, BlackBerry has significantly improved its financial position and product focus."
-- "Almost every product in BlackBerry's bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT devices."
-- "BlackBerry is very competitive in security, has a formidable leadership team, improving financials and some strong assets thoughtfully acquired, which in turn opens up new white space for it to attack."
-- "QNX is perhaps BlackBerry's most exciting IoT play because of its deployed footprint in embedded-computing markets and automotive. BlackBerry's strategy in connected cars is to aggressively expand beyond its deployed footprint in in-vehicle infotainment into adjacent areas like telematics, advanced driver assistance systems,
gateways and cockpit domain controllers."
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
BlackBerry is a mobile-native security software and services company dedicated to securing the Enterprise of Things. From Unified Endpoint Management to secure communications and collaboration, BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things can thrive.
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
This new report on enterprise mobility applications highlights the alarming gap between Central IT and line-of-business IT environments. Millennials in particular are showing signs of growing frustration with the devices and software tools available to support them in the workplace. Many are making their own mobility arrangements, through ‘shadow IT’, despite growing regulatory risk. The advent of the ‘Internet of Things’ will further exacerbate the situation as mobile staff seek access to real time data from their phones and tablets.
Our recent survey of over 100 financial service organizations, conducted by Forbes Insights in the UK and North America, indicates that despite current business and employee demand, enterprise mobile applications remain at a very early stage of maturity, with less than a quarter of employees eligible to access such facilities. The implications here are profound, given the need to support mobile working with appropriate tools in every sphere of corporate activity today.
Many employees complain that the only advance over the last ten years has been to ‘mobilize the laptop’. This merely emulates the traditional desktop environment outside the office. Set against this stark background of underperformance in the mobility area, Central IT appears to be preoccupied with legacy issues such as costly infrastructures and aging systems. Our survey reveals that despite having developed policies and tools to address enterprise mobility, Central IT has little visibility of what is actually going on within the lines of business or at the end user level.
Nor does it have the necessary resources currently to respond rapidly to the growing pressures for workplace mobility. External agencies appear to be stepping in to fill this gap, frequently circumventing Central IT. Mobility remains low on the Central IT agenda.
BlackBerry QNX technology touches our lives in many ways, from flipping a light switch, to seeing the doctor, to driving a car. Learn 35 surprising ways you encounter QNX technology in your daily live.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
BlackBerry Work (formerly known as Good Work) is the best-in-class all-in-one enterprise productivity app that provides employees with integrated email, calendar, contacts, presence, document access, document editing, and more. With countless features such as contact photos and status, the ability to join meetings with one tap, full contact management and VIP notifications, and the ability to run presentations from mobile, you can be sure that every business process that can be done on desktop can now be done on the go.
Unlike consumer grade apps, BlackBerry Work is built for the business user. Designed to offer a consistent user experience across any device, it allows employees to communicate effectively from anywhere, whether it be at work, home, on the road—the possibilities are endless.
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
Organizations need to share files. In fact, over 50% of business processes, including some of the most critical, are document- based. However, most file sharing solutions have consumer-grade roots, and were not built with the security that enterprises need, balanced with the collaboration and mobility features their end users want. BlackBerry Workspaces™ makes enterprises more mobile and collaborative, while reducing the risk, complexity and cost of sharing information across and beyond your organization. Workspaces embeds digital rights management (DRM) protection in your files, so your content remains secure everywhere it goes. With Workspaces, you stay in control – even after files are shared outside your firewall.
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
Supporting outmoded technology for fragmented business processes can inevitably put any business at risk of becoming competitively irrelevant. This is especially true for enterprises in the fast-paced world of technology and manufacturing, where businesses are often globally dispersed and at risk of copycats in the black market. This is also an industry where the careful timing of product releases drives profitability. Staying on the leading-edge of technology adoption is critical to keeping up with the speedy execution and high expectations of the market.
Learn how BlackBerry Workspaces enables Technology & Manufacturing companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
BlackBerry® Workspaces allows enterprises to realize numerous business workflows to promote increased productivity and cost savings. The unique file-centric security approach allows controls and tracking to be built into documents. Now employees can safely access, share and collaborate on sensitive information on any endpoint with any user, reaping the benefits while reducing the risk associated with sharing across organizations.
BlackBerry Workspaces Mobile ApplicationsBlackBerry
Native mobile applications from BlackBerry Workspaces can enable smartphones and tablets to access sensitive corporate information, combining strong security, granular tracking and user-friendly mobile collaboration tools to realize work efficiency from anywhere on any device. Enterprises can now manage all of their corporate content through a “single pane of glass” or unified view for Enterprise File Sharing, Mobile Content Management and Collaboration.
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
In media and entertainment, timing is everything. Presenting the right information at the right time is often the key to success. Protecting creative assets, such as scripts and production plans, is just as important as sharing and collaborating on them — because leaks can have severe implications. The industry is in dire need for a better way to share information.
Learn how BlackBerry Workspaces enables Media & Entertainment companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
In healthcare, the efficient delivery of accurate information can save lives. Thus, the current technology trends of mobility and collaboration hold tremendous potential in improving administrative and patient care processes. Yet many hospitals still rely on paper-centric solutions, such as faxes and printers, that are expensive, labor intensive, and prone to data loss. Outdated technology drives up the cost of care and puts organizations at risk of violating industry regulations such as HIPAA and HITECH — potentially incurring exorbitant fines or jeopardizing reputation.
Learn how BlackBerry Workspaces enables Healthcare organizations to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
3. 71%
71% of breaches
targeted user devices
(Verizon 2013 Data
Breach Investigation
Report).1
60%
60% of Android
devices are currently
vulnerable to a WebView
security risk.2
30%
nearly
Nearly 30% of mobile
apps steal and sell
your contacts,
messages, photos,
or browsing history
to parties ranging from
aggressive advertisers
to cybercriminals.3
75%
75% of all mobile
apps fail basic security
tests.4
90%
nearly
Nearly 90% of Android
devices are exposed
to critical vulnerabilities
due to slow patching
(Cambridge University).5
Privacy Matters. Live Secure.
How PRIV™
safeguards your data
What Is PRIV?
The Power of BlackBerry is now on Android
PRIV combines the superior privacy and security you’ve come to expect from BlackBerry
with the flexibility of Android’s ecosystem and apps. It protects your mobile experience from
the device level up to the application level, and offers a powerful suite of tools through which
you can take charge of your private data. The end result is a device that you can trust will
offer you better protection from threats against your apps, networks, and – most importantly –
personal information.
Living in the Era of Anti-Privacy
1
http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf
2
http://arstechnica.com/security/2015/01/google-wont-fix-bug-hitting-60-percent-of-android-phones/
3
http://www.marblesecurity.com/2015/06/03/marble-securitys-privacyhawk-identifies-risky-android-apps-that-steal-personal-data-and-take-over-smartphones/
4
http://www.gartner.com/newsroom/id/2846017
5
https://community.norton.com/en/blogs/norton-protection-blog/study-finds-mobile-privacy-concerns-often-traded-free-apps
4. Bringing BlackBerry to Android
BlackBerry and Android together have a long and storied history. The BlackBerry®
10 OS runs an Android app player and features an
Android app store, while BES®
and BlackBerry®
security apps support a wide range of Android endpoints. PRIV is the natural next step
in the relationship between the two platforms, expanding on the most comprehensive security solution available for privacy-minded
consumers and enterprises alike.
This solution focuses on four key areas:
• Empowering the user with advanced privacy controls
• Protecting applications and data at every level, starting with the hardware
• Enhancing device security with a productivity-first approach
• Augmenting the native Android experience with BlackBerry’s security expertise
No matter what you use it for, PRIV is designed to keep you safe and secure.
5. What Makes PRIV More Secure?
Designed With Security at its Core
PRIV smartphone layered approach to security leverages BlackBerry’s mobile security chops and combines them with Google’s
Android security improvements. In addition to the standard measures found in Android for Work, we’ve hardened the platform
at every level. Our improvements also bring with them our long-standing focus on the user experience: a seamless division
between personal and work data, effortless management of conversations and notifications, and a strong focus on privacy visibility
and control.
Manufacturing Process/Root of Trust
With PRIV, we built security into the device from the start rather than layering on defences after production. Our manufacturing
process establishes a hardware root of trust, a proprietary technique that adds security keys to the processor on PRIV as it is built.
Those keys are then used to track, verify, and provision each PRIV – meaning that the authenticity and integrity of your device
is guaranteed, as is the safety of the data it holds.
APP APP APP APP
Application 1 Application 2 Application 3 Application 4
Base file system verifies
loaded application hashes
Verified by SHA256
Base File System (Read-Only)
Operating System
Boot ROM
CPU Embedded Boot ROM
BSIS verifies Boot ROM digital signature
Verified with SHA256 and RSA2048
Verified by SHA512 and ECC521
Merkel Hast Tree, signed by Verity
Signed by Boot Image key (APBI)
Signed using Qualcomm’s gensecimage.py
CPU
BOOT
BOOT
OS
6. A Better Bootloader
When you boot up your device, it’s important that you’re
able to trust that only a BlackBerry signed OS can be loaded
and it hasn’t been tampered with since the last restart.
That’s where PRIV secure boot process comes in. Starting
with the hardware Root of Trust, each stage of the secure
boot chain must first verify that the next component is fully
intact before proceeding.
OS-Level Protection
Increasing the integrity of the Android OS is a cornerstone
of PRIV. To that end, the device incorporates a number
of improvements to Android’s base security, locking down
or blocking many unnecessary Android features that could
give an attacker the opportunity to compromise your device.
These improvements include preventing older versions
of the OS from being loaded after a device upgrade and
locking down Android’s core memory.
PRIV runs Android Lollipop (version 5.1.1 or later),
which includes several security enhancements of its own:
• Smart lock: Allows you to unlock your device
by displaying your face or placing it near another
trusted device.
• Multi-user, restricted profile, and guest modes.
• Containerization through Android for Work.
• Address Space Layout Randomization: This Android
feature, which makes it more difficult for attackers
to target a device by scrambling application/system
memory, is enhanced on PRIV.
7. Device Security
In addition to locking down the Android operating system and securing the boot process, PRIV features a number
of other security enhancements.
BlackBerry®
Secure Compound
Build on BlackBerry’s renowned security software, the Secure Compound provides a trusted environment for the protection
of sensitive data and security-focused applications. It’s leveraged by the Secure Boot Process, BlackBerry®
Integrity Detection,
and the protection and generation of security keys and device passwords.
Always On, Full-disk Encryption
By default, PRIV encrypts user data, ensuring information stored
on the device is only accessible to users who enter the password/PIN.
PRIV further enhances this encryption by protecting the key with
BlackBerry Secure Compound.
BlackBerry Integrity Detection
BlackBerry Integrity Detection constantly monitors for events
or configuration changes that could indicate a compromise to the
security of PRIV. These include:
• Safeguarding itself from tampering by running within the BlackBerry
Secure Compound.
• Validating hardware to detect if your device has been rooted.
• Checking the Android OS and file-system for unauthorized changes.
• Verifying that Android trusted apps, firmware, and security policies
are all still functional.
• Detecting attempts to disable high-security applications.
• Sending data to EMM solutions, DTEK by BlackBerry, and third-party
apps for real-time alerts.
8. How Can I Take Control of my Privacy with PRIV?
Keep your data private and share with confidence
Every component of PRIV works together to protect the privacy, integrity, and confidentiality of your apps and data – all without
impeding you. PRIV smartphone security measures protect your device against outside threats, while its privacy tools empower
you to directly manage how and where your data is used. With PRIV, whether you’re working with financial reports or sending selfies,
you are the one that’s in control.
DTEK™
by BlackBerry
We live in a world where everything is interconnected, so controlling what’s shared and with whom is a challenge. DTEK is a visual
tool that exists to address that challenge by letting you know when your privacy could be at risk so you can take action to improve it.
Here’s how it helps you control your personal information:
Monitor: Know at a glance
the overall security rating for
your device, and view ratings
for specific security features.
DTEK notifies you when you
need to take action to keep
yourself secure, and provides
recommendations on how to
do so.
Control: Take charge of your
security settings and enhance
device security through
features such as anti-theft
protection, integrity protection,
password protection, and
remote device management.
Track: With event logging,
advanced tools help you
track what info your apps
have accessed, how your
info is being used, and the
duration of use. This includes
access to your camera,
microphone, location, and
personal information.
Alert: Set up notifications to
receive alerts about specific
application activities. For instance,
you could set DTEK to alert you
when an app starts tracking your
location. DTEK also provides
alerts when something unexpected
happens, such as an unauthorized
installation or jailbreak attempt.
9. BlackBerry®
Password Keeper™
BlackBerry Password Keeper lets you store passwords, usernames, notes, and security questions in a single location. Using the app
is incredibly simple:
1. Create a master password.
Generate secure, random
passwords containing letters,
numbers, and symbols.
3. Import credentials from other
applications into BlackBerry
Password Keeper. Create backups
of records in encrypted or text
format.
2. Measure password strength
through a meter based
on a proprietary algorithm.
GO
4. Locate passwords by
username, website, app,
or notes with in-app search.
5. After ten failed sign-in
attempts, BlackBerry
Password Keeper clears
its data. This protects
against both brute-force
attacks and attempts
by a thief to guess your
master password.
6. Import credentials from other
applications into BlackBerry
Password Keeper.
10. Picture Passwords
PRIV offers an alternative means of securing your device that combines security with ease of use: Picture Passwords.
This method makes use of a number sequence distributed on a randomized grid, providing a quick and easy way to unlock
your device that also protects against several common attack methods:
• Smudge Patterns: Because PRIV Picture Passwords randomizes the number grid, you never follow the same pattern
to unlock your device. This means that smudge patterns on your screen won’t help attackers guess your password.
• Shoulder Surfing: Since Picture Passwords draw a number grid that’s randomized by both layout and size, the chances
of someone guessing your password by looking over your shoulder are relatively slim.
• Brute Force: In addition to randomizing the size, location, and pattern of the grid numbers, Picture Passwords limit
the number of guesses and require a minimum amount of movement across the grid – this makes brute force attacks
infeasible.
1
4
7
2
5
8
3
6
9
2. Select a picture and
an area on that picture.
1. Select a number.
This number will be used
to unlock your device.
3. To unlock your PRIV,
find the number
you chose on the grid,
then drag it to the
part of the picture
you chose.
4. Each time you unlock
your PRIV, the number
grid will be randomly
re-arranged.
Pop-Up Widgets
Widgets are a great way to get information quickly, but can take up a lot of space on your home screen, displaying content
and messages that you may not want everyone to see. With BlackBerry®
Pop-Up Widgets, you can view any application widget
by simply swiping up or down across the icon on your home screen, giving you fast access to the information you need, when
you need it – and keeping it to your eyes only.
11. BBM®
BBM allows you to securely chat and share files with others
in real time. It affords an unprecedented amount of control
over how messages and documents are sent and received,
and features like such as BBM®
Voice, BBM®
Groups, and
BBM®
Channels transform it into a powerful collaborative
tool. All BBM users are fully-authenticated; all messages
are encrypted to prevent tampering or interception. It also
offers the following features:
• Timed Messages: Set how long
contacts have access to messages
and pictures shared in a chat before
it disappears from the screen.
• Message Retraction: Retract a message
to remove it from your BBM chat.
• BBM uses PINs instead of phone
numbers or email addresses so that
it’s more private, and spam-free.
With 2-way opt-in, you always control
who can contact you.
Media Card Protection
Managed properly, PRIV can protect your personal data
by controlling who can access your media card, and where
your photos and other personal files are stored. Using
Android for Work software, only the primary user profile –
your profile – can modify media card files. This prevents
private data from being altered by work or guest profiles
on your device.
All messages are encrypted
to prevent tampering or interception.
12. Remote Device Management
There are few feelings worse than knowing you’ve misplaced your smartphone – especially given how much personal information
is now stored on mobile devices. That’s why PRIV is configured to work seamlessly with a wide range of remote device management
apps such as Android Device Manager. Using these apps, you (and/or an administrator, if your device is managed by an EMM solution)
can safeguard your data if your phone is lost or stolen.
To locate a lost or stolen device:
• View the device’s location on a map
• Make the device ring
• Display contact information on-screen.
To protect the data on a stolen device:
• Remotely lock it
• Change the password
• Perform a factory reset on the device, deleting all data and device settings.
Data In Transit Protection
Most people work outside the office on a regular basis, yourself included. It isn’t enough to simply secure the data you’ve stored
on your device. There also needs to be a means of protecting information – both personal and corporate – while it’s in transit.
PRIV offers a number of different protective measures,
including:
• Dual-Layered Authentication: When connecting
to a network, data sent during the connection and
authentication process is encrypted, preventing
both credentials and data from being stolen.
• Per-User VPN: PRIV features a built-in, always-on
multi-user VPN. One profile automatically routes
all network and application traffic through said VPN.
• BlackBerry®
Secure Connect Plus: In organizations
where BES®
12 is installed, BlackBerry Secure Connect
Plus provides a secure, encrypted connection to your
organization’s network.
• Bluetooth®
/NFC Configuration: You decide which
Bluetooth devices have access to your device and
what information they have access to, and all NFC
activities – such as tap & pay – are preauthorized
by you.
PRIV
VPN
Work Wi-Fi
network
Your servers
BES12
Your firewall
Your firewall
Work
VPN
BlackBerry
Infrastructure
Data path
Work Wi-Fi VPN BlackBerry Infrastructure
End-to-end solution using BES12
13. Documents
Library
App
Sandbox
Documents
Library
Personal app
Sandbox
Personal appApp
Sandbox
Sandbox
App
App
All
documents
All system
resources
Work profile/container
PRIV sandboxing
Typical app scenario
without sandboxing
Application Security
On a traditional mobile OS, applications run by the user have direct access to all documents and system resources on the
device, which gives app-targeted attacks the potential to cause a great deal of damage. PRIV application sandboxes restrict apps
from gaining access to more information than they should. They separate apps from one another, and isolate the capabilities
and permissions of each app to its own area of the device.
Not only does this protect apps from one another, it also improves device stability and preserves the privacy and integrity of your data.
14. Rapid Patching and Support from a World-Class Security Partner
With PRIV, BlackBerry has introduced a new 30-day patching protocol, designed to quickly address Android vulnerabilities, which
functions alongside Android’s 30-day vulnerability disclosure schedule. In addition, we can deliver hotfixes for critical issues outside
of that cycle.
The most impactful threats deserve a far better resolution commitment than can be provided by a time-based approach alone –
your personal data depends on it.
Where Can I Learn More about PRIV?
Interested in finding out more about BlackBerry’s newest smartphone? Check out our full PRIV Security Guide which takes
a comprehensive look at many of the features described in this brochure. You should also swing by the Inside BlackBerry Blog,
where we provide regular news updates about the PRIV (and all of BlackBerry’s other products, as well), as well as visit
blackberry.com/priv for the latest info. Finally, take a look at our online store to purchase a PRIV.
BlackBerry Plugins
PRIV opens the door to a suite of powerful BlackBerry applications which further enhance productivity and security:
• WatchDox®
by BlackBerry: A secure, intuitive file-sharing solution with granular document and permission control.
• Enterprise Identity by BlackBerry: A streamlined identity-management platform that automatically authenticates a user
for access to products and services, particularly on the cloud.
• VPN Authentication by BlackBerry: A VPN solution that uses the PRIV as a secondary factor for authentication rather
than requiring physical tokens, shared secrets, or passcodes.
• SecuSUITE®
for Enterprise: A background anti-eavesdropping solution that provides a high level of security for voice and
instant messaging communications.
• BBM®
Protected: A hardened version of BBM which strengthens encryption on messages, allowing the app to be used
for collaboration in regulated industries.