There's Good Security and Then There's National

Total Page:16

File Type:pdf, Size:1020Kb

There's Good Security and Then There's National BROCHURE THERE’S GOOD SECURITY AND THEN THERE’S NATIONAL SECURITY BlackBerry 10 and BES10 The perfect balance of protection and productivity Back to the Contents THE PERFECT BALANCE OF PROTECTION AND PRODUCTIVITY Contents BlackBerry 10 & BES10 3 Corporate Networks Under Attack 4 BlackBerry Security 5 Protecting Data in Motion 7 BES10 Security Philosophy 8 BES10 Certification & Encryption 9 BES10 Layers of Protection 9 Tech Talk 1 & 2 10 Protecting Work Data on Personal-Use-Enabled Devices 11 BlackBerry Balance 12 Tech Talk 3 13 Enforcing Strong Access Controls 14 BlackBerry 10 Device OS Security Features 15 BES10’s Gold level Controls and Settings 16 Manging Devices 18 BlackBerry Mobile Device Management in Action 19 End-to-end Security 21 3 BlackBerry 10 & BES10 End-to-end mobile data security without compromising business productivity or user satisfaction Keeping corporate data secure is a top priority for The entryways for potential attacks, data loss and productivity any organization. After all, a data breach can cause compromises include: significant financial losses, expose executives to legal Employees maintaining a mix of corporate and third-party actions, damage your company's reputation and weaken applications on the same device and exchanging information or eliminate competitive business advantage. between the two domains As more employees access your corporate network The installation of threat-vulnerable containerization through mobile devices to communicate, collaborate on mobile devices and share data, your infrastructure becomes increasingly Employees visiting sites where they encounter malware or vulnerable to outside attacks and harder to secure and malicious threats protect. The mixing of personal and work email accounts, apps and data, as well as the proliferation of employee- The use of employee-owned devices to access enterprise owned devices, increases the chance of major data leaks. resources and information Rivaling the importance of information security, IT managers need a solution that helps them: however, is business-user productivity and satisfaction. Deliver transparent security for an optimal user experience A mobilized workforce is only effective if the end-user experience is uncompromised and critical applications Provide integrated containerization that enables simple and productivity tools operate as efficiently from a enterprise application development and deployment mobile device as they do from a PC attached directly Reduce employee misuse of devices to the corporate network. An effective mobile security solution is one that imposes no limitations on end-user Keep personal and work information separate productivity. Ensure that network data, both in transit and at rest, are kept secure The BlackBerry end-to-end enterprise security solution secures data from would-be attacks and loss without requiring you to compromise productivity or user BlackBerry delivers a security solution that satisfaction. satisfies the needs of both enterprises and government agencies. The solution provides IT managers must now consider a highly complex the confidentiality, integrity and authenticity to corporate network infrastructure, accessible to a growing number and diversity of devices and applications, when help protect your organization from data loss devising a plan to protect corporate information and and theft while delivering a seamless, simple maintain worker productivity. and uncompromised end-user experience. Back to the Contents 4 Corporate Networks Under Attack* 71% 54% Of breaches targeted Of breaches compromised user devices... servers.... 78% 66% Of intrusions rated as low Of breaches go undetected difficulty... for six months or longer... *Verizon 2013 Data Breach Investigations Report Back to the Contents 5 An unavoidable consequence of the explosive expansion of BlackBerry Security mobile devices within businesses and organization of all sizes is a proportional elevation in vulnerability to security breaches A fully integrated end-to-end enterprise and data leakage. To protect your information from increased mobility security solution exposure to attacks or data loss through accidental or malicious means, IT administrators require a comprehensive security solution, but one that does not sacrifice business productivity or end-user satisfaction. BlackBerry end-to-end security is purpose built to deliver optimal protection for work- related content, both on devices and in transit. BlackBerry security delivers fast, integrated device, application and content management and fully encrypted behind-the-firewall access to corporate data without the need for 3rd-party VPNs or add-on security. The BlackBerry network, combined with its infrastructure authentication, device management capabilities and hardened BlackBerry® 10 operating system, is the ultimate end-to-end mobile security solution. BlackBerry security focuses on four critical areas: • Protecting data in motion • Protecting work data on personal-use-enabled devices • Enforcing strong access controls • Managing devices All G7 These four functions protect your data from GOVERNMENTS breaches, losses or alteration as it transits and 16 of the G20 governments the end-to-end path from your enterprise, rely on BlackBerry security BES10 server, the BlackBerry network and, ultimately, your employees’ BlackBerry devices. Back to the Contents 6 The ultimate standard for end-to-end mobile security 45 35PB Security certificates per month on average. Only MDM provider More than any other mobile vendor Moves more secure mobile data through its infrastructure than to obtain ATO on U.S. any other EMM vendor Defense networks AES FIPS Dedicated 256 140-2 Security Team Back to the Contents 7 Protecting Data in Motion A key element of the BlackBerry solution for in-transit data security in BES10 Because many of your employees work outside the office, BES10 Overview it’s critical that you have strong security measures in place BlackBerry has long-been the ultimate in mobile security. – both on employees’ devices and across internal network An integral component of the BlackBerry solution is BES10, infrastructure – to protect data in transit. A key element of the which secures in-transit data using transport layer security BlackBerry solution for in-transit data security is the BlackBerry over the BlackBerry infrastructure. BES10 encrypts data using Enterprise Service 10, BlackBerry's device and application AES 256-bit encryption prior to transmission, while message management platform. BES10 offers built-in data encryption keys are encrypted by the device transport key. BES10 also to help both enterprises and government agencies protect protects and manages devices and applications within the sensitive information and minimize data loss or alteration. end-to-end BlackBerry security solution. Secure Enterprise Connectivity Work Personal BlackBerry Enterprise Service 10 Enable Work Network TLS over For Personal Use (Enable/Disable) AES BlackBerry BlackBerry SSL (Optional) Mobile Data Dispatcher and Connection BlackBerry Wi Fi Wi Fi Infrastructure Service Firewall or 3G/4G BlackBerry 10 or 3G/4G Enerprise Management Web Service SSL Enable Work Network For Personal Use (Enable/Disable) VPN over Private Network Content servers Wi Fi VPN over Firewall with Firewall with SSL (Optional) or 3G/4G BlackBerry 10 Wi Fi VPN Gateway VPN Gateway or 3G/4G Web servers Wi Fi Microsoft ActiveSync VPN: IPSec or SSL SSL (Optional): Authenticated with server specific certificate TLS: BlackBerry infrastructure authenticated SSL: Authenicated with client/server certificates generated with self certification during activation AES 256: Encrypted with device transport key Wi Fi Wi-Fi: IEE 802.11.i with 802. 1x generated during activation (EAP-FAST, EAP-TLS. EAP-TTLS, PEAP and LEAP) Back to the Contents 8 Protecting Data in Motion cont. BES10 Security Philosophy Confidentiality Integrity Authenticity The security features found in BES10 are built upon a foundation of confidentiality, integrity and authenticity. Confidentiality BES10's encryption capabilities ensures that only intended recipients can view corporate data. Integrity All email sent over a secure network is strongly encrypted to keep third parties from decrypting or altering the message. Authenticity BES10 provides two-way authentication upon pairing with the device, helping reduce the possibility of counterfeit devices accessing your infrastructure. Back to the Contents 9 Protecting Data in Motion cont. BlackBerry 10/BES10 FIPS 140-2 Certification Encryption Options Businesses and government agencies alike need to feel confident BES10 uses a technique called tunneling to protect data in that their highly sensitive data – whether it’s in storage or transit over a secure network. Tunneling incorporates multiple in transit – stays secure from would-be attackers. The U.S. layers of encryption between devices, BES10 and the wireless government created and implemented the FIPS 140-2 computer resource for additional data protection. security standard and uses it to accredit file encryption modules. For example, when employees access the corporate Wi-Fi Both the BlackBerry 10 OS and BES10 software are FIPS 140-2 network, data transmissions between their device and certified, which means that your organization’s data is strongly BES10 are secured first by AES encryption and then by encrypted and the corresponding encryption keys are rigorously Wi-Fi encryption. protected. BlackBerry 10 devices, controlled by BES10, are the only mobile
Recommended publications
  • How Ios 7 Stacks Up:Smartphone OS User Experience Shootout
    How iOS 7 Stacks Up: Smartphone OS User Experience Shootout a Pfeiffer Report Benchmark Project www.pfeifferreport.com @pfeifferreport Introduction Why is it that the arrival of iOS 7 Whether we like it or not, We do not look at features, we do not smartphones have become a compare cutting-edge options and is necessarily a momentous software game. Take any recent gadgets, we only look at aspects event for the smartphone top-of-the-line smartphone, and you that have a direct impact on the are likely to get a well-designed, fast, day-to-day user experience of an market? Simple: Unlike any other pleasant to use bit of hardware: fluid average, non-technical user. operating system out there, it will operation, responsive interaction, fast The aspects we have surveyed and be in the hands of millions or tens graphics. The difference of user rated are the following: experience, therefore, stems of millions of users within a few cognitive load, efficiency, almost exclusively from the customization, as well as user days after its launch. operating system, the user interface experience friction. Based on And that will make it a force to be design, the application integration, the the results from these benchmarks overall coherence. we have then established an overall reckoned with. This report compares the five Mobile Operating System User major mobile operating systems Experience Index presented at the * The question is, of course: in use today: iOS 7, iOS 6, Android , end of this document. Windows Phone 8, and Blackberry 10, The benchmarks are based on the How good is it really? and rates them in terms of user Pfeiffer Consulting Methodology experience.
    [Show full text]
  • Chapter # 1 Introduction
    Chapter # 1 Introduction Mobile applications (apps) have been gaining rising popularity dueto the advances in mobile technologies and the large increase in the number of mobile users. Consequently, several app distribution platforms, which provide a new way for developing, downloading, and updating software applications in modern mobile devices, have recently emerged. To better understand the download patterns, popularity trends, and development strategies in this rapidly evolving mobile app ecosystem, we systematically monitored and analyzed four popular third-party Android app marketplaces. Our study focuses on measuring, analyzing, and modeling the app popularity distribution, and explores how pricing and revenue strategies affect app popularity and developers’ income. Our results indicate that unlike web and peer-to-peer file sharing workloads, the app popularity distribution deviates from commonly observed Zipf-like models. We verify that these deviations can be mainly attributed to a new download pattern, to which we refer as the clustering effect. We validate the existence of this effect by revealing a strong temporal affinity of user downloads to app categories. Based on these observations, we propose a new formal clustering model for the distribution of app downloads, and demonstrate that it closely fits measured data. Moreover, we observe that paid apps follow a different popularity distribution than free apps, and show how free apps with an ad-based revenue strategy may result in higher financial benefits than paid apps. We believe that this study can be useful to appstore designers for improving content delivery and recommendation systems, as well as to app developers for selecting proper pricing policies to increase their income.
    [Show full text]
  • Blackberry World Vendor Portal-User Guide
    BlackBerry World Vendor Portal User Guide Published: 2015-03-05 SWD-20150305162023155 Contents Getting started.............................................................................................................................................5 Checklist: submitting your first app.................................................................................................................5 Vendor guidelines and app vetting criteria...................................................................................................... 8 Apply for a BlackBerry World vendor account................................................................................................. 8 Tips for getting your apps approved.............................................................................................................. 10 About the app dashboard.............................................................................................................................12 Setting up your app in BlackBerry World.................................................................................................... 15 Adding apps to BlackBerry World................................................................................................................. 16 Naming your app..........................................................................................................................................16 Helping customers find your app.................................................................................................................
    [Show full text]
  • Apps and Technology Share - a Student Disability Services and Library Collaboration
    City University of New York (CUNY) CUNY Academic Works Publications and Research Lehman College 2015 Apps and Technology Share - A Student Disability Services and Library Collaboration Rebecca Arzola CUNY Lehman College How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/le_pubs/162 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Apps and Technology Share A Student Disability Services and Library Collaboration 6th Annual CUNY Accessibility Conference Student Success in the Digital Age Friday, May 1st, 2015 John Jay College of Criminal Justice New York City Presenters Stephanie Arriola Students Disability Specialist, Lehman College Rebecca Arzola Government Documents-Collection Development Librarian, Leonard Lief Library, Lehman College Lauren McCarthy LEADS Advisor, Lehman College William Medina Accounting Major, Spring 2015, Lehman College Justin Perez Computer Science Major, Fall 2015, Lehman College The Story q Student Share and Students-on-the-Go q Collaboration q Technology qAssistive Technology qProductivity q Accessibility of documents and software q Going forward with universal design Student Share Students On-the-Go q Successful collaborative student share event between the Office of Student Disability Services and the Library, early Spring 2015. q Developed from a conversation about what apps and technology students use. q To create
    [Show full text]
  • Illegal File Sharing
    ILLEGAL FILE SHARING The sharing of copyright materials such as MUSIC or MOVIES either through P2P (peer-to-peer) file sharing or other means WITHOUT the permission of the copyright owner is ILLEGAL and can have very serious legal repercussions. Those found GUILTY of violating copyrights in this way have been fined ENORMOUS sums of money. Accordingly, the unauthorized distribution of copyrighted materials is PROHIBITED at Bellarmine University. The list of sites below is provided by Educause and some of the sites listed provide some or all content at no charge; they are funded by advertising or represent artists who want their material distributed for free, or for other reasons. Remember that just because content is free doesn't mean it's illegal. On the other hand, you may find websites offering to sell content which are not on the list below. Just because content is not free doesn't mean it's legal. Legal Alternatives for Downloading • ABC.com TV Shows • [adult swim] Video • Amazon MP3 Downloads • Amazon Instant Video • AOL Music • ARTISTdirect Network • AudioCandy • Audio Lunchbox • BearShare • Best Buy • BET Music • BET Shows • Blackberry World • Blip.fm • Blockbuster on Demand • Bravo TV • Buy.com • Cartoon Network Video • Zap2it • Catsmusic • CBS Video • CD Baby • Christian MP Free • CinemaNow • Clicker (formerly Modern Feed) • Comedy Central Video • Crackle • Criterion Online • The CW Video • Dimple Records • DirecTV Watch Online • Disney Videos • Dish Online • Download Fundraiser • DramaFever • The Electric Fetus • eMusic.com
    [Show full text]
  • Konyproducts Supported Devices OS Browsers
    Kony Visualizer Supported Devices, OS, and Browsers Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on the Revision History page. Remember to always view and download the latest document version relevant to the software release you are using. © 2016 by Kony, Inc. All rights reserved 1 of 47 Kony Visualizer Version 1.3 Copyright © 2014 Kony, Inc. All rights reserved. April, 2017 This document contains information proprietary to Kony, Inc., is bound by the Kony license agreements and may not be used except in the context of understanding the use and methods of Kony Inc, software without prior, express, written permission. Kony, Empowering Everywhere, Kony, Kony Nitro, and Kony Visualizer are trademarks of Kony, Inc. MobileFabric is a registered trademark of Kony, Inc. Microsoft, the Microsoft logo, Internet Explorer, Windows, and Windows Vista are registered trademarks of Microsoft Corporation. Apple, the Apple logo, iTunes, iPhone, iPad, OS X, Objective-C, Safari, Apple Pay, Apple Watch and Xcode are trademarks or registered trademarks of Apple, Inc. Google, the Google logo, Android, and the Android logo are registered trademarks of Google, Inc. Chrome is a trademark of Google, Inc. BlackBerry, PlayBook, Research in Motion, and RIM are registered trademarks of BlackBerry. All other terms, trademarks, or service marks mentioned in this document have been capitalized and are to be considered the property of their respective owners. © 2016 by Kony, Inc. All rights reserved 2 of 47 Kony Visualizer Version 1.3 Revision History Date Document Version Description of Modifications/Release 04/10/2017 1.4 Document updated for 7.3 10/24/2016 1.3 Document updated for 7.2 07/18/2016 1.2 Document updated for 7.1 02/29/2016 1.0 Document updated for 7.0 © 2016 by Kony, Inc.
    [Show full text]
  • A Comparative Analysis of Mobile Operating Systems Rina
    International Journal of Computer Sciences and Engineering Open Access Research Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693 A Comparative Analysis of mobile Operating Systems Rina Dept of IT, GGDSD College, Chandigarh ,India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 09/Dec/2018, Published: 31/Dec/2018 Abstract: The paper is based on the review of several research studies carried out on different mobile operating systems. A mobile operating system (or mobile OS) is an operating system for phones, tablets, smart watches, or other mobile devices which acts as an interface between users and mobiles. The use of mobile devices in our life is ever increasing. Nowadays everyone is using mobile phones from a lay man to businessmen to fulfill their basic requirements of life. We cannot even imagine our life without mobile phones. Therefore, it becomes very difficult for the mobile industries to provide best features and easy to use interface to its customer. Due to rapid advancement of the technology, the mobile industry is also continuously growing. The paper attempts to give a comparative study of operating systems used in mobile phones on the basis of their features, user interface and many more factors. Keywords: Mobile Operating system, iOS, Android, Smartphone, Windows. I. INTRUDUCTION concludes research work with future use of mobile technology. Mobile operating system is the interface between user and mobile phones to communicate and it provides many more II. HISTORY features which is essential to run mobile devices. It manages all the resources to be used in an efficient way and provides The term smart phone was first described by the company a user friendly interface to the users.
    [Show full text]
  • Blackberry UEM Architecture and Data Flows
    BlackBerry UEM Architecture and Data Flow Reference 12.10 2018-11-28Z | | 2 Contents BlackBerry UEM Architecture and data flows.................................................... 5 Architecture: BlackBerry UEM solution.................................................................................................................5 BlackBerry UEM components............................................................................ 7 BlackBerry UEM distributed installation.......................................................... 10 BlackBerry UEM regional deployment............................................................. 13 Components used to manage BlackBerry OS devices......................................17 Activating devices...........................................................................................20 Data flow: Activating a BlackBerry 10 device....................................................................................................20 Data flow: Activating an Android device for MDM............................................................................................22 Data flow: Activating an Android Enterprise device in a Google domain........................................................ 24 Data flow: Activating an Android Enterprise device using a managed Google Play account......................... 25 Data flow: Activating an Android device to have only a work profile in a Google domain..............................27 Data flow: Activating an Android device to have only a work profile using
    [Show full text]
  • A Comparison of Mobile Application Adoption Between Chinese and Us College Students
    WHY DO WE CHOOSE THIS APP? A COMPARISON OF MOBILE APPLICATION ADOPTION BETWEEN CHINESE AND US COLLEGE STUDENTS Chenjie Zhang A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2018 Committee: Louisa Ha, Advisor Patrick D. Pauken Graduate Faculty Representative Lisa Hanasono Kate Magsamen-Conrad © 2018 Chenjie Zhang All Rights Reserved iii ABSTRACT Louisa Ha, Advisor The present cross-cultural study applies the regulatory focus theory developed by Higgins and modifies the cultural dimensions proposed by Hofstede to explore and compare the relationships between cultural values and the focused strategic means college consumers use in China and the US. In total, 377 Chinese and 403 US college students participated in a survey to reveal the relations between variables of app download and their cultural values. In addition, for a deeper and insightful understanding of the app download behavior, the method of semi-structured interview was used to raise participants’ and the researcher’s consciousness of and critical reflections upon app download processes and experiences. The research results are five-fold: First, Chinese college students share similar scores of four cultural dimensions with the US college students, and there is no difference in indulgence between the two countries. Second, country is a more powerful variable than cultural dimensions in model testing in terms of differentiating consumers’ regulatory focus. US consumers are more likely to be promotion focused and Chinese consumers are likely to be prevention focused. Third, promotion focused consumers are likely to seek both hedonic and utilitarian gratifications, and to heuristically process information.
    [Show full text]
  • Additional Consumer Disclosures
    Additional Consumer Disclosures 7/1/2020 www.bryanu.edu Contents Supplemental Financial Assistance Information .......................3 Recognition of Citizenship ..................................................... 18 Net Price Calculator and Cost of Attendance Information ...... 18 Academic Planning and Improvement ................................... 19 Disclosure of Retention Rates as Reported to IPEDS .............. 20 Policies and Sanctions Related To Copyright Infringement and Liabilities ............................................................................... 20 Information Security Program ............................................... 24 Fraud Prevention ................................................................... 26 Supplemental Financial Assistance Information FINANCIAL ASSISTANCE The Bryan University Financial Assistance Office is available to provide financial access to all students who qualify. Abiding by federal and institutional guidelines, we seek to meet our student’s financial need and help students make responsible financial decisions. The University is committed to providing our students with information they need to make college as affordable as possible. Bryan University’s Financial Assistance Office is available to help make educational goals obtainable. Students must file a Free Application for Federal Student Aid (www.fafsa.ed.gov) to determine financial need. All applicants for their programs must be United States Citizens or eligible non-citizens. Satisfactory Academic Progress must be maintained
    [Show full text]
  • Blackberry Limited
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 __________________________________________________________ FORM 40-F REGISTRATION STATEMENT PURSUANT TO SECTION 12 OF THE SECURITIES EXCHANGE ACT OF 1934 or ANNUAL REPORT PURSUANT TO SECTION 13(a) OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended February 28, 2017 Commission File Number 0-29898 __________________________________________________________ BlackBerry Limited (Exact name of Registrant as specified in its charter) Ontario 3661 Not Applicable (Province or other Jurisdiction (Primary Standard Industrial (I.R.S. Employer of Incorporation or Organization) Classification Code Number) Identification No) 2200 University Ave East Waterloo, Ontario, Canada, N2K 0A7 (519) 888-7465 (Address and telephone number of Registrant’s principal executive offices) BlackBerry Corporation 3001 Bishop Drive, Suite 400 San Ramon, California, USA 94583 (925) 242-5660 (Name, address and telephone number of agent for service in the United States) __________________________________________________________ Securities registered or to be registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange where registered Common Shares, without par value Toronto Stock Exchange Common Shares, without par value NASDAQ Stock Market, LLC Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None For annual reports, indicate by check mark the information filed with this Form: Annual information form Audited annual financial statements Indicate the number of outstanding shares of each of the Registrant’s classes of capital or common stock as of the close of the period covered by this annual report.
    [Show full text]
  • Blackberry Limited (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 __________________________________________________________ FORM 40-F REGISTRATION STATEMENT PURSUANT TO SECTION 12 OF THE SECURITIES EXCHANGE ACT OF 1934 or ANNUAL REPORT PURSUANT TO SECTION 13(a) OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended March 1, 2014 Commission File Number 0-29898 __________________________________________________________ BlackBerry Limited (Exact name of Registrant as specified in its charter) Ontario 3,661 Not Applicable (Province or other Jurisdiction (Primary Standard Industrial (I.R.S. Employer of Incorporation or Organization) Classification Code Number) Identification No) 2200 University Ave East Waterloo, Ontario, Canada, N2K 0A7 (519) 888-7465 (Address and telephone number of Registrant’s principal executive offices) BlackBerry Corporation 5000 Riverside Drive, Suite 100E, Irving, Texas, USA 75039 (972) 650-6126 (Name, address and telephone number of agent for service in the United States) __________________________________________________________ Securities registered or to be registered pursuant to Section 12(b) of the Act: Common Shares, without par value Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None For annual reports, indicate by check mark the information filed with this Form: Annual information form Audited annual financial statements Indicate the number of outstanding shares of each of the Registrant’s classes of capital or common stock as of the close of the period covered by this annual report. The Registrant had 526,551,953 Common Shares outstanding as at March 1, 2014.
    [Show full text]