SlideShare a Scribd company logo
1 of 2
Download to read offline
Data Sheet
Integration
With Data Loss
Prevention (DLP)
Introducing BlackBerry Workspaces™ to an enterprise workforce kick-starts
secure collaboration and true mobile productivity. With powerful security
controls centered on files, content that includes intellectual property or
Personal Identifiable Information (PII) can now be accessed on BYOD mobile
devices, or shared with external business partners without fear. The ability to
control, revoke and track corporate files provides unprecedented Data Loss
Prevention.
In addition to the protected distribution of sensitive files, Workspaces
provides two additional pillars in the world of Data Loss Prevention.
The Solution
Leveraging Workspaces APIs
One powerful aspect of Data Loss Prevention products
is the ability to discover sensitive files in sites such as file
shares or Microsoft SharePoint. An enterprise organization
that has deployed a DLP solution for document discovery
will be able to locate sensitive documents. For example,
regulated financial documents, intellectual property-rich
strategy presentations or spreadsheets with customer credit
card information could be flagged as sensitive and classified
according to corporate policy (e.g. “Secret” and “Top Secret”).
With document classification in place, CIOs and CISOs can
now take action to apply file-centric security to these sensitive
documents. Using APIs from Workspaces and integrating
them with the DLP solution, the classified sensitive documents
can be protected and then made available for easy, secure
access and sharing, even on mobile devices or with external
collaborators. In addition to protection through encryption,
various file controls (e.g. who has access, allow print, don’t
allow copy/paste, expire access after a specific date, etc.)
can be applied based on classification categories of the DLP
discovery product.
For example, the following document controls can be made
to each classification category, as illustrated in the graphic
above.
Workspaces APIs allow the organization to programmatically
use the classification requirements to enforce how sensitive
information is accessed and used. Files in unsecure
environments may now be migrated to a secure environment
with encryption, access controls, rights management and
detailed audit trails.
Expiration
Copy-Paste
Print
Edit
Watermark
SECRET TOP SECRET
Data Sheet
BlackBerry Workspaces makes your content secure wherever
it travels. With Workspaces, all stakeholders can safely access,
share and collaborate on even the most sensitive files, using
any device — desktop (Windows®, Mac®) or mobile (iOS®,
Android™, BlackBerry® 10). By combining a user experience
that’s as easy and intuitive as any consumer solution with a
unique datacentric architecture (which embeds protection right
in your files), BlackBerry Workspaces is designed to meet the
needs of your organization, IT team, and users. To learn more,
visit www.blackberry.com/workspaces.
About Workspaces
© 2016 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, BLACKBERRY UEM, BBM and EMBLEM Design are the trademarks or registered trademarks of BlackBerry
Limited. All other trademarks are the property of their respective owners. Content: 12/16 | Rev. 04DEC2016
Prevent Distribution of Specified
Sensitive Content
Combining Workspaces and Data Loss Prevention also
provides visibility, remediation and alerts for CIOs and CISOs
when files are sent and shared with Workspaces
Via an ICAP integration, Workspaces can route files to
a Network DLP solution to perform content scanning,
providing visibility to the contents of the files shared through
Workspaces and the ability to remediate via blocking
or allowing. Furthermore, the DLP solution can also be
configured to generate alerts based on the policies that are
triggered.
The combination of visibility, remediation and alerts through
the ICAP DLP integration means that, for example, a
merchant card processor can scan for files with payment
card data, block them from being uploaded into Workspaces
and generate alerts for audit reasons. Likewise, a sports
equipment company may allow a shoe design document to
be shared but still generate alerts to interested parties in the
firm.
Enabling the Three Pillars of Data
Loss Prevention
Workspaces has information security in its DNA and
understands the needs of both the business user and the
security-conscious enterprise.
By combining Workspaces with DLP solutions, an enterprise
has the most comprehensive set of tools to enable secure
collaboration. The powerful combination of file protection
and mobile security, visibility and alerts, and discovery and
remediation allows organizations to seamlessly extend the
compliance regimes they’ve established on their internal
networks with DLP to the mobile, collaborative environment of
modern organizations.
PROTECT THE
DISTRIBUTION OF
SENSITIVE FILES
“My employees need to share
files for business reasons but
we need
to protect the content wherever
it goes.”
Workspaces provides mobile
security and Digital Rights Man-
agement
PREVENT
DISTRIBUTION OF
SPECIFIED SENSITIVE
CONTENT
“I have a company policy that
restricts content of certain
types from being shared. I need
to be compliant with company
policy through visibility, remedi-
ation and alerts.”
Workspaces provides ICAP-
based integration with DLP
solutions
DISCOVER AND
PROTECT
SENSITIVE CONTENT
“I have discovered files with
sensitive content on PCs and
file systems. I now need to
encrypt that content.”
Workspaces provides API inte-
gration with DLP Discovery tools
Learn more at www.blackberry.com/workspaces

More Related Content

What's hot

tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overviewtibbr
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0Elizabeth Caley
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Smart data platform for SharePoint
Smart data platform for SharePointSmart data platform for SharePoint
Smart data platform for SharePointEmmanuel Perdikis
 
WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014joepanora
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7Charles Rey
 
BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry ConnectBlackBerry
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Paperless office
Paperless officePaperless office
Paperless officeLogicalDOC
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseRichard Harbridge
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsEstuate, Inc.
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementNeo4j
 
IBM Lotus Connections In 1 Slide
IBM Lotus Connections In 1 SlideIBM Lotus Connections In 1 Slide
IBM Lotus Connections In 1 SlideStephen Londergan
 

What's hot (19)

tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Smart data platform for SharePoint
Smart data platform for SharePointSmart data platform for SharePoint
Smart data platform for SharePoint
 
WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry Connect
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
0365 profile
0365  profile0365  profile
0365 profile
 
Paperless office
Paperless officePaperless office
Paperless office
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the Enterprise
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
IBM Lotus Connections In 1 Slide
IBM Lotus Connections In 1 SlideIBM Lotus Connections In 1 Slide
IBM Lotus Connections In 1 Slide
 

Viewers also liked

Indie pop album covers
Indie pop album coversIndie pop album covers
Indie pop album covers03smiths
 
DTEK60 by BlackBerry Buyer's Guide
DTEK60 by BlackBerry Buyer's GuideDTEK60 by BlackBerry Buyer's Guide
DTEK60 by BlackBerry Buyer's GuideBlackBerry
 
Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...
Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...
Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...Petri Rouvinen
 
MR_RadioWien_Entscheidungen_September2016
MR_RadioWien_Entscheidungen_September2016MR_RadioWien_Entscheidungen_September2016
MR_RadioWien_Entscheidungen_September2016meinungsraum.at
 
Pitch of my thriller film
Pitch of my thriller film Pitch of my thriller film
Pitch of my thriller film christieshee
 
Säästöpankki somelähettiläs
Säästöpankki somelähettiläsSäästöpankki somelähettiläs
Säästöpankki somelähettiläsJohanna Janhonen
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
Question 2 evaluation
Question 2 evaluationQuestion 2 evaluation
Question 2 evaluationmollymeyer10
 
"Who would be the audience for your media product?”
"Who would be the audience for your media product?”"Who would be the audience for your media product?”
"Who would be the audience for your media product?”christieshee
 

Viewers also liked (15)

Indie pop album covers
Indie pop album coversIndie pop album covers
Indie pop album covers
 
DTEK60 by BlackBerry Buyer's Guide
DTEK60 by BlackBerry Buyer's GuideDTEK60 by BlackBerry Buyer's Guide
DTEK60 by BlackBerry Buyer's Guide
 
Digipak
Digipak Digipak
Digipak
 
Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...
Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...
Summary of March 2015 BRIE-ETLA Special Issue in the Journal of Industry, Com...
 
MR_RadioWien_Entscheidungen_September2016
MR_RadioWien_Entscheidungen_September2016MR_RadioWien_Entscheidungen_September2016
MR_RadioWien_Entscheidungen_September2016
 
Question 4
Question 4Question 4
Question 4
 
Thriller audience
Thriller audienceThriller audience
Thriller audience
 
Pitch of my thriller film
Pitch of my thriller film Pitch of my thriller film
Pitch of my thriller film
 
Säästöpankki somelähettiläs
Säästöpankki somelähettiläsSäästöpankki somelähettiläs
Säästöpankki somelähettiläs
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Question 2 evaluation
Question 2 evaluationQuestion 2 evaluation
Question 2 evaluation
 
Record labels
Record labelsRecord labels
Record labels
 
Question 6
Question 6Question 6
Question 6
 
"Who would be the audience for your media product?”
"Who would be the audience for your media product?”"Who would be the audience for your media product?”
"Who would be the audience for your media product?”
 
Goyte somebody i used to know
Goyte somebody i used to knowGoyte somebody i used to know
Goyte somebody i used to know
 

Similar to BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)

BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for SlackSachin Yadav
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection Pablo Junco
 
The Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityThe Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityHybrid Cloud
 
BlackBerry Access
BlackBerry AccessBlackBerry Access
BlackBerry AccessBlackBerry
 
Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Carbonite
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataHybrid Cloud
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Hybrid Cloud
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
AIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdfAIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdfSushanta Mondal
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 

Similar to BlackBerry Workspaces: Integration with Data Loss Prevention (DLP) (20)

BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
The Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityThe Enterprise File Fabric for Scality
The Enterprise File Fabric for Scality
 
eQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdfeQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdf
 
BlackBerry Access
BlackBerry AccessBlackBerry Access
BlackBerry Access
 
Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
AIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdfAIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdf
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 

More from BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner BenefitsBlackBerry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneBlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointBlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry SecureBlackBerry
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our LivesBlackBerry
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics BlackBerry
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry
 
BlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 

More from BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity Connectors
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
BlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry Docs To Go
BlackBerry Docs To Go
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 

Recently uploaded

Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 

Recently uploaded (20)

Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 

BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)

  • 1. Data Sheet Integration With Data Loss Prevention (DLP) Introducing BlackBerry Workspaces™ to an enterprise workforce kick-starts secure collaboration and true mobile productivity. With powerful security controls centered on files, content that includes intellectual property or Personal Identifiable Information (PII) can now be accessed on BYOD mobile devices, or shared with external business partners without fear. The ability to control, revoke and track corporate files provides unprecedented Data Loss Prevention. In addition to the protected distribution of sensitive files, Workspaces provides two additional pillars in the world of Data Loss Prevention. The Solution Leveraging Workspaces APIs One powerful aspect of Data Loss Prevention products is the ability to discover sensitive files in sites such as file shares or Microsoft SharePoint. An enterprise organization that has deployed a DLP solution for document discovery will be able to locate sensitive documents. For example, regulated financial documents, intellectual property-rich strategy presentations or spreadsheets with customer credit card information could be flagged as sensitive and classified according to corporate policy (e.g. “Secret” and “Top Secret”). With document classification in place, CIOs and CISOs can now take action to apply file-centric security to these sensitive documents. Using APIs from Workspaces and integrating them with the DLP solution, the classified sensitive documents can be protected and then made available for easy, secure access and sharing, even on mobile devices or with external collaborators. In addition to protection through encryption, various file controls (e.g. who has access, allow print, don’t allow copy/paste, expire access after a specific date, etc.) can be applied based on classification categories of the DLP discovery product. For example, the following document controls can be made to each classification category, as illustrated in the graphic above. Workspaces APIs allow the organization to programmatically use the classification requirements to enforce how sensitive information is accessed and used. Files in unsecure environments may now be migrated to a secure environment with encryption, access controls, rights management and detailed audit trails. Expiration Copy-Paste Print Edit Watermark SECRET TOP SECRET
  • 2. Data Sheet BlackBerry Workspaces makes your content secure wherever it travels. With Workspaces, all stakeholders can safely access, share and collaborate on even the most sensitive files, using any device — desktop (Windows®, Mac®) or mobile (iOS®, Android™, BlackBerry® 10). By combining a user experience that’s as easy and intuitive as any consumer solution with a unique datacentric architecture (which embeds protection right in your files), BlackBerry Workspaces is designed to meet the needs of your organization, IT team, and users. To learn more, visit www.blackberry.com/workspaces. About Workspaces © 2016 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, BLACKBERRY UEM, BBM and EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited. All other trademarks are the property of their respective owners. Content: 12/16 | Rev. 04DEC2016 Prevent Distribution of Specified Sensitive Content Combining Workspaces and Data Loss Prevention also provides visibility, remediation and alerts for CIOs and CISOs when files are sent and shared with Workspaces Via an ICAP integration, Workspaces can route files to a Network DLP solution to perform content scanning, providing visibility to the contents of the files shared through Workspaces and the ability to remediate via blocking or allowing. Furthermore, the DLP solution can also be configured to generate alerts based on the policies that are triggered. The combination of visibility, remediation and alerts through the ICAP DLP integration means that, for example, a merchant card processor can scan for files with payment card data, block them from being uploaded into Workspaces and generate alerts for audit reasons. Likewise, a sports equipment company may allow a shoe design document to be shared but still generate alerts to interested parties in the firm. Enabling the Three Pillars of Data Loss Prevention Workspaces has information security in its DNA and understands the needs of both the business user and the security-conscious enterprise. By combining Workspaces with DLP solutions, an enterprise has the most comprehensive set of tools to enable secure collaboration. The powerful combination of file protection and mobile security, visibility and alerts, and discovery and remediation allows organizations to seamlessly extend the compliance regimes they’ve established on their internal networks with DLP to the mobile, collaborative environment of modern organizations. PROTECT THE DISTRIBUTION OF SENSITIVE FILES “My employees need to share files for business reasons but we need to protect the content wherever it goes.” Workspaces provides mobile security and Digital Rights Man- agement PREVENT DISTRIBUTION OF SPECIFIED SENSITIVE CONTENT “I have a company policy that restricts content of certain types from being shared. I need to be compliant with company policy through visibility, remedi- ation and alerts.” Workspaces provides ICAP- based integration with DLP solutions DISCOVER AND PROTECT SENSITIVE CONTENT “I have discovered files with sensitive content on PCs and file systems. I now need to encrypt that content.” Workspaces provides API inte- gration with DLP Discovery tools Learn more at www.blackberry.com/workspaces