BES10 Cloud Solution-Security Technical Overview

BES10 Cloud Solution-Security Technical Overview

Security Technical Overview BES10 Cloud Solution Market Preview Published: 2014-04-22 SWD-20140422090823041 Contents Introduction..................................................................................................................... 7 About this guide................................................................................................................................................................8 What is BES10 Cloud?.......................................................................................................................................................9 Key features of BES10 Cloud....................................................................................................................................10 Key security features of the BES10 Cloud solution.................................................................................................... 11 Hardware and OS security.............................................................................................. 13 Hardware root of trust for BlackBerry devices..................................................................................................................14 The BlackBerry 10 OS.....................................................................................................................................................15 The file system........................................................................................................................................................ 15 Sandboxing............................................................................................................................................................. 15 Device resources..................................................................................................................................................... 16 App permissions......................................................................................................................................................16 Verifying software.................................................................................................................................................... 16 Preventing memory corruption.................................................................................................................................17 Activating and managing devices....................................................................................19 Activating devices...........................................................................................................................................................20 Activating devices over the wireless network............................................................................................................ 20 Activation passwords............................................................................................................................................... 20 Data flow: Activating an iOS device...........................................................................................................................21 Data flow: Activating an Android device....................................................................................................................22 Data flow: Activating a BlackBerry 10 device............................................................................................................24 Using IT policies to manage security................................................................................................................................26 Using compliance profiles to enforce standards for iOS and Android devices....................................................................27 Data in transit.................................................................................................................29 How devices connect to your organization's network....................................................................................................... 30 Protecting Wi-Fi connections................................................................................................................................... 30 Using a VPN............................................................................................................................................................ 30 Types of encryption used for Wi-Fi and VPN connections..........................................................................................30 Protecting email and organizer data.........................................................................................................................32 Protecting data in transit between BES10 Cloud and devices...........................................................................................33 Protecting data in transit between BES10 Cloud and iOS and Android devices.......................................................... 33 Protecting data in transit between BES10 Cloud and BlackBerry 10 devices............................................................. 33 Protecting data in transit between BES10 Cloud and your company directory...................................................................34 Data flow: Establishing a secure connection between BES10 Cloud and the BlackBerry Cloud Connector..................34 Managing certificates..................................................................................................................................................... 36 Sending CA certificates to devices............................................................................................................................36 Sending client certificates to devices........................................................................................................................37 Extending email security................................................................................................................................................. 38 About S/MIME......................................................................................................................................................... 38 S/MIME for BlackBerry 10 devices........................................................................................................................... 38 S/MIME for iOS devices............................................................................................................................................ 43 IBM Notes email encryption for BlackBerry 10 devices.............................................................................................44 Data at rest.....................................................................................................................45 Securing BlackBerry 10 devices for work and personal use..............................................................................................46 How work and personal spaces are separated.......................................................................................................... 46 Securing work and personal apps and data on devices............................................................................................. 47 Controlling how work and personal apps connect to networks...................................................................................56 Protecting data............................................................................................................................................................... 58 Passwords...............................................................................................................................................................58 Security timeout...................................................................................................................................................... 61 Data wipe................................................................................................................................................................ 62 BlackBerry Link protection for BlackBerry 10 devices...............................................................................................65 Backup protection for iOS devices............................................................................................................................66 Encryption...............................................................................................................................................................66 Home screen message on BlackBerry 10 devices.....................................................................................................67 BlackBerry Smart Card Reader................................................................................................................................ 67 Apps.............................................................................................................................. 71 Managing work apps on BlackBerry 10 devices............................................................................................................... 72 Preventing BlackBerry 10 device users from installing apps using development tools.......................................................73 Installing personal apps on BlackBerry 10 devices...........................................................................................................74 Protecting a BlackBerry 10 device from malicious apps...................................................................................................75

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    96 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us